TensorFlow For DummiesGoogle TensorFlow has become the darling of financial firms and research organizations, but the technology can be intimidating and the learning curve is steep. Luckily, TensorFlow For Dummies is here to offer you a friendly, easy-to-follow book on the subject. Inside, you'll find out how to write applications with TensorFlow, while also grasping the concepts underlying machine learning - all without ever losing your cool!
Machine learning has become ubiquitous in modern society, and its applications include language translation, robotics, handwriting analysis, financial prediction, and image recognition. TensorFlow is Google's preeminent toolset for machine learning, and this hands-on guide makes it easy to understand, even for those without a background in artificial intelligence.
Install TensorFlow on your computer; Learn the fundamentals of statistical regression and neural networks; Visualize the machine learning process with TensorBoard; Perform image recognition with convo ...
Streaming DataAs humans, we're constantly filtering and deciphering the information streaming toward us. In the same way, streaming data applications can accomplish amazing tasks like reading live location data to recommend nearby services, tracking faults with machinery in real time, and sending digital receipts before your customers leave the shop. Recent advances in streaming data technology and techniques make it possible for any developer to build these applications if they have the right mindset. This book will let you join them.
Streaming Data is an idea-rich tutorial that teaches you to think about efficiently interacting with fast-flowing data. Through relevant examples and illustrated use cases, you'll explore designs for applications that read, analyze, share, and store streaming data. Along the way, you'll discover the roles of key technologies like Spark, Storm, Kafka, Flink, RabbitMQ, and more. This book offers the perfect balance between big-picture thinking and implementation deta ...
Reactive Design PatternsModern web applications serve potentially vast numbers of users - and they need to keep working as servers fail and new ones come online, users overwhelm limited resources, and information is distributed globally. A Reactive application adjusts to partial failures and varying loads, remaining responsive in an ever-changing distributed environment. The secret is message-driven architecture - and design patterns to organize it.
Reactive Design Patterns presents the principles, patterns, and best practices of Reactive application design. You'll learn how to keep one slow component from bogging down others with the Circuit Breaker pattern, how to shepherd a many-staged transaction to completion with the Saga pattern, how to divide datasets by Sharding, and more. You'll even see how to keep your source code readable and the system testable despite many potential interactions and points of failure. ...
Reactive Application DevelopmentMission-critical applications have to respond instantly to changes in load, recover gracefully from failure, and satisfy exacting requirements for performance, cost, and reliability. That's no small task! Reactive designs make it easier to meet these demands through modular, message-driven architecture, innovative tooling, and cloud-based infrastructure.
Reactive Application Development teaches you how to build reliable enterprise applications using reactive design patterns. This hands-on guide begins by exposing you to the reactive mental model, along with a survey of core technologies like the Akka actors framework. Then, you'll build a proof-of-concept system in Scala, and learn to use patterns like CQRS and Event Sourcing. You'll master the principles of reactive design as you implement elasticity and resilience, integrate with traditional architectures, and learn powerful testing techniques. ...
Hacking Exposed Malware & Rootkits, 2nd EditionThwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.
Learn how malware infects, survives, and propagates across an enterprise; See how hackers develop malicious code and target vulnerable systems; Detect, neutralize, and remove user-mode and kernel-mode rootkits; Use hypervisors and honeypots to uncover and kill virtual rootkits; Defend against keylogging, redirect, click fraud, and identity theft; Block spear phishing, client-side, and embedded-code exploits; Effectively deploy ...
CorelDRAW X8, 12th EditionThis thoroughly revised guide offers complete coverage of CorelDraw X8, including the revamped interface and brand-new features. CorelDRAW X8: The Official Guide shows anyone - from a beginner to an experienced illustrator - how to create top-drawer commercial graphics and exquisite artwork. You will learn to draw photorealistic illustrations, use shortcuts to create complex art, lay out text like a pro, add special effects, and transform 2D objects into 3D graphics. The book features tips for printing high-quality work that matches what you've designed on your monitor.
Work in the customizable interface redesigned to reflect Windows Metro style; Explore and understand the software's menus, palettes, and dockers; Lay out brochures, flyers, and other multi-page documents; Add paragraph, artistic, and custom-shaped text to your designs; Search the Content Exchange for fonts, vector patterns, background designs, and the Get More docker; Use the Perspective, Extrude, Smear, Twirl, Attra ...
Healthcare Information Technology Exam Guide, 2nd EditionGain the skills and knowledge required to implement and support healthcare IT (HIT) systems in various clinical and healthcare business settings. Health Information Technology Exam Guide for CHTS and CAHIMS Certifications prepares IT professionals to transition into HIT with coverage of topics ranging from health data standards to project management. This new edition includes broadened security content in addition to coverage of disruptive innovations such as complex platforms that support big data, genomics, telemedicine, mobile devices, and consumers. Learn about achieving true interoperability, updates to HIPAA rules, and FHIR and SMART standards.
Healthcare and Information Technology in the United States; Fundamentals of Healthcare Information Science; Healthcare Information Standards and Regulation; Implementing, Managing, and Maintaining Healthcare Information Technology; Optimizing Healthcare Information Technology; Making Healthcare Information Technology Private, Secure, an ...
Microsoft SQL Server 2017 on LinuxThis comprehensive guide shows, step-by-step, how to set up, configure, and administer SQL Server 2017 on Linux for high performance and high availability. Written by a SQL Server expert and respected author, Microsoft SQL Server 2017 on Linux teaches valuable Linux skills to Windows-based SQL Server professionals. You will get clear coverage of both Linux and SQL Server and complete explanations of the latest features, tools, and techniques. The book offers clear instruction on adaptive query processing, automatic tuning, disaster recovery, security, and much more.
Understand how SQL Server 2017 on Linux works; Install and configure SQL Server on Linux; Run SQL Server on Docker containers; Learn Linux Administration; Troubleshoot and tune query performance in SQL Server; Learn what is new in SQL Server 2017; Work with adaptive query processing and automatic tuning techniques; Implement high availability and disaster recovery for SQL Server on Linux; Learn the security features avai ...
Gray Hat Hacking, 5th EditionFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.
Build and launch spoofing exploits with Ettercap; Induce error conditions and crash software using fuzzers; Use advanced reverse engineering to exploit Windows and Linux software; Bypass Windows Access Control and memory protection schemes; Exploit web applications with Padding Oracle Att ...
Writing Great SpecificationsThe clearest way to communicate a software specification is to provide examples of how it should work. Turning these story-based descriptions into a well-organized dev plan is another matter. Gherkin is a human-friendly, jargon-free language for documenting a suite of examples as an executable specification. It fosters efficient collaboration between business and dev teams, and it's an excellent foundation for the specification by example (SBE) process.
Writing Great Specifications teaches you how to capture executable software designs in Gherkin following the SBE method. Written for both developers and non-technical team members, this practical book starts with collecting individual feature stories and organizing them into a full, testable spec. You'll learn to choose the best scenarios, write them in a way that anyone can understand, and ensure they can be easily updated by anyone. ...