- Table View
- List View
Practical Tableau: 100 Tips, Tutorials, and Strategies from a Tableau Zen Master
by Ryan SleeperWhether you have some experience with Tableau software or are just getting started, this manual goes beyond the basics to help you build compelling, interactive data visualization applications. Author Ryan Sleeper, one of the worldâ??s most qualified Tableau consultants, complements his web posts and instructional videos with this guide to give you a firm understanding of how to use Tableau to find valuable insights in data.Over five sections, Sleeperâ??recognized as a Tableau Zen Master, Tableau Public Visualization of the Year author, and Tableau Iron Viz Championâ??provides visualization tips, tutorials, and strategies to help you avoid the pitfalls and take your Tableau knowledge to the next level.Practical Tableau sections include:Fundamentals: get started with Tableau from the beginningChart types: use step-by-step tutorials to build a variety of charts in TableauTips and tricks: learn innovative uses of parameters, color theory, how to make your Tableau workbooks run efficiently, and moreFramework: explore the INSIGHT framework, a proprietary process for building Tableau dashboardsStorytelling: learn tangible tactics for storytelling with data, including specific and actionable tips you can implement immediately
Practical TensorFlow.js: Deep Learning in Web App Development
by Juan De RiveraDevelop and deploy deep learning web apps using the TensorFlow.js library. TensorFlow.js is part of a bigger framework named TensorFlow, which has many tools that supplement it, such as TensorBoard, ml5js, tfjs-vis. This book will cover all these technologies and show they integrate with TensorFlow.js to create intelligent web apps.The most common and accessible platform users interact with everyday is their web browser, making it an ideal environment to deploy AI systems. TensorFlow.js is a well-known and battle-tested library for creating browser solutions. Working in JavaScript, the so-called language of the web, directly on a browser, you can develop and serve deep learning applications.You'll work with deep learning algorithms such as feedforward neural networks, convolutional neural networks (CNN), recurrent neural networks (RNN), and generative adversarial network (GAN). Through hands-on examples, apply these networks in use cases related to image classification, natural language processing, object detection, dimensionality reduction, image translation, transfer learning, and time series analysis.Also, these topics are very varied in terms of the kind of data they use, their output, and the training phase. Not everything in machine learning is deep networks, there is also what some call shallow or traditional machine learning. While TensorFlow.js is not the most common place to implement these, you'll be introduce them and review the basics of machine learning through TensorFlow.js.What You'll LearnBuild deep learning products suitable for web browsersWork with deep learning algorithms such as feedforward neural networks, convolutional neural networks (CNN), recurrent neural networks (RNN), and generative adversarial network (GAN)Develop apps using image classification, natural language processing, object detection, dimensionality reduction, image translation, transfer learning, and time series analysisWho This Book Is For Programmers developing deep learning solutions for the web and those who want to learn TensorFlow.js with at least minimal programming and software development knowledge. No prior JavaScript knowledge is required, but familiarity with it is helpful.
Practical Test Automation: Learn to Use Jasmine, RSpec, and Cucumber Effectively for Your TDD and BDD
by Panos MatsinopoulosLearn the principles behind test-driven development (TDD) and behavior-driven development (BDD) and see how Jasmine, RSpec and Cucumber can be used to your advantage. This book examines some of the leading technologies used for testing. You'll see how to use Jasmine’s features to work with a JavaScript application. You will learn how to use Mini Test and RSpec with Ruby and Rubymine. Finally, you’ll use Cucumber to develop your software using a BDD approach. Understanding test automation is a vital skill for any web developer. Practical Test Automation breaks down for you some of the important TDD and BDD technologies on the modern web. What You'll Learn Test an example JavaScript application with JasmineUse Jasmine with JS BinWork with Minitest for test-driven developmentTest an example Ruby project with RSpecUse Cucumber and Gherkin for behavior-driven developmentIntegrate Cucumber with RSpec Who This Book Is For This book is for anyone who wants to learn test automation and more about test-driven development and behavior-driven development.
Practical Test-Driven Development using C# 7: Unleash The Power Of Tdd By Implementing Real World Examples Under . Net Environment And Javascript
by John CallawayTest-Driven Development (TDD) is a methodology that helps you to write as little as code as possible to satisfy the software requirements, and that what you've written does what its supposed to do. If you're looking for a practical resource on Test-Driven Development this is the book for you. You've found a practical end to end guide that will help you to implement Test-Driven Techniques for your software development projects.
Practical Test-Driven Development using C# 7: Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
by John Callaway Clayton HuntDevelop applications for the real world with a thorough software testing approach Key Features Develop a thorough understanding of TDD and how it can help you develop simpler applications with no defects using C# and JavaScript Adapt to the mindset of writing tests before code by incorporating business goals, code manageability, and other factors Make all your software units and modules pass tests by analyzing failed tests and refactoring code as and when required Book Description Test-Driven Development (TDD) is a methodology that helps you to write as little as code as possible to satisfy software requirements, and ensures that what you've written does what it's supposed to do. If you're looking for a practical resource on Test-Driven Development this is the book for you. You've found a practical end-to-end guide that will help you implement Test-Driven Techniques for your software development projects. You will learn from industry standard patterns and practices, and shift from a conventional approach to a modern and efficient software testing approach in C# and JavaScript. This book starts with the basics of TDD and the components of a simple unit test. Then we look at setting up the testing framework so that you can easily run your tests in your development environment. You will then see the importance of defining and testing boundaries, abstracting away third-party code (including the .NET Framework), and working with different types of test double such as spies, mocks, and fakes. Moving on, you will learn how to think like a TDD developer when it comes to application development. Next, you'll focus on writing tests for new/changing requirements and covering newly discovered bugs, along with how to test JavaScript applications and perform integration testing. You’ll also learn how to identify code that is inherently un-testable, and identify some of the major problems with legacy applications that weren’t written with testability in mind. By the end of the book, you’ll have all the TDD skills you'll need and you’ll be able to re-enter the world as a TDD expert! What you will learn The core concepts of TDD Testing in action with a real-world case study in C# and JavaScript using React Writing proper Unit Tests and testable code for your application Using different types of test double such as stubs, spies, and mocks Growing an application guided by tests Exploring new developments on a green-field application Mitigating the problems associated with writing tests for legacy applications Modifying a legacy application to make it testableWho this book is for This book is for software developers with a basic knowledge of Test Driven Development (TDD) who want a thorough understanding of how TDD can benefit them and the applications they produce. The examples in this book are in C#, and you will need a basic understanding of C# to work through these examples.
Practical Text Analytics
by Steven StruhlBridging the gap between the marketer who must put text analytics to use and the increasingly rarefied community of data analysis experts, Practical Text Analytics is an accessible guide to the many remarkable advances in text analytics that specialists are discussing among themselves. Instead of being a resource for programmers, a book on theory or an introduction on how to use advanced statistical programs, this daily reference resource cuts through the profusion of jargon, evaluating the strengths and weaknesses of various methods and serving as a guide to what is credible in this fast-moving and often confusing field. Practical Text Analytics provides guidance on the application of text analytics for marketing professionals who must interpret the results and apply them in their campaigns. It presents the process of analysis in ways that people who use the data need to see them, helping marketers to clarify and organize confidently the confusing array of methods, frame the right questions and apply the results successfully to find meaning in any unstructured data and develop powerful new marketing strategies. About the series: The Marketing Science series makes difficult topics accessible to marketing students and practitioners by grounding them in business reality. Each book is written by an expert in the field and includes case studies and illustrations enabling marketers to gain confidence in applying the tools and techniques and in commissioning external research.
Practical Text Analytics: Maximizing the Value of Text Data (Advances in Analytics and Data Science #2)
by Murugan Anandarajan Chelsey Hill Thomas NolanThis book introduces text analytics as a valuable method for deriving insights from text data. Unlike other text analytics publications, Practical Text Analytics: Maximizing the Value of Text Data makes technical concepts accessible to those without extensive experience in the field. Using text analytics, organizations can derive insights from content such as emails, documents, and social media. Practical Text Analytics is divided into five parts. The first part introduces text analytics, discusses the relationship with content analysis, and provides a general overview of text mining methodology. In the second part, the authors discuss the practice of text analytics, including data preparation and the overall planning process. The third part covers text analytics techniques such as cluster analysis, topic models, and machine learning. In the fourth part of the book, readers learn about techniques used to communicate insights from text analysis, including data storytelling. The final part of Practical Text Analytics offers examples of the application of software programs for text analytics, enabling readers to mine their own text data to uncover information.
Practical Text Mining with Perl
by Roger BilisolyProvides readers with the methods, algorithms, and means to perform text mining tasksThis book is devoted to the fundamentals of text mining using Perl, an open-source programming tool that is freely available via the Internet (www.perl.org). It covers mining ideas from several perspectives--statistics, data mining, linguistics, and information retrieval--and provides readers with the means to successfully complete text mining tasks on their own.The book begins with an introduction to regular expressions, a text pattern methodology, and quantitative text summaries, all of which are fundamental tools of analyzing text. Then, it builds upon this foundation to explore:Probability and texts, including the bag-of-words modelInformation retrieval techniques such as the TF-IDF similarity measureConcordance lines and corpus linguisticsMultivariate techniques such as correlation, principal components analysis, and clusteringPerl modules, German, and permutation testsEach chapter is devoted to a single key topic, and the author carefully and thoughtfully introduces mathematical concepts as they arise, allowing readers to learn as they go without having to refer to additional books. The inclusion of numerous exercises and worked-out examples further complements the book's student-friendly format.Practical Text Mining with Perl is ideal as a textbook for undergraduate and graduate courses in text mining and as a reference for a variety of professionals who are interested in extracting information from text documents.
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
by Megan Roddie Jason Deyalsingh Gary J. KatzGo on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey FeaturesGain a comprehensive understanding of threat validationLeverage open-source tools to test security detectionsHarness open-source content to supplement detection and testingBook DescriptionThreat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline. This comprehensive detection engineering guide will serve as an introduction for those who are new to detection validation, providing valuable guidelines to swiftly bring you up to speed. The book will show you how to apply the supplied frameworks to assess, test, and validate your detection program. It covers the entire life cycle of a detection, from creation to validation, with the help of real-world examples. Featuring hands-on tutorials and projects, this guide will enable you to confidently validate the detections in your security program. This book serves as your guide to building a career in detection engineering, highlighting the essential skills and knowledge vital for detection engineers in today's landscape. By the end of this book, you’ll have developed the skills necessary to test your security detection program and strengthen your organization’s security measures.What you will learnUnderstand the detection engineering processBuild a detection engineering test labLearn how to maintain detections as codeUnderstand how threat intelligence can be used to drive detection developmentProve the effectiveness of detection capabilities to business leadershipLearn how to limit attackers' ability to inflict damage by detecting any malicious activity earlyWho this book is forThis book is for security analysts and engineers seeking to improve their organization’s security posture by mastering the detection engineering lifecycle. To get started with this book, you’ll need a basic understanding of cybersecurity concepts, along with some experience with detection and alert capabilities.
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
by Valentina Costa-GazconGet to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat hunting process and understand the environmentPerform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasetsBook DescriptionThreat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business.This book is not only an introduction for those who don't know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch.You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you'll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools. Later, you will focus on how to plan a hunt with practical examples, before going on to explore the MITRE ATT&CK framework.By the end of this book, you'll have the skills you need to be able to carry out effective hunts in your own environment.What you will learnUnderstand what CTI is, its key concepts, and how it is useful for preventing threats and protecting your organizationExplore the different stages of the TH processModel the data collected and understand how to document the findingsSimulate threat actor activity in a lab environmentUse the information collected to detect breaches and validate the results of your queriesUse documentation and strategies to communicate processes to senior management and the wider businessWho this book is forIf you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.
Practical Time Series Analysis: Prediction with Statistics and Machine Learning
by Aileen NielsenTime series data analysis is increasingly important due to the massive production of such data through the internet of things, the digitalization of healthcare, and the rise of smart cities. As continuous monitoring and data collection become more common, the need for competent time series analysis with both statistical and machine learning techniques will increase.Covering innovations in time series data analysis and use cases from the real world, this practical guide will help you solve the most common data engineering and analysis challengesin time series, using both traditional statistical and modern machine learning techniques. Author Aileen Nielsen offers an accessible, well-rounded introduction to time series in both R and Python that will have data scientists, software engineers, and researchers up and running quickly.You’ll get the guidance you need to confidently:Find and wrangle time series dataUndertake exploratory time series data analysisStore temporal dataSimulate time series dataGenerate and select features for a time seriesMeasure errorForecast and classify time series with machine or deep learningEvaluate accuracy and performance
Practical Time-Series Analysis
by Dr Pks Prakash Dr Avishek PalStep by Step guide filled with real world practical examples. About This Book • Get your first experience with data analysis with one of the most powerful types of analysis—time-series. • Find patterns in your data and predict the future pattern based on historical data. • Learn the statistics, theory, and implementation of Time-series methods using this example-rich guide Who This Book Is For This book is for anyone who wants to analyze data over time and/or frequency. A statistical background is necessary to quickly learn the analysis methods. What You Will Learn • Understand the basic concepts of Time Series Analysis and appreciate its importance for the success of a data science project • Develop an understanding of loading, exploring, and visualizing time-series data • Explore auto-correlation and gain knowledge of statistical techniques to deal with non-stationarity time series • Take advantage of exponential smoothing to tackle noise in time series data • Learn how to use auto-regressive models to make predictions using time-series data • Build predictive models on time series using techniques based on auto-regressive moving averages • Discover recent advancements in deep learning to build accurate forecasting models for time series • Gain familiarity with the basics of Python as a powerful yet simple to write programming language In Detail Time Series Analysis allows us to analyze data which is generated over a period of time and has sequential interdependencies between the observations. This book describes special mathematical tricks and techniques which are geared towards exploring the internal structures of time series data and generating powerful descriptive and predictive insights. Also, the book is full of real-life examples of time series and their analyses using cutting-edge solutions developed in Python. The book starts with descriptive analysis to create insightful visualizations of internal structures such as trend, seasonality and autocorrelation. Next, the statistical methods of dealing with autocorrelation and non-stationary time series are described. This is followed by exponential smoothing to produce meaningful insights from noisy time series data. At this point, we shift focus towards predictive analysis and introduce autoregressive models such as ARMA and ARIMA for time series forecasting. Later, powerful deep learning methods are presented, to develop accurate forecasting models for complex time series, and under the availability of little domain knowledge. All the topics are illustrated with real-life problem scenarios and their solutions by best-practice implementations in Python. The book concludes with the Appendix, with a brief discussion of programming and solving data science problems using Python. Style and approach This book takes the readers from the basic to advance level of Time series analysis in a very practical and real world use cases.
Practical Tinker Board: Getting Started and Building Projects with the ASUS Single-Board Computer
by Liz ClarkGet started with the ASUS Tinker Board and begin building and expanding your own projects. This book covers the basic operating systems offered by ASUS for the Tinker Board and Tinker Board S, TinkerOS and Android, and then dives deeper into its capabilities for projects; such as a music streamer or a weather display with internet connectivity. Beginners will find the resources necessary to follow along and more seasoned makers can review additional information to engage with this new single-board computer platform. The projects are broad enough to show off the capability of the Tinker Board’s hardware and they can be used as is or you can add to them based on your skill level. The ASUS Tinker Board offers an increase in hardware specs and, as a result, is more powerful compared to other single-board computers on the market, making it a great option for projects that would have previously been a challenge to run on other boards, such as the Raspberry Pi. Single-board computers in general are also gaining in popularity as solutions for many DIY tech projects, ranging from gaming to file storage to being a small form factor desktop Linux computer. Practical Tinker Board is a great resource to the maker community, enabling people to begin truly exploring the Tinker Board. What You’ll Learn:Review ASUS Tinker Board's capabilities and functionsGain a deeper understanding of different Linux distributionsBuild useful projects with a range of hardware and softwareTake an in-depth look at how to install, configure and use ASUS Tinker Board in projectsWho This Book Is For:Those who have previously worked on some beginner maker projects, such as basic Arduino and Raspberry Pi projects, and are looking to expand their skills and knowledge of Linux, single board computers, programming and project builds.
Practical UI Patterns for Design Systems: Fast-Track Interaction Design for a Seamless User Experience
by Diana MacDonaldUnderstanding UI patterns is invaluable to anyone creating websites for the first time. It helps you make connections between which tools are right for which jobs, understand the processes, and think deeply about the context of a problem. This is your concise guide to the tested and proven general mechanisms for solving recurring user interface problems, so that you don't have to reinvent the wheel. You'll see how to find a pattern you can apply to a given UI problem and how to deconstruct patterns to understand them in depth, including their constraints. UI patterns lead to better use of existing conventions and converging web standards. This book shows you how to spot anti-patterns, how to mix and match patterns, and how they inform design systems. By helping the non-web professionals and junior web professionals of the world use basic patterns, the web industry can put its best foot forward as new interfaces such as VR/AR/MR, conversational UIs, machine learning, voice input, evolving gestural interactions and more infiltrate the market. Given the emerging popularity of design systems and space of DesignOps, as well as the rise of companies competing on design and usability, now is the time to think about how we use and evolve UI patterns and scale design systems. What You'll LearnProduce intuitive products through consistency and familiarity.Save time instead of starting from scratch.Communicate design decisions with evidence to support solutions.Use smart defaults without extensive product design experience.Improve a user's experience.Scale growing business with design. Who This Book Is For Those familiar with creating websites and want to learn more, WordPress bloggers, or marketers who want to weave components together into a usable, revenue-generating experience.
Practical UML Statecharts in C/C++: Event-Driven Programming for Embedded Systems
by Miro SamekPractical UML Statecharts in C/C++ Second Edition bridges the gap between high-level abstract concepts of the Unified Modeling Language (UML) and the actual programming aspects of modern hierarchical state machines (UML statecharts). The book describes a lightweight, open source, event-driven infrastructure, called QP that enables direct manual cod
Practical UNIX and Internet Security: Securing Solaris, Mac OS X, Linux & Free BSD
by Simson Garfinkel Alan Schwartz Gene SpaffordWhen Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts:Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security.Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security.Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming.Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing.Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security.Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research.Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
Practical UX Design
by Scott FaranelloA foundational yet practical approach to UX that delivers more creative, collaborative, holistic, and mature design solutions, regardless of your background or experience About This Book * Improve your UX design awareness and skills * Gain greater confidence to know when you have delivered a "good" UX design * Learn by example using a book designed by a UX mind for a UX mind Who This Book Is For This book is written for the beginner as well as the experienced UX practitioner, regardless of team size, company size, or job title. It is also intended for anyone with an interest in UX, engages with UX, is involved in any way in interactive problem solving and design, or simply wants to learn more about what we do, how we do it, and why those in the UX field are so passionate about wanting to do it better. What You Will Learn * Awaken your UX mind and dispel the myths of non-UX thinkers * Create the six optimal conditions for your best ideas to appear * Identify and incorporate the ten design principles found in all good UX design * Develop a broader understanding of Information Architecture (IA) to better engage, guide, and inform * Develop a fundamental understanding of patterns and the properties that create them * Raise your level of UX maturity with a strategy that transforms your approach to problem solving and helps others understand the true value of your work * Utilize important tools of the UX trade that never go out of style * Increase your knowledge of UX, incorporate valuable ideas and insights into your work, and look at design from a very unique perspective In Detail Written in an easy-to-read style, this book provides real-world examples, a historical perspective, and a holistic approach to design that will ground you in the fundamental essentials of interactive design, allow you to make more informed design decisions, and increase your understanding of UX in order to reach the highest levels of UX maturity. As you will see, UX is more than just delighting customers and users. It is also about thinking like a UX practitioner, making time for creativity, recognizing good design when you see it, understanding Information Architecture as more than just organizing and labeling websites, using design patterns to influence user behavior and decision making, approaching UX from a business perspective, transforming your client's and company's fundamental understanding of UX and its true value, and so much more. This book is an invaluable resource of knowledge, perspective, and inspiration for those seeking to become better UX designers, increase their confidence, become more mature design leaders, and deliver solutions that provide measurable value to stakeholders, customers, and users regardless of project type, size, and delivery method. Style and approach An in-depth, easy to read, and entertaining journey into and through the world of UX using real-world examples, thoughtful illustrations, and engaging quotes to inspire and explain fully the how and why of UX in a practical and impactful way and used immediately in your own work.
Practical Unix & Internet Security, 3rd Edition
by Simson Garfinkel Alan Schwartz Gene SpaffordThis new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, and much more.
Practical User Research: Everything You Need to Know to Integrate User Research to Your Product Development
by Emmanuelle SavaritExplore how User Research has been influenced over the years by a range of disciplines, such as HCI, usability, anthropology, cognitive psychology, ergonomics etc. This book aims to contribute to the User Research community and covers topics that will help UX professionals, students and stakeholders to gain a better understanding of what User Research is.Throughout the book you will acquire a practical skill set, ranging from how to get the research going, to building a case in order to receive the budget and resources needed. It will provide you with a clear account of how to organise your research, how to plan it, and how to manage stakeholders’ expectations throughout the project. You’ll see how to fit User Research into your organization and incorporate it through the different product development phases (Discovery, Alpha, Beta until Live), as well as how to grow a User Research team.Practical User Research reviews the methodologies used for User Research, looks at how to recruit participants along with how to collect and analyse data, finally focusing on how to interpret and present your findings. Cross-cultural research, accessibility and assisted digital research will also be discussed throughout this book. The final chapter gives you 10 project briefs, with which you will be able to apply your new skill set and put into practice what you have learnt.What You'll LearnIntegrate user research into your businessApply user research to your product development cycleReview the appropriate processes necessary to carry out user researchTake a pragmatic approach to user research, method by methodWho This Book Is For Anyone that wants to understand more about user research.
Practical Vaadin: Developing Web Applications in Java
by Alejandro DuarteImplement web applications in Java using the open-source Vaadin framework version 20 and later. This easy-to-follow book covers all the key concepts and steps to become competent with modern versions of Vaadin. The book covers everything from setting up the development environment to implementing advanced features such as Server Push and database connectivity. The book helps you become proficient in the Vaadin framework, prepare for Vaadin certifications, and shows you how to apply the power of the Java programming language in developing applications for the web.Author Alejandro Duarte starts with an introduction to web development and its key technologies. He then describes and demonstrates how Vaadin simplifies web development by allowing you to implement web graphical user interfaces using the Java programming language without having to code in JavaScript or HTML. Once a solid foundation on the key web and Vaadin concepts is established, Duarte digs deeper into explaining layouts and user interface components such as combo boxes, dialogs, upload fields, and data grids. He also covers topics such as styling with CSS, data binding, client-side views implementation with TypeScript, and integration with Spring Boot and Jakarta EE.What You Will LearnBuild web applications in Java using Servlet technology and VaadinCombine layouts and user interface components to create views in JavaConnect values in UI components to Java objects in the server through data bindingCustomize display styles and add responsive capabilities using CSSDisplay tabular data using the Grid componentImplement client-side views using TypeScriptIntegrate Vaadin applications with Spring Boot and Jakarta EEConnect Vaadin applications to SQL databasesWho This Book Is ForDevelopers with a basic or higher knowledge of Java programming who want to build on their Java skills to create web graphical user interfaces, Java developers who want to create web applications without having to code in JavaScript, and developers who are preparing to take and pass Vaadin certification exams
Practical Video Game Bots: Automating Game Processes Using C++, Python, And Autoit
by Ilya ShpigorDevelop and use bots in video gaming to automate game processes and see possible ways to avoid this kind of automation. This book explains how bots can be very helpful in games such as multiplayer online games, both for training your character and for automating repetitious game processes in order to start a competition with human opponents much faster. Some players might use bots for cheating or avoiding game rules to gain an advantage over opponents - a sophisticated form of hacking that includes some elements of artificial intelligence (AI). However, while Practical Video Game Bots considers these topics, it is not a cheater's guide. Rather, this book is an attempt to overcome the information vacuum regarding bot development in video game applications. Through the use of three case study game examples, it covers most methods and technologies that are used by bot developers, and the details of anti-cheating systems. This book provides answers and useful advice for topics such as process automation, reverse engineering, and network applications. Modern bot applications use technologies from all these domains. You will also consider the work mechanisms of different kinds of bots and will write simple prototypes. What You Will Learn Discover bots and apply them to game applications Use clicker bots with OS-level embedding data, output-device capture, and more Develop in-game bots, with process memory analysis and access Work with out-game bots, with network interception and embedding data Deal with input device emulation and OS-level interception data Who This Book Is For Those with some prior experience in game development and coding experience in Python, C++, and Windows APIs.
Practical Vim: Edit Text at the Speed of Thought
by Drew NeilVim is a fast and efficient text editor that will make you a faster and more efficient developer. It's available on almost every OS, and if you master the techniques in this book, you'll never need another text editor. In more than 120 Vim tips, you'll quickly learn the editor's core functionality and tackle your trickiest editing and writing tasks. This beloved bestseller has been revised and updated to Vim 7.4 and includes three brand-new tips and five fully revised tips.A highly configurable, cross-platform text editor, Vim is a serious tool for programmers, web developers, and sysadmins who want to raise their game. No other text editor comes close to Vim for speed and efficiency; it runs on almost every system imaginable and supports most coding and markup languages.Learn how to edit text the "Vim way": complete a series of repetitive changes with The Dot Formula using one keystroke to strike the target, followed by one keystroke to execute the change. Automate complex tasks by recording your keystrokes as a macro. Discover the "very magic" switch that makes Vim's regular expression syntax more like Perl's. Build complex patterns by iterating on your search history. Search inside multiple files, then run Vim's substitute command on the result set for a project-wide search and replace. All without installing a single plugin! Three new tips explain how to run multiple ex commands as a batch, autocomplete sequences of words, and operate on a complete search match.Practical Vim, Second Edition will show you new ways to work with Vim 7.4 more efficiently, whether you're a beginner or an intermediate Vim user. All this, without having to touch the mouse.What You Need:Vim version 7.4
Practical VoIP Security
by Jan Kanclirz Thomas Porter Choon Shim Andy Zmolek Larry Chaffin Jr.Your Hands-On Guide to Voice over IP (VoIP) This book was written for the thousands of IT professionals-from CIOs to circuit-switched telecom engineers-who are now responsible for deploying and maintaining secure VoIP networks. The book explains the impact on your VoIP network of PSTN, SIP, H.323, firewalls, NAT, encryption, and the regulatory environment. Coverage includes evaluation, design, integration, and management of VoIP networking components, including IP telephones, gateways, gatekeepers, registration servers, media servers, and proxy servers. Throughout the book, the authors rely on their extensive real-world experience to provide readers with practical applications and solutions. VoIP Isn't Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Understand why. What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network? Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP. The Security Considerations of Voice Messaging Learn about the types of security attacks you need to protect against within your voice messaging system. VoIP and the Public Switched Telephone Network (PSTN) Understand PSTN: what is it, and how does it work? VoIP Communication Architectures See how products like Skype, H.248, IAX, and Microsoft Live Communications Server 2005 The Support Protocols of VoIP Environments Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY. Securing the Whole VoIP Infrastructure Your guide to Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks. Authorized Access Begins with Authentication Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network. Secure Internet Mail See how S/MIME provides cryptographic security services for electronic messaging applications.
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
by Andrew MagnussonPractical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks.Bugs: they're everywhere. Software, firmware, hardware -- they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company's prized technology assets suddenly become serious liabilities.Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do. Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose.The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise's overall security posture. Then it's time to get your hands dirty! As the content shifts from conceptual to practical, you're guided through creating a vulnerability-management system from the ground up, using open-source software.Along the way, you'll learn how to: • Generate accurate and usable vulnerability intelligence • Scan your networked systems to identify and assess bugs and vulnerabilities • Prioritize and respond to various security risks • Automate scans, data analysis, reporting, and other repetitive tasks • Customize the provided scripts to adapt them to your own needsPlaying whack-a-bug won't cut it against today's advanced adversaries. Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks.
Practical Weak Supervision: Doing More with Less Data
by Wee Hyong Tok Amit Bahree Senja FilipiMost data scientists and engineers today rely on quality labeled data to train machine learning models. But building a training set manually is time-consuming and expensive, leaving many companies with unfinished ML projects. There's a more practical approach. In this book, Wee Hyong Tok, Amit Bahree, and Senja Filipi show you how to create products using weakly supervised learning models.You'll learn how to build natural language processing and computer vision projects using weakly labeled datasets from Snorkel, a spin-off from the Stanford AI Lab. Because so many companies have pursued ML projects that never go beyond their labs, this book also provides a guide on how to ship the deep learning models you build.Get up to speed on the field of weak supervision, including ways to use it as part of the data science processUse Snorkel AI for weak supervision and data programmingGet code examples for using Snorkel to label text and image datasetsUse a weakly labeled dataset for text and image classificationLearn practical considerations for using Snorkel with large datasets and using Spark clusters to scale labeling