Browse Results

Showing 36,526 through 36,550 of 54,258 results

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

by Roger A. Grimes

Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing.

Hacking Multifactor Authentication

by Roger A. Grimes

Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

by Roger A. Grimes

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Learn how hackers do what they do—no technical expertise necessary Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Malicious Mobile Code: Virus Protection for Windows

by Roger A. Grimes

"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.

Malicious Mobile Code: Virus Protection for Windows

by Roger A. Grimes

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy.The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out inMalicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book?Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers:The current state of the malicious code writing and cracker communityHow malicious code works, what types there are, and what it can and cannot doCommon anti-virus defenses, including anti-virus softwareHow malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent itMacro viruses affecting MS Word, MS Excel, and VBScriptJava applets and ActiveX controlsEnterprise-wide malicious code protectionHoaxesThe future of malicious mobile code and how to combat such codeThese days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever.Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

Malicious Mobile Code

by Roger A. Grimes

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers: The current state of the malicious code writing and cracker community How malicious code works, what types there are, and what it can and cannot do Common anti-virus defenses, including anti-virus software How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it Macro viruses affecting MS Word, MS Excel, and VBScript Java applets and ActiveX controls Enterprise-wide malicious code protection Hoaxes The future of malicious mobile code and how to combat such code These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.

Ransomware Protection Playbook

by Roger A. Grimes

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You’ll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization’s, data.

Beginning C++ Programming

by Richard Grimes

Modern C++ at your fingertips! About This Book • This book gets you started with the exciting world of C++ programming • It will enable you to write C++ code that uses the standard library, has a level of object orientation, and uses memory in a safe and effective way • It forms the basis of programming and covers concepts such as data structures and the core programming language Who This Book Is For A computer, an internet connection, and the desire to learn how to code in C++ is all you need to get started with this book. What You Will Learn • Get familiar with the structure of C++ projects • Identify the main structures in the language: functions and classes • Feel confident about being able to identify the execution flow through the code • Be aware of the facilities of the standard library • Gain insights into the basic concepts of object orientation • Know how to debug your programs • Get acquainted with the standard C++ library In Detail C++ has come a long way and is now adopted in several contexts. Its key strengths are its software infrastructure and resource-constrained applications, including desktop applications, servers, and performance-critical applications, not to forget its importance in game programming. Despite its strengths in these areas, beginners usually tend to shy away from learning the language because of its steep learning curve. The main mission of this book is to make you familiar and comfortable with C++. You will finish the book not only being able to write your own code, but more importantly, you will be able to read other projects. It is only by being able to read others' code that you will progress from a beginner to an advanced programmer. This book is the first step in that progression. The first task is to familiarize you with the structure of C++ projects so you will know how to start reading a project. Next, you will be able to identify the main structures in the language, functions, and classes, and feel confident being able to identify the execution flow through the code. You will then become aware of the facilities of the standard library and be able to determine whether you need to write a routine yourself, or use an existing routine in the standard library. Throughout the book, there is a big emphasis on memory and pointers. You will understand memory usage, allocation, and access, and be able to write code that does not leak memory. Finally, you will learn about C++ classes and get an introduction to object orientation and polymorphism. Style and approach This straightforward tutorial will help you build strong skills in C++ programming, be it for enterprise software or for low-latency applications such as games or embedded programming. Filled with examples, this book will take you gradually up the steep learning curve of C++.

Programming with Managed Extensions for Microsoft® Visual C++® .NET

by Richard Grimes

<div xmlns="http://www.w3.org/1999/xhtml"><p>This book thoroughly covers the Visual C++ managed extensions and how to write Microsoft .NET libraries and applications, plus features that are new to Visual C++.</p></div>

VLSI-SoC: 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, Singapore, October 4–8, 2021, Revised and Extended Selected Papers (IFIP Advances in Information and Communication Technology #661)

by Victor Grimblatt Chip Hong Chang Ricardo Reis Anupam Chattopadhyay Andrea Calimera

This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*.The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs.*The conference was held virtually.

Multi-Agent-Based Simulation XV

by Francisco Grimaldo Emma Norling

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Workshop on Multi-Agent-Based Simulation, MABS 2014, held in Paris, France, in May 2014. The workshop was held in conjunction with the 13th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2014. The 17 revised full papers included in this volume were carefully selected from numerous submissions. The papers are organized in topical sections on simulation methodologies, simulation of social behaviour, data and multi-agent-based simulation and applications.

Statistical Models and Methods for Data Science (Studies in Classification, Data Analysis, and Knowledge Organization)

by Leonardo Grilli Monia Lupparelli Carla Rampichini Emilia Rocco Maurizio Vichi

This book focuses on methods and models in classification and data analysis and presents real-world applications at the interface with data science. Numerous topics are covered, ranging from statistical inference and modelling to clustering and factorial methods, and from directional data analysis to time series analysis and small area estimation. The applications deal with new developments in a variety of fields, including medicine, finance, engineering, marketing, and cyber risk.The contents comprise selected and peer-reviewed contributions presented at the 13th Scientific Meeting of the Classification and Data Analysis Group of the Italian Statistical Society, CLADAG 2021, held (online) in Florence, Italy, on September 9–11, 2021. CLADAG promotes advanced methodological research in multivariate statistics with a special focus on data analysis and classification, and supports the exchange and dissemination of ideas, methodological concepts, numerical methods, algorithms, and computational and applied results at the interface between classification and data science.

Marketing Analytics

by Mike Grigsby

Marketing Analytics arms business analysts and marketers with the marketing science understanding and techniques they need to solve real-world marketing problems, from pulling a targeted list and segmenting data to testing campaign effectiveness and forecasting demand. Assuming no prior knowledge, this book outlines everything practitioners need to 'do' marketing science and demonstrate value to their organization. It introduces concepts relating to statistics, marketing strategy and consumer behaviour and then works through a series of marketing problems in a straightforward, jargon-free way. It demonstrates solutions for various data modelling scenarios and includes full workings and critical analyses to reinforce the key concepts. By starting with the marketing problem and then sharing a series of data modelling options on how to solve it, Marketing Analytics both makes marketing science accessible for beginners and aids the more seasoned practitioner in getting to grips with the trickier technical aspects of data analytics to refine their marketing skills and toolkit and compete more effectively in the marketplace. Online supporting resources for this book include a bank of test questions as well as data sets relating to a number of chapters. About the series: The Marketing Science series makes difficult topics accessible to marketing students and practitioners by grounding them in business reality. Each book is written by an expert in the field and includes case studies and illustrations enabling marketers to gain confidence in applying the tools and techniques and in commissioning external research.

Marketing Analytics: A Practical Guide to Improving Consumer Insights Using Data Techniques (Marketing Science Ser.)

by Mike Grigsby

Who is most likely to buy and what is the best way to target them? How can businesses improve strategy without identifying the key influencing factors? The second edition of Marketing Analytics enables marketers and business analysts to leverage predictive techniques to measure and improve performance. By exploring real-world marketing challenges, it provides clear, jargon-free explanations on how to apply different analytical models for each purpose. From targeted list creation and data segmentation, to testing campaign effectiveness, pricing structures and forecasting demand, this book offers a welcome handbook on how statistics, consumer analytics and modelling can be put to optimal use. The fully revised second edition of Marketing Analytics includes three new chapters on big data analytics, insights and panel regression, including how to collect, separate and analyze big data. All of the advanced tools and techniques for predictive analytics have been updated, translating models such as tobit analysis for customer lifetime value into everyday use. Whether an experienced practitioner or having no prior knowledge, methodologies are simplified to ensure the more complex aspects of data and analytics are fully accessible for any level of application. Complete with downloadable data sets and test bank resources, this book supplies a concrete foundation to optimize marketing analytics for day-to-day business advantage.

Marketing Analytics: A Practical Guide to Improving Consumer Insights Using Data Techniques (Marketing Science Ser.)

by Mike Grigsby

Who is most likely to buy and what is the best way to target them? How can I use both consumer analytics and modelling to improve the impact of marketing campaigns? Marketing Analytics takes you step-by-step through these areas and more. Marketing Analytics enables you to leverage predictive techniques to measure and improve marketing performance. By exploring real-world marketing challenges, it provides clear, jargon-free explanations on how to apply different analytical models for each purpose. From targeted list creation and data segmentation, to testing campaign effectiveness, pricing structures and forecasting demand, it offers a complete resource for how statistics, consumer analytics and modelling can be put to optimal use. This revised and updated third edition of Marketing Analytics contains new material on forecasting, customer touchpoints modelling, and a new focus on customer loyalty. With accessible language throughout, methodologies are simplified to ensure the more complex aspects of data and analytics are fully accessible for any level of application. Supported by a glossary of key terms and supporting resources consisting of datasets, presentation slides for each chapter and a test bank of self-test question, this book supplies a concrete foundation for optimizing marketing analytics for day-to-day business advantage.

Expert C++: Become a proficient programmer by learning coding best practices with C++17 and C++20's latest features

by Vardan Grigoryan Shunguang Wu

Design and architect real-world scalable C++ applications by exploring advanced techniques in low-level programming, object-oriented programming (OOP), the Standard Template Library (STL), metaprogramming, and concurrency Key Features Design professional-grade, maintainable apps by learning advanced concepts such as functional programming, templates, and networking Apply design patterns and best practices to solve real-world problems Improve the performance of your projects by designing concurrent data structures and algorithms Book Description C++ has evolved over the years and the latest release – C++20 – is now available. Since C++11, C++ has been constantly enhancing the language feature set. With the new version, you'll explore an array of features such as concepts, modules, ranges, and coroutines. This book will be your guide to learning the intricacies of the language, techniques, C++ tools, and the new features introduced in C++20, while also helping you apply these when building modern and resilient software. You'll start by exploring the latest features of C++, and then move on to advanced techniques such as multithreading, concurrency, debugging, monitoring, and high-performance programming. The book will delve into object-oriented programming principles and the C++ Standard Template Library, and even show you how to create custom templates. After this, you'll learn about different approaches such as test-driven development (TDD), behavior-driven development (BDD), and domain-driven design (DDD), before taking a look at the coding best practices and design patterns essential for building professional-grade applications. Toward the end of the book, you will gain useful insights into the recent C++ advancements in AI and machine learning. By the end of this C++ programming book, you'll have gained expertise in real-world application development, including the process of designing complex software. What you will learn Understand memory management and low-level programming in C++ to write secure and stable applications Discover the latest C++20 features such as modules, concepts, ranges, and coroutines Understand debugging and testing techniques and reduce issues in your programs Design and implement GUI applications using Qt5 Use multithreading and concurrency to make your programs run faster Develop high-end games by using the object-oriented capabilities of C++ Explore AI and machine learning concepts with C++ Who this book is for This C++ book is for experienced C++ developers who are looking to take their knowledge to the next level and perfect their skills in building professional-grade applications.

High Performance Browser Networking: What every web developer should know about networking and web performance

by Ilya Grigorik

How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications--including HTTP 2.0 and XHR improvements, Server-Sent Events (SSE), WebSocket, and WebRTC. Author Ilya Grigorik, a web performance engineer at Google, demonstrates performance optimization best practices for TCP, UDP, and TLS protocols, and explains unique wireless and mobile network optimization requirements. You'll then dive into performance characteristics of technologies such as HTTP 2.0, client-side network scripting with XHR, real-time streaming with SSE and WebSocket, and P2P communication with WebRTC. Deliver superlative TCP, UDP, and TLS performance Speed up network performance over 3G/4G mobile networks Develop fast and energy-efficient mobile applications Address bottlenecks in HTTP 1.x and other browser protocols Plan for and deliver the best HTTP 2.0 performance Enable efficient real-time streaming in the browser Create efficient peer-to-peer videoconferencing and low-latency applications with real-time WebRTC transports

Wydajne aplikacje internetowe. Przewodnik

by Ilya Grigorik

"Buduj wydajne aplikacje internetowe!Aplikacje internetowe systematycznie wypieraj? swoje klasyczne odpowiedniki. Edytory tekstu, programy graficzne czy systemy CRM w wersji online nikogo ju? nie zaskakuj?. Coraz bardziej skomplikowane narz?dzia dost?pne za po?rednictwem przegl?darki internetowej wymagaj? od deweloperów znakomitej znajomo?ci protoko?ów HTTP, XHR, WebSocket i nie tylko. Dzi?ki tej wiedzy s? oni w stanie tworzy? wydajne aplikacje, które spe?ni? oczekiwania u?ytkowników.Ta ksi??ka to najlepsze ?ród?o informacji po?wi?cone protoko?om internetowym. Przygotowana przez in?yniera Google’a, odpowiedzialnego za wydajno??, zawiera szereg cennych informacji, które pozwol? Ci ulepszy? Twoje w?asne aplikacje. W trakcie lektury dowiesz si?, jak osi?gn?? optymaln? wydajno?? protoko?ów TCP, UDP i TLS oraz jak wykorzysta? mo?liwo?ci sieci mobilnych 3G/4G. W kolejnych rozdzia?ach zaznajomisz si? z histori? protoko?u HTTP, poznasz jego mankamenty oraz sposoby rozwi?zywania problemów. Zorientujesz si? te? w nowo?ciach, jakie ma wprowadzi? HTTP w wersji 2.0. W ko?cu odkryjesz, co mog? Ci zaoferowa? WebSocket oraz WebRTC, a dodatkowo poznasz skuteczne techniki strumieniowania danych w sieci Internet. Ksi??ka ta jest obowi?zkow? lektur? dla ka?dego programisty tworz?cego aplikacje internetowe!Dzi?ki tej ksi??ce: poznasz najlepsze techniki optymalizacji ruchu w sieci wykorzystasz potencja? sieci bezprzewodowych oraz mobilnych zaznajomisz si? z histori? protoko?u HTTP i jego mankamentami zobaczysz, jak nawi?za? po??czenie peer-to-peer za pomoc? WebRTC zbudujesz wydajn? aplikacj? internetow?Poznaj niuanse pozwalaj?ce na zbudowanie szybkiej aplikacji internetowej!"

Machine Learning Bookcamp: Build a portfolio of real-life projects

by Alexey Grigorev

Time to flex your machine learning muscles! Take on the carefully designed challenges of the Machine Learning Bookcamp and master essential ML techniques through practical application.Summary In Machine Learning Bookcamp you will: Collect and clean data for training models Use popular Python tools, including NumPy, Scikit-Learn, and TensorFlow Apply ML to complex datasets with images Deploy ML models to a production-ready environment The only way to learn is to practice! In Machine Learning Bookcamp, you&’ll create and deploy Python-based machine learning models for a variety of increasingly challenging projects. Taking you from the basics of machine learning to complex applications such as image analysis, each new project builds on what you&’ve learned in previous chapters. You&’ll build a portfolio of business-relevant machine learning projects that hiring managers will be excited to see. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Master key machine learning concepts as you build actual projects! Machine learning is what you need for analyzing customer behavior, predicting price trends, evaluating risk, and much more. To master ML, you need great examples, clear explanations, and lots of practice. This book delivers all three! About the book Machine Learning Bookcamp presents realistic, practical machine learning scenarios, along with crystal-clear coverage of key concepts. In it, you&’ll complete engaging projects, such as creating a car price predictor using linear regression and deploying a churn prediction service. You&’ll go beyond the algorithms and explore important techniques like deploying ML applications on serverless systems and serving models with Kubernetes and Kubeflow. Dig in, get your hands dirty, and have fun building your ML skills! What's inside Collect and clean data for training models Use popular Python tools, including NumPy, Scikit-Learn, and TensorFlow Deploy ML models to a production-ready environment About the reader Python programming skills assumed. No previous machine learning knowledge is required. About the author Alexey Grigorev is a principal data scientist at OLX Group. He runs DataTalks.Club, a community of people who love data. Table of Contents 1 Introduction to machine learning 2 Machine learning for regression 3 Machine learning for classification 4 Evaluation metrics for classification 5 Deploying machine learning models 6 Decision trees and ensemble learning 7 Neural networks and deep learning 8 Serverless deep learning 9 Serving models with Kubernetes and Kubeflow

Mastering Java for Data Science

by Alexey Grigorev

This book is for those Java developers who are comfortable with developing applications in Java and are familiar with the basic concepts of data science. This is the go-to book for anyone looking to master the subject using Java. If you are willing to build efficient data applications in your enterprise environment without changing your existing stack, this book is for you!

Node Cookbook: Discover solutions, techniques, and best practices for server-side web development with Node.js 14, 4th Edition

by Bethany Griggs

Discover practical recipes to get to grips with Node.js concepts and programming models for delivering a scalable server-side for your applicationsKey FeaturesImplement practical solutions for scaling, securing, and testing your Node.js web apps effectivelyBuild and deploy scalable microservices architecture with the power of Node.js 14Discover techniques for debugging and testing Node.js applicationsBook DescriptionA key technology for building web applications and tooling, Node.js brings JavaScript to the server enabling full-stack development in a common language. This fourth edition of the Node Cookbook is updated with the latest Node.js features and the evolution of the Node.js framework ecosystems.This practical guide will help you to get started with creating, debugging, and deploying your Node.js applications and cover solutions to common problems, along with tips to avoid pitfalls. You'll become familiar with the Node.js development model by learning how to handle files and build simple web applications and then explore established and emerging Node.js web frameworks such as Express.js and Fastify. As you advance, you'll discover techniques for detecting problems in your applications, handling security concerns, and deploying your applications to the cloud. This recipe-based guide will help you to easily navigate through various core topics of server-side web application development with Node.js.By the end of this Node book, you'll be well-versed with core Node.js concepts and have gained the knowledge to start building performant and scalable Node.js applications.What you will learnUnderstand the Node.js asynchronous programming modelCreate simple Node.js applications using modules and web frameworksDevelop simple web applications using web frameworks such as Fastify and ExpressDiscover tips for testing, optimizing, and securing your web applicationsCreate and deploy Node.js microservicesDebug and diagnose issues in your Node.js applicationsWho this book is forThe book is for web developers who have knowledge of JavaScript and want to gain a broad understanding of Node.js concepts for server-side development.

Advances in Enterprise Engineering XVI: 12th Enterprise Engineering Working Conference, EEWC 2022, Leusden, The Netherlands, November 2–3, 2022, Revised Selected Papers (Lecture Notes in Business Information Processing #473)

by Cristine Griffo Sérgio Guerreiro Maria E. Iacob

This book constitutes the refereed proceedings of the 12th Enterprise Engineering Working Conference on Advances in Enterprise Engineering XVI, EEWC 2022, held in Leusden, The Netherlands, November 2–3, 2022. EEWC aims at addressing the challenges that modern and complex enterprises are facing in a rapidly changing world. The participants of the working conference share a belief that dealing with these challenges requires rigorous and scientific solutions, focusing on the design and engineering of enterprises. The goal of EEWC is to stimulate interaction between the different stakeholders, scientists as well as practitioners, interested in making Enterprise Engineering a reality. The 4 full papers and 2 short papers included in this book were carefully reviewed and selected from 13 submissions. In addition, there are 2 invited papers from keynote presentations. They were organized in topical sections as follows: Invited Papers from Keynote Presentations and Presented Papers.

Mac OS X Power Hound, 2nd Edition

by Rob Griffiths

Mac OS X has captured the attention of consumers and programmers alike with its ability to run existing Mac programs along with Unix and Open Source software. The latest version, Panther, includes more than a hundred new features and improves many of the technologies underlying Mac OS X, including graphics and the Unix-based core. With more than 500 power tips and tricks for Mac aficionados like yourself, Mac OS X Power Hound , Panther Edition helps you unleash the power of Panther. Mac OS X Panther is a complex and powerful operating system with a personality all its own. To make your computing experience with Panther as efficient and enjoyable as possible, you need to learn its secrets, appreciate its idiosyncrasies, and be able to customize it to your needs and wants. Author Rob Griffiths shows you how. Creator and editor of the extremely popular Mac OS X Hints Web site ( www.macosxhints.com ), Griffiths knows Panther inside and out. His Mac OS X Power Hound lifts the hood on the sleek and elegant, Formula-One-powered operating system and delivers over 500 high-octane secrets in every conceivable category, including the Desktop and Finder, iApps, Mac OS X programs, Mastering the system and Terminal, and much more. Consider this book your pit crew, helping you find easier, faster, and better ways of using the Finder, the Dock, the assortment of programs that come with Mac OS X, and a bunch of programs that don't. And if you want to become your own master mechanic, it also includes two rich chapters on Unix, the engine under Mac OS X's hood. With this collection of stand-alone hints, notes, tips, and tricks--every one of them organized, indexed, tested for compatibility with the latest version of Mac OS X 10.3, and, in many cases, illustrated--you'll rapidly progress from an anybody-can-do-this user to a power user.

Make Money While You Sleep: How to Turn Your Knowledge into Online Courses That Make You Money 24hrs a Day

by Lucy Griffiths

What if you could earn money doing what you love?What if you could live more and work less?What if you could Make Money While You Sleep?You can!Forget the old ways of unhealthy working hours and pressing pause on your life until retirement - especially in uncertain economic times. In Make Money While You Sleep, Lucy Griffiths, passive income strategist and coach, will share how you can create a course-based business that works 24 hours a day for you while you get on with the business of living your life.Packed with advice, knowledge and refreshing honesty, Lucy will take you through the process of course creation: from inspiration to getting it done, to actually selling it!* Learn how to stand out in an increasingly content-saturated world by using a proven system that turns your ideas into a bestselling brand. * Package up your expertise and sell your courses on repeat. * Learn how to position yourself as an expert in your industry and harness the power of social media and YouTube to upscale your business. Now is the time to take your digital course idea and turn it into a money-making machine!

Make Money While You Sleep: How to Turn Your Knowledge into Online Courses That Make You Money 24hrs a Day

by Lucy Griffiths

What if you could earn money doing what you love?What if you could live more and work less?What if you could Make Money While You Sleep?You can!Forget the old ways of unhealthy working hours and pressing pause on your life until retirement - especially in uncertain economic times. In Make Money While You Sleep, Lucy Griffiths, passive income strategist and coach, will share how you can create a course-based business that works 24 hours a day for you while you get on with the business of living your life.Packed with advice, knowledge and refreshing honesty, Lucy will take you through the process of course creation: from inspiration to getting it done, to actually selling it!* Learn how to stand out in an increasingly content-saturated world by using a proven system that turns your ideas into a bestselling brand. * Package up your expertise and sell your courses on repeat. * Learn how to position yourself as an expert in your industry and harness the power of social media and YouTube to upscale your business. Now is the time to take your digital course idea and turn it into a money-making machine!

Refine Search

Showing 36,526 through 36,550 of 54,258 results