Artificial Neural Networks with Java, 2nd EditionDevelop neural network applications using the Java environment. After learning the rules involved in neural network processing, this second edition shows you how to manually process your first neural network example. The book covers the internals of front and back propagation and helps you understand the main principles of neural network processing. You also will learn how to prepare the data to be used in neural network development and you will be able to suggest various techniques of data preparation for many unconventional tasks.
This book discusses the practical aspects of using Java for neural network processing. You will know how to use the Encog Java framework for processing large-scale neural network applications. Also covered is the use of neural networks for approximation of non-continuous functions. In addition to using neural networks for regression, this second edition shows you how to use neural networks for computer vision. It focuses on image recognition such as the ...
Python for CybersecurityPython For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.
Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution; Persistence, privilege escalation, defense evasion, and credential access; Discovery, lateral movement, collection, and command and control; Exfiltration and impact.
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, ...
Data-Driven Alexa SkillsDesign and build innovative, custom, data-driven Alexa skills for home or business. Working through several projects, this book teaches you how to build Alexa skills and integrate them with online APIs. If you have basic Python skills, this book will show you how to build data-driven Alexa skills. You will learn to use data to give your Alexa skills dynamic intelligence, in-depth knowledge, and the ability to remember.
Data-Driven Alexa Skills takes a step-by-step approach to skill development. You will begin by configuring simple skills in the Alexa Skill Builder Console. Then you will develop advanced custom skills that use several Alexa Skill Development Kit features to integrate with lambda functions, Amazon Web Services (AWS), and Internet data feeds. These advanced skills enable you to link user accounts, query and store data using a NoSQL database, and access real estate listings and stock prices via web APIs. ...
Up and Running with DAX for Power BITake a concise approach to learning how DAX, the function language of Power BI and PowerPivot, works. This book focuses on explaining the core concepts of DAX so that ordinary folks can gain the skills required to tackle complex data analysis problems. But make no mistake, this is in no way an introductory book on DAX. A number of the topics you will learn, such as the concepts of context transition and table expansion, are considered advanced and challenging areas of DAX.
While there are numerous resources on DAX, most are written with developers in mind, making learning DAX appear an overwhelming challenge, especially for those who are coming from an Excel background or with limited coding experience. The reality is, to hit the ground running with DAX, it's not necessary to wade through copious pages on rarified DAX functions and the technical aspects of the language. There are just a few mandatory concepts that must be fully understood before DAX can be mastered. Knowledge of eve ...
Automated Deep Learning Using Neural Network IntelligenceOptimize, develop, and design PyTorch and TensorFlow models for a specific problem using the Microsoft Neural Network Intelligence (NNI) toolkit. This book includes practical examples illustrating automated deep learning approaches and provides techniques to facilitate your deep learning model development.
The first chapters of this book cover the basics of NNI toolkit usage and methods for solving hyper-parameter optimization tasks. You will understand the black-box function maximization problem using NNI, and know how to prepare a TensorFlow or PyTorch model for hyper-parameter tuning, launch an experiment, and interpret the results. The book dives into optimization tuners and the search algorithms they are based on: Evolution search, Annealing search, and the Bayesian Optimization approach. The Neural Architecture Search is covered and you will learn how to develop deep learning models from scratch. Multi-trial and one-shot searching approaches of automatic neural network design ...
A Complete Guide to Docker for Operations and DevelopmentHarness the power of Docker by containerizing your code with all its libraries and file systems to consistently run anywhere. This book is your source for learning all about Docker operations and development. It's divided into two units and focuses on the topics that the Docker Certified Associate exam covers.
Unit 1 covers the Docker fundamentals, such as Docker Enterprise for Operations, Docker Enterprise for Developers, Swarm, and an introduction to Kubernetes. You will learn how to install Docker Community Edition, Docker Enterprise Edition with Kubernetes and CLI. Also, you will learn the Docker cycle, container lifecycle, develop applications in any language, wrap, build, ship, and deploy them for production. Finally, you will learn how to create a Swarm cluster, deploy an app to it, and manage it with the best practices according to the current technologies.
Unit 2 provides quizzes to help you prepare for the certification test. The DCA exam format and the question style h ...
Hands-On Financial Modeling with Excel for Microsoft 365, 2nd EditionFinancial modeling is a core skill required by anyone who wants to build a career in finance. Hands-On Financial Modeling with Excel for Microsoft 365 explores financial modeling terminologies with the help of Excel.
Starting with the key concepts of Excel, such as formulas and functions, this updated second edition will help you to learn all about referencing frameworks and other advanced components for building financial models. As you proceed, you'll explore the advantages of Power Query, learn how to prepare a 3-statement model, inspect your financial projects, build assumptions, and analyze historical data to develop data-driven models and functional growth drivers. Next, you'll learn how to deal with iterations and provide graphical representations of ratios, before covering best practices for effective model testing. Later, you'll discover how to build a model to extract a statement of comprehensive income and financial position, and understand capital budgeting with the help ...
Python for ArcGIS ProIntegrating Python into your day-to-day ArcGIS work is highly recommended when dealing with large amounts of geospatial data. Python for ArcGIS Pro aims to help you get your work done faster, with greater repeatability and higher confidence in your results.
Starting from programming basics and building in complexity, two experienced ArcGIS professionals-turned-Python programmers teach you how to incorporate scripting at each step: automating the production of maps for print, managing data between ArcGIS Pro and ArcGIS Online, creating custom script tools for sharing, and then running data analysis and visualization on top of the ArcGIS geospatial library, all using Python.
You'll use ArcGIS Pro Notebooks to explore and analyze geospatial data, and write data engineering scripts to manage ongoing data processing and data transfers. This exercise-based book also includes three rich real-world case studies, giving you an opportunity to apply and extend the concepts you studied earli ...
GPT-3GPT-3: NLP with LLMs is a unique, pragmatic take on Generative Pre-trained Transformer 3, the famous AI language model launched by OpenAI in 2020. This model is capable of tackling a wide array of tasks, like conversation, text completion, and even coding with stunningly good performance. Since its launch, the API has powered a staggering number of applications that have now grown into full-fledged startups generating business value. This book will be a deep dive into what GPT-3 is, why it is important, what it can do, what has already been done with it, how to get access to it, and how one can build a GPT-3 powered product from scratch.
This book is for anyone who wants to understand the scope and nature of GPT-3. The book will evaluate the GPT-3 API from multiple perspectives and discuss the various components of the new, burgeoning economy enabled by GPT-3. This book will look at the influence of GPT-3 on important AI trends like creator economy, no-code, and Artificial General I ...
Practical Social EngineeringEven the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive information in a phone call. Practical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature.
Joe Gray, an award-winning expert on social engineering, shares case studies, best practices, open source intelligence (OSINT) tools, and templates for orchestrating and reporting attacks so companies can better protect themselves. He outlines creative techniques to trick users out of their credentials, such as leveraging Python scripts and editing HTML files to clone a legitimate website. Once you've succeeded in harvesting information about your targets with advanced OSINT methods, you'll discover how to defend your own organization from similar threats.
Fast-paced, hands-on, ...