- Table View
- List View
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
by Salman Baset Luc Desrosiers Nitin Gaur Petr Novotny Anthony O’Dowd Venkatraman RamakrishnaLeverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease Key FeaturesWrite your own chaincode/smart contracts using Golang on hyperledger networkBuild and deploy decentralized applications (DApps)Dive into real world blockchain challenges such as integration and scalabilityBook DescriptionBBlockchain and Hyperledger technologiesare hot topics today. Hyperledger Fabric and Hyperledger Composer are open source projects that help organizations create private, permissioned blockchain networks. These find application in finance, banking, supply chain, and IoT among several other sectors. This book will be an easy reference to explore and build blockchain networks using Hyperledger technologies.The book starts by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. You will learn how to configure Hyperledger Fabric and become familiar with its architectural components. Using these components, you will learn to build private blockchain networks, along with the applications that connect to them. Starting from principles first, you’ll learn to design and launch a network, implement smart contracts in chaincode and much more. By the end of this book, you will be able to build and deploy your own decentralized applications, handling the key pain points encountered in the blockchain life cycle.What you will learnDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using basic Hyperledger Fabric deploymentUnderstand the considerations for creating decentralized applicationsLearn to integrate business networks with existing systemsWrite Smart Contracts quickly with Hyperledger ComposerDesign transaction model and chaincode with GolangDeploy Composer REST Gateway to access the Composer transactionsMaintain, monitor, and govern your blockchain solutionsWho this book is forThe book benefits business leaders as it provides a comprehensive view on blockchain business models, governance structure, and business design considerations of blockchain solutions. Technology leaders stand to gain a lot from the detailed discussion around the technology landscape, technology design, and architecture considerations in the book. With model-driven application development, this guide will speed up understanding and concept development for blockchain application developers. The simple and well organized content will put novices at ease with blockchain concepts and constructs.
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
by Joseph MarshallDetailed walkthroughs of how to discover, test, and document common web application vulnerabilities.Key FeaturesLearn how to test for common bugsDiscover tools and methods for hacking ethicallyPractice working through pentesting engagements step-by-stepBook DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You’ll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it’s found), and how to create the tools for automated pentesting workflows.Then, you’ll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research.What you will learnChoose what bug bounty programs to engage inUnderstand how to minimize your legal liability and hunt for bugs ethicallySee how to take notes that will make compiling your submission report easierKnow how to take an XSS vulnerability from discovery to verification, and report submissionAutomate CSRF PoC generation with PythonLeverage Burp Suite for CSRF detectionUse WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applicationsWrite your report in a way that will earn you the maximum amount of moneyWho this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.
Hands-On Business Intelligence with DAX: Discover the intricacies of this powerful query language to gain valuable insights from your data
by Ian HorneImplement business intelligence (BI), data modeling, and data analytics within Microsoft products such as Power BI, SQL Server, and Excel Key Features Understand the ins and outs of DAX expressions and querying functions with the help of easy-to-follow examples Manipulate data of varying complexity and optimize BI workflows to extract key insights Create, monitor, and improve the performance of models by writing clean and robust DAX queries Book Description Data Analysis Expressions (DAX) is known for its ability to increase efficiency by extracting new information from data that is already present in your model. With this book, you'll learn to use DAX's functionality and flexibility in the BI and data analytics domains. You'll start by learning the basics of DAX, along with understanding the importance of good data models, and how to write efficient DAX formulas by using variables and formatting styles. You'll then explore how DAX queries work with the help of examples. The book will guide you through optimizing the BI workflow by writing powerful DAX queries. Next, you'll learn to manipulate and load data of varying complexity within Microsoft products such as Power BI, SQL Server, and Excel Power Pivot. You'll then discover how to build and extend your data models to gain additional insights, before covering progressive DAX syntax and functions to understand complex relationships in DAX. Later, you'll focus on important DAX functions, specifically those related to tables, date and time, filtering, and statistics. Finally, you'll delve into advanced topics such as how the formula and storage engines work to optimize queries. By the end of this book, you'll have gained hands-on experience in employing DAX to enhance your data models by extracting new information and gaining deeper insights. What you will learn Understand DAX, from the basics through to advanced topics, and learn to build effective data models Write and use DAX functions and expressions with the help of hands-on examples Discover how to handle errors in your DAX code, and avoid unwanted results Load data into a data model using Power BI, Excel Power Pivot, and SSAS Tabular Cover DAX functions such as date, time, and time intelligence using code examples Gain insights into data by using DAX to create new information Understand the DAX VertiPaq engine and how it can help you optimize data models Who this book is for This book is for data analysts, business analysts, BI developers, or SQL users who want to make the best use of DAX in the BI and data analytics domain with the help of examples. Some understanding of BI concepts is mandatory to fully understand the concepts covered in the book.
Hands-On Business Intelligence with Qlik Sense: Implement self-service data analytics with insights and guidance from Qlik Sense experts
by Kaushik Solanki Pablo Labbe Clever Anjos Jerry DiMasoCreate dynamic dashboards to bring interactive data visualization to your enterprise using Qlik SenseKey FeaturesImplement various Qlik Sense features to create interactive dashboardsAnalyze data easily and make business decisions faster using Qlik SensePerform self-service data analytics and geospatial analytics using an example-based approachBook DescriptionQlik Sense allows you to explore simple-to-complex data to reveal hidden insights and data relationships to make business-driven decisions.Hands-On Business Intelligence with Qlik Sense begins by helping you get to grips with underlying Qlik concepts and gives you an overview of all Qlik Sense’s features. You will learn advanced modeling techniques and learn how to analyze the data loaded using a variety of visualization objects. You’ll also be trained on how to share apps through Qlik Sense Enterprise and Qlik Sense Cloud and how to perform aggregation with AGGR. As you progress through the chapters, you’ll explore the stories feature to create data-driven presentations and update an existing story. This book will guide you through the GeoAnalytics feature with the geo-mapping object and GeoAnalytics connector. Furthermore, you’ll learn about the self-service analytics features and perform data forecasting using advanced analytics. Lastly, you’ll deploy Qlik Sense apps for mobile and tablet. By the end of this book, you will be well-equipped to run successful business intelligence applications using Qlik Sense's functionality, data modeling techniques, and visualization best practices.What you will learnDiscover how to load, reshape, and model data for analysisApply data visualization practices to create stunning dashboardsMake use of Python and R for advanced analyticsPerform geo-analysis to create visualizations using native objectsLearn how to work with AGGR and data storiesWho this book is forIf you’re a data analyst, BI developer, or interested in business intelligence and want to gain practical experience of working on Qlik Sense, this book is for you. You’ll also find it useful if you want to explore Qlik Sense’s next-generation applications for self-service business intelligence. No prior experience of working with Qlik Sense is required.
Hands-On Chatbot Development with Alexa Skills and Amazon Lex: Create custom conversational and voice interfaces for your Amazon Echo devices and web platforms
by Sam WilliamsBuild artificial intelligence (AI) powered voice and text conversational interfaces with AmazonKey FeaturesDevelop Alexa Skills to create a working voice user interface (VUI)Integrate Amazon Lex chatbots into Facebook, Slack, and text messagesLearn to use AWS Lambda, Alexa Skills Kit, and Amazon LexBook DescriptionHave you ever wondered how Alexa apps are made, how voice-enabled technologies work, or how chatbots function? And why tech giants such as Amazon and Google are investing in voice technologies? A better question is: why should I start developing on these platforms? Hands-On Chatbot Development with Alexa Skills and Amazon Lex covers all features of the Alexa Skills kit with real-world examples that help you develop skills to integrate Echo and chatbots into Facebook, Slack, and Twilio with the Amazon Lex platform.The book starts with teaching you how to set up your local environment and AWS CLI so that you can automate the process of uploading AWS Lambda from your local machine. You will then learn to develop Alexa Skills and Lex chatbots using Lambda functions to control functionality. Once you’ve come to grips with this, you will learn to create increasingly complex chatbots, integrate Amazon S3, and change the way Alexa talks to the user. In the concluding chapters, we shift our focus to Amazon Lex and messaging chatbots. We will explore Alexa, learn about DynamoDB databases, and add cards to user conversations.By the end of this book, you will have explored a full set of technologies that will enable you to create your own voice and messaging chatbots using Amazon.What you will learnCreate a development environment using Alexa Skills Kit, AWS CLI, and Node.jsBuild Alexa Skills and Lex chatbots from scratchGain access to third-party APIs from your Alexa Skills and Lex chatbotsUse AWS services such as Amazon S3 and DynamoDB to enhance the abilities of your Alexa Skills and Amazon Lex chatbotsPublish a Lex chatbot to Facebook Messenger, Twilio SMS, and SlackCreate a custom website for your Lex chatbotsDevelop your own skills for Alexa-enabled devices such as the EchoWho this book is forHands-On Chatbot Development with Alexa Skills and Amazon Lex is for developers who are interested in building conversational bots and Alexa skills with Amazon. Prior experience with JavaScript programming is required.
Hands-On Chatbots and Conversational UI Development: Build chatbots and voice user interfaces with Chatfuel, Dialogflow, Microsoft Bot Framework, Twilio, and Alexa Skills
by Phil D Hall Vamsi Venigalla Srini JanarthanamKey Features Understand the different use cases of Conversational UIs with this project-based guide Build feature-rich Chatbots and deploy them on multiple platforms Get real-world examples of voice-enabled UIs for personal and home assistance Book Description Conversation as an interface is the best way for machines to interact with us using the universally accepted human tool that is language. Chatbots and voice user interfaces are two flavors of conversational UIs. Chatbots are real-time, data-driven answer engines that talk in natural language and are context-aware. Voice user interfaces are driven by voice and can understand and respond to users using speech. This book covers both types of conversational UIs by leveraging APIs from multiple platforms. We'll take a project-based approach to understand how these UIs are built and the best use cases for deploying them. We'll start by building a simple messaging bot from the Facebook Messenger API to understand the basics of bot building. Then we move on to creating a Task model that can perform complex tasks such as ordering and planning events with the newly-acquired-by-Google Dialogflow and Microsoft Bot framework. We then turn to voice-enabled UIs that are capable of interacting with users using speech with Amazon Alexa and Google Home. By the end of the book, you will have created your own line of chatbots and voice UIs for multiple leading platforms. What you will learn Design the flow of conversation between the user and the chatbot Create Task model chatbots for implementing tasks such as ordering food Get new toolkits and services in the chatbot ecosystem Integrate third-party information APIs to build interesting chatbots Find out how to deploy chatbots on messaging platforms Build a chatbot using MS Bot Framework See how to tweet, listen to tweets, and respond using a chatbot on Twitter Publish chatbots on Google Assistant and Amazon Alexa
Hands-On Cloud Administration in Azure: Implement, monitor, and manage important Azure services and components including IaaS and PaaS
by Mustafa ToromanExplore Azure services such as networking, virtual machines, web apps, databases, cloud migration, and securityKey FeaturesUnderstand Azure services to build, deploy, and manage workloads on cloudLearn in-depth core Azure services and work through real-world scenarios and case studiesA concise and practical guide for learning cloud administration on AzureBook DescriptionAzure continues to dominate the public cloud market and grow rapidly thanks to a number of recent innovations. Azure's wide range of services and support has led to a large number of customers switching to Azure cloud.Hands-On Cloud Administration in Azure starts with the basics of Azure cloud fundamentals and key concepts of the cloud computing ecosystem and services. Then, you will gradually get acquainted with core services provided by Azure, including Azure VNet, types and assignments of IP addresses, and network security groups. You will also work on creating and administering Azure Virtual Machines, types of virtual machines (VMs), and design VM solutions based on computing workloads. As you make your way through the chapters, you will explore Azure App Service, discover how to host your web apps in Azure, and monitor and troubleshoot them. In the concluding chapters, you will learn more complex and abstract services, such as Azure Storage, Azure Backup, and Azure Site Recovery. You will also get to grips with Azure SQL Databases and the SQL on Azure VM concept.By the end of this book, you will have obtained practical experience of working with Azure services and Azure administration, along with maintaining, monitoring, and securing your Azure resources.What you will learnUnderstand the concepts of IaaS and PaaSLearn design patterns for Azure solutionsDesign data solutions in AzureExplore concepts of hybrid clouds with AzureImplement Azure Security in cloudCreate and manage Azure resources with script-based toolsWho this book is forHands-On Cloud Administration in Azure is for system administrators, cloud admins, cloud engineers, and DevOps engineers who are interested in understanding administration-related services in Azure. Prior experience of working with Azure is an added advantage.
Hands-On Cloud Development with WildFly: Develop, deploy, and configure cloud-based, enterprise Java applications with WildFly Swarm and OpenShift
by Tomasz AdamskiCreate microservices using Java EE technologies using WildFly Swarm,deploy them in the OpenShift cloud, make them resilient to network failures using Hystrix, configure continuous integration using Jenkins, and security using Keycloak.Key FeaturesCreate functional microservices with WildFly SwarmUse OpenShift to deploy your microservices in the cloudMake your application production-ready using Jenkins, Hystrix, and KeycloakBook DescriptionThe book starts by introducing you to WildFly Swarm—a tool that allows you to create runnable microservices from Java EE components. You’ll learn the basics of Swarm operation—creating microservices containing only the parts of enterprise runtime needed in a specific case. Later, you’ll learn how to configure and test those services.In order to deploy our services in the cloud, we’ll use OpenShift. You’ll get to know basic information on its architecture, features, and relationship to Docker and Kubernetes. Later, you’ll learn how to deploy and configure your services to run in the OpenShift cloud.In the last part of the book, you’ll see how to make your application production-ready. You’ll find out how to configure continuous integration for your services using Jenkins, make your application resistant to network failures using Hystrix, and how to secure them using Keycloak. By the end of the book, you’ll have a functional example application and will have practical knowledge of Java EE cloud development that can be used as a reference in your other projects.What you will learnUtilize Java EE technology to develop modern cloud-enabled applicationsEasily create microservices with WildFly Swarm using proven Java EE technologiesSee the benefits of OpenShift – easy deployment of your services, out of the box scalability and healing, and integration with Continuous Integration toolsIntegrate the sample application with Jenkins’ Continuous Integration serverUtilize Hystrix to provide resilience to your applicationProvide security to your application using KeycloakWho this book is forIf you're an experienced developer familiar with Java EE technologies and would like to learn how you can use those technologies in the cloud with WildFly and OpenShift, then this book is for you.
Hands-On Cloud Solutions with Azure: Architecting, developing, and deploying the Azure way
by Greg LeonardoDesign effective Azure architecture and transform your IT business solutionsKey FeaturesDevelop a resilient and robust cloud environmentDeploy and manage cost-effective and highly available solutions on your public cloudDesign and implement enterprise-level cloud solutionsBook DescriptionAzure provides cloud-based solutions to support your business demands. Building and running solutions on Azure will help your business maximize the return on investment and minimize the total cost of ownership.Hands-On Cloud Solutions with Azure focuses on addressing the architectural decisions that usually arise when you design or migrate a solution to Microsoft Azure. You will start by designing the building blocks of infrastructure solution on Azure, such as Azure compute, storage, and networking, followed by exploring the database options it offers. You will get to grips with designing scalable web and mobile solutions and understand where to host your Active Directory and Identity Solution. Moving on, you’ll learn how to extend DevOps to Azure.You will also beneft from some exciting services that enable extremely smooth operations and streamlined DevOps between on-premises and cloud. The book will help you to design a secure environment for your solution, on both the Cloud and hybrid. Toward the end, you’ll see how to manage and monitor cloud and hybrid solutions.By the end of this book, you will be armed with all the tools and knowledge you need to properly plan and design your solutions on Azure, whether it’s for a brand new project or migration project.What you will learnGet started with Azure by understanding tenants, subs, and resource groupsDecide whether to “lift and shift” or migrate appsPlan and architect solutions in AzureBuild ARM templates for Azure resourcesDevelop and deploy solutions in AzureUnderstand how to monitor and support your application with AzureMake your life easier with Azure best practices and tipsWho this book is forIf you’re an IT consultant, developer, or solutions architect looking to design effective solutions for your organization, this book is for you. Some knowledge of cloud computing will assist with understanding the key concepts covered in this book.
Hands-On Cloud-Native Applications with Java and Quarkus: Build high performance, Kubernetes-native Java serverless applications
by Francesco MarchioniBuild robust and reliable Java applications that works on modern infrastructure, such as containers and cloud, using the new features in Quarkus 1.0 Key Features Build apps with faster boot time and low RSS memory using the latest Quarkus 1.0 features Seamlessly integrate imperative and reactive programming models to build modern Java applications Discover effective solutions for running Java on serverless apps, microservices, containers, FaaS, and the cloud Book Description Quarkus is a new Kubernetes-native framework that allows Java developers to combine the power of containers, microservices, and cloud-native to build reliable applications. The book is a development guide that will teach you how to build Java-native applications using Quarkus and GraalVM. We start by learning about the basic concepts of a cloud-native application and its advantages over standard enterprise applications. Then we will quickly move on to application development, by installing the tooling required to build our first application on Quarkus. Next, we'll learn how to create a container-native image of our application and execute it in a Platform-as-a-Service environment such as Minishift. Later, we will build a complete real-world application that will use REST and the Contexts and Dependency injection stack with a web frontend. We will also learn how to add database persistence to our application using PostgreSQL. We will learn how to work with various APIs available to Quarkus such as Camel, Eclipse MicroProfile, and Spring DI. Towards the end, we will learn advanced development techniques such as securing applications, application configuration, and working with non-blocking programming models using Vert.x. By the end of this book, you will be proficient with all the components of Quarkus and develop-blazing fast applications leveraging modern technology infrastructure. What you will learn Build a native application using Quarkus and GraalVM Secure your applications using Elytron and the MicroProfile JWT extension Manage data persistence with Quarkus using PostgreSQL Use a non-blocking programming model with Quarkus Learn how to get Camel and Infinispan working in native mode Deploy an application in a Kubernetes-native environment using Minishift Discover Reactive Programming with Vert.x Who this book is for The book is for Java developers and software architects who are interested in learning a promising microservice architecture for building reliable and robust applications. Knowledge of Java, Spring Framework, and REST APIs is assumed.
Hands-On Cloud-Native Microservices with Jakarta EE: Build scalable and reactive microservices with Docker, Kubernetes, and OpenShift
by Luigi Fugaro Mauro VocaleDiscover how cloud-native microservice architecture helps you to build dynamically scalable applications by using the most widely used and adopted runtime environments Key Features Build robust cloud-native applications using a variety of tools Understand how to configure both Amazon Web Services (AWS) and Docker clouds for high availability Explore common design patterns used in building and deploying microservices architecture. Book Description Businesses today are evolving rapidly, and developers now face the challenge of building applications that are resilient, flexible, and native to the cloud. To achieve this, you'll need to be aware of the environment, tools, and resources that you're coding against. The book will begin by introducing you to cloud-native architecture and simplifying the major concepts. You'll learn to build microservices in Jakarta EE using MicroProfile with Thorntail and Narayana LRA. You'll then delve into cloud-native application x-rays, understanding the MicroProfile specification and the implementation/testing of microservices. As you progress further, you'll focus on continuous integration and continuous delivery, in addition to learning how to dockerize your services. You'll also cover concepts and techniques relating to security, monitoring, and troubleshooting problems that might occur with applications after you've written them. By the end of this book, you will be equipped with the skills you need to build highly resilient applications using cloud-native microservice architecture. What you will learn Integrate reactive principles in MicroProfile microservices architecture Explore the 12-factors-app paradigm and its implications Get the best out of Java versions 8 and 9 to implement a microservice based on Thorntail Understand what OpenShift is and why it is so important for an elastic architecture Build a Linux container image using Docker and scale the application using Kubernetes Implement various patterns such as, Circuit Breaker and bulkheads Get to grips with the DevOps methodology using continuous integration (CI) and continuous deployment (CD) Who this book is for This book is for developers with basic knowledge of Java EE and HTTP-based application principles who want to learn how to build, test and scale Java EE microservices. No prior experience of writing microservices in Java EE is required.
Hands-On Computer Vision with Detectron2: Develop object detection and segmentation models with a code and visualization approach
by Van Vung Pham Tommy DangExplore Detectron2 using cutting-edge models and learn all about implementing future computer vision applications in custom domainsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how to tackle common computer vision tasks in modern businesses with Detectron2Leverage Detectron2 performance tuning techniques to control the model's finest detailsDeploy Detectron2 models into production and develop Detectron2 models for mobile devicesBook DescriptionComputer vision is a crucial component of many modern businesses, including automobiles, robotics, and manufacturing, and its market is growing rapidly. This book helps you explore Detectron2, Facebook's next-gen library providing cutting-edge detection and segmentation algorithms. It's used in research and practical projects at Facebook to support computer vision tasks, and its models can be exported to TorchScript or ONNX for deployment.The book provides you with step-by-step guidance on using existing models in Detectron2 for computer vision tasks (object detection, instance segmentation, key-point detection, semantic detection, and panoptic segmentation). You'll get to grips with the theories and visualizations of Detectron2's architecture and learn how each module in Detectron2 works. As you advance, you'll build your practical skills by working on two real-life projects (preparing data, training models, fine-tuning models, and deployments) for object detection and instance segmentation tasks using Detectron2. Finally, you'll deploy Detectron2 models into production and develop Detectron2 applications for mobile devices.By the end of this deep learning book, you'll have gained sound theoretical knowledge and useful hands-on skills to help you solve advanced computer vision tasks using Detectron2.What you will learnBuild computer vision applications using existing models in Detectron2Grasp the concepts underlying Detectron2's architecture and componentsDevelop real-life projects for object detection and object segmentation using Detectron2Improve model accuracy using Detectron2's performance-tuning techniquesDeploy Detectron2 models into server environments with easeDevelop and deploy Detectron2 models into browser and mobile environmentsWho this book is forIf you are a deep learning application developer, researcher, or software developer with some prior knowledge about deep learning, this book is for you to get started and develop deep learning models for computer vision applications. Even if you are an expert in computer vision and curious about the features of Detectron2, or you would like to learn some cutting-edge deep learning design patterns, you will find this book helpful. Some HTML, Android, and C++ programming skills are advantageous if you want to deploy computer vision applications using these platforms.
Hands-On Computer Vision with Julia: Build complex applications with advanced Julia packages for image processing, neural networks, and Artificial Intelligence
by Dmitrijs CudihinsExplore the various packages in Julia that support image processing and build neural networks for video processing and object tracking.Key Features Build a full-fledged image processing application using JuliaImages Perform basic to advanced image and video stream processing with Julia's APIs Understand and optimize various features of OpenCV with easy examplesBook DescriptionHands-On Computer Vision with Julia is a thorough guide for developers who want to get started with building computer vision applications using Julia. Julia is well suited to image processing because it’s easy to use and lets you write easy-to-compile and efficient machine code..This book begins by introducing you to Julia's image processing libraries such as Images.jl and ImageCore.jl. You’ll get to grips with analyzing and transforming images using JuliaImages; some of the techniques discussed include enhancing and adjusting images. As you make your way through the chapters, you’ll learn how to classify images, cluster them, and apply neural networks to solve computer vision problems. In the concluding chapters, you will explore OpenCV applications to perform real-time computer vision analysis, for example, face detection and object tracking. You will also understand Julia's interaction with Tesseract to perform optical character recognition and build an application that brings together all the techniques we introduced previously to consolidate the concepts learned.By end of the book, you will have understood how to utilize various Julia packages and a few open source libraries such as Tesseract and OpenCV to solve computer vision problems with ease.What you will learn Analyze image metadata and identify critical data using JuliaImages Apply filters and improve image quality and color schemes Extract 2D features for image comparison using JuliaFeatures Cluster and classify images with KNN/SVM machine learning algorithms Recognize text in an image using the Tesseract library Use OpenCV to recognize specific objects or faces in images and videos Build neural network and classify images with MXNetWho this book is forHands-On Computer Vision with Julia is for Julia developers who are interested in learning how to perform image processing and want to explore the field of computer vision. Basic knowledge of Julia will help you understand the concepts more effectively.
Hands-On Computer Vision with PyTorch: Explore deep learning concepts and implement over 50 real-world image applications
by V Kishore Ayyadevara Yeshwanth ReddyThis book is for beginners to computer vision using PyTorch and intermediate-level machine learning practitioners who are looking to get well-versed with computer vision techniques using deep learning and PyTorch. Those who are just getting started with neural networks will also find this book useful. Basic knowledge of the Python programming language and machine learning is all you need to get started with this computer vision deep learning book.
Hands-On Computer Vision with TensorFlow 2: Leverage deep learning to create powerful image processing apps with TensorFlow 2.0 and Keras
by Benjamin Planche Eliot AndresA practical guide to building high performance systems for object detection, segmentation, video processing, smartphone applications, and more. This book is based on the alpha version of TensorFlow 2.Key FeaturesDiscover how to build, train, and serve your own deep neural networks with TensorFlow 2 and KerasApply modern solutions to a wide range of applications such as object detection and video analysisLearn how to run your models on mobile devices and webpages and improve their performanceBook DescriptionComputer vision solutions are becoming increasingly common, making their way in fields such as health, automobile, social media, and robotics. This book will help you explore TensorFlow 2, the brand new version of Google's open source framework for machine learning. You will understand how to benefit from using convolutional neural networks (CNNs) for visual tasks.Hands-On Computer Vision with TensorFlow 2 starts with the fundamentals of computer vision and deep learning, teaching you how to build a neural network from scratch. You will discover the features that have made TensorFlow the most widely used AI library, along with its intuitive Keras interface, and move on to building, training, and deploying CNNs efficiently. Complete with concrete code examples, the book demonstrates how to classify images with modern solutions, such as Inception and ResNet, and extract specific content using You Only Look Once (YOLO), Mask R-CNN, and U-Net. You will also build Generative Adversarial Networks (GANs) and Variational Auto-Encoders (VAEs) to create and edit images, and LSTMs to analyze videos. In the process, you will acquire advanced insights into transfer learning, data augmentation, domain adaptation, and mobile and web deployment, among other key concepts.By the end of the book, you will have both the theoretical understanding and practical skills to solve advanced computer vision problems with TensorFlow 2.0.What you will learnCreate your own neural networks from scratchClassify images with modern architectures including Inception and ResNetDetect and segment objects in images with YOLO, Mask R-CNN, and U-NetTackle problems in developing self-driving cars and facial emotion recognition systemsBoost your application’s performance with transfer learning, GANs, and domain adaptationUse recurrent neural networks for video analysisOptimize and deploy your networks on mobile devices and in the browserWho this book is forIf you’re new to deep learning and have some background in Python programming and image processing, like reading/writing image files and editing pixels, this book is for you. Even if you’re an expert curious about the new TensorFlow 2 features, you’ll find this book useful.While some theoretical explanations require knowledge in algebra and calculus, the book covers concrete examples for learners focused on practical applications such as visual recognition for self-driving cars and smartphone apps.
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust
by Brian L. TroutwineGet to grips with modern software demands by learning the effective uses of Rust's powerful memory safety.Key Features Learn and improve the sequential performance characteristics of your software Understand the use of operating system processes in a high-scale concurrent system Learn of the various coordination methods available in the Standard library Book DescriptionMost programming languages can really complicate things, especially with regard to unsafe memory access. The burden on you, the programmer, lies across two domains: understanding the modern machine and your language's pain-points. This book will teach you to how to manage program performance on modern machines and build fast, memory-safe, and concurrent software in Rust. It starts with the fundamentals of Rust and discusses machine architecture concepts. You will be taken through ways to measure and improve the performance of Rust code systematically and how to write collections with confidence. You will learn about the Sync and Send traits applied to threads, and coordinate thread execution with locks, atomic primitives, data-parallelism, and more.The book will show you how to efficiently embed Rust in C++ code and explore the functionalities of various crates for multithreaded applications. It explores implementations in depth. You will know how a mutex works and build several yourself. You will master radically different approaches that exist in the ecosystem for structuring and managing high-scale systems. By the end of the book, you will feel comfortable with designing safe, consistent, parallel, and high-performance applications in Rust.What you will learn Probe your programs for performance and accuracy issues Create your own threading and multi-processing environment in Rust Use coarse locks from Rust’s Standard library Solve common synchronization problems or avoid synchronization using atomic programming Build lock-free/wait-free structures in Rust and understand their implementations in the crates ecosystem Leverage Rust’s memory model and type system to build safety properties into your parallel programs Understand the new features of the Rust programming language to ease the writing of parallel programsWho this book is forThis book is aimed at software engineers with a basic understanding of Rust who want to exploit the parallel and concurrent nature of modern computing environments, safely.
Hands-On Continuous Integration and Delivery: Build and release quality software at scale with Jenkins, Travis CI, and CircleCI
by Jean-Marcel BelmontUnderstand various tools and practices for building a continuous integration and delivery pipeline effectivelyKey FeaturesGet up and running with the patterns of continuous integrationLearn Jenkins UI for developing plugins and build an effective Jenkins pipelineAutomate CI/CD with command-line tools and scriptsBook DescriptionHands-On Continuous Integration and Delivery starts with the fundamentals of continuous integration (CI) and continuous delivery (CD) and where it fits in the DevOps ecosystem. You will explore the importance of stakeholder collaboration as part of CI/CD.As you make your way through the chapters, you will get to grips with Jenkins UI, and learn to install Jenkins on different platforms, add plugins, and write freestyle scripts. Next, you will gain hands-on experience of developing plugins with Jenkins UI, building the Jenkins 2.0 pipeline, and performing Docker integration. In the concluding chapters, you will install Travis CI and Circle CI and carry out scripting, logging, and debugging, helping you to acquire a broad knowledge of CI/CD with Travis CI and CircleCI.By the end of this book, you will have a detailed understanding of best practices for CI/CD systems and be able to implement them with confidence.What you will learnInstall Jenkins on multiple operating systemsWork with Jenkins freestyle scripts, pipeline syntax, and methodologyExplore Travis CI build life cycle events and multiple build languagesMaster the Travis CI CLI (command-line interface) and automate tasks with the CLIUse CircleCI CLI jobs and work with pipelinesAutomate tasks using CircleCI CLI and learn to debug and troubleshootLearn open source tooling such as Git and GitHubInstall Docker and learn concepts in shell scriptingWho this book is forHands-On Continuous Integration and Delivery is for system administrators, DevOps engineers, and build and release engineers who want to understand the concept of CI and gain hands-on experience working with prominent tools in the CI ecosystem. Basic knowledge of software delivery is an added advantage.
Hands-On Convolutional Neural Networks with TensorFlow: Solve computer vision problems with modeling in TensorFlow and Python.
by Richard Burton Iffat Zafar Giounona Tzanidou Nimesh Patel Leonardo AraujoLearn how to apply TensorFlow to a wide range of deep learning and Machine Learning problems with this practical guide on training CNNs for image classification, image recognition, object detection and many computer vision challenges.Key FeaturesLearn the fundamentals of Convolutional Neural NetworksHarness Python and Tensorflow to train CNNsBuild scalable deep learning models that can process millions of itemsBook DescriptionConvolutional Neural Networks (CNN) are one of the most popular architectures used in computer vision apps. This book is an introduction to CNNs through solving real-world problems in deep learning while teaching you their implementation in popular Python library - TensorFlow. By the end of the book, you will be training CNNs in no time!We start with an overview of popular machine learning and deep learning models, and then get you set up with a TensorFlow development environment. This environment is the basis for implementing and training deep learning models in later chapters. Then, you will use Convolutional Neural Networks to work on problems such as image classification, object detection, and semantic segmentation.After that, you will use transfer learning to see how these models can solve other deep learning problems. You will also get a taste of implementing generative models such as autoencoders and generative adversarial networks.Later on, you will see useful tips on machine learning best practices and troubleshooting. Finally, you will learn how to apply your models on large datasets of millions of images. What you will learnTrain machine learning models with TensorFlowCreate systems that can evolve and scale during their life cycleUse CNNs in image recognition and classificationUse TensorFlow for building deep learning models Train popular deep learning modelsFine-tune a neural network to improve the quality of results with transfer learningBuild TensorFlow models that can scale to large datasets and systemsWho this book is forThis book is for Software Engineers, Data Scientists, or Machine Learning practitioners who want to use CNNs for solving real-world problems. Knowledge of basic machine learning concepts, linear algebra and Python will help.
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
by Samuel BowneLearn to evaluate and compare data encryption methods and attack cryptographic systemsKey FeaturesExplore popular and important cryptographic methodsCompare cryptographic modes and understand their limitationsLearn to perform attacks on cryptographic systemsBook DescriptionCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption.What you will learnProtect data with encryption and hashingExplore and compare various encryption methodsEncrypt data using the Caesar Cipher techniqueMake hashes and crack themLearn how to use three NIST-recommended systems: AES, SHA, and RSAUnderstand common errors in encryption and exploit themWho this book is forHands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.
Hands-On Cyber Security for Finance: Identify Vulnerabilities And Secure Your Financial Services From Security Breaches
by Erdal OzkayaIf you are a security architect, cyber risk manager,or pentester looking at securing your financial organization then, this book is for you. Some basic understanding of cybersecurity tools and practices would smoothen your journey.
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
by Neil Rerup Milad AslanerGain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organizationKey FeaturesArchitect complex security structures using standard practices and use casesIntegrate security with any architecture solutionImplement cybersecurity architecture in various enterprisesBook DescriptionSolutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging security approaches.Hands-On Cybersecurity for Architects will help you to successfully design, integrate, and implement complex security structures in any solution whilst ensuring that the solution functions as expected. To start with, you will get to grips with the fundamentals of recent cybersecurity practices, followed by acquiring and understanding your organization's requirements. You will then move on to learning how to plan and design robust security architectures, along with practical approaches to performing various security assessments. Once you have grasped all this, you will learn to design and develop key requirements, such as firewalls, virtual private networks (VPNs), wide area networks (WANs), and digital certifications. In addition to this, you will discover how to integrate upcoming security changes on Bring your own device (BYOD), cloud platforms, and the Internet of Things (IoT), among others. Finally, you will explore how to design frequent updates and upgrades for your systems as per your enterprise's needs.By the end of this book, you will be able to architect solutions with robust security components for your infrastructure.What you will learnUnderstand different security architecture layers and their integration with all solutionsStudy SWOT analysis and dig into your organization’s requirements to drive the strategyDesign and implement a secure email service approachMonitor the age and capacity of security tools and architectureExplore growth projections and architecture strategyIdentify trends, as well as what a security architect should take into considerationWho this book is forHands-On Cybersecurity for Architects is for you if you are a security, network, or system administrator interested in taking on more complex responsibilities such as designing and implementing complex security structures. Basic understanding of network and computer security implementation will be helpful. This book is also ideal for non-security architects who want to understand how to integrate security into their solutions.
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
by Rajneesh GuptaDevelop blockchain application with step-by-step instructions, working example and helpful recommendationsKey Features● Understanding the blockchain technology from the cybersecurity perspective● Developing cyber security solutions with Ethereum blockchain technology● Understanding real-world deployment of blockchain based applicationsBook DescriptionBlockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world’s most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value.This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions.Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain.What you will learn● Understand the cyberthreat landscape● Learn about Ethereum and Hyperledger Blockchain● Program Blockchain solutions● Build Blockchain-based apps for 2FA, and DDoS protection● Develop Blockchain-based PKI solutions and apps for storing DNS entries● Challenges and the future of cybersecurity and BlockchainWho this book is forThe book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage.
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
by Sion RetzkinUnderstanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features Understand the concept of Dark Net and Deep Web Use Tor to extract data and maintain anonymity Develop a security framework using Deep web evidences Book Description The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis What you will learn Access the Deep Web and the Dark Web Learn to search and find information in the Dark Web Protect yourself while browsing the Dark Web Understand what the Deep Web and Dark Web are Learn what information you can gather, and how Who this book is for This book is targeted towards security professionals, security analyst, or any stakeholder interested in learning the concept of deep web and dark net. No prior knowledge on Deep Web and Dark Net is required
Hands-On Dashboard Development with QlikView: Practical guide to creating interactive and user-friendly business intelligence dashboards
by Abhishek AgarwalA step-by-step approach to building stunning dashboards with QlikView Key Features Perform effective storytelling through interactive dashboards built with QlikView Create different types of visualizations from a variety of data sources Includes tips, tricks, and best practices to perform effective Business Intelligence using QlikView Book Description QlikView is one of the market leaders when it comes to building effective Business Intelligence solutions. This book will show how you can leverage its power to build your own dashboards to tell your own data story. The book starts with showing you how to connect your data to QlikView and create your own QlikView application. You will learn how to add data from multiple sources, create a data model by joining data, and then review it on the front end. You will work with QlikView components such as charts, list boxes, input boxes, and text objects to create stunning visualizations that help give actionable business insights. You will also learn how to perform analysis on your data in QlikView and master the various types of security measures to be taken in QlikView. By the end of this book, you will have all the essential knowledge required for insightful data storytelling and creating useful BI dashboards using QlikView. What you will learn Learn to use the latest and newest features of QlikView Connect QlikView to various data sources, such as databases and websites Create a fully featured data model without circular references Display your data in maps, charts, and text across multiple sheets Apply set analysis to your data in QlikView expressions Secure your data based on the various audience types Who this book is for This book is best suited for BI professionals, data analysts and budding QlikView developers who wish to build effective dashboards using QlikView. Some basic understanding of the data visualization concepts and Business Intelligence is required.
Hands-On Dashboard Development with Shiny: A practical guide to building effective web applications and dashboards
by Chris BeeleyProgressively explore UI development with Shiny via practical examplesKey FeaturesWrite a Shiny interface in pure HTMLExplore powerful layout functions to make attractive dashboards and other intuitive interfacesGet to grips with Bootstrap and leverage it in your Shiny applicationsBook DescriptionAlthough vanilla Shiny applications look attractive with some layout flexibility, you may still want to have more control over how the interface is laid out to produce a dashboard. Hands-On Dashboard Development with Shiny helps you incorporate this in your applications.The book starts by guiding you in producing an application based on the diamonds dataset included in the ggplot2 package. You’ll create a single application, but the interface will be reskinned and rebuilt throughout using different methods to illustrate their uses and functions using HTML, CSS, and JavaScript. You will also learn to develop an application that creates documents and reports using R Markdown. Furthermore, the book demonstrates the use of HTML templates and the Bootstrap framework. Moving along, you will learn how to produce dashboards using the Shiny command and dashboard package. Finally, you will learn how to lay out applications using a wide range of built-in functions.By the end of the book, you will have an understanding of the principles that underpin layout in Shiny applications, including sections of HTML added to a vanilla Shiny application, HTML interfaces written from scratch, dashboards, navigation bars, and interfaces.What you will learnAdd HTML to a Shiny application and write its interfaces from scratch in HTMLUse built-in Shiny functions to produce attractive and flexible layoutsProduce dashboards, adding icons and notificationsExplore Bootstrap themes to lay out your applicationsGet insights into UI development with hands-on examplesUse R Markdown to create and download reportsWho this book is forIf you have some experience writing Shiny applications and want to use HTML, CSS, and Bootstrap to make custom interfaces, then this book is for you.