IT eBooks
Download, Read, Use
Programming ML.NET
Programming ML.NET

ML.NET brings the power of machine learning to all .NET developers and Programming ML.NET helps you apply it in real production solutions. Modeled on Dino Espositos best-selling Programming ASP.NET, this book takes the same scenario-based approach Microsofts team used to build ML.NET itself. After a foundational overview of ML.NETs libraries, the authors illuminate mini-frameworks (ML Tasks) for regression, classification, ranking, anomaly detection, and more. For each ML Task, they offer insights for overcoming common real-world challenges. Finally, going far beyond shallow learning, the authors thoroughly introduce ML.NET neural networking. They present a complete example application demonstrating advanced Microsoft Azure cognitive services and a handmade custom Keras network showing how to leverage popular Python tools within .NET. 14-time Microsoft MVP Dino Esposito and son Francesco Esposito show how to: Build smarter machine learning solutions that are closer to your users nee ...
Intermediate Statistics with R
Intermediate Statistics with R

Introductory statistics courses prepare students to think statistically but cover relatively few statistical methods. Building on the basic statistical thinking emphasized in an introductory course, a second course in statistics at the undergraduate level can explore a large number of statistical methods. This text covers more advanced graphical summaries, One-Way ANOVA with pair-wise comparisons, Two-Way ANOVA, Chi-square testing, and simple and multiple linear regression models. Models with interactions are discussed in the Two-Way ANOVA and multiple linear regression setting with categorical explanatory variables. Randomization-based inferences are used to introduce new parametric distributions and to enhance understanding of what evidence against the null hypothesis "looks like". Throughout, the use of the statistical software R via Rstudio is emphasized with all useful code and data sets provided within the text. ...
Cryptography and Cryptanalysis in Java
Cryptography and Cryptanalysis in Java

Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes. The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environme ...
Machine Learning with PySpark, 2nd Edition
Machine Learning with PySpark, 2nd Edition

Master the new features in PySpark 3.1 to develop data-driven, intelligent applications. This updated edition covers topics ranging from building scalable machine learning models, to natural language processing, to recommender systems. Machine Learning with PySpark, Second Edition begins with the fundamentals of Apache Spark, including the latest updates to the framework. Next, you will learn the full spectrum of traditional machine learning algorithm implementations, along with natural language processing and recommender systems. You'll gain familiarity with the critical process of selecting machine learning algorithms, data ingestion, and data processing to solve business problems. You'll see a demonstration of how to build supervised machine learning models such as linear regression, logistic regression, decision trees, and random forests. You'll also learn how to automate the steps using Spark pipelines, followed by unsupervised models such as K-means and hierarchical clustering ...
SQL Server Source Control Basics
SQL Server Source Control Basics

Few software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone coordinate database upgrades with changes to the application. We also run the risk that our "ad hoc" database patching will cause inconsistencies and data loss. Source control can and should play a key role in the database development and deployment process, and this book will show you exactly how to get started. It provides 'just enough' detail about the core components of a source control system and how to incorporate that system into the database development and deployment processes, covering: Database Source Control architecture - what to include, how to structure the components Collaborative editing - teamwork on a database project, while ...
Principles of Superconducting Quantum Computers
Principles of Superconducting Quantum Computers

In Principles of Superconducting Quantum Computers, a pair of distinguished researchers delivers a comprehensive and insightful discussion of the building of quantum computing hardware and systems. Bridging the gaps between computer science, physics, and electrical and computer engineering, the book focuses on the engineering topics of devices, circuits, control, and error correction. Using data from actual quantum computers, the authors illustrate critical concepts from quantum computing. Questions and problems at the end of each chapter assist students with learning and retention, while the text offers descriptions of fundamentals concepts ranging from the physics of gates to quantum error correction techniques. The authors provide efficient implementations of classical computations, and the book comes complete with a solutions manual and demonstrations of many of the concepts discussed within. It also includes: A thorough introduction to qubits, gates, and circuits, including ...
User Tested
User Tested

With so many digital experiences touching our lives - and businesses - it's understandable to feel like you're drowning in data. There's a dashboard or chart for just about everything, but data alone can't help you understand and empathize with your customers. No amount of it will take you inside their heads, help you see the world through their eyes, or let you experience what it's really like to be your customer. Only human insight from real people can do that. User Tested gives both individual contributors and executives an approachable, pragmatic playbook for stepping beyond standard business metrics and infusing real human insight into every business decision, design, and experience. In this book, you'll: Learn how businesses became obsessed with data - but disconnected from their customers - and why that's not sustainable; Get the basics about how to capture human insight through user testing, including how to find the right people, ask the right questions, and make sense o ...
Practical Go
Practical Go

Google announced the Go programming language to the public in 2009, with the version 1.0 release announced in 2012. Since its announcement to the community, and the compatibility promise of the 1.0 release, the Go language has been used to write scalable and high-impact software programs ranging from command-line applications and critical infrastructure tools to large-scale distributed systems. It's speed, simplicity, and reliability make it a perfect choice for developers working in various domains. In Practical Go - Building Scalable Network + Non-Network Applications, you will learn to use the Go programming language to build robust, production-ready software applications. You will learn just enough to building command line tools and applications communicating over HTTP and gRPC. This practical guide will cover: Writing command line applications; Writing a HTTP services and clients; Writing RPC services and clients using gRPC; Writing middleware for network clients and servers ...
Wireless Security Architecture
Wireless Security Architecture

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security. Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage - including data published for the first time - of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies; Effective technical resources and r ...
Trustworthy AI
Trustworthy AI

In Trustworthy AI, award-winning executive Beena Ammanath offers a practical approach for enterprise leaders to manage business risk in a world where AI is everywhere by understanding the qualities of trustworthy AI and the essential considerations for its ethical use within the organization and in the marketplace. The author draws from her extensive experience across different industries and sectors in data, analytics and AI, the latest research and case studies, and the pressing questions and concerns business leaders have about the ethics of AI. Filled with deep insights and actionable steps for enabling trust across the entire AI lifecycle, the book presents: In-depth investigations of the key characteristics of trustworthy AI, including transparency, fairness, reliability, privacy, safety, robustness, and more; A close look at the potential pitfalls, challenges, and stakeholder concerns that impact trust in AI application; Best practices, mechanisms, and governance considerati ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026