Mostrando 86,721 - 86,740 Resultados de 87,289 Para Buscar 'W1AW~', tiempo de consulta: 1.43s Limitar resultados
  1. 86721
    Publicado 2023
    Tabla de Contenidos: “…Creating comprehensive web and mobile dashboards -- What next? -- Summary -- Chapter 6: Project #3 - a Remote Asset Tracking Application with LoRaWAN -- Technical requirements -- Understanding LoRaWAN and its IoT applications -- Usage in IoT -- LoRaWAN versus other communication technologies -- Components of a LoRaWAN IoT application -- Essential hardware - sensors and development boards -- Designing the project architecture -- Schematics design and assembly -- Testing GPS module data -- Setting up the Thing, device association, cloud variables, and code -- Cloud variables -- Associating a device -- Network -- Coding -- Configuring the The Things Network Indoor Gateway -- Creating web and mobile dashboards -- What next? …”
    Libro electrónico
  2. 86722
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1 - Understanding the Basics of XR and Unity -- Chapter 1: Introduction to XR and Unity -- Understanding XR and its different forms (VR, AR, and MR) -- What is the difference between AR and MR? -- How did AR, VR, MR, and XR evolve? …”
    Libro electrónico
  3. 86723
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Key Concepts of Containers -- Chapter 1: Modern Infrastructure and Applications with Docker -- Technical requirements -- From monoliths to distributed microservice architectures -- Exploring monolithic applications -- Virtual machines -- Three-tier architecture -- Microservices architecture -- Developing distributed applications -- What are containers? -- Understanding the main concepts of containers -- Understanding dynamism in container-based applications -- Tools for managing containers -- Comparing virtualization and containers -- Building, sharing, and running containers -- Explaining Windows containers -- Improving security using software containers -- Labs -- Installing Docker Desktop -- Summary -- Chapter 2: Building Docker Images -- Technical requirements -- Understanding how copy-on-write filesystems work -- Creating container images -- Using Dockerfiles to create container images -- Creating container images interactively -- Creating images from scratch -- Understanding common Dockerfile keys -- FROM -- ARG -- WORKDIR -- COPY and ADD -- RUN -- USER -- ENTRYPOINT -- EXPOSE -- HEALTHCHECK -- VOLUME -- The command line for creating images -- Actions for creating images -- Managing container images -- Actions for sharing images -- Advanced image creation techniques -- Best practices for container image creation -- Labs -- Caching layers -- Executing a multi-stage build process -- Building images for different architectures -- Summary -- Chapter 3: Sharing Docker Images -- Technical requirements -- Container image registries and repositories -- What is a registry? …”
    Libro electrónico
  4. 86724
    Publicado 2024
    Tabla de Contenidos: “…-- The architecture and principles of Nuxt -- Built on top of Vue -- Universal rendering and static site generation -- Performance optimizations -- Installing and setting up the Nuxt 3 environment -- Prerequisites -- Creating your first "Hello Nuxt" app -- Initialization - the steps to create a new Nuxt project -- The default project structure -- Recommended extensions -- Vue - Official -- Nuxtr -- Summary -- Practice questions -- Further reading -- Chapter 2: Building a Simple Portfolio Using Tailwind CSS and a Dive into Nuxt 3's Project Structure -- Technical requirements -- Essential background - what is Tailwind CSS? -- Setting up and integrating with Tailwind CSS -- Create a new project -- Installing Tailwind CSS -- Creating the website layout and customizing the font -- Embedding the Lato font (or any Google font) -- Creating the layout -- Managing images in the assets folder -- Creating the ProjectShowcase and SkillChip components -- Creating the SkillChip component -- Creating the ProjectShowcase component -- Styling within the component itself -- Creating a useScrollTo composable -- Summary -- Practice questions -- Further reading -- Chapter 3: Building a Real Estate Listing Project to Grasp Routing, Views, Layouts, and Plugins -- Technical requirements -- Essential background- understanding Nuxt 3 routing, layouts, and plugins -- Setting up your real estate listing project in Nuxt 3 -- Defining a default layout for the website and overriding it with a 404 page -- Defining a default layout -- Creating the BaseHeader component…”
    Libro electrónico
  5. 86725
    Publicado 2024
    Tabla de Contenidos: “…Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Core Cloud Concepts -- Making the Most Out of This Book - Your Certification and Beyond -- What Is Cloud Computing? -- Essential Cloud Computing Characteristics -- Cloud Stakeholders -- ISO/IEC 17789 CCRA Roles and Sub-Roles -- Cloud Service Customer -- CSP -- Cloud Service Partner -- Cloud Auditor -- NIST Cloud Computing Key Actors -- Cloud Consumer -- Cloud Provider -- Cloud Broker -- Cloud Auditor (CA) -- Cloud Carrier (CC) -- Key Cloud Computing Technologies and Building Blocks -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 2: Cloud Reference Architecture -- Cloud Service Models -- Software as a Service (SaaS) -- Platform as a Service (PaaS) -- Infrastructure as a Service (IaaS) -- Cloud Service Models and Categories -- Cloud Deployment Models -- Shared Responsibility Model -- Shared Considerations for Cloud Deployments -- Emerging Technologies in Cloud Computing -- Data Science -- Artificial Intelligence and Machine Learning (AI/ML) -- Blockchain -- Internet of Things (IoT) -- Containers -- Quantum Computing -- Quantum as a Service (QaaS) -- Quantum-Enhanced Optimization and ML -- Quantum Simulation and Modeling -- Quantum Cloud-Based Software Development -- Edge Computing -- Confidential Computing -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 3: Top Threats and Essential Cloud Security Concepts and Controls -- The CIA Triad-Confidentiality, Integrity, and Availability -- Common Threats to Cloud Deployments -- Data Breaches -- Misconfiguration -- Insecure APIs -- Insider Threats -- Account Hijacking -- Security Control Categories and Types -- Security Control Categories/Classes -- Security Control Types and Functionality -- Summary -- Exam Readiness Drill - Chapter Review Questions…”
    Libro electrónico
  6. 86726
    Publicado 2024
    “…Then, you will move on to edge applications such as edge predictive AI and federated computing. We wrap up by investigating the security and vulnerability envelope of edge systems. …”
    Libro electrónico
  7. 86727
    Publicado 2024
    “…By the end of this book, you'll be a Keap Pro/Max wiz, ready to dominate your niche and scale your business using the power of automation to supercharge your marketing efforts and achieve workflow mastery. What you will learn Set up and configure branding, profiles, tagging, products, and payment processing Create amazing customer experiences by automating tasks, messaging, and data collection Master techniques to use Keap for automating internal administrative functions Make better business and product development decisions by mastering reporting functionality Save time and track user productivity Keep leads moving through your pipeline to improve conversion rates Streamline accounting and loss recovery with automation Who this book is for This book is a valuable resource for entrepreneurs, small business owners, and marketing professionals who are eager to streamline their operations. …”
    Libro electrónico
  8. 86728
    por Verham, Dominiek
    Publicado 2024
    Tabla de Contenidos: “…-- Using Windows 365 as a privileged access workstation -- Why is Windows 365 a good solution as a PAW? -- How Windows 365 Boot helps to secure an endpoint -- Why is using Windows 365 Boot a good way to secure a local desktop? …”
    Libro electrónico
  9. 86729
    Publicado 2024
    “…By the end of this book, you'll have a clear and practical understanding of how this powerful suite of tools can be implemented in real-world scenarios. What you will learn Set up and configure a fully functional miniature security operations center Explore and implement the government-created Malcolm suite of tools Understand traffic and log analysis using Arkime and CyberChef Compare and contrast intrusion detection and prevention systems Explore incident response methods through Cortex, TheHive, and threat intelligence feed integration Leverage purple team techniques for social engineering and exploit development Who this book is for This book is for entry-level cybersecurity professionals eager to explore a functional defensive environment. …”
    Libro electrónico
  10. 86730
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Modernizing Rob the Builder's Business with Power Pages -- Empowering Rob the Builder's transformation -- Brenda's revelation -- Lost opportunities and health and safety compliance -- Brenda's niece, Sarah, enters the scene -- Power Pages - a vision unveiled -- Power Pages - a paradigm shift -- Use case - establishing and utilizing a comprehensive information system with Power Pages -- Understanding Power Pages' role -- Power Platform's no-code/low-code magic -- Bridging technology gaps with Power Pages -- Setting the stage - tenancy and Power Pages -- Laying the foundation - what is a tenancy? -- Establishing a tenancy for Rob the Builder -- Step 1 - Registering for Microsoft 365 and setting up a new tenant -- Step 2 - Creating new environments -- Step 3 - Power Pages setup -- Step 4 - Power Pages studio -- Navigating the developer's landscape -- Exploring the Power Platform -- Tools for Power Pages development -- Configuring the environment for seamless collaboration -- Summary -- Chapter 2: Power Pages Design Studio -- Planning the website structure -- User story - crafting a modern website for Rob the Builder -- Acceptance criteria -- Tasks -- Template selection and website vision -- Developing the new website -- Building the home page -- Building the website pages -- Content management and organization in the Power Pages design studio -- Defining the website's hierarchy -- Developing websites and deploying them to production -- Setting the website to public -- Summary -- Chapter 3: Power Pages Studio - Styling and Themes -- Introduction to CSS -- Modifiable styles in Power Pages Studio -- Accessing CSS features in Power Pages Studio -- Accessing the CSS code -- Implementing basic CSS customizations -- Create a custom CSS file…”
    Libro electrónico
  11. 86731
    Publicado 2024
    Tabla de Contenidos: “…Heading, weight, and balance -- Motion paths as a visual guide -- Tilting while turning -- Leaning into it -- Copying keyframes to another channel -- Copying keyframes -- Keying a single property -- Pasting keyframes -- Scaling keyframe values -- Summary -- Questions -- Chapter 4: Looking into Object Relationships -- Technical requirements -- Understanding object origins -- The truth about objects and origins -- Centering the origin -- Grabbing the origin -- Parenting objects -- The parent/child relationship -- Understanding constraints -- Adding a constraint -- World space versus local space -- Copying constraints -- Following a path -- Editing the animation path -- Adding a Follow Path constraint -- Animating the path -- Drivers -- Adding a driver -- Editing a driver -- Driver F-curves -- The final chart of object relationships -- Summary -- Questions -- Chapter 5: Rendering an Animation -- Technical requirements -- Setting up the camera -- Adding a camera to the scene -- Camera view-finding -- The animated camera -- Rendering basics -- What is rendering, really? -- Controls for rendering -- Setting up our scene for rendering -- Predicting and managing render performance -- Rendering an image sequence -- Why output an image sequence and not a video? …”
    Libro electrónico
  12. 86732
    Publicado 2024
    Tabla de Contenidos: “…Technical requirements -- Checking the deployed tools -- Building a batch pipeline -- Building the Airflow DAG -- Creating SparkApplication jobs -- Creating a Glue crawler -- Building a real-time pipeline -- Deploying Kafka Connect and Elasticsearch -- Real-time processing with Spark -- Deploying the Elasticsearch sink connector -- Summary -- Chapter 11: Generative AI on Kubernetes -- Technical requirements -- What generative AI is and what it is not -- The power of large neural networks -- Challenges and limitations -- Using Amazon Bedrock to work with foundational models -- Building a generative AI application on Kubernetes -- Deploying the Streamlit app -- Building RAG with Knowledge Bases for Amazon Bedrock -- Adjusting the code for RAG retrieval -- Building action models with agents -- Creating a DynamoDB table -- Configuring the agent -- Deploying the application on Kubernetes -- Summary -- Chapter 12: Where to Go from Here -- Important topics for big data in Kubernetes -- Kubernetes monitoring and application monitoring -- Building a service mesh -- Security considerations -- Automated scalability -- GitOps and CI/CD for Kubernetes -- Kubernetes cost control -- What about team skills? …”
    Libro electrónico
  13. 86733
    Publicado 2024
    Tabla de Contenidos: “…-- The challenge we face today with data -- The magnificent shine of data products -- Raw data deserves appreciation too -- Summary and key takeaways -- Takeaway #1 - need for a modern data estate -- Takeaway #2 - several sources of inspiration for data products -- Takeaway #3 - the naked truth of data assets -- Chapter 12: Data Value, Literacy, and Culture -- Introduction to three pivotal disciplines -- Data Economics -- Data Literacy -- Data Culture -- Unveiling the true worth of enterprise data -- Data Literacy has no end state…”
    Libro electrónico
  14. 86734
    Publicado 2024
    “…By the end of this book, you'll have gained the knowledge to write clean, efficient code that maximizes memory usage and boosts app performance. What you will learn Master memory allocation techniques to minimize resource wastage Differentiate between stack and heap memory, and use them efficiently Implement best practices for object lifetimes and garbage collection Understand .NET Core's memory management principles for optimal performance Identify and fix memory leaks to maintain application reliability Optimize memory usage in multithreaded and asynchronous applications Utilize memory profiling tools to pinpoint and resolve memory bottlenecks Apply advanced memory management techniques to enhance app scalability Who this book is for This book is for developers and professionals who are beyond the beginner stage and seek in-depth knowledge of memory management techniques within the context of .NET Core. …”
    Libro electrónico
  15. 86735
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Adversarial AI -- Chapter 1: Getting Started with AI -- Understanding AI and ML -- Types of ML and the ML life cycle -- Key algorithms in ML -- Neural networks and deep learning -- ML development tools -- Summary -- Further reading -- Chapter 2: Building Our Adversarial Playground -- Technical requirements -- Setting up your development environment -- Python installation -- Creating your virtual environment -- Installing packages -- Registering your virtual environment with Jupyter notebooks -- Verifying your installation -- Hands-on basic baseline ML -- Simple NNs -- Developing our target AI service with CNNs -- Setup and data collection -- Data exploration -- Data preprocessing -- Algorithm selection and building the model -- Model training -- Model evaluation -- Model deployment -- Inference service -- ML development at scale -- Google Colab -- AWS SageMaker -- Azure Machine Learning services -- Lambda Labs Cloud -- Summary -- Chapter 3: Security and Adversarial AI -- Technical requirements -- Security fundamentals -- Threat modeling -- Risks and mitigations -- DevSecOps -- Securing our adversarial playground -- Host security -- Network protection -- Authentication -- Data protection -- Access control -- Securing code and artifacts -- Secure code -- Securing dependencies with vulnerability scanning -- Secret scanning -- Securing Jupyter Notebooks -- Securing models from malicious code -- Integrating with DevSecOps and MLOps pipelines -- Bypassing security with adversarial AI -- Our first adversarial AI attack -- Traditional cybersecurity and adversarial AI -- Adversarial AI landscape -- Summary -- Part 2: Model Development Attacks -- Chapter 4: Poisoning Attacks -- Basics of poisoning attacks -- Definition and examples…”
    Libro electrónico
  16. 86736
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introducing Tools and Skills for .NET -- Introducing this book and its contents -- Companion books to complete your learning journey -- Audiences for this book -- Tools -- Skills -- Testing -- Design and career development -- Setting up your development environment -- Choosing the appropriate tool and application type for learning -- Using Visual Studio for general development -- Using Code for cross-platform development -- Using GitHub Codespaces for development in the cloud -- Using Rider for cross-platform development -- What I used -- Deploying cross-platform -- Downloading and installing Visual Studio -- Visual Studio keyboard shortcuts -- Visual Studio Enterprise edition tools -- Downloading and installing Code -- Installing other extensions -- Managing Code extensions at the command prompt -- Understanding Code versions -- Code keyboard shortcuts -- Downloading and installing Rider -- Other JetBrains tools -- Chrome AI tools -- Making good use of the GitHub repository for this book -- Raising issues with the book -- Giving me feedback -- Downloading solution code from the GitHub repository -- Where to go for help -- Reading documentation on Microsoft Learn -- Getting help for the dotnet tool -- LLMs like ChatGPT -- Getting better help from LLMs using prompt engineering -- AI usage by developers -- Getting help on Discord and other chat forums -- Setting up a database and projects for this book -- Using a sample relational database -- Setting up SQL Server and the Northwind database -- Creating the Northwind database for a local SQL Server -- Creating the Northwind database for SQL Edge in Docker -- Creating a class library for entity models using SQL Server -- Creating a class library for the data context using SQL Server…”
    Libro electrónico
  17. 86737
    Publicado 2024
    “…By the end of this book, you'll be well prepared to contribute to real-world projects on GitHub, equipped with the skills to thrive in the world of collaborative software development. What you will learn Travel back in code history and track different versions of your projects Keep your code blocks neat and tidy within your repository, just like sorting puzzle pieces to create a masterpiece Create branches to experiment with new ideas or features without messing up your main code Use Git to share your suggestions and collaborate with other coders to make your code even more amazing Automate and level up your coding game with GitHub Actions Build your coder reputation by contributing to open source projects Who this book is for This book is for young, tech-curious individuals eager to find out more about the world of software development. …”
    Libro electrónico
  18. 86738
    Publicado 2024
    “…By the end of this book, you'll have gained a profound understanding of the significance of multi-layered defense strategies, explored frameworks for building robust security programs, and developed the ability to navigate the evolving threat landscape with resilience and agility. What you will learn Understand the core tenets of Defense in Depth, its principles, and best practices Gain insights into evolving security threats and adapting defense strategies Master the art of crafting a layered security strategy Discover techniques for designing robust and resilient systems Apply Defense in Depth principles to cloud-based environments Understand the principles of Zero Trust security architecture Cultivate a security-conscious culture within organizations Get up to speed with the intricacies of Defense in Depth for regulatory compliance standards Who this book is for This book is for security engineers, security analysts, and security managers who are focused on secure design and Defense in Depth. …”
    Libro electrónico
  19. 86739
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and credits -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations of Conversational AI -- Chapter 1: An Introduction to Chatbots, Conversational AI, and ChatGPT -- What are chatbots and conversational AI? -- A brief history of conversational AI -- An overview of chatbots and automated assistants -- Evolution of chatbots and conversational AI -- Understanding conversational AI applications -- Customer service -- Language translation -- Education -- Healthcare -- Banking and insurance -- Retail -- Human resources -- Conversational AI as a training tool - the emergence of digital humans -- Conclusion -- What is OpenAI's ChatGPT? …”
    Libro electrónico
  20. 86740
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations of System Design -- Chapter 1: Basics of System Design -- What is system design? -- Software system -- Distributed software system -- Understanding system design -- What are the types of system design? …”
    Libro electrónico