Browse Results

Showing 7,276 through 7,300 of 62,719 results

Babylon.js Essentials

by Julien Moreau-Mathis

Understand, train, and be ready to develop 3D Web applications/video games using the Babylon.js framework, even for beginners About This Book * Understand the basics of 3D (along with the theory) before practicing * Each mini-project provides previous features, alongside the new feature you are learning, to supply the examples * Learn from the best of the best, a developer at Microsoft, France Who This Book Is For Babylon.JS Essentials is intended for developers who want to enter the world of 3D development for the Web, or developers who want to add the Babylon.js framework to their skill set. The notion of Oriented Object Programming would be helpful to understand the architecture of the Babylon.js framework. Also, a familiarity with Web development would be useful, to understand the principles used. What You Will Learn * Understand what the TypeScript language is and its benefits (compared to JavaScript) in large projects such as 3D engines * Learn the basics of 3D using Babylon.js without too much theory but with an emphasis on practice, for a better understanding of the architecture * Know the usage of Material--a fundamental principle of 3D engines in Babylon.js--and then customize the appearance of 3D objects * Integrate collisions and physics in gameplay. Understand the notion of impostor for physics simulation * Manage, create, and spatialize audio tracks in 3D scenes * Go further with the Babylon.js framework to create actions on events * Create rendering effects provided by the Babylon.js framework, such as post-processes In Detail Are you familiar with HTML5? Do you want to build exciting games and Web applications? Then explore the exciting world of game and Web development with one of the best frameworks out there: Babylon.JS. Starting from the beginning, the book introduces the required basics for 3D development and the knowledge you need to use the Babylon.js framework. It focuses on the simplicity provided by Babylon.js and uses a combination of theory and practice. All the chapters are provided with example files ready to run; each example file provides the previously learned features of the framework. Finally, developers will be ready to easily understand new features added to the framework in the future. Style and approach The book is a comprehensive guide packed with ready-to-run examples with a mix of theory and practice.

Back-end Performance

by Christopher Pitt Bruno Skvorc Reza Lavaryan Tonino Jankov Daniel Berman

Performance simply matters. Technology may allow us to "go bigger", but maybe not necessarily be better when it comes to performance. Now is the time to utilize the amazing tools that are available for making websites faster, and to learn how to improve user experience and satisfaction. This is a practical collection of tutorials on back-end website performance for web developers. It's packed with useful, real world hints and tips that you can use on your sites today. It contains: How to Optimize MySQL: Indexes, Slow Queries, Configuration by Bruno SkvorcHow to Read Big Files with PHP (Without Killing Your Server) by Chris PittWordPress Optimization by Tonino JankovHTTP/2: Background, Performance Benefits and Implementations by Tonino JankovApache vs Nginx Performance: Optimization Techniques by Tonino JankovAn In-depth Walkthrough of Supercharging Apps with Blackfire by Reza LavaryanHow to Boost Your Server Performance with Varnish by Tonino JankovHow to Process Server Logs by Daniel Berman This book is for all back-end developers who wish to build sites and apps that are more performant. You'll need to be familiar with server-side development in order to follow the discussion.

BackTrack 4: Assuring Security by Penetration Testing

by Tedi Heriyanto Shakeel Ali

Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually.If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.

BackTrack 5 Cookbook

by David De Smet Willie Pritchett

This is a cookbook with the necessary explained commands and code to learn BackTrack thoroughly. It smoothes your learning curve through organized recipes,This book is for anyone who desires to come up to speed in using BackTrack 5 or for use as a reference for seasoned penetration testers.

BackTrack 5 Wireless Penetration Testing Beginner’s Guide

by Vivek Ramachandran

Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

BackTrack – Testing Wireless Network Security

by Kevin Cardwell

Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks.All you need is some experience with networks and computers and you will be ready to go.

Backbase 4 RIA Development

by Ghica van Emde Boas Sergey Ilinsky

This is a practical book, where every example is tested and all source code is available with the book. Each chapter ends with work on a sample application using the new things learned. At the end of the book there is a complete, usable Travel Blog application. This book is for web developers who want to develop applications using the Backbase Client Framework. It may also be interesting for web developers and web application architects who want to know more about XML-based web application architectures.

Backbone.js Blueprints

by Andrew Burgess

This book is an easy-to-follow guide which is full of examples that will take you through building seven very different web applications with Backbone. The code is broken down into manageable bites and then thoroughly explained. If you are ready to learn about building frontend applications in Backbone, this is the book for you. Perhaps you've dipped your toe into Backbone and are ready to take the plunge. Even if you haven't, this book will teach you everything you need to know to build solid frontend apps with Backbone. You'll need to be pretty good at JavaScript and have a working knowledge of HTML and CSS, but other than that, you're good to go!

Backbone.js Cookbook

by Vadim Mirgorod

Written in a friendly, example driven Beginner's Guide format, there are plenty of step-by-step instructions to get you started fast!Pentaho 4.0 By Example: Beginner's Guide is the ideal companion for a wide-variety of developers. Whether you are new to the world of Business Intelligence reporting, or an experienced BI analyst, this book will guide you through the creation of your first reports in Pentaho. We assume some knowledge of the SQL language and database systems.

Backbone.js Essentials

by Jeremy Walker

If you are a developer with baseline JavaScript proficiency and are familiar with the jQuery library, then this book is ideal for you. Whether you've tried building complex web applications before and been frustrated by the challenge of doing so without the proper tools, or whether you've only built simple websites and are now looking to create full-featured web applications, this book has everything you need to get ahead of the curve.

Backbone.js Patterns and Best Practices

by Swarnendu De

This is a step-by-step guide to design patterns, best practices, and solutions to common problems for Backbone.js-based application development. This book is for JavaScript developers who work with Backbone.js and want to learn the best design patterns to develop complex web applications. Basic knowledge of Backbone.js and JavaScript is essential.

Backbone.js Testing

by Ryan Roemer

This book is packed with the step by step tutorial and instructions in recipe format helping you setup test infrastructure and gradually advance your skills to plan, develop, and test your backbone applications.If you are a JavaScript developer looking for recipes to create and implement test support for your backbone application, then this book is ideal for you.

Backdoor Attacks against Learning-Based Algorithms (Wireless Networks)

by Haojin Zhu Shaofeng Li Xuemin (Sherman) Shen Wen Wu

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning.Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters.The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms.

Background Modeling and Foreground Detection for Video Surveillance

by Fatih Porikli Thierry Bouwmans Benjamin Höferlin Antoine V Acavant

Background modeling and foreground detection are important steps in video processing used to detect robustly moving objects in challenging environments. This requires effective methods for dealing with dynamic backgrounds and illumination changes as well as algorithms that must meet real-time and low memory requirements.Incorporating both establish

Backing Up Your Mac

by Joe Kissell

The Definitive Guide to Mac Backups <P><P> Your Mac contains valuable and sometimes irreplaceable files--family photos and videos, business documents, your unfinished novel... not to mention personal data such as email, contacts, and calendars. Without great backups, all of that data could disappear in an instant. We don't like to think about theft, fire, and natural disasters, but these things happen. So do hard drive crashes and other malfunctions (not to mention user error). <P> Your best insurance against losing data forever is a thorough, carefully designed backup plan. You don't have to spend a ton of money or be a technical whiz to back up your Mac. This book helps you design a sensible backup strategy, choose and configure the best backup hardware and software for your needs, and understand how to make your backups as painless as possible. <P> * Learn Joe's simple, three-prong strategy for bulletproof Mac backups. <P> * Decide whether Time Machine is right for you--and if so, learn how to use it for backing up and restoring data. <P> * Discover alternatives to Time Machine for storing multiple versions of your files. <P> * Find out why and how to create a bootable duplicate (or clone) of your Mac's startup volume. <P> * Choose the best hardware for backing up your data. <P> * Learn about offsite storage, including cloud backup services. <P> * Know exactly what you'll need to do if disaster strikes. <P> * Deal with special backup needs, such as large video files, backups while on the road, and backing up a small network.

Backing Up Your Mac

by Joe Kissell

The data on every Mac should be backed up to protect against theft, hardware failure, user error, and other catastrophes. This book helps you design a sensible backup strategy, choose and configure the best backup hardware and software for your needs, and understand how to make your backups as painless as possible.

Backup & Recovery

by W. Curtis Preston

In this resource for database and system administrators, Preston provides clear instructions for using open source tools to backup and recover vital systems. All types of systems needing protection are covered, from basic Linux, Windows, and Mac OS workstations to complex DB2, Oracle, and Sybase databases. He also presents clear criteria for evaluating both commercial and open source solutions as well as various types of backup hardware. Preston has been designing data-protection systems since 1993. Annotation ©2007 Book News, Inc. , Portland, OR (booknews. com)

Backup & Recovery: Inexpensive Backup Solutions for Open Systems

by W. Curtis Preston

Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material.Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. Backup & Recovery then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so.For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to:Automate the backup of popular databases without a commercial utilityPerform bare metal recovery of any popular open systems platform, including your PC or laptopUtilize valuable but often unknown open source backup productsUnderstand the state of commercial backup software, including explanations of CDP and data de-duplication softwareAccess the current state of backup hardware, including Virtual Tape Libraries (VTLs)

Backward Fuzzy Rule Interpolation

by Qiang Shen Shangzhu Jin Jun Peng

This book chiefly presents a novel approach referred to as backward fuzzy rule interpolation and extrapolation (BFRI). BFRI allows observations that directly relate to the conclusion to be inferred or interpolated from other antecedents and conclusions. Based on the scale and move transformation interpolation, this approach supports both interpolation and extrapolation, which involve multiple hierarchical intertwined fuzzy rules, each with multiple antecedents. As such, it offers a means of broadening the applications of fuzzy rule interpolation and fuzzy inference. The book deals with the general situation, in which there may be more than one antecedent value missing for a given problem. Two techniques, termed the parametric approach and feedback approach, are proposed in an attempt to perform backward interpolation with multiple missing antecedent values. In addition, to further enhance the versatility and potential of BFRI, the backward fuzzy interpolation method is extended to support α-cut based interpolation by employing a fuzzy interpolation mechanism for multi-dimensional input spaces (IMUL). Finally, from an integrated application analysis perspective, experimental studies based upon a real-world scenario of terrorism risk assessment are provided in order to demonstrate the potential and efficacy of the hierarchical fuzzy rule interpolation methodology.

Bad Boy Ballmer: The Man Who Rules Microsoft

by Fredric Alan Maxwell

In Jan. 2000 Bill Gates gave his responsibilities & the title CEO of Microsoft to his best friend, Steve Ballmer, who had been at Gates's side almost since the company's earliest days. Ballmer's life is an incredible story of tremendous ambition, genius, arrogance, & charisma. This enlightening biography -- based on in-depth study & interviews with former Microsoft insiders -- provides the complete, controversial narrative of one of the technology industry's most influential & talked-about figures. It is also the definitive story of the Bill Gates/Steve Ballmer relationship, from their 1974 meeting at a Harvard dorm. The book shows how Ballmer & Gates work together & provides a revealing look at one of the masterminds of the technological age.

Bad Choices: How Algorithms Can Help You Think Smarter and Live Happier

by Ali Almossawi

A relatable, interactive, and funny exploration of algorithms, those essential building blocks of computer science - and of everyday life - from the author of the wildly popular Bad Arguments.Algorithms -- processes that are made up of unambiguous steps and do something useful -- make up the very foundations of computer science. Yet, they also inform our choices in approaching everyday tasks, from managing a pile of clothes fresh out of the dryer to deciding what music to listen to.With Bad Choices, Ali Almossawi, presents twelve scenes from everyday life that help demonstrate and demystify the fundamental algorithms that drive computer science, bringing these seemingly elusive concepts into the understandable realms of the everyday.Readers will discover how:· Matching socks can teach you about search and hash tables· Planning trips to the store can demonstrate the value of stacks· Deciding what music to listen to shows why link analysis is all-important· Crafting a succinct Tweet draws on ideas from compression· Making your way through a grocery list helps explain priority queues and traversing graphs · And moreAs you better understand algorithms, you'll also discover what makes a method faster and more efficient, helping you become a more nimble, creative problem-solver, ready to face new challenges. Bad Choices will open the world of algorithms to all readers making this a perennial go-to for fans of quirky, accessible science books.

Bad Data Handbook: Cleaning Up The Data So You Can Get Back To Work

by Q. Ethan McCallum

What is bad data? Some people consider it a technical phenomenon, like missing values or malformed records, but bad data includes a lot more. In this handbook, data expert Q. Ethan McCallum has gathered 19 colleagues from every corner of the data arena to reveal how they’ve recovered from nasty data problems.From cranky storage to poor representation to misguided policy, there are many paths to bad data. Bottom line? Bad data is data that gets in the way. This book explains effective ways to get around it.Among the many topics covered, you’ll discover how to:Test drive your data to see if it’s ready for analysisWork spreadsheet data into a usable formHandle encoding problems that lurk in text dataDevelop a successful web-scraping effortUse NLP tools to reveal the real sentiment of online reviewsAddress cloud computing issues that can impact your analysis effortAvoid policies that create data analysis roadblocksTake a systematic approach to data quality analysis

Bad Girls and Sick Boys: Fantasies in Contemporary Art and Culture

by Linda S. Kauffman

Linda S. Kauffman turns the pornography debate on its head with this audacious analysis of recent taboo-shattering fiction, film, and performance art. Investigating the role of fantasy in art, politics, and popular culture, she shows how technological advances in medicine and science (magnetic resonance imaging, computers, and telecommunications) have profoundly altered our concepts of the human body. Cyberspace is producing new forms of identity and subjectivity. The novelists, filmmakers, and performers in Bad Girls and Sick Boys are the interpreters of these brave new worlds, cartographers who are busy mapping the fin-de-millennium environment that already envelops us.Bad Girls and Sick Boys offers a vital and entertaining tour of the current cultural landscape. Kauffman boldly connects the dots between the radical artists who shatter taboos and challenge legal and aesthetic conventions. She links writers like John Hawkes and Robert Coover to Kathy Acker and William Vollmann; filmmakers like Ngozi Onwurah and Isaac Julien to Brian De Palma and Gus Van Sant; and performers like Carolee Schneemann and Annie Sprinkle to the visual arts. Kauffman's lively interviews with J. G. Ballard, David Cronenberg, Bob Flanagan, and Orlan add an extraordinary dimension to her timely and convincing argument.

Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program

by Karl Beecher

This book takes a humorous slant on the programming practice manual by reversing the usual approach: under the pretence of teaching you how to become the world’s worst programmer who generally causes chaos, the book teaches you how to avoid the kind of bad habits that introduce bugs or cause code contributions to be rejected.Why be a code monkey when you can be a chaos monkey? OK, so you want to become a terrible programmer. You want to write code that gets vigorously rejected in review. You look forward to reading feedback plastered in comments like "WTF???". Even better, you fantasize about your bug-ridden changes sneaking through and causing untold chaos in the codebase. You want to build a reputation as someone who writes creaky, messy, error-prone garbage that frustrates your colleagues. Bad Programming Practices 101 will help you achieve that goal a whole lot quicker by teaching you an array of bad habits that will allow you to cause maximum chaos.Alternatively, you could use this book to identify those bad habits and learn to avoid them. The bad practices are organized into topics that form the basis of programming (layout, variables, loops, modules, and so on). It's been remarked that to become a good programmer, you must first write 10,000 lines of bad code to get it all out of your system. This book is aimed at programmers who have so far written only a small portion of that. By learning about poor programming habits, you will learn good practices. In addition, you will find out the motivation behind each practice, so you can learn why it is considered good and not simply get a list of rules.What You'll LearnBecome a better coder by learning how (not) to programChoose your tools wiselyThink of programming as problem solvingDiscover the consequences of a program’s appearance and overall structureExplain poor use of variables in programsAvoid bad habits and common mistakes when using conditionals and loopsSee how poor error-handling makes for unstable programsSidestep bad practices related specifically to object-oriented programmingMitigate the effects of ineffectual and inadequate bug location and testingWho This Book Is ForThose who have some practical programming knowledge (can program in at least one programming language), but little or no professional experience, which they would like to quickly build up. They are either still undergoing training in software development, or are at the beginning of their programming career. They have at most 1-2 years of professional experience.

Badanie danych. Raport z pierwszej linii dzia?a?

by Cathy O'Neil Rachel Schutt

Unikalne wprowadzenie do nauki o danych!W dzisiejszych czasach najcenniejszym dobrem jest informacja. Ogromne ilo?ci danych s? przechowywane w przepastnych bazach danych, a kluczem do sukcesu jest ich umiej?tna analiza i wyci?ganie wniosków. To dynamicznie rozwijaj?ca si? dziedzina wiedzy, w której do tej pory brakowa?o solidnych podr?czników, pozwalaj?cych na dog??bne poznanie tego obszaru. Na szcz??cie to si? zmieni?o! Trzymasz w?a?nie w r?kach unikaln? ksi??k?, w której badacze z najwi?kszych firm bran?y IT dziel? si? skutecznymi technikami analizy danych. Z kolejnych rozdzia?ów dowiesz si?, czym jest nauka o danych, model danych oraz test A/B. Ponadto zdob?dziesz wiedz? na temat wnioskowania statystycznego, algorytmów, j?zyka R oraz wizualizacji danych. Si?gnij po t? ksi??k?, je?eli chcesz si? dowiedzie?, jak wykrywa? oszustwa, korzysta? z MapReduce oraz bada? przyczynowo??. To obowi?zkowa pozycja na pó?ce czytelników zainteresowanych badaniem danych.Dzi?ki tej ksi??ce: poznasz zaawansowane sposoby analizy danych nauczysz si? korzysta? z MapReduce zwizualizujesz posiadane dane i wykryjesz oszustwa poznasz podstawy j?zyka R wyci?gniesz warto?ciowe wnioski z posiadanych danychWyci?gnij warto?ciowe wnioski z posiadanych informacji!

Refine Search

Showing 7,276 through 7,300 of 62,719 results