万本电子书0元读

万本电子书0元读

Mastering Python Regular Expressions
Mastering Python Regular Expressions
Félix López
¥45.77
A short and straight to the point guide that explains the implementation of Regular Expressions in Python. This book is aimed at Python developers who want to learn how to leverage Regular Expressions in Python. Basic knowledge of Python is required for a better understanding.
Boost.Asio C++ Network Programming Cookbook
Boost.Asio C++ Network Programming Cookbook
Dmytro Radchuk
¥90.46
Over 25 hands-on recipes to create robust and highly-efficient cross-platform distributed applications with the Boost.Asio libraryAbout This BookBuild highly efficient distributed applications with easeEnhance your cross-platform network programming skills with one of the most reputable C++ librariesFind solutions to real-world problems related to network programming with ready-to-use recipes using this detailed and practical handbookWho This Book Is ForIf you want to enhance your C++ network programming skills using the Boost.Asio library and understand the theory behind development of distributed applications, this book is just what you need. The prerequisite for this book is experience with general C++11. To get the most from the book and comprehend advanced topics, you will need some background experience in multithreading.What You Will LearnBoost your working knowledge of one of the most reputable C++ networking libraries—Boost.AsioFamiliarize yourself with the basics of TCP and UDP protocolsCreate scalable and highly-efficient client and server applicationsUnderstand the theory behind development of distributed applicationsIncrease the security of your distributed applications by adding SSL supportImplement a HTTP client easilyUse iostreams, scatter-gather buffers, and timersIn DetailStarting with recipes demonstrating the execution of basic Boost.Asio operations, the book goes on to provide ready-to-use implementations of client and server applications from simple synchronous ones to powerful multithreaded scalable solutions. Finally, you are presented with advanced topics such as implementing a chat application, implementing an HTTP client, and adding SSL support. All the samples presented in the book are ready to be used in real projects just out of the box.As well as excellent practical examples, the book also includes extended supportive theoretical material on distributed application design and construction.Style and approachThis book is a set of recipes, each containing the statement and de*ion of a particular practical problem followed by code sample providing the solution to the problem and detailed step-by-step explanation. Recipes are grouped by topic into chapters and ordered by the level of complexity from basic to advanced.
Mastering Python
Mastering Python
Rick van Hattem
¥71.93
Master the art of writing beautiful and powerful Python by using all of the features that Python 3.5 offers About This Book Become familiar with the most important and advanced parts of the Python code style Learn the trickier aspects of Python and put it in a structured context for deeper understanding of the language Offers an expert's-eye overview of how these advanced tasks fit together in Python as a whole along with practical examples Who This Book Is For Almost anyone can learn to write working * and create high quality code but they might lack a structured understanding of what it means to be 'Pythonic'. If you are a Python programmer who wants to code efficiently by getting the syntax and usage of a few intricate Python techniques exactly right, this book is for you. What You Will Learn Create a virtualenv and start a new project Understand how and when to use the functional programming paradigm Get familiar with the different ways the decorators can be written in Understand the power of generators and coroutines without digressing into lambda calculus Create metaclasses and how it makes working with Python far easier Generate HTML documentation out of documents and code using Sphinx Learn how to track and optimize application performance, both memory and cpu Use the multiprocessing library, not just locally but also across multiple machines Get a basic understanding of packaging and creating your own libraries/applications In Detail Python is a dynamic programming language. It is known for its high readability and hence it is often the first language learned by new programmers. Python being multi-paradigm, it can be used to achieve the same thing in different ways and it is compatible across different platforms. Even if you find writing Python code easy, writing code that is efficient, easy to maintain, and reuse is not so straightforward. This book is an authoritative guide that will help you learn new advanced methods in a clear and contextualised way. It starts off by creating a project-specific environment using venv, introducing you to different Pythonic syntax and common pitfalls before moving on to cover the functional features in Python. It covers how to create different decorators, generators, and metaclasses. It also introduces you to functools.wraps and coroutines and how they work. Later on you will learn to use asyncio module for asynchronous clients and servers. You will also get familiar with different testing systems such as py.test, doctest, and unittest, and debugging tools such as Python debugger and faulthandler. You will learn to optimize application performance so that it works efficiently across multiple machines and Python versions. Finally, it will teach you how to access C functions with a simple Python call. By the end of the book, you will be able to write more advanced *s and take on bigger challenges. Style and Approach This book is a comprehensive guide that covers advanced features of the Python language, and communicate them with an authoritative understanding of the underlying rationale for how, when, and why to use them.
Beginning C++ Programming
Beginning C++ Programming
Richard Grimes
¥90.46
C++ has come a long way and is now adopted in several contexts. Its key strengths are its software infrastructure and resource-constrained applications, including desktop applications, servers, and performance-critical applications, not to forget its importance in game programming. Despite its strengths in these areas, beginners usually tend to shy away from learning the language because of its steep learning curve. The main mission of this book is to make you familiar and comfortable with C++. You will finish the book not only being able to write your own code, but more importantly, you will be able to read other projects. It is only by being able to read others' code that you will progress from a beginner to an advanced programmer. This book is the first step in that progression. The first task is to familiarize you with the structure of C++ projects so you will know how to start reading a project. Next, you will be able to identify the main structures in the language, functions, and classes, and feel confident being able to identify the execution flow through the code. You will then become aware of the facilities of the standard library and be able to determine whether you need to write a routine yourself, or use an existing routine in the standard library. Throughout the book, there is a big emphasis on memory and pointers. You will understand memory usage, allocation, and
Cybersecurity – Attack and Defense Strategies
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes,Erdal Ozkaya
¥73.02
Enhance your organization’s secure posture by improving your attack and defense strategies About This Book ? Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics. ? Learn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategies. ? A practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your system. Who This Book Is For This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial. What You Will Learn ? Learn the importance of having a solid foundation for your security posture ? Understand the attack strategy using cyber security kill chain ? Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence ? Learn how to perform an incident investigation ? Get an in-depth understanding of the recovery process ? Understand continuous security monitoring and how to implement a vulnerability management strategy ? Learn how to perform log analysis to identify suspicious activities In Detail The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system. In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis. By the end of this book, you will be well-versed with Red Team and Blue Team techniques and will have learned the techniques used nowadays to attack and defend systems. Style and approach This book uses a practical approach of the cybersecurity kill chain to explain the different phases of the attack, which includes the rationale behind each phase, followed by scenarios and examples that brings the theory into practice.
GitHub Essentials
GitHub Essentials
Achilleas Pipinellis
¥54.49
This book will teach you what you need to know to start using GitHub effectively for collaborating and working on your software projects. About This Book ? Effectively use GitHub by learning its key features to leverage the power of Git and make collaboration on code easy to work with. ? Be more productive on the development workflow of your projects using the valuable toolset that GitHub provides. ? Explore the world of GitHub by following simple, step-by-step, real-world scenarios accompanied by helpful, explanatory screenshots. Who This Book Is For This book is for experienced or novice developers with a basic knowledge of Git. If you ever wanted to learn how big projects such as Twitter, Google, or even GitHub collaborate on code, then this book is for you. What You Will Learn ? Create and upload repositories to your account ? Create organizations and manage teams with different access levels on repositories ? Use the issue tracker effectively and add context to issues with labels and milestones ? Create, access, and personalize your user account and profile settings ? Build a community around your project using the sophisticated tools GitHub provides ? Create GitHub pages and understand web analytics In Detail Whether you are an experienced developer or a novice, learning to work with Version Control Systems is a must in the software development world. Git is the most popular tool for that purpose, and GitHub was built around it, leveraging its powers by bringing it to the web. Starting with the basics of creating a repository, you will then learn how to manage the issue tracker, the place where discussions about your project take place. Continuing our journey, we will explore how to use the wiki and write rich documentation that will accompany your project. You will also master organization/team management and some of the features that made GitHub so well known, including pull requests. Next, we will focus on creating simple web pages hosted on GitHub and lastly, we will explore the settings that are configurable for a user and a repository. Style and approach This book will take you through some of the most important features of one of the most popular tools, GitHub, which is used to bring developers together from all around the world to discover, share, and build better software. At each step of the way, you will learn about important approaches used in GitHub, including creating a repository, managing teams, creating GitHub pages, and watching your repository's web analytics, among others.
Java 9: Building Robust Modular Applications
Java 9: Building Robust Modular Applications
Dr. Edward Lavieri,Peter Verhas,Jason Lee
¥63.21
Mastering advanced features of Java and implement them to build amazing projects About This Book ? Take advantage of Java's new modularity features to write real-world applications that solve a variety of problems ? Explore the major concepts introduced with Java 9, including modular programming, HTTP 2.0, API changes, and more ? Get to grips with tools, techniques and best practices to enhance application development Who This Book Is For This learning path is for Java developers who are looking to move a level up and learn how to build robust applications in the latest version of Java. What You Will Learn ? Package Java applications as modules using the Java Platform Module System ? Implement process management in Java using the all-new process handling API ? Integrate your applications with third-party services in the cloud ? Interact with mail servers, using JavaMail to build an application that filters spam messages ? Use JavaFX to build rich GUI-based applications, which are an essential element of application development ? Leverage the possibilities provided by the newly introduced Java shell ? Test your application's effectiveness with the JVM harness ? See how Java 9 provides support for the HTTP 2.0 standard In Detail Java 9 and its new features add to the richness of the language; Java is one of the languages most used by developers to build robust software applications. Java 9 comes with a special emphasis on modularity with its integration with Jigsaw. This course is your one-stop guide to mastering the language. You'll be provided with an overview and explanation of the new features introduced in Java 9 and the importance of the new APIs and enhancements. Some new features of Java 9 are ground-breaking; if you are an experienced programmer, you will be able to make your enterprise applications leaner by learning these new features. You'll be provided with practical guidance in applying your newly acquired knowledge of Java 9 and further information on future developments of the Java platform. This course will improve your productivity, making your applications faster. Next, you'll go on to implement everything you've learned by building 10 cool projects. You will learn to build an email filter that separates spam messages from all your inboxes, a social media aggregator app that will help you efficiently track various feeds, and a microservice for a client/server note application, to name just a few. By the end of this course, you will be well acquainted with Java 9 features and able to build your own applications and projects. This Learning Path contains the best content from the following two recently published Packt products: ? Mastering Java 9 ? Java 9 Programming Blueprints Style and approach This practical guide is filled with real-world examples. Its projects will help you get acquainted with concepts in depth.
Spring 5 Design Patterns
Spring 5 Design Patterns
Dinesh Rajput
¥80.65
Learn various design patterns and best practices in Spring 5 and use them to solve common design problems. About This Book ? Explore best practices for designing an application ? Manage your code easily with Spring's Dependency Injection pattern ? Understand the benefits that the right design patterns can offer your toolkit Who This Book Is For This book is for developers who would like to use design patterns to address common problems while designing an app using the Spring Framework and Reactive Programming approach. A basic knowledge of the Spring Framework and Java is assumed. What You Will Learn ? Develop applications using dependency injection patterns ? Learn best practices to design enterprise applications ? Explore Aspect-Oriented Programming relating to transactions, security, and caching. ? Build web applications using traditional Spring MVC patterns ? Learn to configure Spring using XML, annotations, and Java. ? Implement caching to improve application performance. ? Understand concurrency and handle multiple connections inside a web server. ? Utilizing Reactive Programming Pattern to build Reactive web applications. In Detail Design patterns help speed up the development process by offering well tested and proven solutions to common problems. These patterns coupled with the Spring framework offer tremendous improvements in the development process. The book begins with an overview of Spring Framework 5.0 and design patterns. You will understand the Dependency Injection pattern, which is the main principle behind the decoupling process that Spring performs, thus making it easier to manage your code. You will learn how GoF patterns can be used in Application Design. You will then learn to use Proxy patterns in Aspect Oriented Programming and remoting. Moving on, you will understand the JDBC template patterns and their use in abstracting database access. Then, you will be introduced to MVC patterns to build Reactive web applications. Finally, you will move on to more advanced topics such as Reactive streams and Concurrency. At the end of this book, you will be well equipped to develop efficient enterprise applications using Spring 5 with common design patterns Style and approach The book takes a pragmatic approach, showing various design patterns and best-practice considerations, including the Reactive programming approach with the Spring 5 Framework and ways to solve common development and design problems for enterprise applications.
Hands-On Machine Learning for Cybersecurity
Hands-On Machine Learning for Cybersecurity
Soma Halder
¥81.74
Get into the world of smart data security using machine learning algorithms and Python libraries Key Features *Learn machine learning algorithms and cybersecurity fundamentals *Automate your daily workflow by applying use cases to many facets of security *Implement smart machine learning solutions to detect various cybersecurity problems Book Description Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain. The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not. Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems What you will learn *Use machine learning algorithms with complex datasets to implement cybersecurity concepts *Implement machine learning algorithms such as clustering, k-means, and Naive Bayes to solve real-world problems *Learn to speed up a system using Python libraries with NumPy, Scikit-learn, and CUDA *Understand how to combat malware, detect spam, and fight financial fraud to mitigate cyber crimes *Use TensorFlow in the cybersecurity domain and implement real-world examples *Learn how machine learning and Python can be used in complex cyber issues Who this book is for This book is for the data scientists, machine learning developers, security researchers, and anyone keen to apply machine learning to up-skill computer security. Having some working knowledge of Python and being familiar with the basics of machine learning and cybersecurity fundamentals will help to get the most out of the book
MQTT Essentials - A Lightweight IoT Protocol
MQTT Essentials - A Lightweight IoT Protocol
Gastón C. Hillar
¥71.93
This step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We’ll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python. Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages. Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messages What you will learn ?Understand how MQTTv3.1 and v3.1.1 works in detail ?Install and secure a Mosquitto MQTT broker by following best practices ?Design and develop IoT solutions combined with mobile and web apps that use MQTT messages to communicate ?Explore the features included in MQTT for IoT and Machine-to-Machine communications ?Publish and receive MQTT messages with Python, Java, Swift, JavaScript, and Node.js ?Implement the security best practices while setting up the MQTT Mosquitto broker
Panda3D 1.6 Game Engine Beginner's Guide
Panda3D 1.6 Game Engine Beginner's Guide
David Brian Mathews
¥80.65
This book is a step-by-step, tutorial-driven guide to game or application development using Panda3D that follows the process used in professional development. You will learn through first-hand experience how a Panda3D developer goes from literally nothing to a finished product. Along the way there are illustrations to explain difficult topics and to display the results of progress, as well as a complete archive of thoroughly explained code for every tutorial. Every single code file the reader saves is mirrored in the example code, finished and explained. In addition, every art and audio asset required by the tutorials is provided, so the user need not provide any assets of their own. If you are an independent developer interested in creating your own video games or other 3D applications using Panda3D for personal or commercial distribution at minimal expense, this book is definitely for you. A basic understanding of general programming, such as familiarity with the concept of a variable, is necessary. Some familiarity with object-oriented programming and the Python language is expected, but not essential. This book does not cover the creation of three dimensional models or similar art assets, nor does it cover the creation of two dimensional art assets or audio assets.
MySQL Management and Administration with Navicat
MySQL Management and Administration with Navicat
G?khan Ozar
¥54.49
Standard Mini. This book is written for MySQL Users, Developers, and admins who want to discover just how easy Navicat makes even normally arduous tasks.
Building Minecraft Server Modifications - Second Edition
Building Minecraft Server Modifications - Second Edition
Cody M. Sommer
¥54.49
Create and customize your very own Minecraft server using Java and the Spigot API About This Book Set up a Minecraft server that you control Use object-oriented programming to modify Minecraft regardless of your level of experience This interactive guide will help you create a unique experience for you and your friends Who This Book Is For This book is great for anyone who is interested in customizing their Minecraft server. Whether you are new to programming, Java, Bukkit, or even Minecraft itself, this book has you covered. All you need is a valid Minecraft account. If you are interested in programming as a career or hobby, this book will get you started. If you are simply interested in playing Minecraft with your friends, then this book will help you make that experience even more enjoyable. What You Will Learn Install and run a Spigot server for free on your home PC Adjust the server settings to customize Minecraft to your liking Install an IDE and configure a project to write code Install and test plugins on a Spigot server Test your plugins through debugging the code Program in game commands and permissions Get to know advanced programming concepts such as event-driven programming, configuration files, saving/loading data, and scheduled tasks Implement configuration files to make your plugins customizable Save and load your plugin's data to persist across server restarts In Detail Minecraft is a sandbox game that allows you to play it in any way you want. Coupled with a multiplayer server powered by Spigot, you can customize the game even more! Using the Bukkit API, anyone interested in learning how to program can control their Minecraft world by developing server plugins. This book is a great introduction to software development through the wonderful world of Minecraft. We start by instructing you through how to set up your home PC for Minecraft server development. This includes an IDE complete with the required libraries as well as a Spigot server to test on. You will be guided through writing code for several different plugins. Each chapter teaches you new skills to create plugins of increasing complexity, and each plugin adds a new concept of the Bukkit API By the end of the book, you will have all the knowledge you need about the API to successfully create any type of plugin. You can then practice and build your Java skills through developing more mods for their server. Style and approach This hands-on guide is filled with interactive examples to help you modify Minecraft. Programming terms and concepts are explained along the way so even those who have never written code before can keep up.
Industrial Cybersecurity
Industrial Cybersecurity
Pascal Ackerman
¥80.65
Your one-step guide to understanding industrial cyber security, its control systems, and its operations. About This Book ? Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices ? Filled with practical examples to help you secure critical infrastructure systems efficiently ? A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems Who This Book Is For If you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful. What You Will Learn ? Understand industrial cybersecurity, its control systems and operations ? Design security-oriented architectures, network segmentation, and security support services ? Configure event monitoring systems, anti-malware applications, and endpoint security ? Gain knowledge of ICS risks, threat detection, and access management ? Learn about patch management and life cycle management ? Secure your industrial control systems from design through retirement In Detail With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed. Style and approach A step-by-step guide to implement Industrial Cyber Security effectively.
Mastering Machine Learning with Spark 2.x
Mastering Machine Learning with Spark 2.x
Alex Tellez;Max Pumperla;Michal Malohlava
¥90.46
Unlock the complexities of machine learning algorithms in Spark to generate useful data insights through this data analysis tutorial About This Book ? Process and analyze big data in a distributed and scalable way ? Write sophisticated Spark pipelines that incorporate elaborate extraction ? Build and use regression models to predict flight delays Who This Book Is For Are you a developer with a background in machine learning and statistics who is feeling limited by the current slow and “small data” machine learning tools? Then this is the book for you! In this book, you will create scalable machine learning applications to power a modern data-driven business using Spark. We assume that you already know the machine learning concepts and algorithms and have Spark up and running (whether on a cluster or locally) and have a basic knowledge of the various libraries contained in Spark. What You Will Learn ? Use Spark streams to cluster tweets online ? Run the PageRank algorithm to compute user influence ? Perform complex manipulation of DataFrames using Spark ? Define Spark pipelines to compose individual data transformations ? Utilize generated models for off-line/on-line prediction ? Transfer the learning from an ensemble to a simpler Neural Network ? Understand basic graph properties and important graph operations ? Use GraphFrames, an extension of DataFrames to graphs, to study graphs using an elegant query language ? Use K-means algorithm to cluster movie reviews dataset In Detail The purpose of machine learning is to build systems that learn from data. Being able to understand trends and patterns in complex data is critical to success; it is one of the key strategies to unlock growth in the challenging contemporary marketplace today. With the meteoric rise of machine learning, developers are now keen on finding out how can they make their Spark applications smarter. This book gives you access to transform data into actionable knowledge. The book commences by defining machine learning primitives by the MLlib and H2O libraries. You will learn how to use Binary classification to detect the Higgs Boson particle in the huge amount of data produced by CERN particle collider and classify daily health activities using ensemble Methods for Multi-Class Classification. Next, you will solve a typical regression problem involving flight delay predictions and write sophisticated Spark pipelines. You will analyze Twitter data with help of the doc2vec algorithm and K-means clustering. Finally, you will build different pattern mining models using MLlib, perform complex manipulation of DataFrames using Spark and Spark SQL, and deploy your app in a Spark streaming environment. Style and approach This book takes a practical approach to help you get to grips with using Spark for analytics and to implement machine learning algorithms. We'll teach you about advanced applications of machine learning through illustrative examples. These examples will equip you to harness the potential of machine learning, through Spark, in a variety of enterprise-grade systems.
Python: Beginner's Guide to Programming Code with Python
Python: Beginner's Guide to Programming Code with Python
Charlie Masterson
¥24.44
Python: Beginner's Guide to Programming Code with Python
Deep Learning with PyTorch Quick Start Guide
Deep Learning with PyTorch Quick Start Guide
David Julian
¥54.49
Introduction to deep learning and PyTorch by building a convolutional neural network and recurrent neural network for real-world use cases such as image classification, transfer learning, and natural language processing. Key Features *Clear and concise explanations *Gives important insights into deep learning models *Practical demonstration of key concepts Book Description PyTorch is extremely powerful and yet easy to learn. It provides advanced features, such as supporting multiprocessor, distributed, and parallel computation. This book is an excellent entry point for those wanting to explore deep learning with PyTorch to harness its power. This book will introduce you to the PyTorch deep learning library and teach you how to train deep learning models without any hassle. We will set up the deep learning environment using PyTorch, and then train and deploy different types of deep learning models, such as CNN, RNN, and autoencoders. You will learn how to optimize models by tuning hyperparameters and how to use PyTorch in multiprocessor and distributed environments. We will discuss long short-term memory network (LSTMs) and build a language model to predict text. By the end of this book, you will be familiar with PyTorch's capabilities and be able to utilize the library to train your neural networks with relative ease. What you will learn *Set up the deep learning environment using the PyTorch library *Learn to build a deep learning model for image classification *Use a convolutional neural network for transfer learning *Understand to use PyTorch for natural language processing *Use a recurrent neural network to classify text *Understand how to optimize PyTorch in multiprocessor and distributed environments *Train, optimize, and deploy your neural networks for maximum accuracy and performance *Learn to deploy production-ready models Who this book is for Developers and Data Scientist familiar with Machine Learning but new to deep learning, or existing practitioners of deep learning who would like to use PyTorch to train their deep learning models will find this book to be useful. Having knowledge of Python programming will be an added advantage, while previous exposure to PyTorch is not needed.
Cybersecurity: The Beginner's Guide
Cybersecurity: The Beginner's Guide
Dr. Erdal Ozkaya
¥53.40
Understand the nitty-gritty of Cybersecurity with ease Key Features * Align your security knowledge with industry leading concepts and tools * Acquire required skills and certifications to survive the ever changing market needs * Learn from industry experts to analyse, implement, and maintain a robust environment Book Description It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learn * Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best * Plan your transition into cybersecurity in an efficient and effective way * Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity Who this book is for This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.
Hands-On Data Analysis with Pandas
Hands-On Data Analysis with Pandas
Stefanie Molin
¥79.56
Get to grips with pandas—a versatile and high-performance Python library for data manipulation, analysis, and discovery Key Features * Perform efficient data analysis and manipulation tasks using pandas * Apply pandas to different real-world domains using step-by-step demonstrations * Get accustomed to using pandas as an effective data exploration tool Book Description Data analysis has become a necessary skill in a variety of positions where knowing how to work with data and extract insights can generate significant value. Hands-On Data Analysis with Pandas will show you how to analyze your data, get started with machine learning, and work effectively with Python libraries often used for data science, such as pandas, NumPy, matplotlib, seaborn, and scikit-learn. Using real-world datasets, you will learn how to use the powerful pandas library to perform data wrangling to reshape, clean, and aggregate your data. Then, you will learn how to conduct exploratory data analysis by calculating summary statistics and visualizing the data to find patterns. In the concluding chapters, you will explore some applications of anomaly detection, regression, clustering, and classification, using scikit-learn, to make predictions based on past data. By the end of this book, you will be equipped with the skills you need to use pandas to ensure the veracity of your data, visualize it for effective decision-making, and reliably reproduce analyses across multiple datasets. What you will learn * Understand how data analysts and scientists gather and analyze data * Perform data analysis and data wrangling in Python * Combine, group, and aggregate data from multiple sources * Create data visualizations with pandas, matplotlib, and seaborn * Apply machine learning (ML) algorithms to identify patterns and make predictions * Use Python data science libraries to analyze real-world datasets * Use pandas to solve common data representation and analysis problems * Build Python scripts, modules, and packages for reusable analysis code Who this book is for This book is for data analysts, data science beginners, and Python developers who want to explore each stage of data analysis and scientific computing using a wide range of datasets. You will also find this book useful if you are a data scientist who is looking to implement pandas in machine learning. Working knowledge of Python programming language will be beneficial.
OpenStack Cloud Security
OpenStack Cloud Security
Fabio Alessandro Locati
¥63.21
If you are an OpenStack administrator or developer, or wish to build solutions to protect your OpenStack environment, then this book is for you. Experience of Linux administration and familiarity with different OpenStack components is assumed.
Microsoft System Center Data Protection Manager 2012 R2 Cookbook
Microsoft System Center Data Protection Manager 2012 R2 Cookbook
Robert Hedblom
¥107.90
If you are a DPM administrator, this book will help you verify your knowledge and provide you with everything you need to know about the 2012 R2 release. No prior knowledge about System Center DPM is required, however some experience of running backups will come in handy.
1 2 3 4 5 6 7