Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Understand the fundamentals of Bxdf plugins for RenderMan® 21+, both the technical details and API architecture. The main goal of the book is to enable technical artists, hobbyists, and students in using the noncommercial (NCR), free RenderMan® edition. RenderMan® is an industry standard for rendering software. It has been used for every Pixar film to date and numerous other projects. RenderMan® 21, and all subsequent versions, use Monte Carlo path tracing. This change has necessitated the use of C++ plugins in place of the RenderMan Shader Language (RSL). Because of this, writing Bxdfs now requires knowledge of Monte Carlo integration, probability density functions, and the RenderMan® C++ API. Essential Guide to RenderMan® Shading Plugin Development specifically addresses writing RenderMan® C++ materials. It explores the mathematical models of representative Bxdfs while drawing parallels, when helpful, to earlier RSL implementations. It also includes an overview of Integrators, providing further context for modern RenderMan® programmable shading. What You Will LearnC++ development for BxdfsFundamentals of the rendering equationMonte Carlo integration Who Is This Book ForBeginner plugin writers for RenderMan®, such as technical artists, students, or hobbyists who may already have experience with RSL or another shader language. More experienced C++ developers without knowledge of RenderMan® or Monte Carlo path tracing will benefit from the content as well. While some prior experience in computer graphics is helpful, the book provides background and references for further study.
This book explains how to scale Apache Spark 3 to handle massive amounts of data, either via batch or streaming processing. It covers how to use Spark¿s structured APIs to perform complex data transformations and analyses you can use to implement end-to-end analytics workflows. This book covers Spark 3's new features, theoretical foundations, and application architecture. The first section introduces the Apache Spark ecosystem as a unified engine for large scale data analytics, and shows you how to run and fine-tune your first application in Spark. The second section centers on batch processing suited to end-of-cycle processing, and data ingestion through files and databases. It explains Spark DataFrame API as well as structured and unstructured data with Apache Spark. The last section deals with scalable, high-throughput, fault-tolerant streaming processing workloads to process real-time data. Here you'll learn about Apache Spark Streaming¿s execution model, the architecture of Spark Streaming, monitoring, reporting, and recovering Spark streaming. A full chapter is devoted to future directions for Spark Streaming. With real-world use cases, code snippets, and notebooks hosted on GitHub, this book will give you an understanding of large-scale data analysis concepts--and help you put them to use.Upon completing this book, you will have the knowledge and skills to seamlessly implement large-scale batch and streaming workloads to analyze real-time data streams with Apache Spark.What You Will LearnMaster the concepts of Spark clusters and batch data processingUnderstand data ingestion, transformation, and data storageGain insight into essential stream processing concepts and different streaming architecturesImplement streaming jobs and applications with Spark StreamingWho This Book Is ForData engineers, data analysts, machine learning engineers, Python and R programmers
While many guides exist to help software engineers learn cloud networking design and architecture concepts, and even prepare for cloud network certifications on AWS and Azure, far fewer resources are available covering the Google Cloud Platform (GCP) Professional Cloud Network Engineer certification exam. Well, look no further! This self-paced guide book is designed to help engineers learn cloud networking best practices on GCP, and prepare for the GCP Professional Cloud Network Engineer certification exam.You will waste no time when you use this study companion. It lets you dive in and learn how GCP differs from other public cloud providers (AWS and Microsoft Azure). You will understand GCP's unique ability to allow virtual private clouds (VPCs) that span across multiple regions. You will know how to leverage GCP as a competitive advantage in the IT engineering community. Key concepts covered on the exam are called out and applied in each chapter of this book, giving you both practice and reinforcement, a far more effective learning tool than rote learning or similar approaches typically enlisted in exam preparation.Enterprises are looking for developers with Google networking skills. Now is the time to skill up! This book shows you how to leverage GCP¿s developer-focused, user-friendly approach to understand how the networking components enabling the popular 1B-user Google products (e.g., Gmail, Google Search, YouTube, Google Workspace (formerly G-Suite), Google Maps, Google Photos, and many others) work behind the scenes.What You Will LearnIn addition to preparing for the GCP Professional Cloud Network Engineer certification exam, you will learn how to:Architect and design a virtual private cloudImplement a virtual private cloudConfigure network servicesImplement hybrid connectivityImplement network securityManage network operationsOptimize network resourcesWho This Book Is ForSoftware engineers (network, DevOps, SecOps, DataOps, engineers skilled with SDLC), software architects (solution, security, data, infrastructure, cloud, those skilled with TOGAF), and IT professionals. Prerequisites: While this study companion is intended to be self-contained, a basic knowledge of cloud computing along with hands-on experience with a minimum of two modern programming languages (Java, C#) is beneficial in order for readers to fully achieve the objectives of the book.
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change.Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely.This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity.You Will Learn How to: Safely save email messages as attachments for analysisIdentify what information is in an email headerReview header information and extract key indicators or patterns used for detectionIdentify signs of a suspicious or malicious email messageDetect the tactics that attackers use in phishing emailsSafely examine email links and attachmentsUse a variety of free and simple tools to analyze email messagesWho This Book Is ForCybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.
Create a mobile app for Apple platforms using SwiftUI in conjunction with Google¿s Firebase backend to post and retrieve data, authenticate users, and store data securely. Yoüll use SwiftUI to create an engaging and aesthetically appealing user interface that meets the expectations of iOS users while leveraging the power of Google¿s Firebase to securely and seamlessly work with your backend data.With an intro to Xcode and SwiftUI, followed by tutorials on how build an app with Firestore, Firebase Storage, and the Authenticate framework, you'll find everything you need to build a complete iOS application. Yoüll begin with an introduction to Firebase and an overview of how to use Xcode and write code in SwiftUI. Then dive into two real-life projects where you'll build a note application and a social media application. With these projects, you'll see how to post, read, edit, and delete data using Firestore. You'll also upload large assets, such as pictures, toFirebase Storage, and we will also authenticate users with email and Sign in with Apple. On the backend, you'll learn how to structure our data, secure it, and also use third-party extensions to enhance the user experience.Build Mobile Apps with SwiftUI and Firebase offers the skills and knowledge necessary to develop apps that are both fun and functional for the user while also providing a robust backend that integrates with your app and stores data securely. Use SwiftUI and Firebase to build something your users will love!What You'll LearnAuthenticate users on your appSecure a remote database and manage data easilyEnhance user experience with extensionsWho This Book Is ForiOS developers who are beginning their journey with both SwiftUI, to build user interfaces, and the Google Firebase backend.
If you are a developer who wants to learn the basic skills of web and application programming interfaces (APIs) with .NET, this book is your complete introduction. The book takes a learn-by-experience approach. You will hit the ground running with a sample project that has everything you need to be wired up.As you follow along, you will learn simple and intuitive conventions that will free you from some of the more tedious decisions and work, in order to allow you to focus on the business requirements required by your team. Certain components of the framework should always appear in certain folders in the solution to speed up development while others need a name that follows particular conventions. You will learn the building blocks of Web API and how to leverage them to have a well-rounded API. Understanding these small but important tricks will make development faster, easier, and more pleasant, and will prevent time-consuming errors.Part I introduces you to the basics of Web. Part II gets you started creating an API that you will use and build upon throughout the book until you have a complete project. All companion code is available via GitHub. Part III covers more advanced concepts, including how to override out-of-the-box conventions to customize an API to meet your specific business needs. By the end of the book you will have a fully functional API, and you will be better prepared for an interview for a .NET backend developer job.What You Will LearnBuild a start-to-finish Web APIKnow the main concepts of the WebApply best practices in API development to your own projectsKnow the fundamentals of Web API developmentKnow the fundamentals of a RESTful APILeverage Web API constructs to implement a clean and extensible APIGet hands-on experience to unit test a Web APIGain the skills required to apply for a junior or entry-level .NET Web developer jobWho This Book Is ForDevelopers who want to learn API development with .NET. It is helpful to have some basic C# programming knowledge because it is used in API development in .NET, but it is not mandatory. Readers should be familiar with a programming language to be able to understand code and examples. Experience with web development is not necessary.
Begin your programming journey with C++ , starting with the basics and progressing through step-by-step examples that will help you become a proficient C++ programmer. This book includes new features from the C++23 standard. All you need are Beginning C++23 and any recent C++ compiler and you'll soon be writing real C++ programs. There is no assumption of prior programming knowledge. All language concepts that are explained in the book are illustrated with working program examples, and all chapters include exercises for you to test and practice your knowledge. Free source code downloads are provided for all examples from the text and solutions to the exercises. This latest edition has been fully updated to the latest version of the language, C++23, and to all conventions and best practices of modern C++. This book also introduces elements of the C++ Standard Library that provide essential support for C++23. After completing this book, you will have the knowledge and skills needed to build your first C++ applications. What You Will LearnBegin programming with the C++23 standardCarry out modular programming in C++Work with arrays and loops, pointers and references, strings, and moreWrite your own functions, types, and operatorsDiscover the essentials of object-oriented programmingUse overloading, inheritance, virtual functions, and polymorphismWrite generic function and class templates, and make them safer using concepts Learn the ins and outs of containers, algorithms, and rangesUse auto type declarations, exceptions, move semantics, lambda expressions, and much moreWho This Book Is ForProgrammers new to C++ and those who may be looking for a refresh primer on C++ in general.
This project-oriented book gives you a hands-on approach to designing, developing, and templating your Snowflake platform delivery. Written by seasoned Snowflake practitioners, the book is full of practical guidance and advice to accelerate and mature your Snowflake journey. Working through the examples helps you develop the skill, knowledge, and expertise to expand your organization's core Snowflake capability and prepare for later incorporation of additional Snowflake features as they become available. Your Snowflake platform will be resilient, fit for purpose, extensible, and guarantee rapid, consistent, and repeatable, pattern-based deployments ready for application delivery.When a Snowflake account is delivered there are no controls, guard rails, external monitoring, nor governance mechanisms baked in. From a large organization perspective, this book explains how to deliver your core Snowflake platform in the form of a Landing Zone, a consistent, templated approach that assumes familiarity with Snowflake core concepts and principles. The book also covers Snowflake from a governance perspective and addresses the "who can see what?" question, satisfying requirements to know for certain that your Snowflake accounts properly adhere to your organization's data usage policies.The book provides a proven pathway to success by equipping you with skill, knowledge, and expertise to accelerate Snowflake adoption within your organization. The patterns delivered within this book are used for production deployment, and are proven in real-world use. Examples in the book help you succeed in an environment in which governance policies, processes, and procedures oversee and control every aspect of your Snowflake platform development and delivery life cycle. Your environment may not be so exacting, but you'll still benefit from the rigorous and demanding perspective this book's authors bring to the table. The book showsyou how to leverage what you already know and adds what you don't know, all applied to deliver your Snowflake accounts. You will know how to position your organization to deliver consistent Snowflake accounts that are prepared and ready for immediate application development.What You Will LearnCreate a common, consistent deployment framework for Snowflake in your organizationEnable rapid up-skill and adoption of Snowflake, leveraging the benefits of cloud platformsDevelop a deep understanding of Snowflake administration and configurationImplement consistent, approved design patterns that reduce account provisioning timesManage data consumption by monitoring and controlling access to datasets
Understand the role that Dataverse plays in the low-code revolution that helps businesses gain advantage from being more agile with technology. This book shows you how to use Dataverse to solve business problems by describing the layers of a solution in the Power Platform and the options that exist at each layer so you can make informed decisions as you develop your solutions. The book shows how Dataverse is a central piece of the Microsoft Power Platform and helps tech-savvy professionals move nimbly and seize the day when opportunities present themselves. The book starts out by covering the platform in terms of its layers so you can orient yourself with the features that exist at each level and what that means to you as a developer. You will learn how to work inside the data layer to design tables to store data and relationships and manage how it all works together. You will learn how to apply business logic and validation in the business layerto ensure data integrity and enforce process compliance. You will learn how to design interfaces in the presentation layer to allow users to interact with your data and processes in user-friendly applications. And you will learn how to utilize third-party integration tools to create seamless connections between your solution and legacy systems so you can develop enterprise-grade tools in record time.What You Will LearnUnderstand the layers of Dataverse and the features at each layerCreate tables and relationships to store data and manage interactionsBuild applications to allow users to interact with your data using logical interfacesDesign business logic and workflows to ensure data integrity and automationConfigure security to control access to data and prevent unauthorized accessExplore the options for integration with third-party systems Who This Book Is ForMicrosoft Power Platform users who want to learn how to access the power of the Power Platform and leverage Dataverse to build powerful, robust, and resilient tools; power users and citizen developers who are looking for tools to quickly build scalable business solutions that don¿t require a strong developer background; pro developers who want to learn how to utilize use the Power Platform to speed up the development cycle and deliver value to customers faster than ever before
Go beyond the basics and build complete applications using the Rust programming language. The applications in this book include a high-performance web client, a microcontroller (for a robot, for example), a game, an app that runs on Android, and an application that incorporates AI and machine learning. Each chapter will be organized in the following format: what this kind of application looks like; requirements and user stories of our example program; an introduction to the Rust libraries used; the actual implementation of the example program, including common pitfalls and their solutions; and a brief comparison of libraries for building each application, if there is no clear winner.Practical Rust Projects will open your eyes to the world of practical applications of Rust. After reading the book, you will be able to apply your Rust knowledge to build your own projects. What You Will Learn Write Rust code that runs on microcontrollers Build a 2D game Create Rust-based mobile Android applications Use Rust to build AI and machine learning applications Who This Book Is ForSomeone with basic Rust knowledge, wishing to learn more about how to apply Rust in a real-world scenario.
Investing in engineering documentation (Docs) means investing in community user experience. This book teaches readers how mastering the docs-as-code ecosystem empowers communities to understand better their favorite products and Open-Source (OSS) technologies better.Author Alejandra Quetzalli believes that ¿docs-as-ecosystem¿ represents a more comprehensive and collaborative approach to documentation development than ¿docsas- code¿ because it recognizes that documentation is more than just code. Docs involve technical writing, design, community feedback, community management, accessibility, SEO, UX, and today¿ even Artificial Intelligence tools! The word ecosystem promotes a paradigm where we treat documentation as a complex and dynamic system that must be managed and nurtured.In this book, yoüll acquire practical skills such as creating public style guides, incorporating responsive and accessible design, designing user flows and information architecture, retrieving user feedback, and setting up Docs analytics. Yoüll learn to identify the difference in work processes between maintaining Docs for a product versus an OSS technology. Yoüll discover the secrets to managing technical writers and OSS contributions, all while building a thriving Docs community. To end on a futuristic note, yoüll discover why technical writers who harness Artificial Intelligence (AI) tools (i.e., ChatGPT) need not fear a robot uprising anytime soon. What You'll LearnExamine accessibility and the user experienceUnderstand Information architecture Review docs-as-ecosystem processes Manage technical writersOversee OSS Docs contributions Retrieve and integrate user feedback Build Docs and Education communities Who This Book is ForDevelopers of all levels, VPs of Product/Engineering, Product Managers, and Designers,
Uncover the fascinating history of virtual communities and how we connect to each other online. The Rise of Virtual Communities, explores the earliest online community platforms, mapping the technological evolutions, and the individuals, that have shaped the culture of the internet.Read in-depth interviews with the visionary founders of iconic online platforms, and uncover the history of virtual communities and how the industry has developed over time. Featuring never-before told stories, this exploration introduces new ideas and predictions for the future, explaining how we got here and challenging what we think we may know about building online communities.Readers will: Learn what a virtual community is and how it has become an integral part of modern society Review key insights into building virtual communities and platforms from the founders and pioneers who created them See what thecurrent developments and the potential challenges are related to the future of virtual communitiesWho is this for:Community managers, company founders and those who want to know more about the origins and future of virtual communities.interviews Include:Randy Farmer & Chip Morningstar ¿ Lucasfilm Games ¿Habitat¿ and creators of the modern AvatarHoward Rheingold - Community expert and member of the WELLStacy Horn - Founder of Echo NYCJim Bumgardner - Founder of The PalacePhilip Rosedale - Founder of Second LifeSampo Karjalainen - Co-founder of Habbo HotelLance Priebe - Co-Founder of Club Penguin Angelo Sotira - Co-Founder of Deviant Art Caterina Fake - Co-Founder of FlickrAlexis Ohanian- Founder of Reddit Kevin Rose ¿ Co-Founder of Digg & PROOF CollectiveJason Citron - Founder of Discord Trevor McFedries - Founder of FWB & Brud Cherie Hu - Founder of Water & MusicMichelle Kennedy - Founder of Peanut
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid.A plethora of cybersecurity management resources are available-many with sound advice, management approaches, and technical solutions-but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy foundational cyber risk management approach applicable to your entire organization.The book provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and helps practitioners pull cyber from a "e;technical"e; problem to a "e;business risk management"e; problem, equipping you with a simple approach to understand, manage, and measure cyber risk for your enterprise. What You Will LearnEducate the executives/board on what you are doing to reduce riskCommunicate the value of cybersecurity programs and investments through insightful risk-informative metricsKnow your key performance indicators (KPIs), key risk indicators (KRIs), and/or objectives and key resultsPrioritize appropriate resources through identifying program-related gapsLay down the foundational components of a program based on real examples, including pitfalls to avoidWho This Book Is ForCISOs, CROs, CIOs, directors of risk management, and anyone struggling to pull together frameworks or basic metrics to quantify uncertainty and address risk
SparxSystems Enterprise Architect (EA) is a logical choice for many companies and organizations: it combines a broad feature set with an affordable price. However, the robust range of features makes starting to use this fantastic tool a bit intimidating. Enter Michael, a fictional consultant and experienced enterprise architect featured throughout the book to show you how to populate a model with elements and connectors, and how to create diagrams that speak to the audience: management, project managers, internal audit, business stakeholders and IT representatives. As the book progresses Michael's duties continue with more advanced topics including the use of workflow tools such as Kanban boards. You'll even see how to present directly from Enterprise Architect so that latest information can be shown straight from the source!The last days of Michael¿s mission are devoted to fine-tuning the enterprise architecture model with the help of tagged values. And to leave the model in the hands of the customer by creating a custom toolbox. What You'll Learn Setup EA and populate a model with elements, connectors and diagramsReview the Big Five of enterprise architect: Model, Packages, Diagrams, Elements, ConnectorsImplement evidence-based best practice strategies aligned with overall goalsWho This Book Is ForNon-technical users who use EA mainly to document entire landscapes.
Understand modern data fabric and data mesh concepts using AI-based self-service data discovery and delivery capabilities, a range of intelligent data integration styles, and automated unified data governance¿all designed to deliver "data as a product" within hybrid cloud landscapes.This book teaches you how to successfully deploy state-of-the-art data mesh solutions and gain a comprehensive overview on how a data fabric architecture uses artificial intelligence (AI) and machine learning (ML) for automated metadata management and self-service data discovery and consumption. You will learn how data fabric and data mesh relate to other concepts such as data DataOps, MLOps, AIDevOps, and more. Many examples are included to demonstrate how to modernize the consumption of data to enable a shopping-for-data (data as a product) experience.By the end of this book, you will understand the data fabric concept and architecture as it relates to themes such as automated unifieddata governance and compliance, enterprise information architecture, AI and hybrid cloud landscapes, and intelligent cataloging and metadata management. What You Will LearnDiscover best practices and methods to successfully implement a data fabric architecture and data mesh solutionUnderstand key data fabric capabilities, e.g., self-service data discovery, intelligent data integration techniques, intelligent cataloging and metadata management, and trustworthy AIRecognize the importance of data fabric to accelerate digital transformation and democratize data accessDive into important data fabric topics, addressing current data fabric challengesConceive data fabric and data mesh concepts holistically within an enterprise contextBecome acquainted with the business benefits of data fabric and data meshWho This Book Is ForAnyone who is interested in deploying modern data fabric architectures and data mesh solutions within an enterprise, including IT and business leaders, data governance and data office professionals, data stewards and engineers, data scientists, and information and data architects. Readers should have a basic understanding of enterprise information architecture.
Es lässt sich nicht leugnen, dass das 21. Jahrhundert datengesteuert ist, wobei viele digitale Branchen auf die sorgfältige Erfassung und Analyse großer Mengen von Informationen angewiesen sind. Ein Chief Data Officer (CDO) in einem Unternehmen ist der Leiter dieses Prozesses, was diese Position oft zu einer Herausforderung macht. Das Chief Data Officer Management Handbook soll hier Abhilfe schaffen.In diesem Buch gibt der Autor Martin Treder Ratschläge, wie CDOs besser auf ihren Verantwortungsbereich vorbereitet werden können, wie sie einen nachhaltigeren Ansatz entwickeln und wie sie die typischen Fallstricke vermeiden können. Basierend auf den positiven und negativen Erfahrungen aktueller CDOs hilft das Chief Data Officer Management Handbook dabei, die ideale Struktur eines Datenbüros zu entwerfen, sie zu implementieren und die richtigen Leute an Bord zu holen.Wichtige Themen wie die Datenversorgungskette, die Datenstrategie und die Data Governance werden vonTreder sorgfältig behandelt. Als CDO ist es wichtig, dass Sie Ihre Position mit Ihrem gesamten Team effektiv nutzen. Das Chief Data Officer Management Handbook ermöglicht es allen Mitarbeitern, die Verantwortung für die Zusammenarbeit im Bereich Daten zu übernehmen. Daten sind die Grundlage heutiger und zukünftiger technologischer Innovationen, und Sie könnten die Führungspersönlichkeit sein, die die nächste große Veränderung bewirkt.Was Sie lernen werden:Wichtige Elemente eines effektiven Datenmanagements anwendenSie erhalten einen umfassenden Überblick über alle Datenbereiche (die oft unabhängig voneinander verwaltet werden) Arbeiten Sie mit der Datenversorgungskette, von der Datenerfassung bis zur Datennutzung, einer Überprüfung aller relevanten Interessengruppen, der Datenstrategie und der DatenverwaltungFür wen ist dieses Buch gedacht?CDOs, Datenverantwortliche, Datenberater und alle Fachleute, die verstehenwollen, wie ein Datenbüro in einer Organisation funktioniert.
This book introduces a Responsible AI framework and guides you through processes to apply at each stage of the machine learning (ML) life cycle, from problem definition to deployment, to reduce and mitigate the risks and harms found in artificial intelligence (AI) technologies. AI offers the ability to solve many problems today if implemented correctly and responsibly. This book helps you avoid negative impacts ¿ that in some cases have caused loss of life ¿ and develop models that are fair, transparent, safe, secure, and robust.The approach in this book raises your awareness of the missteps that can lead to negative outcomes in AI technologies and provides a Responsible AI framework to deliver responsible and ethical results in ML. It begins with an examination of the foundational elements of responsibility, principles, and data. Next comes guidance on implementation addressing issues such as fairness, transparency, safety, privacy, and robustness. The book helps you think responsibly while building AI and ML models and guides you through practical steps aimed at delivering responsible ML models, datasets, and products for your end users and customers. What You Will LearnBuild AI/ML models using Responsible AI frameworks and processesDocument information on your datasets and improve data qualityMeasure fairness metrics in ML modelsIdentify harms and risks per task and run safety evaluations on ML modelsCreate transparent AI/ML modelsDevelop Responsible AI principles and organizational guidelinesWho This Book Is ForAI and ML practitioners looking for guidance on building models that are fair, transparent, and ethical; those seeking awareness of the missteps that can lead to unintentional bias and harm from their AI algorithms; policy makers planning to craft laws, policies, and regulations that promote fairness and equity in automated algorithms
Gain a thorough understanding of DevOps concepts and learn to deploy AWS DevOps services in an organization. This book covers AWS DevOps deployment and building applications and services for enhanced performance.A Complete Guide to DevOps with AWS will show you how to use AWS DevOps to launch and scale services using AWS tools. It demonstrates how to handle infrastructure as code such as AWS CodeCommit, AWS CodeBuild, and AWS CodeArtifact, and how to adapt your software with familiar tools such as terraform and cloud formation. This practice also helps in the continuous integration and deployment of pipelines such as AWS CodeDeploy and AWS CodePipeline with different deployment strategies. You will also learn how to find bugs quicker, enhance software quality, reduce your time to market, and how to build, test, and prepare for a release with frequent code changes. You will also see how to scale your applications to provide maximum performance for users with high traffic. The book also covers monitoring and logging applications, giving an overall picture of the ecosystem of product development. It also explains Kubernetes in depth with AWS EKS. It concludes by walking you through how to build projects with AWS DevOps tools and technologies. After completing this book, you will have gained a solid understanding of the concepts of AWS DevOps through examples, including building projects with integration of software tools. What You Will LearnAutomate processes with AWS toolsUnderstand AWS Services for Continuous deployment, and how to use themUse infrastructure as code with AWS in different formatsIntegrate AWS security into DevOpsWho This Book Is ForDevOps professionals and cloud engineers.
Improve your odds of passing one of the most highly sought-after exams for developers working with Microsoft¿s cloud platform: Exam AZ-204: Developing Solutions for Microsoft Azure. This book guides you through practical examples of each of the technologies covered by the exam while exposing you to the settings and interactions between platform solutions that you will need to be in command of to prepare for the exam and to use on your job in Azure development.Chapters in this book correspond directly to the exam skills outline and are delivered in a ¿from-the-ground-up¿ approach, allowing you to build your knowledge as you go. This approach serves to help even novice developers get up to speed quickly, while allowing more experienced developers to find the exact topics and scenarios they need to hone their skill sets as they both prepare for the exam and reference information for real-world solutions.As you work through each chapter, you will get an introduction to the topic of the chapter followed by a comprehensive discovery of the key elements of the Azure service(s) being covered. Yoüll be guided through solutions by studying typical, real-world scenarios. Each chapter concludes with review questions to solidify your learning and includes links to the corresponding Microsoft Learn modules that are relevant to the concepts in the chapter and associated with each section of the AZ-204 exam.What You Will LearnKnow the essential platform services of AzureDevelop and deploy secure and robust web solutionsArchitect and create serverless solutionsManage containers in the Azure Containers ecosystemChoose the correct messaging and event-handling tools for your applicationsMaster real-world examples and challenges that help prepare you for the AZ-204 examWho This Book Is ForDevelopers planning to take the AZ-204 exam, and developers who want to learn more about development on the most common Azure platform services
This book will teach you how to build complex Spring applications and microservices out of the box, with minimal concern over things like configurations. Pro Spring Boot 3 will show you how to fully leverage Spring Boot 3's robust features and how to apply them to create enterprise-ready applications, microservices, and web/cloud applications that just work. Special focus is given to what's been added in the new Spring Boot 3 release, including support for Java 17 and 19; changes to Spring Security; Spring Boot Actuator with Micrometer updates; GraalVM support; RSocket service interfaces; many dependency upgrades; more flexible support for Spring Data JDBC, the new AOT (Ahead-of-Time Transformation); and much more.This book is your authoritative, pragmatic guide for increasing your enterprise Java and cloud application productivity while decreasing development time. It's a no-nonsense reference packed with casestudies that increase in complexity over the course of the book. The author, a senior solutions architect and Principal Technical instructor with VMware, the company behind the Spring Framework, shares his experience, insights, and firsthand knowledge about how Spring Boot technology works and best practices for getting the most out of it.This is an essential book for your Spring learning and reference library.What You Will LearnBuild web/cloud, microservices, and enterprise applications with the Spring Boot 3 frameworkPersist data with JDBC, JPA, and NoSQL databasesMessage with JMS, RabbitMQ, WebSockets, and RSocketGain a review of Spring Cloud projectsExtend Spring Boot by creating your own Spring Boot Starter and @Enable featureTest and deploy with Spring Boot with best practicesUnderstand the new AOT (Ahead-Of-Time Transformations) and the GraalVM support to go nativeUse the latest version of Spring SecurityWho This Book Is ForExperienced Spring and Java developers seeking increased productivity gains and decreased complexity and development time in their applications and software services.
This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor¿known as a Qualified Security Assessor (QSA)¿needs to know. This book is the first reference to detail the specific documentation needed for every PCI requirement. The authors provide real-world examples of complying with the 12 main PCI requirements and clarify many of the gray areas within the PCI DSS.Any merchant or service provider that stores, processes, or transmits credit card data must comply with the PCI Data Security Standard. PCI DSS 1.0 was first published in 2004, yet many of those tasked with PCI compliance still encounter difficulties when trying to make sense of it. PCI DSS version 4 was published in March 2022, and at 360 pages, it has numerous additional requirements, leaving many people struggling to know what they need to do to comply.PCI DSS v4.0 has a transition period in which PCI DSS version 3.2.1 will remain active for two years from the v4.0 publication date. Although the transition period ends on March 31, 2024, and may seem far away, those tasked with PCI compliance will need every bit of the time to acquaint themselves with the many news updates, templates, forms, and more, that PCI v4.0 brings to their world.What Yoüll LearnKnow what it takes to be PCI compliantUnderstand and implement what is in the PCI DSSGet rid of cardholder dataEverything you need to know about segmenting your cardholder data networkKnow what documentation is needed for your PCI compliance effortsLeverage real-world experience to assist PCI compliance workWho This Book Is For Compliance managers and those tasked with PCI compliance, information security managers, internal auditors, chief security officers, chief technology officers, and chief information officers. Readers should have a basic understanding of how credit card payment networks operate, in addition to basic security concepts.
Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest.Next, you'll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial ¿click¿ through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level.In the final part of the book, you'll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation.After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool.What You Will LearnUse Wireshark to identify intrusions into a networkExercise methods to uncover network data even when it is in encrypted formAnalyze malware Command and Control (C2) communications and identify IOCsExtract data in a forensically sound manner to support investigationsLeverage capture file statistics to reconstruct network eventsWho This Book Is ForNetwork analysts, Wireshark analysts, and digital forensic analysts.
Navigate through the Kubernetes landscape to create and deploy container-based applications. This book will show you how to choose between the various available container-based operating systems, and how to design a better continuous integration pipeline for your container images, where to store them, and how to scan and secure them. In the first half of the book, you'll learn the practical tips on how to setup the system for visibility and troubleshooting, how to reduce the attack vector and reduce risks. The second half of the book focuses on Kubernetes, the popular container orchestration system. You'll see how to setup your Kubernetes for practical applications such as show/chargeback using tagging, efficient use of namespaces and pods, various isolation layers. It also shows you how to integrate with popular implementations of K8S such as AWS EKS (Elastic Container Service), GCP Google Kubernetes Engine (GKE) in touch points such as authentication and authorization, optimization, logging and troubleshooting tools, etc.By practicing the scenarios given in this book, you will be able to make better design choices that are appropriate for the constraints you are working with. Deploy Container Applications Using Kubernetes is your go-to resource for an optimal deployment of workloads using containers and Kubernetes in both public and private cloud settings. What You'll LearnUnderstand the various design choices, their pros and consBuild a better CI/CD pipeline for your containers and KubernetesDeploy your first container application in a public cloud K8S engineImprove your existing K8S deployment for efficiency and eleganceWho This Book Is ForIT Platform Architects, System Engineers/, and System Administrators
Learn the C++ programming language in a structured, straightforward, and friendly manner. This book teaches the basics of the modern C++ programming language, the C++ Standard Library, and modern C++ standards, including C++23. No previous programming experience is required. C++ is a language like no other, surprising in its complexity, yet wonderfully sleek and elegant in so many ways. It is also a language that cannot be learned by guessing, one that is easy to get wrong and challenging to get right. To overcome this, each section is filled with real-world examples that gradually increase in complexity. Modern C++ for Absolute Beginners, Second Edition teaches more than just programming in C++23. It provides a solid C++ foundation to build upon. The author takes you through the C++ programming language, the Standard Library, and C++11 to C++23 standard basics. Each chapter is accompanied by the right amount oftheory and plenty of source code examples. You will work with C++23 features and standards, yet you will also compare and take a look into previous versions of C++. After reading this book, you'll be able to start programming in modern C++ standards. You will do so with plenty of relevant source code examples, freely available via a dedicated GitHub repository. What You Will LearnGet Introduced to modern C++ in a friendly but effective wayWork with the basics of C++: types, operators, variables, constants, expressions, references, functions, classes, I/O, smart pointers, polymorphism, and moreSet up the Visual Studio environment on Windows and GCC on Linux, where you can write your own codeDeclare and define functions, classes, and objects, and organize code into namespacesDiscover object-oriented programming: classes and objects, encapsulation, inheritance, polymorphism, and more using the most advanced C++ featuresEmploy best practices in organizing source code and controlling program workflowGet familiar with C++ language do's and don'ts, and moreManage the basics of lambdas, inheritance, polymorphism, smart pointers, templates, modules, contracts, concepts, and moreWho This Book Is For Beginner or novice programmers who wish to learn C++ programming. No prior programming experience is required.
Beginning Photo Retouching & Restoration Using GIMP teaches the reader how to achieve professional results using this high end image editor. You'll learn how to do everything from making dull images "e;pop"e; to resurrecting badly damaged photographs deemed beyond any hope of rescue. There's no need to shell out good money month after month for the "e;big name"e; software package. GIMP 2.8 is a world-class image editor that wields almost as much power, and is completely free!Learning the art of photo retouching and restoration is fun and rewarding. Reclaim those treasured images from the ravages of time and neglect, and pass them on to future generations. Beginning Photo Retouching & Restoration Using GIMP will provide you with a wide array of editing exercises to help you develop a high degree of proficiency. Whether you are the designated "e;family archivist"e; wanting to preserve your family history, or a professional photographer with a desire to add an extra revenue generating service, this book will be an invaluable aid. • Shows how to acquire the best scans and digitize large photographs.• Teaches you how to digitally repair damaged prints, correct color shifts, reclaim lost detail-even colorize black and white images.• Offers great tips on how to maintain and preserve your newly printed restored photographs, and how to properly store originals.
Master the intricacies of Snowflake and prepare for the SnowPro Advanced Architect Certification exam with this comprehensive study companion. This book provides robust and effective study tools to help you prepare for the exam and is also designed for those who are interested in learning the advanced features of Snowflake. The practical examples and in-depth background on theory in this book help you unleash the power of Snowflake in building a high-performance system. The best practices demonstrated in the book help you use Snowflake more powerfully and effectively as a data warehousing and analytics platform.Reading this book and reviewing the concepts will help you gain the knowledge you need to take the exam. The book guides you through a study of the different domains covered on the exam: Accounts and Security, Snowflake Architecture, Data Engineering, and Performance Optimization. Yoüll also be well positioned to apply your newly acquired practical skills to real-world Snowflake solutions. You will have a deep understanding of Snowflake to help you take full advantage of Snowflake¿s architecture to deliver value analytics insight to your business.What You Will LearnGain the knowledge you need to prepare for the examReview in-depth theory on Snowflake to help you build high-performance systemsBroaden your skills as a data warehouse designer to cover the Snowflake ecosystemOptimize performance and costs associated with your use of the Snowflake data platformShare data securely both inside your organization and with external partnersApply your practical skills to real-world Snowflake solutionsWho This Book Is ForAnyone who is planning to take the SnowPro Advanced Architect Certification exam, those who want to move beyond traditional database technologies and build their skills to design and architect solutions using Snowflake services, and veteran database professionals seeking an on-the-job reference to understand one of the newest and fastest-growing technologies in data
Dependent types are a concept that allows developers to write proof-carrying code. Idris is a programming language that supports dependent types. This book will teach you the mathematical foundations of Idris as well as how to use it to write software and mathematically prove properties.The first part of the book serves as an introduction to the language's underlying theories. It starts by reviewing formal systems and mathematical logical systems as foundational building blocks, then gradually builds up to dependent types. Next, you'll learn type theory for dependent types. Following this, you'll explore the Idris programming language and conclude by exploring the depths of formal systems and type checkers by implementing them.Introduction to Dependent Types with Idris will walk you through simple examples through more advanced techniques, stepping up the difficulty as you gain more knowledge. Every chapter includes a set of exercises based on what it covered to further cement your learning. No specialized knowledge of mathematics is expected beyond the basics, so it is perfect for novices.What You Will Learn Understand Lambda calculus and dependent types Gain insight into functional programmingWrite mathematical proofs with IdrisWho This Book Is ForProgrammers, mathematicians, academics, and anyone else interested learning dependent types and lambda calculus.
Written as an illustrated, step-by-step guide for beginners, this book will introduce you to HTML and CSS with lab exercises and examples of code. You'll begin by setting up the development environment such as local web server and html editor. The next few chapters cover web servers, the basics of HTML such as language syntax, tags, and how to write a program. Next, you'll learn how to put together simple web pages demonstrating how the code works and how to use various HTML tags and CSS to style the pages. Finally, the use of CMS to build websites such as Drupal and WordPress and how HTML and CSS fits in. At the end there are reference libraries for both HTML tags and CSS.The Absolute Beginners Guide to HTML and CSS provides you with the tools, confidence, and inspiration to start building web pages and websites. If you are a programmer, developer or a student, or just someone who wants to learn on their own, this book is for you.What You'll LearnUnderstand basic computer programming conceptsSee how to use HTML and CSS to build web pagesApply the syntax of HTML and CSSSee how HTML and CSS fits into CMS systems such as Drupal and WordPressWho This Book Is For Software programmers, developers, students, and anyone who wants a quick reference for HTML and CSS
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.