- Table View
- List View
Advanced Analytics and Deep Learning Models (Next Generation Computing and Communication Engineering)
by Archana Mire Shaveta Malik Amit Kumar TyagiAdvanced Analytics and Deep Learning Models The book provides readers with an in-depth understanding of concepts and technologies related to the importance of analytics and deep learning in many useful real-world applications such as e-healthcare, transportation, agriculture, stock market, etc. Advanced analytics is a mixture of machine learning, artificial intelligence, graphs, text mining, data mining, semantic analysis. It is an approach to data analysis. Beyond the traditional business intelligence, it is a semi and autonomous analysis of data by using different techniques and tools. However, deep learning and data analysis both are high centers of data science. Almost all the private and public organizations collect heavy amounts of data, i.e., domain-specific data. Many small/large companies are exploring large amounts of data for existing and future technology. Deep learning is also exploring large amounts of unsupervised data making it beneficial and effective for big data. Deep learning can be used to deal with all kinds of problems and challenges that include collecting unlabeled and uncategorized raw data, extracting complex patterns from a large amount of data, retrieving fast information, tagging data, etc. This book contains 16 chapters on artificial intelligence, machine learning, deep learning, and their uses in many useful sectors like stock market prediction, a recommendation system for better service selection, e-healthcare, telemedicine, transportation. There are also chapters on innovations and future opportunities with fog computing/cloud computing and artificial intelligence. Audience Researchers in artificial intelligence, big data, computer science, and electronic engineering, as well as industry engineers in healthcare, telemedicine, transportation, and the financial sector. The book will also be a great source for software engineers and advanced students who are beginners in the field of advanced analytics in deep learning.
Advanced Analytics and Learning on Temporal Data: 7th ECML PKDD Workshop, AALTD 2022, Grenoble, France, September 19–23, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13812)
by Thomas Guyet Georgiana Ifrim Simon Malinowski Anthony Bagnall Patrick Shafer Vincent LemaireThis book constitutes the refereed proceedings of the 7th ECML PKDD Workshop, AALTD 2022, held in Grenoble, France, during September 19–23, 2022.The 12 full papers included in this book were carefully reviewed and selected from 21 submissions. They were organized in topical sections as follows: Oral presentation and poster presentation.
Advanced Analytics and Learning on Temporal Data: 8th ECML PKDD Workshop, AALTD 2023, Turin, Italy, September 18–22, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14343)
by Georgiana Ifrim Romain Tavenard Anthony Bagnall Patrick Schaefer Simon Malinowski Thomas Guyet Vincent LemaireThis volume LNCS 14343 constitutes the refereed proceedings of the 8th ECML PKDD Workshop, AALTD 2023, in Turin, Italy, in September 2023. The 20 full papers were carefully reviewed and selected from 28 submissions. They are organized in the following topical section as follows: Machine Learning; Data Mining; Pattern Analysis; Statistics to Share their Challenges and Advances in Temporal Data Analysis.
Advanced Analytics and Learning on Temporal Data: 4th ECML PKDD Workshop, AALTD 2019, Würzburg, Germany, September 20, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11986)
by Vincent Lemaire Simon Malinowski Anthony Bagnall Alexis Bondu Thomas Guyet Romain TavenardThis book constitutes the refereed proceedings of the 4th ECML PKDD Workshop on Advanced Analytics and Learning on Temporal Data, AALTD 2019, held in Würzburg, Germany, in September 2019. The 7 full papers presented together with 9 poster papers were carefully reviewed and selected from 31 submissions. The papers cover topics such as temporal data clustering; classification of univariate and multivariate time series; early classification of temporal data; deep learning and learning representations for temporal data; modeling temporal dependencies; advanced forecasting and prediction models; space-temporal statistical analysis; functional data analysis methods; temporal data streams; interpretable time-series analysis methods; dimensionality reduction, sparsity, algorithmic complexity and big data challenge; and bio-informatics, medical, energy consumption, on temporal data.
Advanced Analytics and Learning on Temporal Data: 5th ECML PKDD Workshop, AALTD 2020, Ghent, Belgium, September 18, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12588)
by Vincent Lemaire Simon Malinowski Anthony Bagnall Thomas Guyet Romain Tavenard Georgiana IfrimThis book constitutes the refereed proceedings of the 4th ECML PKDD Workshop on Advanced Analytics and Learning on Temporal Data, AALTD 2019, held in Ghent, Belgium, in September 2020. The 15 full papers presented in this book were carefully reviewed and selected from 29 submissions. The selected papers are devoted to topics such as Temporal Data Clustering; Classification of Univariate and Multivariate Time Series; Early Classification of Temporal Data; Deep Learning and Learning Representations for Temporal Data; Modeling Temporal Dependencies; Advanced Forecasting and Prediction Models; Space-Temporal Statistical Analysis; Functional Data Analysis Methods; Temporal Data Streams; Interpretable Time-Series Analysis Methods; Dimensionality Reduction, Sparsity, Algorithmic Complexity and Big Data Challenge; and Bio-Informatics, Medical, Energy Consumption, Temporal Data.
Advanced Analytics and Learning on Temporal Data: 6th ECML PKDD Workshop, AALTD 2021, Bilbao, Spain, September 13, 2021, Revised Selected Papers (Lecture Notes in Computer Science #13114)
by Vincent Lemaire Simon Malinowski Anthony Bagnall Thomas Guyet Romain Tavenard Georgiana IfrimThis book constitutes the refereed proceedings of the 6th ECML PKDD Workshop on Advanced Analytics and Learning on Temporal Data, AALTD 2021, held during September 13-17, 2021. The workshop was planned to take place in Bilbao, Spain, but was held virtually due to the COVID-19 pandemic. The 12 full papers presented in this book were carefully reviewed and selected from 21 submissions. They focus on the following topics: Temporal Data Clustering; Classification of Univariate and Multivariate Time Series; Multivariate Time Series Co-clustering; Efficient Event Detection; Modeling Temporal Dependencies; Advanced Forecasting and Prediction Models; Cluster-based Forecasting; Explanation Methods for Time Series Classification; Multimodal Meta-Learning for Time Series Regression; and Multivariate Time Series Anomaly Detection.
Advanced Analytics in Mining Engineering: Leverage Advanced Analytics in Mining Industry to Make Better Business Decisions
by Ali SoofastaeiIn this book, Dr. Soofastaei and his colleagues reveal how all mining managers can effectively deploy advanced analytics in their day-to-day operations- one business decision at a time.Most mining companies have a massive amount of data at their disposal. However, they cannot use the stored data in any meaningful way. The powerful new business tool-advanced analytics enables many mining companies to aggressively leverage their data in key business decisions and processes with impressive results.From statistical analysis to machine learning and artificial intelligence, the authors show how many analytical tools can improve decisions about everything in the mine value chain, from exploration to marketing.Combining the science of advanced analytics with the mining industrial business solutions, introduce the “Advanced Analytics in Mining Engineering Book” as a practical road map and tools for unleashing the potential buried in your company’s data.The book is aimed at providing mining executives, managers, and research and development teams with an understanding of the business value and applicability of different analytic approaches and helping data analytics leads by giving them a business framework in which to assess the value, cost, and risk of potential analytical solutions. In addition, the book will provide the next generation of miners – undergraduate and graduate IT and mining engineering students – with an understanding of data analytics applied to the mining industry. By providing a book with chapters structured in line with the mining value chain, we will provide a clear, enterprise-level view of where and how advanced data analytics can best be applied. This book highlights the potential to interconnect activities in the mining enterprise better. Furthermore, the book explores the opportunities for optimization and increased productivity offered by better interoperability along the mining value chain – in line with the emerging vision of creating a digital mine with much-enhanced capabilities for modeling, simulation, and the use of digital twins – in line with leading “digital” industries.
Advanced Analytics in Power BI with R and Python: Ingesting, Transforming, Visualizing
by Ryan WadeThis easy-to-follow guide provides R and Python recipes to help you learn and apply the top languages in the field of data analytics to your work in Microsoft Power BI. Data analytics expert and author Ryan Wade shows you how to use R and Python to perform tasks that are extremely hard, if not impossible, to do using native Power BI tools. For example, you will learn to score Power BI data using custom data science models and powerful models from Microsoft Cognitive Services. The R and Python languages are powerful complements to Power BI. They enable advanced data transformation techniques that are difficult to perform in Power BI in its default configuration but become easier by leveraging the capabilities of R and Python. If you are a business analyst, data analyst, or a data scientist who wants to push Power BI and transform it from being just a business intelligence tool into an advanced data analytics tool, then this is the book to help you do that. What You Will Learn Create advanced data visualizations via R using the ggplot2 package Ingest data using R and Python to overcome some limitations of Power Query Apply machine learning models to your data using R and Python without the need of Power BI premium compacity Incorporate advanced AI in Power BI without the need of Power BI premium compacity via Microsoft Cognitive Services, IBM Watson Natural Language Understanding, and pre-trained models in SQL Server Machine Learning Services Perform advanced string manipulations not otherwise possible in Power BI using R and Python Who This Book Is For Power users, data analysts, and data scientists who want to go beyond Power BI’s built-in functionality to create advanced visualizations, transform data in ways not otherwise supported, and automate data ingestion from sources such as SQL Server and Excel in a more concise way
Advanced Analytics with Spark
by Sean Owen Sandy Ryza Josh Wills Uri LasersonIn this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example.You'll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques--classification, collaborative filtering, and anomaly detection among others--to fields such as genomics, security, and finance. If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you'll find these patterns useful for working on your own data applications.Patterns include:Recommending music and the Audioscrobbler data setPredicting forest cover with decision treesAnomaly detection in network traffic with K-means clusteringUnderstanding Wikipedia with Latent Semantic AnalysisAnalyzing co-occurrence networks with GraphXGeospatial and temporal data analysis on the New York City Taxi Trips dataEstimating financial risk through Monte Carlo simulationAnalyzing genomics data and the BDG projectAnalyzing neuroimaging data with PySpark and Thunder
Advanced Analytics with Spark: Patterns for Learning from Data at Scale
by Josh Wills Sandy Ryza Sean Owen Uri LasersonIn the second edition of this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example. Updated for Spark 2.1, this edition acts as an introduction to these techniques and other best practices in Spark programming.You’ll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques—including classification, clustering, collaborative filtering, and anomaly detection—to fields such as genomics, security, and finance.If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you’ll find the book’s patterns useful for working on your own data applications.With this book, you will:Familiarize yourself with the Spark programming modelBecome comfortable within the Spark ecosystemLearn general approaches in data scienceExamine complete implementations that analyze large public data setsDiscover which machine learning tools make sense for particular problemsAcquire code that can be adapted to many uses
Advanced Analytics with Transact-SQL: Exploring Hidden Patterns and Rules in Your Data
by Dejan SarkaLearn about business intelligence (BI) features in T-SQL and how they can help you with data science and analytics efforts without the need to bring in other languages such as R and Python. This book shows you how to compute statistical measures using your existing skills in T-SQL. You will learn how to calculate descriptive statistics, including centers, spreads, skewness, and kurtosis of distributions. You will also learn to find associations between pairs of variables, including calculating linear regression formulas and confidence levels with definite integration. No analysis is good without data quality. Advanced Analytics with Transact-SQL introduces data quality issues and shows you how to check for completeness and accuracy, and measure improvements in data quality over time. The book also explains how to optimize queries involving temporal data, such as when you search for overlapping intervals. More advanced time-oriented information in the book includes hazard and survival analysis. Forecasting with exponential moving averages and autoregression is covered as well. Every web/retail shop wants to know the products customers tend to buy together. Trying to predict the target discrete or continuous variable with few input variables is important for practically every type of business. This book helps you understand data science and the advanced algorithms use to analyze data, and terms such as data mining, machine learning, and text mining.Key to many of the solutions in this book are T-SQL window functions. Author Dejan Sarka demonstrates efficient statistical queries that are based on window functions and optimized through algorithms built using mathematical knowledge and creativity. The formulas and usage of those statistical procedures are explained so you can understand and modify the techniques presented. T-SQL is supported in SQL Server, Azure SQL Database, and in Azure Synapse Analytics. There are so many BI features in T-SQL that it might become your primary analytic database language. If you want to learn how to get information from your data with the T-SQL language that you already are familiar with, then this is the book for you. What You Will LearnDescribe distribution of variables with statistical measuresFind associations between pairs of variablesEvaluate the quality of the data you are analyzingPerform time-series analysis on your dataForecast values of a continuous variablePerform market-basket analysis to predict customer purchasing patternsPredict target variable outcomes from one or more input variablesCategorize passages of text by extracting and analyzing keywordsWho This Book Is ForDatabase developers and database administrators who want to translate their T-SQL skills into the world of business intelligence (BI) and data science. For readers who want to analyze large amounts of data efficiently by using their existing knowledge of T-SQL and Microsoft’s various database platforms such as SQL Server and Azure SQL Database. Also for readers who want to improve their querying by learning new and original optimization techniques.
Advanced and Intelligent Computations in Diagnosis and Control (Advances in Intelligent Systems and Computing #386)
by Zdzisław KowalczukThis book is devoted to the demands of research and industrial centers for diagnostics, monitoring and decision making systems that result from the increasing complexity of automation and systems, the need to ensure the highest level of reliability and safety, and continuing research and the development of innovative approaches to fault diagnosis. The contributions combine domains of engineering knowledge for diagnosis, including detection, isolation, localization, identification, reconfiguration and fault-tolerant control. The book is divided into six parts: (I) Fault Detection and Isolation; (II) Estimation and Identification; (III) Robust and Fault Tolerant Control; (IV) Industrial and Medical Diagnostics; (V) Artificial Intelligence; (VI) Expert and Computer Systems.
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
by Prabath SiriwardenaAdvanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the 'coolest' way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an afterthought, but API security has evolved a lot in last five years. The growth of standards, out there, has been exponential. That's where AdvancedAPI Security comes in--to wade through the weeds and help you keep the bad guys away while realizing the internal and external benefits of developing APIs for your services. Our expert author guides you through the maze of options and shares industry leading best practices in designing APIs for rock-solid security. The book will explain, in depth, securing APIs from quite traditional HTTP Basic Authentication to OAuth 2. 0 and the standards built around it. Build APIs with rock-solid security today with Advanced API Security. Takes you through the best practices in designing APIs for rock-solid security. Provides an in depth tutorial of most widely adopted security standards for API security. Teaches you how to compare and contrast different security standards/protocols to find out what suits your business needs the best.
Advanced API Security: OAuth 2.0 and Beyond
by Prabath SiriwardenaPrepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack. What You Will LearnSecurely design, develop, and deploy enterprise APIsPick security standards and protocols to match business needsMitigate security exploits by understanding the OAuth 2.0 threat landscapeFederate identities to expand business APIs beyond the corporate firewallProtect microservices at the edge by securing their APIsDevelop native mobile applications to access APIs securelyIntegrate applications with SaaS APIs protected with OAuth 2.0Who This Book Is ForEnterprise security architects who are interested in best practices around designing APIs. The book is also for developers who are building enterprise APIs and integrating with internal and external applications.
Advanced Applications of Blockchain Technology (Studies in Big Data #60)
by Shiho Kim Ganesh Chandra DekaThis contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.
Advanced Applications of Computational Mathematics: Theoretical Advances And Advanced Applications (De Gruyter Series On The Applications Of Mathematics In Engineering And Information Sciences Ser. #3)
by Akshay Kumar Mangey Ram Hari Mohan SrivastavaThis book “Advanced Applications of Computational Mathematics” covers multidisciplinary studies containing advanced research in the field of computational and applied mathematics. The book includes research methodology, techniques, applications, and algorithms. The book will be very useful to advanced students, researchers and practitioners who are involved in the areas of computational and applied mathematics and engineering.
Advanced Applications of Natural Language Processing for Performing Information Extraction (SpringerBriefs in Speech Technology)
by António Teixeira Mário RodriguesThis book explains how can be created information extraction (IE) applications that are able to tap the vast amount of relevant information available in natural language sources: Internet pages, official documents such as laws and regulations, books and newspapers, and social web. Readers are introduced to the problem of IE and its current challenges and limitations, supported with examples. The book discusses the need to fill the gap between documents, data, and people, and provides a broad overview of the technology supporting IE. The authors present a generic architecture for developing systems that are able to learn how to extract relevant information from natural language documents, and illustrate how to implement working systems using state-of-the-art and freely available software tools. The book also discusses concrete applications illustrating IE uses. · Provides an overview of state-of-the-art technology in information extraction (IE), discussing achievements and limitations for the software developer and providing references for specialized literature in the area · Presents a comprehensive list of freely available, high quality software for several subtasks of IE and for several natural languages · Describes a generic architecture that can learn how to extract information for a given application domain
Advanced Applied Deep Learning: Convolutional Neural Networks and Object Detection
by Umberto MichelucciDevelop and optimize deep learning models with advanced architectures. This book teaches you the intricate details and subtleties of the algorithms that are at the core of convolutional neural networks. In Advanced Applied Deep Learning, you will study advanced topics on CNN and object detection using Keras and TensorFlow. Along the way, you will look at the fundamental operations in CNN, such as convolution and pooling, and then look at more advanced architectures such as inception networks, resnets, and many more. While the book discusses theoretical topics, you will discover how to work efficiently with Keras with many tricks and tips, including how to customize logging in Keras with custom callback classes, what is eager execution, and how to use it in your models. Finally, you will study how object detection works, and build a complete implementation of the YOLO (you only look once) algorithm in Keras and TensorFlow. By the end of the book you will have implemented various models in Keras and learned many advanced tricks that will bring your skills to the next level.What You Will Learn See how convolutional neural networks and object detection workSave weights and models on diskPause training and restart it at a later stage Use hardware acceleration (GPUs) in your codeWork with the Dataset TensorFlow abstraction and use pre-trained models and transfer learningRemove and add layers to pre-trained networks to adapt them to your specific projectApply pre-trained models such as Alexnet and VGG16 to new datasets Who This Book Is For Scientists and researchers with intermediate-to-advanced Python and machine learning know-how. Additionally, intermediate knowledge of Keras and TensorFlow is expected.
Advanced Arduino Techniques in Science: Refine Your Skills and Projects with PCs or Python-Tkinter
by Richard J. SmytheIf you’re already a comfortable programmer, familiar with your single board computer and microcontroller, and are ready to refine your projects, then let’s get started! This book covers advanced methods and techniques for creating, implementing, monitoring and controlling your experiments and projects with your Raspberry Pi and Arduino. Projects will use Python and the Tkinter GUI and will also cover software development for adding real time data display to the Raspberry Pi.You'll review concepts of frequency occurring in nature and the techniques used to measure the frequency of electrically varying signal voltages. You'll also study procedures for safe design, implementation and operation of experimental measurement systems operating at high heats and high temperatures. Throughout the book you'll look at sources and types of errors, and best practices for minimizing and reducing them.Often times there are simple environmental issues hindering what would seem to be simple projects: high temperatures, controlling the power for elevated temperature with the proportional integral and derivative (PID) algorithm, and the limitations imposed by eight bit code, the influence of noise and errors in measured data, and many more. Advanced Arduino Techniques in Science provides the best tools to move past those restrictions. What You’ll LearnImplement an experimental control system and graphical data display for the Raspberry Pi and ArduinoManage experimental control with PID algorithm implementation, tuning and limitations imposed by eight bit digital signalsBuild an analytical front end Examine data smoothing capability of the Kalman filterExplore available methods for measuring both high and low frequency values in electronic signalsWho This Book Is ForEducators, researchers, students, makers, citizen scientists, or hobbyists can all extend their measuring capability or improve upon the quality of their collected data. The book is directed to those with intermediate skills in programming and those who are comfortable with Python programming and Arduino C.
Advanced Artificial Intelligence and Robo-Justice
by Georgios I. ZekosThe book deals with digital technology which is transforming the landscape of dispute resolution. It illustrates the application of AI in the legal field and shows the future prospect of robo-justice for an AAI society in the advanced artificial intelligence era. In other words, the present justice system and the influence of current AI upon courts and arbitration are investigated. The transforming role of AI on all legal fields is examined thoroughly by giving answers concerning AI legal personality and liability. The analysis shows that digital technology is generating an ever-growing number of disputes and at the same time is challenging the effectiveness and reach of traditional dispute resolution avenues. To that extent, the book presents in tandem the impact of AI upon courts and arbitration, and reveals the role of AAI in generating a new robo-justice system.Finally, the end of the perplexing relation of courts and arbitration is evidenced methodically and comprehensively.
Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website
by Scott NorbergIncorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and delves into security topics rarely covered elsewhere. Get ready to dive deep into ASP.NET Core 3.1 source code, clarifying how particular features work and addressing how to fix problems. For straightforward use cases, the ASP.NET Core framework does a good job in preventing certain types of attacks from happening. But for some types of attacks, or situations that are not straightforward, there is very little guidance available on how to safely implement solutions. And worse, there is a lot of bad advice online on how to implement functionality, be it encrypting unsafely hard-coded parameters that need to be generated at runtime, or articles which advocate for certain solutions that are vulnerable to obvious injection attacks. Even more concerning is the functions in ASP.NET Core that are not as secure as they should be by default.Advanced ASP.NET Core 3 Security is designed to train developers to avoid these problems. Unlike the vast majority of security books that are targeted to network administrators, system administrators, or managers, this book is targeted specifically to ASP.NET developers. Author Scott Norberg begins by teaching developers how ASP.NET Core works behind the scenes by going directly into the framework's source code. Then he talks about how various attacks are performed using the very tools that penetration testers would use to hack into an application. He shows developers how to prevent these attacks. Finally, he covers the concepts developers need to know to do some testing on their own, without the help of a security professional. What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the frameworkDig into ASP.NET Core 3.1 source code to understand how the security services workEstablish a baseline for understanding how to design more secure softwareProperly apply cryptography in software developmentTake a deep dive into web security conceptsValidate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET CoreFix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needsIncorporate security into your software development process Who This Book Is ForSoftware developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. A basic understanding of web technologies such as HTML, JavaScript, and CSS is assumed, as is knowledge of how to create a website, and how to read and write C#. You do not need knowledge of security concepts, even those that are often covered in ASP.NET Core documentation.
Advanced ASP.NET Core 8 Security: Move Beyond ASP.NET Documentation and Learn Real Security
by Scott NorbergMost .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the framework itself. And most developers don’t use all of the best practices that are recommended. If you are interested in truly top-notch security, available sources don’t give you the information you need. Most blogs and other books simply state how to use the configurations within ASP.NET, but do not teach you security as understood by security professionals. Online code samples aren't much help because they are usually written by developers who aren’t incorporating security practices. This book solves those issues by teaching you security first, going over software best practices as understood by security professionals, not developers. Then it teaches you how security is implemented in ASP.NET. With that foundation, it dives into specific security-related functionality and discusses how to improve upon the default functionality with working code samples. And you will learn how security professionals build software security programs so you can continue building software security best practices into your own Secure Software Development Life Cycle (SSDLC). What You’ll Learn Know how both attackers and professional defenders approach web security Establish a baseline of security for understanding how to design more secure software Discern which attacks are easy to prevent, and which are more challenging, in ASP.NET Dig into ASP.NET source code to understand how the security services work Know how the new logging system in ASP.NET falls short of security needs Incorporate security into your software development process Who This Book Is For Software developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET. To get the most out of this book, you should already have a basic understanding of web programming and ASP.NET, including creating new projects, creating pages, and using JavaScript. Topics That Are New to This Edition This edition has been updated with the following changes: Best practices and code samples updated to reflect security-related changes in ASP.NET 8 Improved examples, including a fully-functional website incorporating security suggestions Best practices for securely using Large Language Models (LLMs) and AI Expansions and clarifications throughout
Advanced Audio Visualization Using ThMAD: Creating Amazing Graphics with Open Source Software
by Peter SpäthLearn advanced techniques and improve your audio visualization skills with Thinking Machine Audio Dreams (ThMAD). With this book, you can concentrate on advanced examples and usage patterns, including using shaders in a more profound way, and how to incorporate ThMAD into a tool chain using the professional sound server JACK.
Advanced Backend Code Optimization
by Sid Touati Benoit Dupont de DinechinThis book is a summary of more than a decade of research in the area of backend optimization. It contains the latest fundamental research results in this field. While existing books are often more oriented toward Masters students, this book is aimed more towards professors and researchers as it contains more advanced subjects.It is unique in the sense that it contains information that has not previously been covered by other books in the field, with chapters on phase ordering in optimizing compilation; register saturation in instruction level parallelism; code size reduction for software pipelining; memory hierarchy effects and instruction level parallelism.Other chapters provide the latest research results in well-known topics such as register need, and software pipelining and periodic register allocation.
Advanced Bioscience and Biosystems for Detection and Management of Diabetes (Springer Series on Bio- and Neurosystems #13)
by Kishor Kumar Sadasivuni John-John Cabibihan Abdulaziz Khalid A M Al-Ali Rayaz A. MalikThis book covers the medical condition of diabetic patients, their early symptoms and methods conventionally used for diagnosing and monitoring diabetes. It describes various techniques and technologies used for diabetes detection. The content is built upon moving from regressive technology (invasive) and adapting new-age pain-free technologies (non-invasive), machine learning and artificial intelligence for diabetes monitoring and management. This book details all the popular technologies used in the health care and medical fields for diabetic patients. An entire chapter is dedicated to how the future of this field will be shaping up and the challenges remaining to be conquered. Finally, it shows artificial intelligence and predictions, which can be beneficial for the early detection, dose monitoring and surveillance for patients suffering from diabetes