Graph-Powered Machine LearningGraph-Powered Machine Learning teaches to use graph-based algorithms and data organization strategies to develop superior machine learning applications. You'll dive into the role of graphs in machine learning and big data platforms, and take an in-depth look at data source modeling, algorithm design, recommendations, and fraud detection. Explore end-to-end projects that illustrate architectures and help you optimize with best design practices. Author Alessandro Negro's extensive experience shines through in every chapter, as you learn from examples and concrete scenarios based on his work with real clients!
Identifying relationships is the foundation of machine learning. By recognizing and analyzing the connections in your data, graph-centric algorithms like K-nearest neighbor or PageRank radically improve the effectiveness of ML applications. Graph-based machine learning techniques offer a powerful new perspective for machine learning in social networking, fraud detection, natural ...
High Performance MySQL, 4th EditionHow can you realize MySQL's full power? With High Performance MySQL, you'll learn advanced techniques for everything from setting service-level objectives to designing schemas, indexes, and queries to tuning your server, operating system, and hardware to achieve your platform's full potential. This guide also teaches database administrators safe and practical ways to scale applications through replication, load balancing, high availability, and failover.
Updated to reflect recent advances in cloud- and self-hosted MySQL, InnoDB performance, and new features and tools, this revised edition helps you design a relational data platform that will scale with your business. You'll learn best practices for database security along with hard-earned lessons in both performance and database stability.
Dive into MySQL's architecture, including key facts about its storage engines; Learn how server configuration works with your hardware and deployment choices; Make query performance part of you ...
Mastering Apache PulsarEvery enterprise application creates data, including log messages, metrics, user activity, and outgoing messages. Learning how to move these items is almost as important as the data itself. If you're an application architect, developer, or production engineer new to Apache Pulsar, this practical guide shows you how to use this open source event streaming platform to handle real-time data feeds.
Jowanza Joseph, staff software engineer at Finicity, explains how to deploy production Pulsar clusters, write reliable event streaming applications, and build scalable real-time data pipelines with this platform. Through detailed examples, you'll learn Pulsar's design principles, reliability guarantees, key APIs, and architecture details, including the replication protocol, the load manager, and the storage layer.
This book helps you: Understand how event streaming fits in the big data ecosystem; Explore Pulsar producers, consumers, and readers for writing and reading events; Build scalabl ...
SQL Server Metadata SuccinctlySQL Server is a very complex and powerful product, but it provides tremendous amounts of data about itself. You can use this metadata to improve your database design, increase performance, review security, and more. Joseph D. Booth will show readers sample scripts and queries using information schema views as well as SQL Server-specific views in SQL Server Metadata Succinctly. ...
Event- and Data-Centric Enterprise Risk-Adjusted Return ManagementTake a holistic view of enterprise risk-adjusted return management in banking. This book recommends that a bank transform its siloed operating model into an agile enterprise model. It offers an event-driven, process-based, data-centric approach to help banks plan and implement an enterprise risk-adjusted return model (ERRM), keeping the focus on business events, processes, and a loosely coupled enterprise service architecture.
Most banks suffer from a lack of good quality data for risk-adjusted return management. This book provides an enterprise data management methodology that improves data quality by defining and using data ontology and taxonomy. It extends the data narrative with an explanation of the characteristics of risk data, the usage of machine learning, and provides an enterprise knowledge management methodology for risk-return optimization. The book provides numerous examples for process automation, data analytics, event management, knowledge management, and improvements ...
Mastering VMware Horizon 8Learn all about designing, installing, configuring, and managing VMware Horizon, with a core focus on how to deliver virtual desktops using Horizon. This book allows you to follow the complete process for deploying VMware Horizon and covers the design, deployment, and management of solutions.
You'll start by reviewing remote solutions, from virtual desktops to published applications, including the benefits and what the different solutions deliver. Once through the high-level technology you'll then look at the VMware Horizon solution focusing on the architecture and the components that make up the solution and how to design a production-ready environment. Other VMware EUC technologies that complement the core Horizon solution will also be incorporate into it.
Armed with the knowledge of how to design a solution, you'll move onto the installation phase and start to build a test lab environment. Once your lab is installed, you'll move onto the configuration stage where you will un ...
Building Applications with Azure Resource Manager (ARM)Learn how to leverage infrastructure as code with Azure Resource Manager (ARM) and the best practices to build, test, debug, and deploy your applications in Microsoft Azure using ARM templates and the new domain-specific language Bicep.
As organizations consider moving partially or fully to the cloud, infrastructure as code (IaC) has become a key component to improving time to market for their applications. However, it is critical that enterprise infrastructure professionals use the right resources and strategies to build the infrastructure required to run applications in the cloud. Azure cloud-native components and capabilities automate the build and deployment process, offering a myriad of compelling reasons to leverage IaC to build your applications in Azure.
Starting with the evolution of the software-defined approach and building on the basic concepts of infrastructure as code, this book provides you with comprehensive guidance to learn Azure Resource Manager from the ground u ...
Stylish F# 6, 2nd EditionWhy just get by in F# when you can program in style. This book goes beyond syntax and into design. It provides F# developers with best practices, guidance, and advice to write beautiful, maintainable, and correct code. This second edition, fully updated for .NET 6 and F# 6, includes all new coverage of anonymous records, the task {} computation expression, and the relationship between types and modules.
Stylish F# 6 covers every design decision that a developer makes in constructing F# programs, helping you make the most educated and valuable design choices at every stage of code development. You will learn about the design of types and function signatures, the benefits of immutability, and the uses of partial function application. You will understand best practices for writing APIs to be used by F#, C#, and other languages. Each carefully vetted design choice is supported with compelling examples, illustrations, and rationales. ...
Designing Secure SoftwareDesigning Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the process.
The book begins with a discussion of core concepts like trust, threats, mitigation, secure design patterns, and cryptography. The second part, perhaps this book's most unique and important contribution to the field, covers the process of designing and reviewing a software design with security considerations in mind. The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written in C and Python to illustrate implementation vulnerabilities.
You'll learn how to: Identify important assets, the attack surface, and the trust boundaries in a system; Evaluate the effectiveness of various threat mit ...
Introduction to Computer OrganizationIntroduction to Computer Organization gives programmers a practical understanding of what happens in a computer when you execute your code. You may never have to write x86-64 assembly language or design hardware yourself, but knowing how the hardware and software works will give you greater control and confidence over your coding decisions. We start with high level fundamental concepts like memory organization, binary logic, and data types and then explore how they are implemented at the assembly language level.
The goal isn't to make you an assembly programmer, but to help you comprehend what happens behind the scenes between running your program and seeing "Hello World" displayed on the screen. Classroom-tested for over a decade, this book will demystify topics like: How to translate a high-level language code into assembly language; How the operating system manages hardware resources with exceptions and interrupts; How data is encoded in memory; How hardware switches handle decim ...