Browse Results

Showing 28,751 through 28,775 of 53,350 results

Serverless Design Patterns and Best Practices: Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity

by Brian Zambrano

Get started with designing your serverless application using optimum design patterns and industry standard practicesKey FeaturesLearn the details of popular software patterns and how they are applied to serverless applicationsUnderstand key concepts and components in serverless designsWalk away with a thorough understanding of architecting serverless applicationsBook DescriptionServerless applications handle many problems that developers face when running systems and servers. The serverless pay-per-invocation model can also result in drastic cost savings, contributing to its popularity. While it's simple to create a basic serverless application, it's critical to structure your software correctly to ensure it continues to succeed as it grows. Serverless Design Patterns and Best Practices presents patterns that can be adapted to run in a serverless environment. You will learn how to develop applications that are scalable, fault tolerant, and well-tested.The book begins with an introduction to the different design pattern categories available for serverless applications. You will learn the trade-offs between GraphQL and REST and how they fare regarding overall application design in a serverless ecosystem. The book will also show you how to migrate an existing API to a serverless backend using AWS API Gateway. You will learn how to build event-driven applications using queuing and streaming systems, such as AWS Simple Queuing Service (SQS) and AWS Kinesis. Patterns for data-intensive serverless application are also explained, including the lambda architecture and MapReduce.This book will equip you with the knowledge and skills you need to develop scalable and resilient serverless applications confidently.What you will learnComprehend the popular design patterns currently being used with serverless architecturesUnderstand the various design options and corresponding implementations for serverless web application APIsLearn multiple patterns for data-intensive serverless systems and pipelines, including MapReduce and Lambda ArchitectureLearn how to leverage hosted databases, queues, streams, storage services, and notification servicesUnderstand error handling and system monitoring in a serverless architecture a serverless architectureLearn how to set up a serverless application for continuous integration, continuous delivery, and continuous deploymentWho this book is forIf you're a software architect, engineer, or someone who wants to build serverless applications, which are non-trivial in complexity and scope, then this book is for you. Basic knowledge of programming and serverless computing concepts are assumed.

Advanced Infrastructure Penetration Testing: Defend Your Systems From Methodized And Proficient Attackers

by Chiheb Chebbi

This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices , modern operating systems and help you secure high security environments.

Advanced Deep Learning with Keras: Apply deep learning techniques, autoencoders, GANs, variational autoencoders, deep reinforcement learning, policy gradients, and more

by Rowel Atienza

A comprehensive guide to advanced deep learning techniques, including Autoencoders, GANs, VAEs, and Deep Reinforcement Learning, that drive today's most impressive AI results Key FeaturesExplore the most advanced deep learning techniques that drive modern AI resultsImplement Deep Neural Networks, Autoencoders, GANs, VAEs, and Deep Reinforcement LearningA wide study of GANs, including Improved GANs, Cross-Domain GANs and Disentangled Representation GANsBook DescriptionRecent developments in deep learning, including GANs, Variational Autoencoders, and Deep Reinforcement Learning, are creating impressive AI results in our news headlines - such as AlphaGo Zero beating world chess champions, and generative AI that can create art paintings that sell for over $400k because they are so human-like.Advanced Deep Learning with Keras is a comprehensive guide to the advanced deep learning techniques available today, so you can create your own cutting-edge AI. Using Keras as an open-source deep learning library, you'll find hands-on projects throughout that show you how to create more effective AI with the latest techniques.The journey begins with an overview of MLPs, CNNs, and RNNs, which are the building blocks for the more advanced techniques in the book. You’ll learn how to implement deep learning models with Keras and Tensorflow, and move forwards to advanced techniques, as you explore deep neural network architectures, including ResNet and DenseNet, and how to create Autoencoders. You then learn all about Generative Adversarial Networks (GANs), and how they can open new levels of AI performance. Variational AutoEncoders (VAEs) are implemented, and you’ll see how GANs and VAEs have the generative power to synthesize data that can be extremely convincing to humans - a major stride forward for modern AI. To complete this set of advanced techniques, you'll learn how to implement Deep Reinforcement Learning (DRL) such as Deep Q-Learning and Policy Gradient Methods, which are critical to many modern results in AI.What you will learnCutting-edge techniques in human-like AI performanceImplement advanced deep learning models using KerasThe building blocks for advanced techniques - MLPs, CNNs, and RNNsDeep neural networks – ResNet and DenseNetAutoencoders and Variational AutoEncoders (VAEs)Generative Adversarial Networks (GANs) and creative AI techniquesDisentangled Representation GANs, and Cross-Domain GANsDeep Reinforcement Learning (DRL) methods and implementationProduce industry-standard applications using OpenAI gymDeep Q-Learning and Policy Gradient MethodsWho this book is forSome fluency with Python is assumed. As an advanced book, you'll be familiar with some machine learning approaches, and some practical experience with DL will be helpful. Knowledge of Keras or TensorFlow is not required but would be helpful.

Hands-On Blockchain for Python Developers: Gain blockchain programming skills to build decentralized applications using Python

by Arjuna Sky Kok

Implement real-world decentralized applications using Python, Vyper, Populus, and EthereumKey FeaturesStay up-to-date with everything you need to know about the blockchain ecosystemImplement smart contracts, wallets, and decentralized applications(DApps) using Python librariesGet deeper insights into storing content in a distributed storage platformBook DescriptionBlockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions. This book serves as a practical guide to developing a full-fledged decentralized application with Python to interact with the various building blocks of blockchain applications.Hands-On Blockchain for Python Developers starts by demonstrating how blockchain technology and cryptocurrency hashing works. You will understand the fundamentals and benefits of smart contracts such as censorship resistance and transaction accuracy. As you steadily progress, you'll go on to build smart contracts using Vyper, which has a similar syntax to Python. This experience will further help you unravel the other benefits of smart contracts, including reliable storage and backup, and efficiency. You'll also use web3.py to interact with smart contracts and leverage the power of both the web3.py and Populus framework to build decentralized applications that offer security and seamless integration with cryptocurrencies. As you explore later chapters, you'll learn how to create your own token on top of Ethereum and build a cryptocurrency wallet graphical user interface (GUI) that can handle Ethereum and Ethereum Request for Comments (ERC-20) tokens using the PySide2 library. This will enable users to seamlessly store, send, and receive digital money. Toward the end, you'll implement InterPlanetary File System (IPFS) technology in your decentralized application to provide a peer-to-peer filesystem that can store and expose media.By the end of this book, you'll be well-versed in blockchain programming and be able to build end-to-end decentralized applications on a range of domains using Python.What you will learnUnderstand blockchain technology and what makes it an immutable databaseUse the features of web3.py API to interact with the smart contractCreate your own cryptocurrency and token in Ethereum using VyperUse IPFS features to store content on the decentralized storage platformImplement a Twitter-like decentralized application with a desktop frontendBuild decentralized applications in the shape of console, web, and desktop applicationsWho this book is forIf you are a Python developer who wants to enter the world of blockchain, Hands-On Blockchain for Python Developers is for you. The book will be your go-to guide to becoming well-versed with the blockchain ecosystem and building your own decentralized applications using Python and library support.

JavaScript and JSON Essentials: Build Light Weight, Scalable, And Faster Web Applications With The Power Of Json, 2nd Edition

by Bruno Joseph D'Mello

JSON is an established and standard format used to exchange data. This book shows how JSON plays different roles in full web development through examples. By the end of this book, you'll have a new perspective on providing solutions for your applications and handling their complexities.

Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure

by Sagar Rahalkar

Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organizationGain hands-on experience in working with network scanning and analyzing toolsLearn to secure your network infrastructureBook DescriptionThe tech world has been taken over by digitization to a very large extent, and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure.Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism.By the end of this book, you will be in a position to build a security framework fit for an organization.What you will learnDevelop a cost-effective end-to-end vulnerability management programImplement a vulnerability management program from a governance perspectiveLearn about various standards and frameworks for vulnerability assessments and penetration testingUnderstand penetration testing with practical learning on various supporting tools and techniquesGain insight into vulnerability scoring and reportingExplore the importance of patching and security hardeningDevelop metrics to measure the success of the vulnerability management programWho this book is forNetwork Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

by Zaid Sabih

Learn how to hack systems like black hat hackers and secure them like security expertsKey FeaturesUnderstand how computer systems work and their vulnerabilitiesExploit weaknesses and hack into machines to test their securityLearn how to secure systems from hackersBook DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices.Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections.The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks.What you will learnUnderstand ethical hacking and the different fields and types of hackersSet up a penetration testing lab to practice safe and legal hackingExplore Linux basics, commands, and how to interact with the terminalAccess password-protected networks and spy on connected clientsUse server and client-side attacks to hack and control remote computersControl a hacked system remotely and use it to hack other systemsDiscover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injectionsWho this book is forLearning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.

Network Programming with Rust: Build Fast And Resilient Network Servers And Clients By Leveraging Rust's Memory-safety And Concurrency Features

by Abhishek Chanda

Rust has steadily become one of the most important new programming languages in recent years. One the one hand, it is low-level enough to provide fine-grained control over memory while providing memory-safety through compile-time validation. Rust also guarantees data race-free parallelism. All these features make it uniquely suitable for writing low-level networking applications. This book will help developers get started on writing such applications in Rust.

Learning JavaScript Data Structures and Algorithms: Write complex and powerful JavaScript code using the latest ECMAScript, 3rd Edition

by Loiane Groner

Create classic data structures and algorithms such as depth-first search and breadth-first search, learn recursion, as well as create and use a heap data structure using JavaScriptKey FeaturesImplement common data structures and the associated algorithms along with the context in which they are usedMaster existing JavaScript data structures such as arrays, sets, and maps, and learn how to implement new ones such as stacks, linked lists, trees, and graphs in ES 8Develop abstract data types to make JavaScript a more flexible and powerful programming languageBook DescriptionA data structure is a particular way of organizing data in a computer to utilize resources efficiently. Data structures and algorithms are the base of every solution to any programming problem. With this book, you will learn to write complex and powerful code using the latest ES 2017 features.Learning JavaScript Data Structures and Algorithms begins by covering the basics of JavaScript and introduces you to ECMAScript 2017, before gradually moving on to the most important data structures such as arrays, queues, stacks, and linked lists. You will gain in-depth knowledge of how hash tables and set data structures function as well as how trees and hash maps can be used to search files in an HD or represent a database. This book serves as a route to take you deeper into JavaScript. You’ll also get a greater understanding of why and how graphs, one of the most complex data structures, are largely used in GPS navigation systems in social networks.Toward the end of the book, you’ll discover how all the theories presented in this book can be applied to solve real-world problems while working on your own computer networks and Facebook searches.What you will learn Declare, initialize, add, and remove items from arrays, stacks, and queues Create and use linked lists, doubly linked lists, and circular linked lists Store unique elements with hash tables, dictionaries, and sets Explore the use of binary trees and binary search trees Sort data structures using algorithms such as bubble sort, selection sort, insertion sort, merge sort, and quick sort Search elements in data structures using sequential sort and binary searchWho this book is forIf you’re a JavaScript developer who wants to dive deep into JavaScript and write complex programs using JavaScript data structures and algorithms, this book is for you.

Big Data Analytics with Hadoop 3: Build highly effective analytics solutions to gain valuable insight into your big data

by Sridhar Alla

Explore big data concepts, platforms, analytics, and their applications using the power of Hadoop 3Key FeaturesLearn Hadoop 3 to build effective big data analytics solutions on-premise and on cloudIntegrate Hadoop with other big data tools such as R, Python, Apache Spark, and Apache FlinkExploit big data using Hadoop 3 with real-world examplesBook DescriptionApache Hadoop is the most popular platform for big data processing, and can be combined with a host of other big data tools to build powerful analytics solutions. Big Data Analytics with Hadoop 3 shows you how to do just that, by providing insights into the software as well as its benefits with the help of practical examples.Once you have taken a tour of Hadoop 3’s latest features, you will get an overview of HDFS, MapReduce, and YARN, and how they enable faster, more efficient big data processing. You will then move on to learning how to integrate Hadoop with the open source tools, such as Python and R, to analyze and visualize data and perform statistical computing on big data. As you get acquainted with all this, you will explore how to use Hadoop 3 with Apache Spark and Apache Flink for real-time data analytics and stream processing. In addition to this, you will understand how to use Hadoop to build analytics solutions on the cloud and an end-to-end pipeline to perform big data analysis using practical use cases.By the end of this book, you will be well-versed with the analytical capabilities of the Hadoop ecosystem. You will be able to build powerful solutions to perform big data analytics and get insight effortlessly.What you will learnExplore the new features of Hadoop 3 along with HDFS, YARN, and MapReduceGet well-versed with the analytical capabilities of Hadoop ecosystem using practical examplesIntegrate Hadoop with R and Python for more efficient big data processing Learn to use Hadoop with Apache Spark and Apache Flink for real-time data analyticsSet up a Hadoop cluster on AWS cloudPerform big data analytics on AWS using Elastic Map ReduceWho this book is forBig Data Analytics with Hadoop 3 is for you if you are looking to build high-performance analytics solutions for your enterprise or business using Hadoop 3’s powerful features, or you’re new to big data analytics. A basic understanding of the Java programming language is required.

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

by Salman Aftab Donald Tevault

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. Key Features Leverage this guide to confidently deliver a system that reduces the risk of being hacked Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more Master the art of securing a Linux environment with this end-to-end practical guide Book Description This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise. What you will learn Use various techniques to prevent intruders from accessing sensitive data Prevent intruders from planting malware, and detect whether malware has been planted Prevent insiders from accessing data that they aren’t authorized to access Do quick checks to see whether a computer is running network services that it doesn’t need to run Learn security techniques that are common to all Linux distros, and some that are distro-specificWho this book is for If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.

Hands-On Software Architecture with Golang: Design And Architect Highly Scalable And Robust Applications Using Go

by Jyotiswarup Raiturkar

This book is for software developers, architects and CTOs looking to use Go in their software architecture. The book assumes general programming knowledge and architecture concepts. Familiarity with Go is not required and programming constructs are introduced with concepts.

Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

by Mounir Hahad Kumaraguru Velmurugan Abhijit Mohanta

Your one-stop guide to know digital extortion and it's prevention.Key FeaturesA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Book DescriptionRansomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a defensive mechanism in place for workstations and servers under one organization.This book starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware analysis and how you can identify different kinds of malware. We will also take a look at different types of ransomware, and how it reaches your system, spreads in your organization, and hijacks your computer. We will then move on to how the ransom is paid and the negative effects of doing so. You will learn how to respond quickly to ransomware attacks and how to protect yourself. The book gives a brief overview of the internals of security software and Windows features that can be helpful in ransomware prevention for administrators. You will also look at practical use cases in each stage of the ransomware phenomenon. The book talks in detail about the latest ransomware attacks involving WannaCry, Petya, and BadRabbit.By the end of this book, you will have end-to-end knowledge of the trending malware in the tech industry at present.What you will learn Understand malware types and malware techniques with examples Obtain a quick malware analysis Understand ransomware techniques, their distribution, and their payment mechanism Case studies of famous ransomware attacks Discover detection technologies for complex malware and ransomware Configure security software to protect against ransomware Handle ransomware infectionsWho this book is forThis book is targeted towards security administrator, security analysts, or any stakeholders in the security sector who want to learn about the most trending malware in the current market: ransomware.

Unity 2018 Artificial Intelligence Cookbook: Over 90 recipes to build and customize AI entities for your games with Unity, 2nd Edition

by Jorge Palacios

Explore various recipes to build games using popular artificial intelligence techniques and algorithms such as Navmesh navigation A*, DFS, and UCB1Key FeaturesExplore different algorithms for creating decision-making agents that go beyond simple behaviors and movementDiscover the latest features of the NavMesh API for scripting intelligent behaviour in your game charactersCreate games that are non-predictable and dynamic and have a high replayability factorBook DescriptionInteractive and engaging games come with intelligent enemies, and this intellectual behavior is combined with a variety of techniques collectively referred to as Artificial Intelligence. Exploring Unity's API, or its built-in features, allows limitless possibilities when it comes to creating your game's worlds and characters. This cookbook covers both essential and niche techniques to help you take your AI programming to the next level.To start with, you’ll quickly run through the essential building blocks of working with an agent, programming movement, and navigation in a game environment, followed by improving your agent's decision-making and coordination mechanisms – all through hands-on examples using easily customizable techniques. You’ll then discover how to emulate the vision and hearing capabilities of your agent for natural and humanlike AI behavior, and later improve the agents with the help of graphs. This book also covers the new navigational mesh with improved AI and pathfinding tools introduced in the Unity 2018 update. You’ll empower your AI with decision-making functions by programming simple board games, such as tic-tac-toe and checkers, and orchestrate agent coordination to get your AIs working together as one.By the end of this book, you’ll have gained expertise in AI programming and developed creative and interactive games.What you will learnCreate intelligent pathfinding agents with popular AI techniques such as A* and A*mbushImplement different algorithms for adding coordination between agents and tactical algorithms for different purposesSimulate senses so agents can make better decisions, taking account of the environmentExplore different algorithms for creating decision-making agents that go beyond simple behaviors and movementCreate coordination between agents and orchestrate tactics when dealing with a graph or terrainImplement waypoints by making a manual selectorWho this book is forThe Unity 2018 Artificial Intelligence Cookbook is for you if you are eager to get more tools under your belt to solve AI- and gameplay-related problems. Basic knowledge of Unity and prior knowledge of C# is an advantage.

Modern Scala Projects: Leverage the power of Scala for building data-driven and high-performant projects

by Ilango Gurusamy

Develop robust, Scala-powered projects with the help of machine learning libraries such as SparkML to harvest meaningful insightKey FeaturesGain hands-on experience in building data science projects with Scala Exploit powerful functionalities of machine learning librariesUse machine learning algorithms and decision tree models for enterprise appsBook DescriptionScala, together with the Spark Framework, forms a rich and powerful data processing ecosystem. Modern Scala Projects is a journey into the depths of this ecosystem. The machine learning (ML) projects presented in this book enable you to create practical, robust data analytics solutions, with an emphasis on automating data workflows with the Spark ML pipeline API. This book showcases or carefully cherry-picks from Scala’s functional libraries and other constructs to help readers roll out their own scalable data processing frameworks. The projects in this book enable data practitioners across all industries gain insights into data that will help organizations have strategic and competitive advantage. Modern Scala Projects focuses on the application of supervisory learning ML techniques that classify data and make predictions. You'll begin with working on a project to predict a class of flower by implementing a simple machine learning model. Next, you'll create a cancer diagnosis classification pipeline, followed by projects delving into stock price prediction, spam filtering, fraud detection, and a recommendation engine. By the end of this book, you will be able to build efficient data science projects that fulfil your software requirements.What you will learnCreate pipelines to extract data or analytics and visualizationsAutomate your process pipeline with jobs that are reproducible Extract intelligent data efficiently from large, disparate datasets Automate the extraction, transformation, and loading of dataDevelop tools that collate, model, and analyze dataMaintain the integrity of data as data flows become more complexDevelop tools that predict outcomes based on “pattern discovery”Build really fast and accurate machine-learning models in ScalaWho this book is forModern Scala Projects is for Scala developers who would like to gain some hands-on experience with some interesting real-world projects. Prior programming experience with Scala is necessary.

Delphi High Performance: Build Fast Delphi Applications Using Concurrency, Parallel Programming And Memory Management

by Primož Gabrijelčič

<P><P>Build fast, scalable, and high performing applications with Delphi <P><P>Key Features <P><P>Build efficient and concurrent applications in Delphi with focused examples <P><P>Identify performance bottlenecks and apply the correct algorithm to increase the performance of applications. <P><P>Delve into parallel programming and memory management to optimize your code <P><P>Book Description <P><P>Delphi is a cross-platform Integrated Development Environment (IDE) that supports rapid application development for Microsoft Windows, Apple Mac OS X, Google Android, iOS, and now Linux with RAD Studio 10.2. This book will be your guide to build efficient high performance applications with Delphi. <P><P>The book begins by explaining how to find performance bottlenecks and apply the correct algorithm to fix them. It will teach you how to improve your algorithms before taking you through parallel programming. You'll then explore various tools to build highly concurrent applications. <P><P>After that, you'll delve into improving the performance of your code and master cross-platform RTL improvements. Finally, we'll go through memory management with Delphi and you'll see how to leverage several external libraries to write better performing programs. <P><P>By the end of the book, you'll have the knowledge to create high performance applications with Delphi. <P><P>What you will learn <P><P>Find performance bottlenecks and easily mitigate them <P><P>Discover different approaches to fix algorithms <P><P>Understand parallel programming and work with various tools included with Delphi <P><P>Master the RTL for code optimization <P><P>Explore memory managers and their implementation <P><P>Leverage external libraries to write better performing programs <P><P>Who This Book Is For <P><P>This book is for Delphi developers who would like to build high performance applications with Delphi. Prior knowledge of Delphi is assumed.

ECMAScript Cookbook: Over 70 recipes to help you learn the new ECMAScript (ES6/ES8) features and solve common JavaScript problems

by Ross Harrison

Become a better web programmer by writing efficient and modular code using ES6 and ES8Key FeaturesLearn to write asynchronous code and improve the readability of your web applications Explore advanced concepts such as closures, Proxy, generators, Promise, async functions, and Atomics Use different design patterns to create structures to solve common organizational and processing issuesBook DescriptionECMAScript Cookbook follows a modular approach with independent recipes covering different feature sets and specifications of ECMAScript to help you become an efficient programmer.This book starts off with organizing your JavaScript applications as well as delivering those applications to modem and legacy systems. You will get acquainted with features of ECMAScript 8 such as async, SharedArrayBuffers, and Atomic operations that enhance asynchronous and parallel operations. In addition to this, this book will introduce you to SharedArrayBuffers, which allow web workers to share data directly, and Atomic operations, which help coordinate behavior across the threads. You will also work with OOP and Collections, followed by new functions and methods on the built-in Object and Array types that make common operations more manageable and less error-prone. You will then see how to easily build more sophisticated and expressive program structures with classes and inheritance. In the end, we will cover Sets, Maps, and Symbols, which are the new types introduced in ECMAScript 6 to add new behaviors and allow you to create simple and powerful modules.By the end of the book, you will be able to produce more efficient, expressive, and simpler programs using the new features of ECMAScript. What you will learnOrganize JavaScript programs across multiple files, using ES modulesCreate and work with promises using the Promise object and methodsCompose async functions to propagate and handle errorsSolve organizational and processing issues with structures using design patternsUse classes to encapsulate and share behaviorOrchestrate parallel programs using WebWorkers, SharedMemory, and AtomicsUse and extend Map, Set, and Symbol to work with user-defined classes and simulate data typesExplore new array methods to avoid looping with arrays and other collectionsWho this book is forIf you’re a web developer with a basic understanding of JavaScript and wish to learn the latest features of ECMAScript for developing efficient web applications, this book is for you.

DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

by Shashikant Bangera

Set up complete CI and CD pipelines for your serverless applications using DevOps principlesKey FeaturesUnderstand various services for designing serverless architecture Build CD pipelines using various cloud providers for your serverless applications Implement DevOps best practices when building serverless applicationsBook DescriptionServerless applications are becoming very popular among developers and are generating a buzz in the tech market. Many organizations struggle with the effective implementation of DevOps with serverless applications. DevOps for Serverless Applications takes you through different DevOps-related scenarios to give you a solid foundation in serverless deployment.You will start by understanding the concepts of serverless architecture and development, and why they are important. Then, you will get to grips with the DevOps ideology and gain an understanding of how it fits into the Serverless Framework. You'll cover deployment framework building and deployment with CI and CD pipelines for serverless applications. You will also explore log management and issue reporting in the serverless environment. In the concluding chapters, you will learn important security tips and best practices for secure pipeline management.By the end of this book, you will be in a position to effectively build a complete CI and CD delivery pipeline with log management for serverless applications.What you will learnExplore serverless fundamentals and effectively combine them with DevOpsSet up CI and CD with AWS Lambda and other popular Serverless service providers with the help of the Serverless FrameworkPerform monitoring and logging with serverless applicationsSet up a dynamic dashboard for different service providersDiscover best practices for applying DevOps to serverless architectureUnderstand use cases for different serverless architecturesWho this book is forDevOps for Serverless Applications is for DevOps engineers, architects, or anyone interested in understanding the DevOps ideology in the serverless world. You will learn to use DevOps with serverless and apply continuous integration, continuous delivery, testing, logging, and monitoring with serverless.

Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models

by Giuseppe Bonaccorso c/o Quandoo

Explore and master the most important algorithms for solving complex machine learning problems.Key FeaturesDiscover high-performing machine learning algorithms and understand how they work in depth. One-stop solution to mastering supervised, unsupervised, and semi-supervised machine learning algorithms and their implementation. Master concepts related to algorithm tuning, parameter optimization, and moreBook DescriptionMachine learning is a subset of AI that aims to make modern-day computer systems smarter and more intelligent. The real power of machine learning resides in its algorithms, which make even the most difficult things capable of being handled by machines. However, with the advancement in the technology and requirements of data, machines will have to be smarter than they are today to meet the overwhelming data needs; mastering these algorithms and using them optimally is the need of the hour. Mastering Machine Learning Algorithms is your complete guide to quickly getting to grips with popular machine learning algorithms. You will be introduced to the most widely used algorithms in supervised, unsupervised, and semi-supervised machine learning, and will learn how to use them in the best possible manner. Ranging from Bayesian models to the MCMC algorithm to Hidden Markov models, this book will teach you how to extract features from your dataset and perform dimensionality reduction by making use of Python-based libraries such as scikit-learn. You will also learn how to use Keras and TensorFlow to train effective neural networks.If you are looking for a single resource to study, implement, and solve end-to-end machine learning problems and use-cases, this is the book you need.What you will learnExplore how a ML model can be trained, optimized, and evaluatedUnderstand how to create and learn static and dynamic probabilistic modelsSuccessfully cluster high-dimensional data and evaluate model accuracyDiscover how artificial neural networks work and how to train, optimize, and validate themWork with Autoencoders and Generative Adversarial NetworksApply label spreading and propagation to large datasetsExplore the most important Reinforcement Learning techniquesWho this book is forThis book is an ideal and relevant source of content for data science professionals who want to delve into complex machine learning algorithms, calibrate models, and improve the predictions of the trained model. A basic knowledge of machine learning is preferred to get the best out of this guide.

Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

by Jeeva S. Chelladhurai Ken Cochrane Neependra K Khare

Leverage Docker to deploying software at scaleKey FeaturesLeverage practical examples to manage containers efficientlyIntegrate with orchestration tools such as Kubernetes for controlled deploymentsLearn to implement best practices on improving efficiency and security of containersBook DescriptionDocker is an open source platform for building, shipping, managing, and securing containers. Docker has become the tool of choice for people willing to work with containers. Since the market is moving toward containerization, Docker will definitely have a big role to play in the future tech market.This book starts with setting up Docker in different environment, and helps you learn how to work with Docker images. Then, you will take a deep dive into network and data management for containers. The book explores the RESTful APIs provided by Docker to perform different actions, such as image/container operations. The book then explores logs and troubleshooting Docker to solve issues and bottlenecks. You will gain an understanding of Docker use cases, orchestration, security, ecosystems, and hosting platforms to make your applications easy to deploy, build, and collaborate on. The book covers the new features of Docker 18.xx (or later), such as working with AWS and Azure, Docker Engine, Docker Swarm, Docker Compose, and so on.By the end of this book, you will have gained hands-on experience of finding quick solutions to different problems encountered while working with Docker.What you will learnInstall Docker on various platformsWork with Docker images and containersContainer networking and data sharingDocker APIs and language bindingsVarious PaaS solutions for DockerImplement container orchestration using Docker Swarm and KubernetesContainer securityDocker on various cloudsWho this book is forBook is targeted towards developers, system administrators, and DevOps engineers who want to use Docker in his/her development, QA, or production environments. It is expected that the reader has basic Linux/Unix skills such as installing packages, editing files, managing services, and so on. Any experience in virtualization technologies such as KVM, XEN, and VMware will be an added advantage

Mastering Functional Programming: Functional techniques for sequential and parallel programming with Scala

by Anatolii Kmetiuk

Learn how functional programming can help you in deploying web servers and working with databases in a declarative and pure wayKey FeaturesLearn functional programming from scratchProgram applications with side effects in a pure wayGain expertise in working with array tools for functional programmingBook DescriptionIn large projects, it can get difficult keeping track of all the interdependencies of the code base and how its state changes at runtime. Functional Programming helps us solve these problems. It is a paradigm specifically designed to deal with the complexity of software development. This book will show you how the right abstractions can reduce complexity and make your code easy to read and understand.Mastering Functional Programming begins by touching upon the basics such as what lambdas are and how to write declarative code with the help of functions. It then moves on to more advanced concepts such as pure functions and type classes, the problems they aim to solve, and how to use them in real-world scenarios. You will also explore some of the more advanced patterns in the world of functional programming, such as monad transformers and Tagless Final. In the concluding chapters, you will be introduced to the actor model, implement it in modern functional languages, and explore the subject of parallel programming.By the end of the book, you will have mastered the concepts entailing functional programming along with object-oriented programming (OOP) to build robust applications.What you will learnWrite reliable and scalable software based on solid foundationsExplore the cutting edge of computer science researchEffectively solve complex architectural problems in a robust wayAvoid unwanted outcomes such as errors or delays and focus on business logicWrite parallel programs in a functional style using the actor modelUse functional data structures and collections in your day-to-day workWho this book is forIf you are from an imperative and OOP background, this book will guide you through the world of functional programming, irrespective of which programming language you use.

Deep Learning with PyTorch: A practical approach to building neural network models using PyTorch

by Vishnu Subramanian

Build neural network models in text, vision and advanced analytics using PyTorch Key Features Learn PyTorch for implementing cutting-edge deep learning algorithms. Train your neural networks for higher speed and flexibility and learn how to implement them in various scenarios; Cover various advanced neural network architecture such as ResNet, Inception, DenseNet and more with practical examples; Book Description Deep learning powers the most intelligent systems in the world, such as Google Voice, Siri, and Alexa. Advancements in powerful hardware, such as GPUs, software frameworks such as PyTorch, Keras, Tensorflow, and CNTK along with the availability of big data have made it easier to implement solutions to problems in the areas of text, vision, and advanced analytics. This book will get you up and running with one of the most cutting-edge deep learning libraries—PyTorch. PyTorch is grabbing the attention of deep learning researchers and data science professionals due to its accessibility, efficiency and being more native to Python way of development. You'll start off by installing PyTorch, then quickly move on to learn various fundamental blocks that power modern deep learning. You will also learn how to use CNN, RNN, LSTM and other networks to solve real-world problems. This book explains the concepts of various state-of-the-art deep learning architectures, such as ResNet, DenseNet, Inception, and Seq2Seq, without diving deep into the math behind them. You will also learn about GPU computing during the course of the book. You will see how to train a model with PyTorch and dive into complex neural networks such as generative networks for producing text and images. By the end of the book, you'll be able to implement deep learning applications in PyTorch with ease. What you will learn Use PyTorch for GPU-accelerated tensor computations Build custom datasets and data loaders for images and test the models using torchvision and torchtext Build an image classifier by implementing CNN architectures using PyTorch Build systems that do text classification and language modeling using RNN, LSTM, and GRU Learn advanced CNN architectures such as ResNet, Inception, Densenet, and learn how to use them for transfer learning Learn how to mix multiple models for a powerful ensemble model Generate new images using GAN’s and generate artistic images using style transfer Who this book is for This book is for machine learning engineers, data analysts, data scientists interested in deep learning and are looking to explore implementing advanced algorithms in PyTorch. Some knowledge of machine learning is helpful but not a mandatory need. Working knowledge of Python programming is expected.

Hands-On Big Data Modeling: Effective database design techniques for data architects and business intelligence professionals

by James Lee Tao Wei

Data Modelers, Data Architects, Database administrators, ETL developers, DW/BI professionals and Software Engineers will be the relevant users who want to design sophisticated and powerful database models.

Kubernetes for Serverless Applications: Implement FaaS by effectively deploying, managing, monitoring, and orchestrating serverless applications using Kubernetes

by Jeeva S. Chelladhurai Paul Adamson Russ McKendrick

Transform yourself into a Kubernetes specialist in serverless applications. Key Features Get hands-on experience in installing, configuring, and using services such as Kubeless, Funktion, OpenWhisk, and Fission Learn how to launch Kubernetes both locally and in public clouds Explore the differences between using services such as AWS Lambda and Azure Functions and running your own Book Description Kubernetes has established itself as the standard platform for container management, orchestration, and deployment. It has been adopted by companies such as Google, its original developers, and Microsoft as an integral part of their public cloud platforms, so that you can develop for Kubernetes and not worry about being locked into a single vendor. This book will initially start by introducing serverless functions. Then you will configure tools such as Minikube to run Kubernetes. Once you are up-and-running, you will install and configure Kubeless, your first step towards running Function as a Service (FaaS) on Kubernetes. Then you will gradually move towards running Fission, a framework used for managing serverless functions on Kubernetes environments. Towards the end of the book, you will also work with Kubernetes functions on public and private clouds. By the end of this book, we will have mastered using Function as a Service on Kubernetes environments. What you will learn Get a detailed analysis of serverless/Functions as a Service Get hands-on with installing and running tasks in Kubernetes using Minikube Install Kubeless locally and launch your first function Launch Kubernetes in the cloud and move your applications between your local machine and your cloud cluster Deploy applications on Kubernetes using Apache OpenWhisk Explore topics such as Funktion and Fission installation on the cloud followed by launching applications Monitor a serverless function and master security best practices and Kubernetes use cases Who this book is for If you are a DevOps engineer, cloud architect, or a stakeholder keen to learn about serverless functions in Kubernetes environments, then this book is for you.

NetSuite ERP for Administrators: Learn how to install, maintain, and secure a NetSuite implementation, using the best tools and techniques

by Anthony Bickof

Learn steps and tasks to help a NetSuite administrator perform both his daily and monthly tasks efficiently. Advance his expertise to become NetSuite leader without having to spend time and money on corporate trainings.Key FeaturesUnderstand the business considerations and implementation of the NetSuite ERPGain a deep knowledge of enterprise security, data management, process automation, and analyticsLearn techniques to sail through system maintenance while ensuring accuracy and to practically troubleshoot issuesBook DescriptionNetSuite ERP is a complete, scalable cloud ERP solution targeted at fast-growing, mid-sized businesses and large enterprises. It's the smartly executed combination of financial management operations and built-in business intelligence, which enables companies to make data-driven and well-informed decisions. This book will help administrators become expert enough to be seen as the NetSuite leader at their company and to be able to advise department heads on specific processes, and strategic decisions. We start with an overview of ERP and NetSuite ERP, before going on to explain the built-in features to show the breadth of NetSuite ERP's product and its ease of use. We then discuss business aspects, focusing on the most important processes in NetSuite. Then you'll understand the implementation aspects that are generic enough to cover all the features. The focus then shifts to specific skills that you will need to administer for any system, such as roles, permissions, customization, and data imports. Moving on, you'll learn how to centralize the creation of search templates and give users the tools to pivot the data and expose it to the user in useful ways, such as on the dashboard. The book ends with checklists providing actionable steps that you as an administrator can take to do your job and support the application through new releases and troubleshooting problems.What you will learn Provide executives with meaningful insights into the business A Framework to streamline the implementation of new and existing features Leverage built-in tools to optimize your efficiency and effectiveness Test configuration to check the implementation of role-specific permissions Understand how to optimize the amount of data to be shared with users Import data like new leads and employ current data like pricing updates Perform on-going maintenance and troubleshoot issuesWho this book is forThis book is for administrators, consultants, and Project Managers who would like to improve their skills in the areas of configuration and system management. Basic experience implementing NetSuite is assumed.

Refine Search

Showing 28,751 through 28,775 of 53,350 results