Learn Type-Driven Development
¥63.21
A fast paced guide for JavaScript developers for writing safe, fast, and reusable code by leveraging ResaonML's strong static type system Key Features *Reduce code errors with the power of type systems *Employ static typechecking and genericity to promote code reuse and consistency *Understand functional programming which is the foundation of type-driven development Book Description Type-driven development is an approach that uses a static type system to achieve results including safety and efficiency. Types are used to express relationships and other assumptions directly in the code, and these assumptions are enforced by the compiler before the code is run. Learn Type-Driven Development covers how to use these type systems to check the logical consistency of your code. This book begins with the basic idea behind type-driven development. You’ll learn about values (or terms) and how they contrast with types. As you progress through the chapters, you’ll cover how to combine types and values inside modules and build structured types out of simpler ones. You’ll then understand how to express choices or alternatives directly in the type system using variants, polymorphic variants, and generalized algebraic data types. You’ll also get to grips with sum types, build sophisticated data types from generics, and explore functions that express change in the types of values. In the concluding chapters, you’ll cover advanced techniques for code reuse, such as parametric polymorphism and subtyping. By end of this book, you will have learned how to iterate through a type-driven process of solving coding problems using static types, together with dynamic behavior, to obtain more safety and speed. What you will learn *Use static types to capture information, making programs safer and faster *Learn ReasonML from experienced type-driven developers *Enhance safety by simply using basic types *Understand the most important type-driven concepts with simple examples *Explore a design space using static typing and find the best way to express your system rules *Use static types and dynamic runtime in harmony to write even safer and faster code Who this book is for If you’re a programmer working with dynamically typed languages and are looking for ways to mitigate production runtime errors, Learn Type-Driven Development is for you. You’ll also find this book helpful if you’re a programmer working with statically typed languages looking for increased safety and improved performance.
Learn Microsoft Azure
¥81.74
Explore various Azure services to build solutions that leverage effective design patterns Key Features *Create, deploy, and host cloud applications on Azure *Understand various Azure services that help you host serverless applications *Explore practical examples to help you secure and troubleshoot your cloud environment Book Description Azure is one of the leading public cloud service providers. Thanks to a number of Azure service updates, it continues to make advances in the realm of cloud computing. Learn Microsoft Azure starts with the fundamentals of cloud computing. You will learn to configure and set up the Azure infrastructure. As you make your way through the book, you'll explore Azure services, along with working on virtual memory systems (VMS) and deployment models. You will understand various services in the Azure ecosystem, such as Azure IoT and Azure Analytics, among others. An easy-to-follow introduction to various cloud design patterns will also add to your efficiency in designing cloud solutions. In the concluding chapters, you'll secure your virtual networks using Network security groups and configure Azure Active Directory (Azure AD) to set a custom domain name and company profile. By the end of this book, you will have learned to secure and troubleshoot your Azure cloud environment and be fully aware of best practices for Azure cloud administration. What you will learn *Understand the cloud services offered by Azure *Design storage and networks in Azure for your Azure VM *Work with web apps and Azure SQL databases *Build your identity management solutions on Azure using Azure AD *Monitor, protect, and automate your Azure services using Operation Management Suite (OMS) *Implement OMS for Azure services Who this book is for Learn Microsoft Azure is for administrators, cloud engineers, and developers who want to get started with using Azure as their cloud platform and build cloud-based applications for their enterprises.
Blockchain Developer's Guide
¥90.46
Build real-world projects like a smart contract deployment platform, betting apps, wallet services, and much more using blockchain Key Features *Apply blockchain principles and features for making your life and business better *Understand Ethereum for smart contracts and DApp deployment *Tackle current and future challenges and problems relating to blockchain Book Description Blockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders. It is the main technical innovation of Bitcoin, where it serves as the public ledger for Bitcoin transactions. Blockchain Developer's Guide takes you through the electrifying world of blockchain technology. It begins with the basic design of a blockchain and elaborates concepts, such as Initial Coin Offerings (ICOs), tokens, smart contracts, and other related terminologies. You will then explore the components of Ethereum, such as Ether tokens, transactions, and smart contracts that you need to build simple DApps. Blockchain Developer's Guide also explains why you must specifically use Solidity for Ethereum-based projects and lets you explore different blockchains with easy-to-follow examples. You will learn a wide range of concepts - beginning with cryptography in cryptocurrencies and including ether security, mining, and smart contracts. You will learn how to use web sockets and various API services for Ethereum. By the end of this Learning Path, you will be able to build efficient decentralized applications. This Learning Path includes content from the following Packt products: *Blockchain Quick Reference by Brenn Hill, Samanyu Chopra, Paul Valencourt *Building Blockchain Projects by Narayan Prusty What you will learn *Understand how various components of the blockchain architecture work *Get familiar with cryptography and the mechanics behind blockchain *Apply consensus protocol to determine the business sustainability *Understand what ICOs and crypto-mining are, and how they work Who this book is for Blockchain Developer's Guide is for you if you want to get to grips with the blockchain technology and develop your own distributed applications. It is also designed for those who want to polish their existing knowledge regarding the various pillars of the blockchain ecosystem. Prior exposure to an object-oriented programming language such as JavaScript is needed.
AI Blueprints
¥71.93
The essential blueprints and workflow you need to build successful AI business applications Key Features *Learn and master the essential blueprints to program AI for real-world business applications *Gain insights into how modern AI and machine learning solve core business challenges *Acquire practical techniques and a workflow that can build AI applications using state-of-the-art software libraries *Work with a practical, code-based strategy for creating successful AI solutions in your business Book Description AI Blueprints gives you a working framework and the techniques to build your own successful AI business applications. You’ll learn across six business scenarios how AI can solve critical challenges with state-of-the-art AI software libraries and a well thought out workflow. Along the way you’ll discover the practical techniques to build AI business applications from first design to full coding and deployment. The AI blueprints in this book solve key business scenarios. The first blueprint uses AI to find solutions for building plans for cloud computing that are on-time and under budget. The second blueprint involves an AI system that continuously monitors social media to gauge public feeling about a topic of interest - such as self-driving cars. You’ll learn how to approach AI business problems and apply blueprints that can ensure success. The next AI scenario shows you how to approach the problem of creating a recommendation engine and monitoring how those recommendations perform. The fourth blueprint shows you how to use deep learning to find your business logo in social media photos and assess how people interact with your products. Learn the practical techniques involved and how to apply these blueprints intelligently. The fifth blueprint is about how to best design a ‘trending now’ section on your website, much like the one we know from Twitter. The sixth blueprint shows how to create helpful chatbots so that an AI system can understand customers’ questions and answer them with relevant responses. This book continuously demonstrates a working framework and strategy for building AI business applications. Along the way, you’ll also learn how to prepare for future advances in AI. You’ll gain a workflow and a toolbox of patterns and techniques so that you can create your own smart code. What you will learn *An essential toolbox of blueprints and advanced techniques for building AI business applications *How to design and deploy AI applications that meet today’s business needs *A workflow from first design stages to practical code solutions in your next AI projects *Solutions for AI projects that involve social media analytics and recommendation engines *Practical projects and techniques for sentiment analysis and helpful chatbots *A blueprint for AI projects that recommend products based on customer purchasing habits *How to prepare yourself for the next decade of AI and machine learning advancements Who this book is for Programming AI Business Applications provides an introduction to AI with real-world examples. This book can be read and understood by programmers and students without requiring previous AI experience. The projects in this book make use of Java and Python and several popular and state-of-the-art opensource AI libraries.
Hands-On Machine Learning for Cybersecurity
¥81.74
Get into the world of smart data security using machine learning algorithms and Python libraries Key Features *Learn machine learning algorithms and cybersecurity fundamentals *Automate your daily workflow by applying use cases to many facets of security *Implement smart machine learning solutions to detect various cybersecurity problems Book Description Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain. The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not. Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems What you will learn *Use machine learning algorithms with complex datasets to implement cybersecurity concepts *Implement machine learning algorithms such as clustering, k-means, and Naive Bayes to solve real-world problems *Learn to speed up a system using Python libraries with NumPy, Scikit-learn, and CUDA *Understand how to combat malware, detect spam, and fight financial fraud to mitigate cyber crimes *Use TensorFlow in the cybersecurity domain and implement real-world examples *Learn how machine learning and Python can be used in complex cyber issues Who this book is for This book is for the data scientists, machine learning developers, security researchers, and anyone keen to apply machine learning to up-skill computer security. Having some working knowledge of Python and being familiar with the basics of machine learning and cybersecurity fundamentals will help to get the most out of the book
Machine Learning with the Elastic Stack
¥73.02
Leverage Elastic Stack’s machine learning features to gain valuable insight from your data Key Features * Combine machine learning with the analytic capabilities of Elastic Stack * Analyze large volumes of search data and gain actionable insight from them * Use external analytical tools with your Elastic Stack to improve its performance Book Description Machine Learning with the Elastic Stack is a comprehensive overview of the embedded commercial features of anomaly detection and forecasting. The book starts with installing and setting up Elastic Stack. You will perform time series analysis on varied kinds of data, such as log files, network flows, application metrics, and financial data. As you progress through the chapters, you will deploy machine learning within the Elastic Stack for logging, security, and metrics. In the concluding chapters, you will see how machine learning jobs can be automatically distributed and managed across the Elasticsearch cluster and made resilient to failure. By the end of this book, you will understand the performance aspects of incorporating machine learning within the Elastic ecosystem and create anomaly detection jobs and view results from Kibana directly. What you will learn * Install the Elastic Stack to use machine learning features * Understand how Elastic machine learning is used to detect a variety of anomaly types * Apply effective anomaly detection to IT operations and security analytics * Leverage the output of Elastic machine learning in custom views, dashboards, and proactive alerting * Combine your created jobs to correlate anomalies of different layers of infrastructure * Learn various tips and tricks to get the most out of Elastic machine learning Who this book is for If you are a data professional eager to gain insight on Elasticsearch data without having to rely on a machine learning specialist or custom development, Machine Learning with the Elastic Stack is for you. Those looking to integrate machine learning within their search and analytics applications will also find this book very useful. Prior experience with the Elastic Stack is needed to get the most out of this book.
Hands-On Artificial Intelligence for IoT
¥90.46
Build smarter systems by combining artificial intelligence and the Internet of Things—two of the most talked about topics today Key Features * Leverage the power of Python libraries such as TensorFlow and Keras to work with real-time IoT data * Process IoT data and predict outcomes in real time to build smart IoT models * Cover practical case studies on industrial IoT, smart cities, and home automation Book Description There are many applications that use data science and analytics to gain insights from terabytes of data. These apps, however, do not address the challenge of continually discovering patterns for IoT data. In Hands-On Artificial Intelligence for IoT, we cover various aspects of artificial intelligence (AI) and its implementation to make your IoT solutions smarter. This book starts by covering the process of gathering and preprocessing IoT data gathered from distributed sources. You will learn different AI techniques such as machine learning, deep learning, reinforcement learning, and natural language processing to build smart IoT systems. You will also leverage the power of AI to handle real-time data coming from wearable devices. As you progress through the book, techniques for building models that work with different kinds of data generated and consumed by IoT devices such as time series, images, and audio will be covered. Useful case studies on four major application areas of IoT solutions are a key focal point of this book. In the concluding chapters, you will leverage the power of widely used Python libraries, TensorFlow and Keras, to build different kinds of smart AI models. By the end of this book, you will be able to build smart AI-powered IoT apps with confidence. What you will learn * Apply different AI techniques including machine learning and deep learning using TensorFlow and Keras * Access and process data from various distributed sources * Perform supervised and unsupervised machine learning for IoT data * Implement distributed processing of IoT data over Apache Spark using the MLLib and H2O.ai platforms * Forecast time-series data using deep learning methods * Implementing AI from case studies in Personal IoT, Industrial IoT, and Smart Cities * Gain unique insights from data obtained from wearable devices and smart devices Who this book is for If you are a data science professional or a machine learning developer looking to build smart systems for IoT, Hands-On Artificial Intelligence for IoT is for you. If you want to learn how popular artificial intelligence (AI) techniques can be used in the Internet of Things domain, this book will also be of benefit. A basic understanding of machine learning concepts will be required to get the best out of this book.
Hands-On Cloud-Native Microservices with Jakarta EE
¥81.74
Discover how cloud-native microservice architecture helps you to build dynamically scalable applications by using the most widely used and adopted runtime environments Key Features * Build robust cloud-native applications using a variety of tools * Understand how to configure both Amazon Web Services (AWS) and Docker clouds for high availability * Explore common design patterns used in building and deploying microservices architecture. Book Description Businesses today are evolving rapidly, and developers now face the challenge of building applications that are resilient, flexible, and native to the cloud. To achieve this, you'll need to be aware of the environment, tools, and resources that you're coding against. The book will begin by introducing you to cloud-native architecture and simplifying the major concepts. You'll learn to build microservices in Jakarta EE using MicroProfile with Thorntail and Narayana LRA. You'll then delve into cloud-native application x-rays, understanding the MicroProfile specification and the implementation/testing of microservices. As you progress further, you'll focus on continuous integration and continuous delivery, in addition to learning how to dockerize your services. You'll also cover concepts and techniques relating to security, monitoring, and troubleshooting problems that might occur with applications after you've written them. By the end of this book, you will be equipped with the skills you need to build highly resilient applications using cloud-native microservice architecture. What you will learn * Integrate reactive principles in MicroProfile microservices architecture * Explore the 12-factors-app paradigm and its implications * Get the best out of Java versions 8 and 9 to implement a microservice based on Thorntail * Understand what OpenShift is and why it is so important for an elastic architecture * Build a Linux container image using Docker and scale the application using Kubernetes * Implement various patterns such as, Circuit Breaker and bulkheads * Get to grips with the DevOps methodology using continuous integration (CI) and continuous deployment (CD) Who this book is for This book is for developers with basic knowledge of Java EE and HTTP-based application principles who want to learn how to build, test and scale Java EE microservices. No prior experience of writing microservices in Java EE is required.
Hands-On Cybersecurity for Finance
¥81.74
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features * Protect your financial environment with cybersecurity practices and methodologies * Identify vulnerabilities such as data manipulation and fraudulent transactions * Provide end-to-end protection within organizations Book Description Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures. What you will learn * Understand the cyber threats faced by organizations * Discover how to identify attackers * Perform vulnerability assessment, software testing, and pentesting * Defend your financial cyberspace using mitigation techniques and remediation plans * Implement encryption and decryption * Understand how Artificial Intelligence (AI) affects cybersecurity Who this book is for Hands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
Hands-On IoT Solutions with Blockchain
¥63.21
Integrate an end-to-end logistic chain using IBM Blockchain and IoT platforms Key Features *Explore practical implementation of ledger technology in the IoT architecture *Study security best practices for your smart devices *Understand Blockchain implementation for end-to-end IoT solutions Book Description Blockchain has been the hot topic of late thanks to cryptocurrencies. To make matters more interesting, the financial market is looking for ways to reduce operational costs and generate new business models, and this is where blockchain solutions come into the picture. In addition to this, with Internet of Things (IoT) trending and Arduino, Raspberry Pi, and other devices flooding the market, you can now create cheap devices even at home. Hands-On IoT Solutions with Blockchain starts with an overview of IoT concepts in the current business scenario. It then helps you develop your own device on the IBM Watson IoT platform and create your fi rst IoT solution using Watson and Intel Edison.Once you are familiar with IoT, you will learn about Blockchain technology and its use cases. You will also work with the Hyperledger framework and develop your own Blockchain network. As you progress through the chapters, you'll work with problem statements and learn how to design your solution architecture so that you can create your own integrated Blockchain and IoT solution. The next set of chapters will explain how to implement end-to-end Blockchain solutions with IoT using the IBM Cloud platform. By the end of this book, you will have mastered the convergence of IoT and Blockchain technology and exploited the best practices and drivers to develop a bulletproof integrated solution. What you will learn *Understand the key roles of IoT in the current market *Study the different aspects of IBM Watson IoT platform *Create devices, gateways, and applications connected to the platform *Explore the fundamentals of Blockchain *Define good use cases for Blockchain *Discover the Hyperledger Fabric and Composer frameworks *Develop an IBM Watson IoT application using a Intel Edison *Integrate IoT with the Blockchain platform Who this book is for Hands-On IoT Solutions with Blockchain is for you if you are an Internet of Things (IoT) analyst, architect, engineer, or any stakeholder responsible for security mechanisms on an IoT infrastructure. This book is also for IT professionals who want to start developing solutions using Blockchain and IoT on the IBM Cloud platform. Basic understanding of IoT will assist you in understanding key concepts covered in the book.
Implementing VMware Horizon 7.7
¥90.46
Effectively implement features and components for any computing environment Key Features *Explore the latest features of VMware Horizon 7.7 *Virtualize your desktop infrastructure using new features introduced in Horizon *Implement App Volumes and User Environment Manager in your infrastructure Book Description This third edition of Implementing VMware Horizon 7.7 has been updated to get you up to speed with VMware Horizon 7.7 by showing you how to use its key features and deploying an end-user computing infrastructure for your own organization. The book begins by guiding you on how to deploy all the core requirements for a VMware Horizon infrastructure. It then moves on to show you how to provision and administer end-user computing resources using VMware Horizon. You’ll not only be able to deploy the core VMware Horizon features, but you’ll also be able to implement new features, such as the Just-in-Time Management Platform (JMP) and the Horizon Console. You’ll also focus on the latest features and components of the Horizon platform and learn when and how they are used. By the end of the book, you will have developed a solid understanding of how your organization can benefit from the capabilities VMware Horizon offers and how each of its components is implemented. What you will learn *Work with the different products that make up VMware Horizon *Implement a multi-site VMware Horizon Pod using the Cloud Pod Architecture feature *Deploy and configure VMware Horizon’s optional components *Implement and maintain Microsoft RDSH, Horizon Linux, and Windows Desktop Pools and RDSH Application Pools *Configure and manage Horizon remotely using PowerCLI *Learn about the Microsoft Windows Group Policy templates for Horizon *Understand how to manage the SSL certificates for each of the VMware Horizon components Who this book is for If you’re a system administrator, solutions architect, or desktop engineer looking to level up your skills working with VMware's Horizon ecosystem and want to build a successful deployment strategy for desktops and applications, this book is for you.
WordPress 5 Complete
¥73.02
An in-depth and comprehensive take on WordPress, covering everything about the platform such as WordPress posts, pages, themes, plugins, and more. Key Features * Get up to date with the latest WordPress 5.0 (Bebo) and all its new features * Beginner-friendly layout and advice you can apply from day one with loads of screenshots and examples * Enrich your development experience with the new block-based editor Gutenberg Book Description Back in the day, when you wanted to launch a new website, you either had to learn web programming yourself or hire a professional who would take care of the whole process for you. Nowadays, with WordPress, anyone can build an optimized site with the least amount of effort possible and then make it available to the world in no time. Here, in the seventh edition of the book, we are going to show you how to build great looking and functional websites using WordPress. The new version of WordPress – 5.0 – comes with a few important changes, and we tell you all about how to use them effectively. From crafting content pages using the block editor, and customizing the design of your site, through to making sure it's secure, we go through it all. The book starts by introducing WordPress and teaching you how to set it up. You are then shown how to create a blog site, start writing content, and even use plugins and themes to customize the design of the site and add some unique elements to set it apart. If you want to get more in-depth, we also show you how to get started creating your own themes and plugins. Finally, we teach you how to use WordPress for building non-blog websites. By the end of the book, you will be sufficiently skilled to design high-quality websites and will be fully familiar with the ins and outs of WordPress. What you will learn * Learn to adapt your plugin with the Gutenberg editor * Create content that is optimized for publication on the web * Craft great looking pages and posts with the use of block editor * Structure your web pages in an accessible and clear way * Install and work with plugins and themes * Customize the design of your website * Upload multimedia content, such as images, audio, and video easily and effectively * Develop your own WordPress plugins and themes * Use WordPress to build websites that serve purposes other than blogs Who this book is for The ideal target audience for this book would be PHP developers who have some basic knowledge of working with WordPress and who want to get a comprehensive practical understanding of working with WordPress and create production-ready websites with it.
Azure Resource Manager Templates Quick Start Guide
¥54.49
Compose and decompose ARM templates and use advanced concepts like looping, conditions, dependencies, PowerShell and Desired State Configuration. Key Features * Design, implement, and unit test ARM templates * Develop and deploy ARM templates following security best practices Book Description Azure Resource Manager (ARM) templates are declarations of Azure resources in the JSON format to provision and maintain them using infrastructure as code. This book gives practical solutions and examples for provisioning and managing various Azure services using ARM templates. The book starts with an understanding of infrastructure as code, a refresher on JSON, and then moves on to explain the fundamental concepts of ARM templates. Important concepts like iteration, conditional evaluation, security, usage of expressions, and functions will be covered in detail. You will use linked and nested templates to create modular ARM templates. You will see how to create multiple instances of the same resources, how to nest and link templates, and how to establish dependencies between them. You will also learn about implementing design patterns, secure template design, the unit testing of ARM templates, and adopting best practices. By the end of this book, you will understand the entire life cycle of ARM templates and their testing, and be able to author them for complex deployments. What you will learn * Understand the foundations of ARM templates including nested and linked templates * Design, create, and unit test ARM templates using best practices * Learn about conditional deployments, looping, Custom Script Extensions using PowerShell, Bash, and DSC * Implement design patterns related to ARM templates * Run post-deployment PowerShell and Desired State Configuration scripts * Create solutions and deploy them on Azure using ARM templates Who this book is for This books is for developers, DevOps engineers, and architects who have experience in Azure.
Mastering Ceph
¥81.74
Discover the unified, distributed storage system and improve the performance of applications Key Features * Explore the latest features of Ceph's Mimic release * Get to grips with advanced disaster and recovery practices for your storage * Harness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systems Book Description Ceph is an open source distributed storage system that is scalable to Exabyte deployments. This second edition of Mastering Ceph takes you a step closer to becoming an expert on Ceph. You’ll get started by understanding the design goals and planning steps that should be undertaken to ensure successful deployments. In the next sections, you’ll be guided through setting up and deploying the Ceph cluster with the help of orchestration tools. This will allow you to witness Ceph’s scalability, erasure coding (data protective) mechanism, and automated data backup features on multiple servers. You’ll then discover more about the key areas of Ceph including BlueStore, erasure coding and cache tiering with the help of examples. Next, you’ll also learn some of the ways to export Ceph into non-native environments and understand some of the pitfalls that you may encounter. The book features a section on tuning that will take you through the process of optimizing both Ceph and its supporting infrastructure. You’ll also learn to develop applications, which use Librados and distributed computations with shared object classes. Toward the concluding chapters, you’ll learn to troubleshoot issues and handle various scenarios where Ceph is not likely to recover on its own. By the end of this book, you’ll be able to master storage management with Ceph and generate solutions for managing your infrastructure. What you will learn * Plan, design and deploy a Ceph cluster * Get well-versed with different features and storage methods * Carry out regular maintenance and daily operations with ease * Tune Ceph for improved ROI and performance * Recover Ceph from a range of issues * Upgrade clusters to BlueStore Who this book is for If you are a storage professional, system administrator, or cloud engineer looking for guidance on building powerful storage solutions for your cloud and on-premise infrastructure, this book is for you.
Mastering VMware vSphere 6.7
¥73.02
Unleash the benefits of VMware vSphere 6.7 to provide a powerful, flexible and secure digital infrastructure Key Features * Deep dive into areas like management, security, scalability, availability and more with vSphere 6.7 * Design, deploy and manage VMware vSphere virtual datacenters * Implement monitoring and security of VMware workloads with ease Book Description vSphere 6.7 is the latest release of VMware’s industry-leading, virtual cloud platform. It allows organisations to move to hybrid cloud computing by enabling them to run, manage, connect and secure applications in a common operating environment. This up-to-date, 2nd edition provides complete coverage of vSphere 6.7. Complete with step-by-step explanations of essential concepts, practical examples and self-assessment questions, you will begin with an overview of the products, solutions and features of the vSphere 6.7 suite. You’ll learn how to design and plan a virtual infrastructure and look at the workflow and installation of components. You'll gain insight into best practice configuration, management and security. By the end the book you'll be able to build your own VMware vSphere lab that can run even the most demanding of workloads. What you will learn * Explore the immense functionality of vSphere 6.7 * Design, manage and administer a virtualization environment * Get tips for the VCP6-DCV and VCIX6-DCV exams * Understand how to implement different migration techniques across different environments * Explore vSphere 6.7s powerful capabilities for patching, upgrading and managing the configuration of virtual environments. * Understand core vSphere components * Master resource management, disaster recovery, troubleshooting, monitoring and security Who this book is for This book is for Administrators, Infrastructure Engineers, Architects, and Consultants with basic knowledge of VMware vSphere.
Mastering Ansible
¥73.02
Design, develop, and solve real-world automation and orchestration problems by unlocking the automation capabilities of Ansible. Key Features * Tackle complex automation challenges with the newly added features in Ansible 2.7 Book Description Automation is essential for success in the modern world of DevOps. Ansible provides a simple, yet powerful, automation engine for tackling complex automation challenges. This book will take you on a journey that will help you exploit the latest version's advanced features to help you increase efficiency and accomplish complex orchestrations. This book will help you understand how Ansible 2.7 works at a fundamental level and will also teach you to leverage its advanced capabilities. Throughout this book, you will learn how to encrypt Ansible content at rest and decrypt data at runtime. Next, this book will act as an ideal resource to help you master the advanced features and capabilities required to tackle complex automation challenges. Later, it will walk you through workflows, use cases, orchestrations, troubleshooting, and Ansible extensions. Lastly, you will examine and debug Ansible operations, helping you to understand and resolve issues. By the end of the book, you will be able to unlock the true power of the Ansible automation engine and tackle complex, real- world actions with ease. What you will learn * Gain an in-depth understanding of how Ansible works under the hood * Fully automate Ansible playbook executions with encrypted data * Access and manipulate variable data within playbooks * Use blocks to perform failure recovery or cleanup * Explore the Playbook debugger and the Ansible Console * Troubleshoot unexpected behavior effectively * Work with cloud infrastructure providers and container systems * Develop custom modules, plugins, and dynamic inventory sources Who this book is for This book is for Ansible developers and operators who have an understanding of its core elements and applications but are now looking to enhance their skills in applying automation using Ansible.
Kali Linux - An Ethical Hacker's Cookbook
¥81.74
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Key Features * Practical recipes to conduct effective penetration testing using the latest version of Kali Linux * Leverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with ease * Confidently perform networking and application attacks using task-oriented recipes Book Description Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book’s crisp and task-oriented recipes. What you will learn * Learn how to install, set up and customize Kali for pentesting on multiple platforms * Pentest routers and embedded devices * Get insights into fiddling around with software-defined radio * Pwn and escalate through a corporate network * Write good quality security reports * Explore digital forensics and memory analysis with Kali Linux Who this book is for If you are an IT security professional, pentester, or security analyst who wants to conduct advanced penetration testing techniques, then this book is for you. Basic knowledge of Kali Linux is assumed.
TensorFlow Reinforcement Learning Quick Start Guide
¥45.77
Leverage the power of Tensorflow to Create powerful software agents that can self-learn to perform real-world tasks Key Features * Explore efficient Reinforcement Learning algorithms and code them using TensorFlow and Python * Train Reinforcement Learning agents for problems, ranging from computer games to autonomous driving. * Formulate and devise selective algorithms and techniques in your applications in no time. Book Description Advances in reinforcement learning algorithms have made it possible to use them for optimal control in several different industrial applications. With this book, you will apply Reinforcement Learning to a range of problems, from computer games to autonomous driving. The book starts by introducing you to essential Reinforcement Learning concepts such as agents, environments, rewards, and advantage functions. You will also master the distinctions between on-policy and off-policy algorithms, as well as model-free and model-based algorithms. You will also learn about several Reinforcement Learning algorithms, such as SARSA, Deep Q-Networks (DQN), Deep Deterministic Policy Gradients (DDPG), Asynchronous Advantage Actor-Critic (A3C), Trust Region Policy Optimization (TRPO), and Proximal Policy Optimization (PPO). The book will also show you how to code these algorithms in TensorFlow and Python and apply them to solve computer games from OpenAI Gym. Finally, you will also learn how to train a car to drive autonomously in the Torcs racing car simulator. By the end of the book, you will be able to design, build, train, and evaluate feed-forward neural networks and convolutional neural networks. You will also have mastered coding state-of-the-art algorithms and also training agents for various control problems. What you will learn * Understand the theory and concepts behind modern Reinforcement Learning algorithms * Code state-of-the-art Reinforcement Learning algorithms with discrete or continuous actions * Develop Reinforcement Learning algorithms and apply them to training agents to play computer games * Explore DQN, DDQN, and Dueling architectures to play Atari's Breakout using TensorFlow * Use A3C to play CartPole and LunarLander * Train an agent to drive a car autonomously in a simulator Who this book is for Data scientists and AI developers who wish to quickly get started with training effective reinforcement learning models in TensorFlow will find this book very useful. Prior knowledge of machine learning and deep learning concepts (as well as exposure to Python programming) will be useful.
Natural Language Processing Fundamentals
¥73.02
Use Python and NLTK (Natural Language Toolkit) to build out your own text classifiers and solve common NLP problems. Key Features * Assimilate key NLP concepts and terminologies * Explore popular NLP tools and techniques * Gain practical experience using NLP in application code Book Description If NLP hasn't been your forte, Natural Language Processing Fundamentals will make sure you set off to a steady start. This comprehensive guide will show you how to effectively use Python libraries and NLP concepts to solve various problems. You'll be introduced to natural language processing and its applications through examples and exercises. This will be followed by an introduction to the initial stages of solving a problem, which includes problem definition, getting text data, and preparing it for modeling. With exposure to concepts like advanced natural language processing algorithms and visualization techniques, you'll learn how to create applications that can extract information from unstructured data and present it as impactful visuals. Although you will continue to learn NLP-based techniques, the focus will gradually shift to developing useful applications. In these sections, you'll understand how to apply NLP techniques to answer questions as can be used in chatbots. By the end of this book, you'll be able to accomplish a varied range of assignments ranging from identifying the most suitable type of NLP task for solving a problem to using a tool like spacy or gensim for performing sentiment analysis. The book will easily equip you with the knowledge you need to build applications that interpret human language. What you will learn * Obtain, verify, and clean data before transforming it into a correct format for use * Perform data analysis and machine learning tasks using Python * Understand the basics of computational linguistics * Build models for general natural language processing tasks * Evaluate the performance of a model with the right metrics * Visualize, quantify, and perform exploratory analysis from any text data Who this book is for Natural Language Processing Fundamentals is designed for novice and mid-level data scientists and machine learning developers who want to gather and analyze text data to build an NLP-powered product. It'll help you to have prior experience of coding in Python using data types, writing functions, and importing libraries. Some experience with linguistics and probability is useful but not necessary.
Learning Python Networking
¥90.46
Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools Key Features * Deal with remote network servers using SSH, FTP, SNMP and LDAP protocols. * Design multi threaded and event-driven architectures for asynchronous servers programming. * Leverage your Python programming skills to build powerful network applications Book Description Network programming has always been a demanding task. With full-featured and well-documented libraries all the way up the stack, Python makes network programming the enjoyable experience it should be. Starting with a walk through of today's major networking protocols, through this book, you'll learn how to employ Python for network programming, how to request and retrieve web resources, and how to extract data in major formats over the web. You will utilize Python for emailing using different protocols, and you'll interact with remote systems and IP and DNS networking. You will cover the connection of networking devices and configuration using Python 3.7, along with cloud-based network management tasks using Python. As the book progresses, socket programming will be covered, followed by how to design servers, and the pros and cons of multithreaded and event-driven architectures. You'll develop practical clientside applications, including web API clients, email clients, SSH, and FTP. These applications will also be implemented through existing web application frameworks. What you will learn * Execute Python modules on networking tools * Automate tasks regarding the analysis and extraction of information from a network * Get to grips with asynchronous programming modules available in Python * Get to grips with IP address manipulation modules using Python programming * Understand the main frameworks available in Python that are focused on web application * Manipulate IP addresses and perform CIDR calculations Who this book is for If you're a Python developer or a system administrator with Python experience and you're looking to take your first steps in network programming, then this book is for you. If you're a network engineer or a network professional aiming to be more productive and efficient in networking programmability and automation then this book would serve as a useful resource. Basic knowledge of Python is assumed.
Mastering IOT
¥88.28
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organization Key Features * Build complex Python-based applications with IoT * Explore different concepts, technologies, and tradeoffs in the IoT architectural stack * Delve deep into each element of the IoT design—from sensors to the cloud Book Description The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. We’ll begin our journey with an introduction to Raspberry Pi and quickly jump right into Python programming. We’ll learn all concepts through multiple projects, and then reinforce our learnings by creating an IoT robot car. We’ll examine modern sensor systems and focus on what their power and functionality can bring to our system. We’ll also gain insight into cloud and fog architectures, including the OpenFog standards. The Learning Path will conclude by discussing three forms of prevalent attacks and ways to improve the security of our IoT infrastructure. By the end of this Learning Path, we will have traversed the entire spectrum of technologies needed to build a successful IoT system, and will have the confidence to build, secure, and monitor our IoT infrastructure. This Learning Path includes content from the following Packt products: * Internet of Things Programming Projects by Colin Dow * Internet of Things for Architects by Perry Lea What you will learn * Build a home security dashboard using an infrared motion detector * Receive data and display it with an actuator connected to the Raspberry Pi * Build an IoT robot car that is controlled via the Internet * Use IP-based communication to easily and quickly scale your system * Explore cloud protocols, such as Message Queue Telemetry Transport (MQTT) and CoAP * Secure communication with encryption forms, such as symmetric key Who this book is for This Learning Path is designed for developers, architects, and system designers who are interested in building exciting projects with Python by understanding the IoT ecosphere, various technologies, and tradeoffs. Technologists and technology managers who want to develop a broad view of IoT architecture, will also find this Learning Path useful. Prior programming knowledge of Python is a must.

购物车
个人中心

