|
|||
Deep learning is often viewed as the exclusive domain of math PhDs and big tech companies. But as this hands-on guide demonstrates, programmers comfortable with Python can achieve impressive results in deep learning with little math background, small amounts of data, and minimal code. How? With fastai, the first library to provide a consistent interface to the most frequently used deep learning applications. Authors Jeremy Howard and Sylvain Gugger, the creators of fastai, show you how to train a model on a wide range of tasks using fastai and PyTorch. You’ll also dive progressively further into deep learning theory to gain a complete understanding of the algorithms behind the scenes. Train models in computer vision, natural language processing, tabular data, and collaborative filteringLearn the latest deep learning techniques that matter most in practiceImprove accuracy, speed, and reliability by understanding how deep learning models workDiscover how to turn your models into web applicationsImplement deep learning algorithms from scratchConsider the ethical implications of your workGain insight from the foreword by PyTorch cofounder, Soumith Chintala |
|
|||
Apprenez à utiliser les puissants outils de pixelmator, créez, sublimez vos photos et partagez. Les développeurs de pixelmator ont mis à disposition un logiciel fabuleux pour faire de la création graphique et retoucher vos photos. Il n’est cependant jamais facile de s’y retrouver lorsque l’on n’a jamais utilisé ce type de logiciel, encore plus lorsque la plupart des tutoriels et informations sur internet sont en langue anglaise. Dans ce livre numérique destiné aux débutants je vous guide à travers pixelmator de manière interactive à l’aide de diaporamas et de vidéos.  Vous commencerez par les bases jusqu’à l’apprentissage de possibilités avancées. Aucune connaissance n’est nécessaire pour démarrer. Au programme : L’organisation de l’interface de pixelmator. Comment organiser vos projets avec les calques. Créer des images matricielles et vectorielles. L’utilisation des différents outils et leurs options. Comment retoucher et sublimer vos photos ; les nombreuses manières d’en découper une partie afin de l’utiliser ailleurs et faire des montages. L’utilisation de vos premiers effets et techniques avancées… |
|
|||
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." — Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" ( Financial Times ). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications. |
|
|||
The inventor of the PalmPilot shares a compelling new theory of intelligence, brain function, and the future of artificial intelligence. Tech innovator Jeff Hawkins reshaped our relationship to computers with devices like the PalmPilot. Now he stands ready to revolutionize both neuroscience and computing in one stroke, with a new understanding of intelligence itself. In this book, Hawkins develops a powerful theory of human cognition and explains how, based on his theory, we can finally build intelligent machines. According to Hawkins, the brain is a complex system that remembers sequences of events and their nested relationships. This style of organization reflects the true structure of the world and allows us to make increasingly accurate predictions. This memory-prediction process in turn forms the basis of intelligence, perception, creativity, and even consciousness. In an engaging style accessible to the general reader, Hawkins shows how a clear understanding of brain function can be applied to building intelligent machines, in silicon, that will exceed our human ability in surprising ways. Written with acclaimed science writer Sandra Blakeslee, On Intelligence is a landmark book in its scope and clarity. “Brilliant and imbued with startling clarity . . . the most important book in neuroscience, psychology, and artificial intelligence in a generation.” —Malcolm Young, University of Newcastle |
|
|||
As you move data to the cloud, you need to consider a comprehensive approach to data governance, along with well-defined and agreed-upon policies to ensure your organization meets compliance requirements. Data governance incorporates the ways people, processes, and technology work together to ensure data is trustworthy and can be used effectively. This practical guide shows you how to effectively implement and scale data governance throughout your organization. Chief information, data, and security officers and their teams will learn strategy and tooling to support democratizing data and unlocking its value while enforcing security, privacy, and other governance standards. Through good data governance, you can inspire customer trust, enable your organization to identify business efficiencies, generate more competitive offerings, and improve customer experience. This book shows you how. You'll learn: Data governance strategies addressing people, processes, and toolsBenefits and challenges of a cloud-based data governance approachHow data governance is conducted from ingest to preparation and useHow to handle the ongoing improvement of data qualityChallenges and techniques in governing streaming dataData protection for authentication, security, backup, and monitoringHow to build a data culture in your organization |
|
|||
Compétence Mac vous propose de réaliser des exercices pas à pas afin de maîtriser votre Mac et tirer bénéfice des outils disponibles sur macOS. Au programme de ce Cahier n°10, 7 tutoriels complets illustrés. 1/ macOS Dix conseils pour paramétrer au mieux votre premier Mac 2/ FINDER Ajoutez et profitez des widgets interactifs sur le bureau du Mac 3/ STOCKAGE Libérez un maximum d’espace sur votre disque dur interne  4/ NUMBERS Créez et utilisez un calendrier mensuel et personnalisable 5/ MAIL Créez un message de réponse automatique dans Mail 6/ APPLE ID Comment changer simplement la photo de votre profil ? 7/ PLANS Organisez et gérez vos écrits et notes avec brio. Bonne lecture ! |
|
|||
Welcome to Your Complete Guide to iPhone 16 Pro Max, your comprehensive resource for mastering Apple’s latest flagship smartphone! This guide is designed to provide you with clear, step-by-step instructions, alongside valuable tips and tricks for navigating iOS 18 effectively. Imagine effortlessly managing your daily tasks, capturing stunning photos, and exploring all the innovative features your iPhone 16 Pro Max has to offer. This guide simplifies the learning process, ensuring that users of all experience levels can make the most of their device. Inside, you’ll discover detailed tutorials on setting up your iPhone, customizing settings, and utilizing the powerful features of iOS 18. Each section is packed with practical tips that will enhance your user experience and help you unlock your device’s full potential. Don’t just use your iPhone—master it! With this user-friendly guide, you’ll gain the skills and knowledge necessary to navigate your iPhone 16 Pro Max with confidence. Let’s embark on this exciting journey together and explore everything your device has to offer! |
|
|||
The Practical, Step-by-Step Guide to Using LLMs at Scale in Projects and Products Large Language Models (LLMs) like Llama 3, Claude 3, and the GPT family are demonstrating breathtaking capabilities, but their size and complexity have deterred many practitioners from applying them. In Quick Start Guide to Large Language Models, Second Edition, pioneering data scientist and AI entrepreneur Sinan Ozdemir clears away those obstacles and provides a guide to working with, integrating, and deploying LLMs to solve practical problems. Ozdemir brings together all you need to get started, even if you have no direct experience with LLMs: step-by-step instructions, best practices, real-world case studies, and hands-on exercises. Along the way, he shares insights into LLMs' inner workings to help you optimize model choice, data formats, prompting, fine-tuning, performance, and much more. The resources on the companion website include sample datasets and up-to-date code for working with open- and closed-source LLMs such as those from OpenAI (GPT-4 and GPT-3.5), Google (BERT, T5, and Gemini), X (Grok), Anthropic (the Claude family), Cohere (the Command family), and Meta (BART and the LLaMA family). Learn key concepts: pre-training, transfer learning, fine-tuning, attention, embeddings, tokenization, and more Use APIs and Python to fine-tune and customize LLMs for your requirements Build a complete neural/semantic information retrieval system and attach to conversational LLMs for building retrieval-augmented generation (RAG) chatbots and AI Agents Master advanced prompt engineering techniques like output structuring, chain-of-thought prompting, and semantic few-shot prompting Customize LLM embeddings to build a complete recommendation engine from scratch with user data that outperforms out-of-the-box embeddings from OpenAI Construct and fine-tune multimodal Transformer architectures from scratch using open-source LLMs and large visual datasets Align LLMs using Reinforcement Learning from Human and AI Feedback (RLHF/RLAIF) to build conversational agents from open models like Llama 3 and FLAN-T5 Deploy prompts and custom fine-tuned LLMs to the cloud with scalability and evaluation pipelines in mind Diagnose and optimize LLMs for speed, memory, and performance with quantization, probing, benchmarking, and evaluation frameworks "A refreshing and inspiring resource. Jam-packed with practical guidance and clear explanations that leave you smarter about this incredible new field." --Pete Huang, author of The Neuron Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details. |
|
|||
All cloud architects need to know how to build data platforms that enable businesses to make data-driven decisions and deliver enterprise-wide intelligence in a fast and efficient way. This handbook shows you how to design, build, and modernize cloud native data and machine learning platforms using AWS, Azure, Google Cloud, and multicloud tools like Snowflake and Databricks. Authors Marco Tranquillin, Valliappa Lakshmanan, and Firat Tekiner cover the entire data lifecycle from ingestion to activation in a cloud environment using real-world enterprise architectures. You'll learn how to transform, secure, and modernize familiar solutions like data warehouses and data lakes, and you'll be able to leverage recent AI/ML patterns to get accurate and quicker insights to drive competitive advantage. You'll learn how to: Design a modern and secure cloud native or hybrid data analytics and machine learning platformAccelerate data-led innovation by consolidating enterprise data in a governed, scalable, and resilient data platformDemocratize access to enterprise data and govern how business teams extract insights and build AI/ML capabilitiesEnable your business to make decisions in real time using streaming pipelinesBuild an MLOps platform to move to a predictive and prescriptive analytics approach |
|
|||
In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale). Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities, a host of cities, and plenty of close shaves, to an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes -- and a portrait of a visionary who forced the authorities to rethink the way they pursued him, and forced companies to rethink the way they protect their most sensitive information. "Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR |
|
|||
Get a comprehensive, in-depth introduction to the core Python language with this hands-on book. Based on author Mark Lutz’s popular training course, this updated fifth edition will help you quickly write efficient, high-quality code with Python. It’s an ideal way to begin, whether you’re new to programming or a professional developer versed in other languages. Complete with quizzes, exercises, and helpful illustrations, this easy-to-follow, self-paced tutorial gets you started with both Python 2.7 and 3.3— the latest releases in the 3.X and 2.X lines—plus all other releases in common use today. You’ll also learn some advanced language features that recently have become more common in Python code. Explore Python’s major built-in object types such as numbers, lists, and dictionariesCreate and process objects with Python statements, and learn Python’s general syntax modelUse functions to avoid code redundancy and package code for reuseOrganize statements, functions, and other tools into larger components with modulesDive into classes: Python’s object-oriented programming tool for structuring codeWrite large programs with Python’s exception-handling model and development toolsLearn advanced Python tools, including decorators, descriptors, metaclasses, and Unicode processing |
|
|||
Unlock the secrets of the Terminal and discover how this powerful tool solves problems the Finder can’t handle. With this handy guide, you’ll learn commands for a variety of tasks, such as killing programs that refuse to quit, renaming a large batch of files in seconds, or running jobs in the background while you do other work. Get started with an easy-to-understand overview of the Terminal and its partner, the shell. Then dive into commands neatly arranged into two dozen categories, including directory operations, file comparisons, and network connections. Each command includes a concise description of its purpose and features. Log into your Mac from remote locationsSearch and modify files in powerful waysSchedule jobs for particular days and timesLet several people use one Mac at the same timeCompress and uncompress files in a variety of formatsView and manipulate Mac OS X processesCombine multiple commands to perform complex operationsDownload and install additional commands from the Internet |
|
|||
Learn how to use, deploy, and maintain Apache Spark with this comprehensive guide, written by the creators of the open-source cluster-computing framework. With an emphasis on improvements and new features in Spark 2.0, authors Bill Chambers and Matei Zaharia break down Spark topics into distinct sections, each with unique goals. You’ll explore the basic operations and common functions of Spark’s structured APIs, as well as Structured Streaming, a new high-level API for building end-to-end streaming applications. Developers and system administrators will learn the fundamentals of monitoring, tuning, and debugging Spark, and explore machine learning techniques and scenarios for employing MLlib, Spark’s scalable machine-learning library. Get a gentle overview of big data and SparkLearn about DataFrames, SQL, and Datasets—Spark’s core APIs—through worked examplesDive into Spark’s low-level APIs, RDDs, and execution of SQL and DataFramesUnderstand how Spark runs on a clusterDebug, monitor, and tune Spark clusters and applicationsLearn the power of Structured Streaming, Spark’s stream-processing engineLearn how you can apply MLlib to a variety of problems, including classification or recommendation |
|
|||
Get ready to unlock the power of your data. With the fourth edition of this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. This book is ideal for programmers looking to analyze datasets of any size, and for administrators who want to set up and run Hadoop clusters. Using Hadoop 2 exclusively, author Tom White presents new chapters on YARN and several Hadoop-related projects such as Parquet, Flume, Crunch, and Spark. You’ll learn about recent changes to Hadoop, and explore new case studies on Hadoop’s role in healthcare systems and genomics data processing. Learn fundamental components such as MapReduce, HDFS, and YARNExplore MapReduce in depth, including steps for developing applications with itSet up and maintain a Hadoop cluster running HDFS and MapReduce on YARNLearn two data formats: Avro for data serialization and Parquet for nested dataUse data ingestion tools such as Flume (for streaming data) and Sqoop (for bulk data transfer)Understand how high-level data processing tools like Pig, Hive, Crunch, and Spark work with HadoopLearn the HBase distributed database and the ZooKeeper distributed configuration service |
|
|||
The Ruby Programming Language is the authoritative guide to Ruby and provides comprehensive coverage of versions 1.8 and 1.9 of the language. It was written (and illustrated!) by an all-star team: David Flanagan, bestselling author of programming language "bibles" (including JavaScript: The Definitive Guide and Java in a Nutshell) and committer to the Ruby Subversion repository. Yukihiro "Matz" Matsumoto, creator, designer and lead developer of Ruby and author of Ruby in a Nutshell, which has been expanded and revised to become this book. why the lucky stiff, artist and Ruby programmer extraordinaire.This book begins with a quick-start tutorial to the language, and then explains the language in detail from the bottom up: from lexical and syntactic structure to datatypes to expressions and statements and on through methods, blocks, lambdas, closures, classes and modules. The book also includes a long and thorough introduction to the rich API of the Ruby platform, demonstrating -- with heavily-commented example code -- Ruby's facilities for text processing, numeric manipulation, collections, input/output, networking, and concurrency. An entire chapter is devoted to Ruby's metaprogramming capabilities. The Ruby Programming Language documents the Ruby language definitively but without the formality of a language specification. It is written for experienced programmers who are new to Ruby, and for current Ruby programmers who want to challenge their understanding and increase their mastery of the language. |
|
|||
Successful online communities don’t just happen by themselves. They’re the result of a carefully executed strategy, solid design, and patient nurturing. Though they may seem like a lot of work, the benefits an online community can bring to your brand make the efforts worthwhile. This book will provide you with the essential tools to build online communities. You’ll learn how to: • identify the business objectives for your online community • develop a community strategy to recruit and retain members • create brand loyalty, bring in new business, and offer value to customers that your competitors cannot imitate • take advantage of free advertising opportunities • use communities to gain market insights and establish a direct line to your customer base In addition, you’ll discover the risks and costs of an online community project, how it can end up saving your company money, and even how it can become an important new revenue source of its own. You’ll also be inspired by exclusive interviews, where the people who manage thriving online communities share the lessons they’ve learned and the secrets of their success. |
|
|||
Why learn Scala? You don’t need to be a data scientist or distributed computing expert to appreciate this object-oriented functional programming language. This practical book provides a comprehensive yet approachable introduction to the language, complete with syntax diagrams, examples, and exercises. You’ll start with Scala's core types and syntax before diving into higher-order functions and immutable data structures. Author Jason Swartz demonstrates why Scala’s concise and expressive syntax make it an ideal language for Ruby or Python developers who want to improve their craft, while its type safety and performance ensures that it’s stable and fast enough for any application. Learn about the core data types, literals, values, and variablesDiscover how to think and write in expressions, the foundation for Scala's syntaxWrite higher-order functions that accept or return other functionsBecome familiar with immutable data structures and easily transform them with type-safe and declarative operationsCreate custom infix operators to simplify existing operations or even to start your own domain-specific languageBuild classes that compose one or more traits for full reusability, or create new functionality by mixing them in at instantiation |
|
|||
The classic guide to how computers work, updated with new chapters and interactive graphics "For me, Code was a revelation. It was the first book about programming that spoke to me. It started with a story, and it built up, layer by layer, analogy by analogy, until I understood not just the Code, but the System. Code is a book that is as much about Systems Thinking and abstractions as it is about code and programming. Code teaches us how many unseen layers there are between the computer systems that we as users look at every day and the magical silicon rocks that we infused with lightning and taught to think." - Scott Hanselman, Partner Program Director, Microsoft, and host of Hanselminutes Computers are everywhere, most obviously in our laptops and smartphones, but also our cars, televisions, microwave ovens, alarm clocks, robot vacuum cleaners, and other smart appliances. Have you ever wondered what goes on inside these devices to make our lives easier but occasionally more infuriating? For more than 20 years, readers have delighted in Charles Petzold's illuminating story of the secret inner life of computers, and now he has revised it for this new age of computing. Cleverly illustrated and easy to understand, this is the book that cracks the mystery. You'll discover what flashlights, black cats, seesaws, and the ride of Paul Revere can teach you about computing, and how human ingenuity and our compulsion to communicate have shaped every electronic device we use. This new expanded edition explores more deeply the bit-by-bit and gate-by-gate construction of the heart of every smart device, the central processing unit that combines the simplest of basic operations to perform the most complex of feats. Petzold's companion website, CodeHiddenLanguage.com, uses animated graphics of key circuits in the book to make computers even easier to comprehend. In addition to substantially revised and updated content, new chapters include: Chapter 18:  Let's Build a Clock! Chapter 21:  The Arithmetic Logic Unit Chapter 22:  Registers and Busses Chapter 23:  CPU Control Signals Chapter 24:  Jumps, Loops, and Calls Chapter 28: The World Brain From the simple ticking of clocks to the worldwide hum of the internet, Code reveals the essence of the digital revolution. |
|
|||
Learn firsthand just how easy a cyberattack can be. Go Hack Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by how easy they are to carry out—and realize just how vulnerable most people really are. You’ll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You’ll even hack a virtual car! You’ll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you’ll understand how to guard against the hacks you perform. You’ll learn: How to practice hacking within a safe, virtual environmentHow to use popular hacking tools the way real hackers do, like Kali Linux, Metasploit, and John the RipperHow to infect devices with malware, steal and crack passwords, phish for sensitive information, and moreHow to use hacking skills for good, such as to access files on an old laptop when you can’t remember the passwordValuable strategies for protecting yourself from cyber attacks You can’t truly understand cyber threats or defend against them until you’ve experienced them firsthand. By hacking yourself before the bad guys do, you’ll gain the knowledge you need to keep you and your loved ones safe. |
|
|||
Named one of the best books of 2017 by The Economist, The Wall Street Journal, & Vox The father of virtual reality explains its dazzling possibilities by reflecting on his own lifelong relationship with technology Bridging the gap between tech mania and the experience of being inside the human body , Dawn of the New Everything is a look at what it means to be human at a moment of unprecedented technological possibility. Through a fascinating look back over his life in technology, Jaron Lanier, an interdisciplinary scientist and father of the term “virtual reality,” exposes VR’s ability to illuminate and amplify our understanding of our species, and gives readers a new perspective on how the brain and body connect to the world. An inventive blend of autobiography, science writing, philosophy and advice, this book tells the wild story of his personal and professional life as a scientist, from his childhood in the UFO territory of New Mexico, to the loss of his mother, the founding of the first start-up, and finally becoming a world-renowned technological guru. Understanding virtual reality as being both a scientific and cultural adventure, Lanier demonstrates it to be a humanistic setting for technology. While his previous books offered a more critical view of social media and other manifestations of technology, in this book he argues that virtual reality can actually make our lives richer and fuller. |
|
|||
Traditional data architecture patterns are severely limited. To use these patterns, you have to ETL data into each tool—a cost-prohibitive process for making warehouse features available to all of your data. The lack of flexibility with these patterns requires you to lock into a set of priority tools and formats, which creates data silos and data drift. This practical book shows you a better way. Apache Iceberg provides the capabilities, performance, scalability, and savings that fulfill the promise of an open data lakehouse. By following the lessons in this book, you'll be able to achieve interactive, batch, machine learning, and streaming analytics with this high-performance open source format. Authors Tomer Shiran, Jason Hughes, and Alex Merced from Dremio show you how to get started with Iceberg. With this book, you'll learn: The architecture of Apache Iceberg tablesWhat happens under the hood when you perform operations on Iceberg tablesHow to further optimize Iceberg tables for maximum performanceHow to use Iceberg with popular data engines such as Apache Spark, Apache Flink, and Dremio Discover why Apache Iceberg is a foundational technology for implementing an open data lakehouse. |
|
|||
Discover the Incredible World of AI with Ben Wong's Guide: "Artificial Intelligence for Beginners: Exploring ChatGPT and its Potential" With a blend of intriguing insights, real-world examples, and step-by-step instructions, author and AI expert Ben Wong takes you on a captivating journey through the intricate landscape of AI, focusing on OpenAI's cutting-edge language model - ChatGPT. Written in an accessible and reader-friendly style, this book breaks down complex AI concepts, offering beginners an excellent starting point and providing AI enthusiasts with a deeper understanding of the topic. Whether you're looking to leverage AI for your business, embark on a new career path, or simply satiate your curiosity about this revolutionary technology, this book is your ideal companion. Inside this book, you'll discover: •An easy-to-understand introduction to AI, its history, and its various branches. •The inner workings of ChatGPT, including its architecture, training process, and language modeling. •Practical applications of ChatGPT in commercial, creative, academic, and research contexts. •A thorough analysis of the limitations, risks, and ethical considerations associated with AI and ChatGPT. •Step-by-step guide to using ChatGPT, complete with troubleshooting tips and project ideas. •Enlightening case studies and real-world applications of ChatGPT. •Insight into the future of AI and how you can prepare for an AI-driven future. •Comprehensive glossary of AI terms, additional resources, and AI communities for further learning. Embark on an enlightening journey into the world of AI with "Artificial Intelligence for Beginners: Exploring ChatGPT and its Potential". Ignite your understanding, stir your imagination, and get ready to unlock the limitless potential of AI with Ben Wong. Grab your copy today! |
|
|||
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn how to more effectively leverage identity across their businesses. This book helps you: Learn why functional online identity is still a difficult problem for most companiesUnderstand the purpose of digital identity and why it's fundamental to your business strategyLearn why "rolling your own" digital identity infrastructure is a bad ideaDifferentiate between core ideas such as authentication and authorizationExplore the properties of centralized, federated, and decentralized identity systemsDetermine the right authorization methods for your specific applicationUnderstand core concepts such as trust, risk, security, and privacyLearn how digital identity and self-sovereign identity can make a difference for you and your organization |
|
|||
Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field extraction, field aliases and macros, and Splunk tags. You will be able to make your own data model and prepare an advanced dashboard in Splunk. In the second part, you will explore the Splunk Admin certification. There will be in-depth coverage of Splunk licenses and user role management, and how to configure Splunk forwarders, indexer clustering, and the security policy of Splunk. You’ll also explore advanced data input options in Splunk as well as .conf file merging logic, btool, various attributes, stanza types, editing advanced data inputs through the .conf file, and various other types of .conf file in Splunk. The concluding part covers the advanced topics of the Splunk Admin certification. You will also learn to troubleshoot Splunk and to manage existing Splunk infrastructure. You will understand how to configure search head, multi-site indexer clustering, and search peers besides exploring how to troubleshoot Splunk Enterprise using the monitoring console and matrix.log. This part will also include search issues and configuration issues. You will learn to deploy an app through a deployment server on your client’s instance, create a server class, and carry out load balancing, socks proxy, and indexer discovery. By the end of the  Splunk Certified Study Guide , you will have learned how to manage resources in Splunk and how to use REST API services for Splunk. This section also explains how to set up Splunk Enterprise on the AWS platform and some of the best practices to make them work efficiently together. The book offers multiple choice question tests for each part that will help you better prepare for the exam. You will: Study to pass the Splunk User, Power User, and Admin certificate examsImplement and manage Splunk multi-site clusteringDesign, implement, and manage a complex Splunk Enterprise solutionMaster the roles of Splunk Admin and troubleshootingConfigure Splunk using AWS |
|
|||
Are interested in getting into computer hacking or just hacking in general, but don't know where to start? Well today is your lucky day then, because reading this book will get your feet wet into the world of computer hacking, but won't overwhelm you at the same time. This is a beginner's guide that I created strictly for people like you to get introduced to the basics of what hacking is all about! This book contains very basic information on the ins and outs of beginner level hacking. There are many misconceptions and ideas that people have about the world of hacking, and you are going to learn a little bit about them. Hacking is an extremely complex activity that requires a lot of skills and knowledge. This book will give you a basic idea about what hacking is and how it can be done. In a world where no information is private, hacking is a useful tool. It’s illegal in some cases but that depends on the way it is used. Hacking is only beneficial when you use it to make the world a better place. The final choice of what you will do with the information that is provided in this book is entirely up to you. Hacking is not easy. It will require a lot of time and patience in order to master it. There are many risks involved in hacking and you should consider them all before you start on your journey as a hacker. There are various kinds of hacking that are possible. You can easily hack someone’s laptop or mobile phone if you have the requisite knowledge. This book will guide you on how to secure your own networks and also how to start with hacking basics such as figuring out a password. The unrealistic expectations that you might have garnered over the years might not come to be true at all. Hacking is hardly about being a vigilante. In most cases, hacking into extremely safe networks is almost impossible. If you want to satiate your thirst for knowledge in relation to hacking then this is the right book for you. |