IT eBooks
Download, Read, Use
Kubeflow Operations Guide
Kubeflow Operations Guide

Building models is a small part of the story when it comes to deploying machine learning applications. The entire process involves developing, orchestrating, deploying, and running scalable and portable machine learning workloads-a process Kubeflow makes much easier. This practical book shows data scientists, data engineers, and platform architects how to plan and execute a Kubeflow project to make their Kubernetes workflows portable and scalable. Authors Josh Patterson, Michael Katzenellenbogen, and Austin Harris demonstrate how this open source platform orchestrates workflows by managing machine learning pipelines. You'll learn how to plan and execute a Kubeflow platform that can support workflows from on-premises to cloud providers including Google, Amazon, and Microsoft. Dive into Kubeflow architecture and learn best practices for using the platform; Understand the process of planning your Kubeflow deployment; Install Kubeflow on an existing on-premise Kubernetes cluster; Dep ...
Adversarial Tradecraft in Cybersecurity
Adversarial Tradecraft in Cybersecurity

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse. This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place. Throughout this book, you will learn how to gain an advantage ove ...
AI and Machine Learning for On-Device Development
AI and Machine Learning for On-Device Development

AI is nothing without somewhere to run it. Now that mobile devices have become the primary computing device for most people, it's essential that mobile developers add AI to their toolbox. This insightful book is your guide to creating and running models on popular mobile platforms such as iOS and Android. Laurence Moroney, lead AI advocate at Google, offers an introduction to machine learning techniques and tools, then walks you through writing Android and iOS apps powered by common ML models like computer vision and text recognition, using tools such as ML Kit, TensorFlow Lite, and Core ML. If you're a mobile developer, this book will help you take advantage of the ML revolution today. Explore the options for implementing ML and AI on mobile devices; Create ML models for iOS and Android; Write ML Kit and TensorFlow Lite apps for iOS and Android, and Core ML/Create ML apps for iOS; Choose the best techniques and tools for your use case, such as cloud-based versus on-device infere ...
Mastering Kali Linux for Advanced Penetration Testing, 4th Edition
Mastering Kali Linux for Advanced Penetration Testing, 4th Edition

Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employed by real hackers. You'll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploying vulnerable cloud services on AWS using containers, exploiting misconfigured S3 buckets to gain access to EC2 instances. This book delves into passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. See how hackers use lat ...
Windows 11 Made Easy
Windows 11 Made Easy

Get started with Windows 11. This book shows you how to set up and personalize your PC in order to get the best experience from your documents, photos, and your time online. The book introduces you to the new desktop, start menu, and settings panel. It covers everything that's been changed, added, or removed. Next you will learn how to personalize and customize your PC, laptop, and tablet and how to make Windows 11 safer to use for your children and family. The book takes you through how to keep your personal information safe and secure, and how to make sure your precious documents and photos are backed-up with OneDrive. The book shows you how to use accessibility tools to make Windows 11 easier to use, see, hear, and touch, and how to have fun with Android apps and Xbox gaming. You will also learn how to become more productive, how to connect to your college or workplace, and how you can use multiple desktops and snap layouts to get stuff done. After reading this book, you wi ...
Pro Active Directory Certificate Services
Pro Active Directory Certificate Services

In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required background knowledge you need. Then it takes you deeper, step by step, teaching you how to deploy Certificate Services and configure it to issue various digital certificate types, complete with examples of using these certificates with IIS, Outlook, and Windows. Microsoft-based networks - on-premises, hybrid, and cloud-based networks - are used in companies of all sizes. Within them, there are many applications of digital certificates that can be created and managed by Microsoft Certificate Services. As security is more important than ever, and cryptography and PKI are fundamental to so many of these defenses, understanding Microsoft Certificate Services is becoming an increasingly more desirable ...
Enterprise React Development with UmiJS
Enterprise React Development with UmiJS

UmiJS is the Ant Group's underlying frontend development framework, an open source project for developing enterprise-class frontend applications. In this book, you'll get hands-on with single-page application development using UmiJS. By following practical step-by-step examples, you'll develop essential skills to build and publish your apps and create a modern user experience with responsive interfaces. This book will help you learn the essential features of UmiJS and how to set up and build a project from scratch using React, Less, and TypeScript. You'll study Ant Design, a framework based on solid design concepts that provides a series of React components to accelerate interface development. Along the way, you'll see how to make requests and develop the frontend using simulated data while ensuring that your app has a high level of security and feedback. You'll also discover ways to improve your code quality and readability using formatting tools. By the end of the book, you'll ...
Build Customized Apps with Amazon Honeycode
Build Customized Apps with Amazon Honeycode

Amazon Honeycode enables you to build fully managed, customizable, and scalable mobile and web applications for personal or professional use with little to no code. With this practical guide to Amazon Honeycode, you'll be able to bring your app ideas to life, improving your and your team's/organization's productivity. You'll begin by creating your very first app from the get-go and use it as a means to explore the Honeycode development environment and concepts. Next, you'll learn how to set up and organize the data to build and bind an app on Honeycode as well as deconstruct different templates to understand the common structures and patterns that can be used. Finally, you'll build a few apps from scratch and discover how to apply the concepts you've learned. By the end of this app development book, you'll have gained the knowledge you need to be able to build and deploy your own mobile and web applications. You'll also be able to invite and share your app with people you want to ...
CMake Best Practices
CMake Best Practices

CMake is a powerful tool used to perform a wide variety of tasks, so finding a good starting point for learning CMake is difficult. This book cuts to the core and covers the most common tasks that can be accomplished with CMake without taking an academic approach. While the CMake documentation is comprehensive, it is often hard to find good examples of how things fit together, especially since there are lots of dirty hacks and obsolete solutions available on the internet. This book focuses on helping you to tie things together and create clean and maintainable projects with CMake. You'll not only get to grips with the basics but also work through real-world examples of structuring large and complex maintainable projects and creating builds that run in any programming environment. You'll understand the steps to integrate and automate various tools for improving the overall software quality, such as testing frameworks, fuzzers, and automatic generation of documentation. And since writ ...
Computer Vision Projects with PyTorch
Computer Vision Projects with PyTorch

Design and develop end-to-end, production-grade computer vision projects for real-world industry problems. This book discusses computer vision algorithms and their applications using PyTorch. The book begins with the fundamentals of computer vision: convolutional neural nets, RESNET, YOLO, data augmentation, and other regularization techniques used in the industry. And then it gives you a quick overview of the PyTorch libraries used in the book. After that, it takes you through the implementation of image classification problems, object detection techniques, and transfer learning while training and running inference. The book covers image segmentation and an anomaly detection model. And it discusses the fundamentals of video processing for computer vision tasks putting images into videos. The book concludes with an explanation of the complete model building process for deep learning frameworks using optimized techniques with highlights on model AI explainability. After reading th ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025