Monetizing Machine Learning
Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book - Amazon, Microsoft, Google, and PythonAnywhere.
You will work through a series of common Python data science problems in an increasing order of complexity. The practical projects presented in this book are simple, clear, and can be used as templates to jump-start many other types of projects. You will learn to create a web application around numerical or categorical predictions, understand the analysis of text, create powerful and interactive presentations, serve restricted access to data, and leverage web plugins to accept credit card payments and donations. You will get your projects into the hands of the world in no time.
Each chapter follows three steps: modeling the right way, designing and developing a local web application, and deploying onto a popular and reliable serv ...
Beginning AI Bot Frameworks
Want to build your first AI bot but don't know where to start? This book provides a comprehensive look at all the major bot frameworks available. You'll learn the basics for each framework in one place and get a clear picture for which one is best for your needs.
Beginning AI Bot Frameworks starts with an overview of bot development and then looks at Google Wit.ai and APi.ai functions, IBM Watson, AWS bots with Lambda, FlockOS and TensorFlow. Additionally, it touches on Deep Learning and how bot frameworks can be extended to mixed reality with Hololens. By the end, you'll have mastered the different bot frameworks available and finally have the confidence to develop intelligent AI Chatbots of their own.
Review key structural points for building bots; Understand the basic requirements for building a bot in each framework; Integrate some of the frameworks; Compare the features of each framework. ...
Applied Deep Learning
Work with advanced topics in deep learning, such as optimization algorithms, hyper-parameter tuning, dropout, and error analysis as well as strategies to address typical problems encountered when training deep neural networks. You'll begin by studying the activation functions mostly with a single neuron (ReLu, sigmoid, and Swish), seeing how to perform linear and logistic regression using TensorFlow, and choosing the right cost function.
The next section talks about more complicated neural network architectures with several layers and neurons and explores the problem of random initialization of weights. An entire chapter is dedicated to a complete overview of neural network error analysis, giving examples of solving problems originating from variance, bias, overfitting, and datasets coming from different distributions.
Applied Deep Learning also discusses how to implement logistic regression completely from scratch without using any Python library except NumPy, to let you appre ...
Applied Natural Language Processing with Python
Learn to harness the power of AI for natural language processing, performing tasks such as spell check, text summarization, document classification, and natural language generation. Along the way, you will learn the skills to implement these methods in larger infrastructures to replace existing code or create new algorithms.
Applied Natural Language Processing with Python starts with reviewing the necessary machine learning concepts before moving onto discussing various NLP problems. After reading this book, you will have the skills to apply these concepts in your own professional environment.
Utilize various machine learning and natural language processing libraries such as TensorFlow, Keras, NLTK, and Gensim; Manipulate and preprocess raw text data in formats such as .txt and .pdf; Strengthen your skills in data science by learning both the theory and the application of various algorithms. ...
Complete Guide to Test Automation
Rely on this robust and thorough guide to build and maintain successful test automation. As the software industry shifts from traditional waterfall paradigms into more agile ones, test automation becomes a highly important tool that allows your development teams to deliver software at an ever-increasing pace without compromising quality.
Even though it may seem trivial to automate the repetitive tester's work, using test automation efficiently and properly is not trivial. Many test automation endeavors end up in the "graveyard" of software projects. There are many things that affect the value of test automation, and also its costs. This book aims to cover all of these aspects in great detail so you can make decisions to create the best test automation solution that will not only help your test automation project to succeed, but also allow the entire software project to thrive.
One of the most important details that affects the success of the test automation is how easy it is to m ...
Cybersecurity Incident Response
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.
Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.
The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing, Detection, Containment, Eradication, Post-incident actions.
Know the sub-categories of the NIST Cyber ...
Combine two typically separate sources of data - behavioral quantitative data and usability testing qualitative data - into a powerful single tool that helps improve your organization's website by increasing conversion and ROI. The combination of the what is happening data of website activity, coupled with the why it's happening data of usability testing, provides a complete 360-degree view into what is causing poor performance, where your website can be optimized, and how it can be improved.
There are plenty of books focusing on big data and using data analytics to improve websites, or on utilizing usability testing and UX research methods for improvement. This is the first book that combines both subjects into a methodology you can use over and over again to improve any website.
UX Optimization is ideal for anyone who wants to combine the power of quantitative data with the insights provided by qualitative data to improve website results. The book uses step-by-step instructions ...
Build a successful Yammer implementation, make your workplace social and collaborative, create a culture of sharing, form expert communities and generate innovative solutions. Besides, this book will help to enhance your collaboration your suppliers, partners, and clients.
The author starts by giving an introduction to social collaborations and successful implementations of Yammer. Along the way, he explains the art of community management in Yammer using his hands-on experience of building communities. He then explains methods to keep a Yammer network engaged followed by a description of running a campaign on Yammer.
The second part of Yammer begins with ways you can engage entire organizations, including executives, on Yammer along with methods to measure the success of a Yammer network. You'll see how to get to grips with integrating Yammer with an existing platform and how to collaborate with customers, suppliers, and partners using Yammer. Finally, you'll learn various inn ...
Introducing InnoDB Cluster
Set up, manage, and configure the new InnoDB Cluster feature in MySQL from Oracle. If you are growing your MySQL installation and want to explore making your servers highly available, this book provides what you need to know about high availability and the new tools that are available in MySQL 8.0.11 and later.
Introducing InnoDB Cluster teaches you about the building blocks that make up InnoDB Cluster such as MySQL Group Replication for storing data redundantly, MySQL Router for the routing of inbound connections, and MySQL Shell for simplified setup and configuration, status reporting, and even automatic failover. You will understand how it all works together to ensure that your data are available even when your primary database server goes down.
Features described in this book are available in the Community Edition of MySQL, beginning with the version 8.0.11 GA release, making this book relevant for any MySQL users in need of redundancy against failure. Tutorials in the book s ...
SQL Server 2017 Query Performance Tuning
Identify and fix causes of poor performance. You will learn Query Store, adaptive execution plans, and automated tuning on the Microsoft Azure SQL Database platform. Anyone responsible for writing or creating T-SQL queries will find valuable the insight into bottlenecks, including how to recognize them and eliminate them.
This book covers the latest in performance optimization features and techniques and is current with SQL Server 2017. If your queries are not running fast enough and you're tired of phone calls from frustrated users, then this book is the answer to your performance problems.
SQL Server 2017 Query Performance Tuning is about more than quick tips and fixes. You'll learn to be proactive in establishing performance baselines using tools such as Performance Monitor and Extended Events. You'll recognize bottlenecks and defuse them before the phone rings. You'll learn some quick solutions too, but emphasis is on designing for performance and getting it right. The goal ...
Firewalls Don't Stop Dragons
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself - step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats.
Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data - just like wearing a seat belt, installing smoke ala ...