Learning TensorFlow.jsGiven the demand for AI and the ubiquity of JavaScript, TensorFlow.js was inevitable. With this Google framework, seasoned AI veterans and web developers alike can help propel the future of AI-driven websites. In this guide, author Gant Laborde (Google Developer Expert in machine learningand the web) provides a hands-on end-to-end approach to TensorFlow.js fundamentals for a broad technical audience that includes data scientists, engineers, web developers, students, and researchers.
You'll begin by working through some basic examples in TensorFlow.js before diving deeper into neural network architectures, DataFrames, TensorFlow Hub, model conversion, transfer learning, and more. Once you finish this book, you'll know how to build and deploy production-readydeep learning systems with TensorFlow.js.
- Explore tensors, the most fundamental structure of machine learning;
- Convert data into tensors and back with a real-world example;
- Combine AI with the web using TensorFlow.js; ...
Modern Data ProtectionGive your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.
To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach.
- Learn the workload types that your organization should be backing up;
- Explore the hardware, software, and ser ...
Chaos EngineeringAuto engineers test the safety of a car by intentionally crashing it and carefully observing the results. Chaos engineering applies the same principles to software systems. In Chaos Engineering: Site reliability through controlled disruption, you'll learn to run your applications and infrastructure through a series of tests that simulate real-life failures. You'll maximize the benefits of chaos engineering by learning to think like a chaos engineer, and how to design the proper experiments to ensure the reliability of your software. With examples that cover a whole spectrum of software, you'll be ready to run an intensive testing regime on anything from a simple WordPress site to a massive distributed system running on Kubernetes.
Can your network survive a devastating failure? Could an accident bring your day-to-day operations to a halt? Chaos engineering simulates infrastructure outages, component crashes, and other calamities to show how systems and staff respond. Testing systems ...
Convolutional Neural Networks with Swift for TensorflowDive into and apply practical machine learning and dataset categorization techniques while learning Tensorflow and deep learning. This book uses convolutional neural networks to do image recognition all in the familiar and easy to work with Swift language.
It begins with a basic machine learning overview and then ramps up to neural networks and convolutions and how they work. Using Swift and Tensorflow, you'll perform data augmentation, build and train large networks, and build networks for mobile devices. You'll also cover cloud training and the network you build can categorize greyscale data, such as mnist, to large scale modern approaches that can categorize large datasets, such as imagenet.
Convolutional Neural Networks with Swift for Tensorflow uses a simple approach that adds progressive layers of complexity until you have arrived at the current state of the art for this field. ...
Blockchain Enabled Applications, 2nd EditionLearn all about blockchain and its applications in cryptocurrency, healthcare, Internet of Things, finance, decentralized organizations, and more. Featuring case studies and practical insights, this book covers a unique mix of topics and offers insight into how to overcome hurdles that arise as the market and consumers grow accustomed to blockchain-based organizations and services.
The book is divided into three major sections. The first section provides a historical background to blockchain technology. You will start with a historical context to financial capital markets when Bitcoin was invented, followed by mining protocols, the need for consensus, hardware mining, etc. Next, a formal introduction to blockchain is provided covering transaction workflow, role of decentralized network, and payment verification. Then, we dive deep into a different implementation of a blockchain: Ethereum. The main technical features, such as Ethereum Virtual Machine, are presented along with the smart ...
Deep Reinforcement Learning in UnityGain an in-depth overview of reinforcement learning for autonomous agents in game development with Unity.
This book starts with an introduction to state-based reinforcement learning algorithms involving Markov models, Bellman equations, and writing custom C# code with the aim of contrasting value and policy-based functions in reinforcement learning. Then, you will move on to path finding and navigation meshes in Unity, setting up the ML Agents Toolkit (including how to install and set up ML agents from the GitHub repository), and installing fundamental machine learning libraries and frameworks (such as Tensorflow). You will learn about: deep learning and work through an introduction to Tensorflow for writing neural networks (including perceptron, convolution, and LSTM networks), Q learning with Unity ML agents, and porting trained neural network models in Unity through the Python-C# API. You will also explore the OpenAI Gym Environment used throughout the book.
Deep Reinforcement ...
Adversarial Tradecraft in CybersecurityLittle has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.
This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.
Throughout this book, you will learn how to gain an advantage ove ...
Mastering Windows Server 2019, 3rd EditionWindows Server 2019 has a lot to offer, with a variety of roles, features, toolsets, and server management interfaces that allow interaction with your servers from virtually anywhere in the world. This updated edition comes with four new chapters to provide you with the in-depth knowledge needed to implement and use this operating system in any environment.
Centralized management, monitoring, and configuration of servers are key to an efficient IT department. This book delves into multiple methods for quickly managing all your servers from a 'single pane of glass' - the ability to monitor different servers across a network using Server Manager, Windows PowerShell, and even Windows Admin Center - from anywhere. Despite the book being more focused on Windows Server 2019 LTSC, you will still explore containers and Nano Server, which are more related to the SAC of server releases. This additional coverage will give you insights into all aspects of using Windows Server 2019 in your envir ...
AI for Healthcare with Keras and Tensorflow 2.0Learn how AI impacts the healthcare ecosystem through real-life case studies with TensorFlow 2.0 and other machine learning (ML) libraries.
This book begins by explaining the dynamics of the healthcare market, including the role of stakeholders such as healthcare professionals, patients, and payers. Then it moves into the case studies. The case studies start with EHR data and how you can account for sub-populations using a multi-task setup when you are working on any downstream task. You also will try to predict ICD-9 codes using the same data. You will study transformer models. And you will be exposed to the challenges of applying modern ML techniques to highly sensitive data in healthcare using federated learning. You will look at semi-supervised approaches that are used in a low training data setting, a case very often observed in specialized domains such as healthcare. You will be introduced to applications of advanced topics such as the graph convolutional network and how you c ...
Full Stack Python SecurityFull Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you'll need to build secure Python web applications. As you work through the insightful code snippets and engaging examples, you'll put security standards, best practices, and more into action. Along the way, you'll get exposure to important libraries and tools in the Python ecosystem.
Security is a full-stack concern, encompassing user interfaces, APIs, web servers, network infrastructure, and everything in between. Master the powerful libraries, frameworks, and tools in the Python ecosystem and you can protect your systems top to bottom. Packed with realistic examples, lucid illustrations, and working code, this book shows you exactly how to secure Python-based web applications.
Full Stack Python Security: Cryptography, TLS, and attack resistance teaches you everything you need to secure Python and Django-based web apps. In it, seasoned security pro Dennis Byrne demystifies complex secur ...