Microsoft Excel Inside OutDive Into Microsoft Excel for Office 2021 and Microsoft 365 and really put your spreadsheet expertise to work. This supremely well-organized reference packs hundreds of timesaving solutions, tips, and workaroundsall you need to make the most of Excels most powerful tools for analyzing data and making better decisions. Renowned Excel expert Bill Jelen offers a complete tour of Excel and its latest innovations, from advanced analysis and visualizations to dashboards. Discover how experts tackle todays key tasksand challenge yourself to new levels of mastery.
Save time with galleries, keyboard accelerators, and other shortcuts; Enter formulas more efficiently, and fully control operators and dates; Use new data types to return photos, arrays, or weather history and even create your own; Master Excels most widely-used functions; Integrate external data from the web and other sources; Use the new XLOOKUP function to retrieve data more efficiently, with fewer errors; Store powerful specia ...
Professional Scrum Development with Azure DevOpsThis guide can help any development team plan, track, and manage work far more effectively, by combining today's leading agile framework (Scrum) and Microsoft's ALM/DevOps toolset (Azure DevOps). Renowned Scrum expert Richard Hundhausen thoroughly covers team formation, backlogs, Sprints, test plans, collaboration, flow, continuous improvement, Azure Boards, Azure Test Plans, and the real-world tradeoffs associated with DevOps. Throughout, you'll find practical, in-the-trenches tips from experienced Professional Scrum Developers. To make this guide even more valuable, Hundhausen has organized it to complement Scrum.org's popular Professional Scrum Developer (PSD) program, which he created with Scrum.org's Ken Schwaber, author of this book's Foreword.
Professional Scrum Trainer Richard Hundhausen shows how to: Deepen your understanding of the Scrum framework and Professional Scrum as based on the 2020 Scrum Guide; Provide proven work item planning and tracking, and quickly drive valu ...
FPGAs for Dummies, 2nd EditionField programmable gate arrays (FPGAs) are integrated circuits that enable designers to program customized digital logic in the field. FPGAs have been around since the 1980s and were originally conceived to give all design teams the ability to create custom logic. In the early days, using an FPGA in your design meant you had to do a lot of programming just to get your FPGA to perform simple functions, so most designers avoided them. If you haven't looked into FPGAs since your university studies way back when, you'll want to take another look at them.
The FPGA has evolved from a useful but humble interface device into a system-level integrated circuit (IC) with its own microprocessors, memory blocks, and interfaces. It's the next big thing.
Now would be a great time to get an inexpensive development kit, download free tools, and begin to explore this world for yourself. And this book will help you understand the practical uses of FPGAs.
This book is for you if you're a system d ...
Cryptography and Cryptanalysis in JavaHere is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.
The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.
The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environme ...
Applied Deep Learning with TensorFlow 2, 2nd EditionUnderstand how neural networks work and learn how to implement them using TensorFlow 2.0 and Keras. This new edition focuses on the fundamental concepts and at the same time on practical aspects of implementing neural networks and deep learning for your research projects.
This book is designed so that you can focus on the parts you are interested in. You will explore topics as regularization, optimizers, optimization, metric analysis, and hyper-parameter tuning. In addition, you will learn the fundamentals ideas behind autoencoders and generative adversarial networks.
All the code presented in the book will be available in the form of Jupyter notebooks which would allow you to try out all examples and extend them in interesting ways. A companion online book is available with the complete code for all examples discussed in the book and additional material more related to TensorFlow and Keras. All the code will be available in Jupyter notebook format and can be opened directly in G ...
Python for CybersecurityPython For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.
Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution; Persistence, privilege escalation, defense evasion, and credential access; Discovery, lateral movement, collection, and command and control; Exfiltration and impact.
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, ...
Using .NET Core, Docker, and Kubernetes SuccinctlyTerms like container and Docker, unknown to Microsoft programmers until now, have recently become essential in technical discussions about the development, distribution, and management of our applications. Containers can solve some of programmers' everyday problems, but a challenge with them is managing their lifecycles and the communication among them. So we need to choose a container technology, with Docker being the most commonly used, and an orchestrator, with Kubernetes being the best choice today. In Using .NET Core, Docker, and Kubernetes Succinctly, Michele Aponte will walk you through using Docker and Kubernetes with a .NET Core example application. ...
Foundations of Machine Learning, 2nd EditionA new edition of a graduate-level machine learning textbook that focuses on the analysis and theory of algorithms.
This book is a general introduction to machine learning that can serve as a textbook for graduate students and a reference for researchers. It covers fundamental modern topics in machine learning while providing the theoretical basis and conceptual tools needed for the discussion and justification of algorithms. It also describes several key aspects of the application of these algorithms. The authors aim to present novel theoretical tools and concepts while giving concise proofs even for relatively advanced topics.
Foundations of Machine Learning is unique in its focus on the analysis and theory of algorithms. The first four chapters lay the theoretical foundation for what follows; subsequent chapters are mostly self-contained. Topics covered include the Probably Approximately Correct (PAC) learning framework; generalization bounds based on Rademacher complexity and ...
SAP Intelligent RPA for DevelopersSAP Intelligent Robotic Process Automation (RPA) enables businesses to automate repetitive work and integrate automation capabilities across SAP and non-SAP systems.
This book provides end-to-end coverage of business process automation using SAP Intelligent RPA and shows how to build multiple SAP Intelligent RPA projects from start to finish. Some of these projects may build upon the work done in previous chapters to showcase the Agile development process in SAP Intelligent RPA.
As you progress, you'll cover the SAP Intelligent RPA factory, Desktop Studio, Cloud Studio, and the Bot store. You'll also learn about the building blocks of the SAP Intelligent RPA solution and creating bots from initial application declaration to workflow design and deployment, along with making bots run in attended and unattended modes.
You'll also learn about SAP Process Automation, the new SAP service that is going to replace the SAP Intelligent RPA service soon. Finally, we will discuss the migr ...
Practical Model-Driven Enterprise ArchitectureMost organizations face challenges in defining and achieving evolved enterprise architecture practices, which can be a very lengthy process even if implemented correctly. Developers, for example, can build better solutions only if they receive the necessary design information from architects, and decision-makers can make appropriate changes within the organization only if they know the implications of doing so.
The book starts by addressing the problems faced by enterprise architecture practitioners and provides solutions based on an agile approach to enterprise architecture, using ArchiMate® 3.1 as an industry standard and Sparx EA as the modeling tool. You'll learn with the help of a fictional organization that has three business units, each expecting something different from you as the enterprise architect. You'll build the practice, satisfy the different requirements of each business unit, and share the knowledge with others so they can follow your steps. Toward the end, you'll ...