In Trustworthy AI, award-winning executive Beena Ammanath offers a practical approach for enterprise leaders to manage business risk in a world where AI is everywhere by understanding the qualities of trustworthy AI and the essential considerations for its ethical use within the organization and in the marketplace. The author draws from her extensive experience across different industries and sectors in data, analytics and AI, the latest research and case studies, and the pressing questions and concerns business leaders have about the ethics of AI.
Filled with deep insights and actionable steps for enabling trust across the entire AI lifecycle, the book presents: In-depth investigations of the key characteristics of trustworthy AI, including transparency, fairness, reliability, privacy, safety, robustness, and more; A close look at the potential pitfalls, challenges, and stakeholder concerns that impact trust in AI application; Best practices, mechanisms, and governance considerati ...
Systems Analysis and Design, 8th Edition
Systems Analysis and Design, 8th Edition offers students a hands-on introduction to the core concepts of systems analysis and systems design. Following a project-based approach written to mimic real-world workflow, the text includes a multitude of cases and examples, in-depth explanations, and special features that highlight crucial concepts and emphasize the application of fundamental theory to real projects. ...
PHP & MySQL
Learn PHP, the programming language used to build sites like Facebook, Wikipedia and WordPress, then discover how these sites store information in a database (MySQL) and use the database to create the web pages.
This full-color book is packed with inspiring code examples, infographics and photography that not only teach you the PHP language and how to work with databases, but also show you how to build new applications from scratch. It demonstrates practical techniques that you will recognize from popular sites where visitors can: Register as a member and log in; Create articles, posts and profiles that are saved in a database; Upload their own images and files; Automatically receive email notifications; Like and comment on posts.
To show you how to apply the skills you learn, you will build a complete content management system, enhanced with features that are commonly seen on social networks.
Wireless Security Architecture
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.
Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage - including data published for the first time - of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies; Effective technical resources and r ...
Google announced the Go programming language to the public in 2009, with the version 1.0 release announced in 2012. Since its announcement to the community, and the compatibility promise of the 1.0 release, the Go language has been used to write scalable and high-impact software programs ranging from command-line applications and critical infrastructure tools to large-scale distributed systems. It's speed, simplicity, and reliability make it a perfect choice for developers working in various domains.
In Practical Go - Building Scalable Network + Non-Network Applications, you will learn to use the Go programming language to build robust, production-ready software applications. You will learn just enough to building command line tools and applications communicating over HTTP and gRPC.
This practical guide will cover: Writing command line applications; Writing a HTTP services and clients; Writing RPC services and clients using gRPC; Writing middleware for network clients and servers ...
With so many digital experiences touching our lives - and businesses - it's understandable to feel like you're drowning in data. There's a dashboard or chart for just about everything, but data alone can't help you understand and empathize with your customers. No amount of it will take you inside their heads, help you see the world through their eyes, or let you experience what it's really like to be your customer. Only human insight from real people can do that.
User Tested gives both individual contributors and executives an approachable, pragmatic playbook for stepping beyond standard business metrics and infusing real human insight into every business decision, design, and experience.
In this book, you'll: Learn how businesses became obsessed with data - but disconnected from their customers - and why that's not sustainable; Get the basics about how to capture human insight through user testing, including how to find the right people, ask the right questions, and make sense o ...
Principles of Superconducting Quantum Computers
In Principles of Superconducting Quantum Computers, a pair of distinguished researchers delivers a comprehensive and insightful discussion of the building of quantum computing hardware and systems. Bridging the gaps between computer science, physics, and electrical and computer engineering, the book focuses on the engineering topics of devices, circuits, control, and error correction.
Using data from actual quantum computers, the authors illustrate critical concepts from quantum computing. Questions and problems at the end of each chapter assist students with learning and retention, while the text offers descriptions of fundamentals concepts ranging from the physics of gates to quantum error correction techniques.
The authors provide efficient implementations of classical computations, and the book comes complete with a solutions manual and demonstrations of many of the concepts discussed within. It also includes: A thorough introduction to qubits, gates, and circuits, including ...
Introduction to UAV Systems, 5th Edition
In the newly revised Fifth Edition of Introduction to UAV Systems, an expert team of aviators, engineers, and researchers delivers the fundamentals of UAV systems for both professionals and students in UAV courses. Suitable for students in Aerospace Engineering programs, as well as Flight and Aeronautics programs, this new edition now includes end-of-chapter questions and online instructor ancillaries that make it an ideal textbook.
As the perfect complement to the author's Design of Unmanned Aerial Systems, this book includes the history, classes, and missions of UAVs. It covers fundamental topics, like aerodynamics, stability and control, propulsion, loads and structures, mission planning, payloads, and communication systems. Brand-new materials in areas including autopilots, quadcopters, payloads, and ground control stations highlight the latest industry technologies.
The authors also discuss: A thorough introduction to the history of unmanned aerial vehicles, including their ...
Python for Cybersecurity
Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.
Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution; Persistence, privilege escalation, defense evasion, and credential access; Discovery, lateral movement, collection, and command and control; Exfiltration and impact.
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, ...
Artificial Intelligence Programming with Python
In Practical Artificial Intelligence Programming with Python: From Zero to Hero, veteran educator and photophysicist Dr. Perry Xiao delivers a thorough introduction to one of the most exciting areas of computer science in modern history. The book demystifies artificial intelligence and teaches readers its fundamentals from scratch in simple and plain language and with illustrative code examples.
Divided into three parts, the author explains artificial intelligence generally, machine learning, and deep learning. It tackles a wide variety of useful topics, from classification and regression in machine learning to generative adversarial networks. He also includes: Fulsome introductions to MATLAB, Python, AI, machine learning, and deep learning; Expansive discussions on supervised and unsupervised machine learning, as well as semi-supervised learning; Practical AI and Python "cheat sheet" quick references.
This hands-on AI programming guide is perfect for anyone with a basic knowledg ...
FPGAs for Dummies, 2nd Edition
Field programmable gate arrays (FPGAs) are integrated circuits that enable designers to program customized digital logic in the field. FPGAs have been around since the 1980s and were originally conceived to give all design teams the ability to create custom logic. In the early days, using an FPGA in your design meant you had to do a lot of programming just to get your FPGA to perform simple functions, so most designers avoided them. If you haven't looked into FPGAs since your university studies way back when, you'll want to take another look at them.
The FPGA has evolved from a useful but humble interface device into a system-level integrated circuit (IC) with its own microprocessors, memory blocks, and interfaces. It's the next big thing.
Now would be a great time to get an inexpensive development kit, download free tools, and begin to explore this world for yourself. And this book will help you understand the practical uses of FPGAs.
This book is for you if you're a system d ...