Automated Machine Learning in ActionAutomated Machine Learning in Action reveals how you can automate the burdensome elements of designing and tuning your machine learning systems. It's written in a math-lite and accessible style, and filled with hands-on examples for applying AutoML techniques to every stage of a pipeline. AutoML can even be implemented by machine learning novices! If you're new to ML, you'll appreciate how the book primes you on machine learning basics. Experienced practitioners will love learning how automated tools like AutoKeras and KerasTuner can create pipelines that automatically select the best approach for your task, or tune any customized search space with user-defined hyperparameters, which removes the burden of manual tuning.
Machine learning tasks like data pre-processing, feature selection, and model optimization can be time-consuming and highly technical. Automated machine learning, or AutoML, applies pre-built solutions to these chores, eliminating errors caused by manual processing. ...
Functional Programming in C#, 2nd EditionFunctional Programming in C# has helped thousands of developers apply functional thinking to C# code. Its practical examples and spot-on treatment of FP concepts makes it the perfect guide for proficient C# programmers. This second edition is fully revised to cover new functional-inspired features in the most recent releases of C#, including tuples, async streams, pattern matching, and records. Each chapter is packed with awesome perspectives and epiphany moments on how functional programming can change the way you code.
Turbocharge your C# code. Good functional techniques will improve concurrency, state management, event handling, and maintainability of your software. This book gives you practical answers to why, how, and where to add functional programing into your C# coding practice.
Functional Programming in C#, Second Edition teaches functional thinking for real-world problems. It reviews the C# language features that allow you to program functionally and through many practi ...
Grokking Machine LearningGrokking Machine Learning teaches you how to apply ML to your projects using only standard Python code and high school-level math. No specialist knowledge is required to tackle the hands-on exercises using Python and readily available machine learning tools. Packed with easy-to-follow Python-based exercises and mini-projects, this book sets you on the path to becoming a machine learning expert.
Discover powerful machine learning techniques you can understand and apply using only high school math! Put simply, machine learning is a set of techniques for data analysis based on algorithms that deliver better results as you give them more data. ML powers many cutting-edge technologies, such as recommendation systems, facial recognition software, smart speakers, and even self-driving cars. This unique book introduces the core concepts of machine learning, using relatable examples, engaging exercises, and crisp illustrations.
Grokking Machine Learning presents machine learning algorithm ...
ASP.NET Core SecurityASP.NET Core Security teaches you the skills and countermeasures you need to keep your ASP.NET Core apps secure from the most common web application attacks. With this collection of practical techniques, you will be able to anticipate risks and introduce practices like testing as regular security checkups. You'll be fascinated as the author explores real-world security breaches, including rogue Firefox extensions and Adobe password thefts. The examples present universal security best practices with a sharp focus on the unique needs of ASP.NET Core applications.
Your ASP.NET Core applications are under attack now. Are you ready? Th ere are specific countermeasures you can apply to keep your company out of the headlines. This book demonstrates exactly how to secure ASP.NET Core web applications, including safe browser interactions, recognizing common threats, and deploying the framework's unique security APIs.
ASP.NET Core Security is a realistic guide to securing your web applicat ...
The Definitive Guide to Security in Jakarta EERefer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta Authentication & Authorization as its underlying official foundation. Jakarta EE Security implementations are discussed, such as Soteria and Open Liberty, along with the build-in modules and Jakarta EE Security third-party modules, such as Payara Yubikey & OIDC, and OmniFaces JWT-Auth.
The book discusses Jakarta EE Security in relation to SE underpinnings and provides a detailed explanation of how client-cert authentication over HTTPS takes place, how certifications work, and how LDAP-like names are mapped to caller/user names. General (web) security best practices are presented, such as not storing passwords in plaintext, using HTTPS, sanitizing inputs to DB queries, encoding output, and explanations of various (web) attacks and common vulnerabilities are included.
Practical examples of securing applications discuss common needs such as letting users explicitly log in, sign u ...
Design and Deploy Microsoft Azure Virtual DesktopDesign and build the new desktop service from Microsoft. This book offers a modern framework, design methodology, and best practices of design and deployment for virtual apps and desktops.
Microsoft Azure Virtual Desktop (AVD) is a Desktop as a Service (DaaS) which is simple to deploy, accessible from any device, easy to manage, and secure. The book starts with AVD essentials and its critical features, followed by the planning and method of preparing for AVD. You will go through defining the requirements and assessing by setting the AVD application baseline, network requirements, and security requirements. Next, you will learn how to design and deploy the core infrastructure of Microsoft AVD to understand its Access Layer, Control Layer, Resource Layer, Hosting Layer, and User Layer. You will also learn how to design the desktop and Host Pool of AVD. And you will learn the modern way to manage and secure AVD components.
After reading this book, you will have the right blend of kn ...
Debugging with GDBThe GNU Debugger allows you to see what is going on "inside" a program while it executes - or what a program was doing at the moment it crashed. GDB supports C, C++, Java, Fortran and Assembly among other languages; it is also designed to work closely with the GNU Compiler Collection (GCC). The GNU Debugger Program has four special features that helps you catch bugs in the act: It starts your program for you, specifying anything that might affect it's behavior. Makes your program stop under specified conditions. Examines what happened when the program stopped. Allows you to experiment with changes to see what effect they have on the program. This book will show you: setting and clearing breakpoints examining the stack, source files and data examining the symbol table altering program execution specifying a target for debugging how to control the debugger how to use canned command sequences how to install GDB and much more! This manual is written for programmers. It is designed so someo ...
Taking Blender to the Next LevelIf you're ready to start exploring the more advanced workflows and processes in Blender to create intricate 3D models, then Taking Blender to the Next Level is for you.
This book focuses on a few different VFX-related workflows such as geometry nodes, organic modeling, 3D camera tracking, photogrammetry, sculpting, compositing, and physics simulations. You'll learn how to use geometry nodes to create dynamic motion graphic scenes as well as perform 3D scanning of real-world objects using photogrammetry. You'll also find out how to model, rig, and animate your own 3D characters from scratch. Next, you'll progress to using simulations to break objects apart and then use cloth and hair simulations to add realism to your 3D creations. Finally, you'll go over the final render settings and export your 3D animation masterpiece as a video.
By the end of this Blender book, you'll be able to model your own 3D characters, objects, and landscapes; rig, animate, and texture your characters; 3 ...
Build Customized Apps with Amazon HoneycodeAmazon Honeycode enables you to build fully managed, customizable, and scalable mobile and web applications for personal or professional use with little to no code. With this practical guide to Amazon Honeycode, you'll be able to bring your app ideas to life, improving your and your team's/organization's productivity.
You'll begin by creating your very first app from the get-go and use it as a means to explore the Honeycode development environment and concepts. Next, you'll learn how to set up and organize the data to build and bind an app on Honeycode as well as deconstruct different templates to understand the common structures and patterns that can be used. Finally, you'll build a few apps from scratch and discover how to apply the concepts you've learned.
By the end of this app development book, you'll have gained the knowledge you need to be able to build and deploy your own mobile and web applications. You'll also be able to invite and share your app with people you want to ...
Clean Android ArchitectureAs an application's code base increases, it becomes harder for developers to maintain existing features and introduce new ones. In this clean architecture book, you'll learn to identify when and how this problem emerges and how to structure your code to overcome it.
The book starts by explaining clean architecture principles and Android architecture components and then explores the tools, frameworks, and libraries involved. You'll learn how to structure your application in the data and domain layers, the technologies that go in each layer, and the role that each layer plays in keeping your application clean. You'll understand how to arrange the code into these two layers and the components involved in assembling them. Finally, you'll cover the presentation layer and the patterns that can be applied to have a decoupled and testable code base.
By the end of this architecture book, you'll be able to build an application following clean architecture principles and have the knowledge ...