Google Cloud CookbookGet quick hands-on experience with Google Cloud. This cookbook provides a variety of self-contained recipes that show you how to use Google Cloud services for your enterprise application. Whether you're looking for practical ways to apply microservices, AI, analytics, security, or networking solutions, these recipes take you step-by-step through the process and provide discussions that explain how and why the recipes work.
Ideal for system engineers and administrators, developers, network and database administrators, and data analysts, this cookbook helps you get started with Google Cloud regardless of your level of experience. Google veterans Rui Costa and Drew Hodun also cover advanced-level Google Cloud services for those who have appreciable experience with the platform.
Learn how to get started with Google Cloud; Understand the depth of services Google Cloud provides; Gain hands-on experience using practical examples and labs; Explore topics that include BigQuery, Cloud Run, ...
Performance TestingUse this book to prepare for the ISTQB Certified Tester Foundation Level Performance Testing exam. The book has been designed to follow the ISTQB syllabus, covering all of the syllabus learning objectives, with additional reference material extending beyond the syllabus. The book covers an overall methodology for managing and conducting performance testing.
Performance testing has often been considered a black art. In many organizations, perhaps an individual or a small group of technical staff or contractors is given the task of "load testing" an extended system, network, or application.
Performance testing is like any other form of testing. It follows a defined test process that is similar to other test types. It utilizes a disciplined approach to the definition of requirements and user stories, the creation of test conditions, test cases, and test procedures. It establishes measurable goals against which the success or failure of the testing can be judged. It also requires (an ...
AWS CookbookThis practical guide provides over 70 self-contained recipes to help you creatively solve common AWS challenges you'll encounter on your cloud journey. If you're comfortable with rudimentary scripting and general cloud concepts, this cookbook provides what you need to address foundational tasks and create high-level capabilities.
Authors John Culkin and Mike Zazon share real-world examples that incorporate best practices. Each recipe includes a diagram to visualize the components. Code is provided so that you can safely execute in an AWS account to ensure solutions work as described. From there, you can customize the code to help construct an application or fix an existing problem. Each recipe also includes a discussion to provide context, explain the approach, and challenge you to explore the possibilities further.
Go beyond theory and learn the details you need to successfully build on AWS. The recipes help you: Redact personal identifiable information (PII) from text using Ama ...
Ethical HackingEthical Hacking is a crash course in modern hacking techniques. It's already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.
You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network.
You'll work with a wide range of professional penetration testing tools - and learn to write your own tools in Python - as you pra ...
Math for Deep LearningDeep learning is everywhere, making this powerful driver of AI something more STEM professionals need to know. Learning which library commands to use is one thing, but to truly understand the discipline, you need to grasp the mathematical concepts that make it tick. This book will give you a working knowledge of topics in probability, statistics, linear algebra, and differential calculus - the essential math needed to make deep learning comprehensible, which is key to practicing it successfully.
Each of the four subfields are contextualized with Python code and hands-on, real-world examples that bridge the gap between pure mathematics and its applications in deep learning. Chapters build upon one another, with foundational topics such as Bayes' theorem followed by more advanced concepts, like training neural networks using vectors, matrices, and derivatives of functions. You'll ultimately put all this math to use as you explore and implement deep learning algorithms, including backp ...
Practical Linux ForensicsPractical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems that have been misused, abused, or the target of malicious attacks. This essential practitioner's guide will show you how to locate and interpret digital evidence found on Linux desktops, servers, and IoT devices, draw logical conclusions, and reconstruct timelines of past activity after a crime or security incident. It's a book written for investigators with varying levels of Linux experience, and the techniques shown are independent of the forensic analysis platform and tools used.
Early chapters provide an overview of digital forensics as well as an introduction to the Linux operating system and popular distributions. From there, the book describes the analysis of storage, filesystems, files and directories, installed software packages, and logs. Special focus is given to examining human user activity such as logins, desktop environments and artifacts, home director ...
Building Offline Applications with AngularGet a complete overview of offline installable applications. Businesses need reliable applications that enable users to access data and their applications in spite of a bad network connection.
Traditional websites work only when connected to the network. With a large number of users depending on mobile phones and tablets for work, social interactions, and media consumption, it's important that the web applications can work on a weak network connection and even offline.
This step-by-step guide shows you how to build an Angular application that considers offline access and uses its ready-made features and configurations. Build Offline Applications with Angular helps bridge the gap between native apps and web applications. ...
Neural Networks with JavaScript SuccinctlyJames McCaffrey leads you through the fundamental concepts of neural networks, including their architecture, input-output, tanh and softmax activation, back-propagation, error and accuracy, normalization and encoding, and model interpretation. Although most concepts are relatively simple, there are many of them, and they interact with each other in unobvious ways, which is a major challenge of neural networks. But you can learn all important neural network concepts by running and examining the code in Neural Networks with JavaScript Succinctly, with complete example programs for the three major types of neural network problems. ...
Transformers for Natural Language Processing, 2nd EditionTransformers are a game-changer for natural language understanding (NLU) and have become one of the pillars of artificial intelligence.
Transformers for Natural Language Processing, 2nd Edition, investigates deep learning for machine translations, speech-to-text, text-to-speech, language modeling, question-answering, and many more NLP domains with transformers.
An Industry 4.0 AI specialist needs to be adaptable; knowing just one NLP platform is not enough anymore. Different platforms have different benefits depending on the application, whether it's cost, flexibility, ease of implementation, results, or performance. In this book, we analyze numerous use cases with Hugging Face, Google Trax, OpenAI, and AllenNLP.
This book takes transformers' capabilities further by combining multiple NLP techniques, such as sentiment analysis, named entity recognition, and semantic role labeling, to analyze complex use cases, such as dissecting fake news on Twitter. Also, see how transformers ...
Istio in ActionReduce the operational complexity of your microservices with an Istio-powered service mesh! Istio in Action shows you how to implement this powerful new architecture and move your application-networking concerns to a dedicated infrastructure layer. Non-functional concerns stay separate from your application, so your code is easier to understand, maintain, and adapt regardless of programming language. In this practical guide, you'll go hands-on with the full-featured Istio service mesh to manage microservices communication. Helpful diagrams, example configuration, and examples make it easy to understand how to control routing, secure container applications, and monitor network traffic.
Offload complex microservice communication layer challenges to Istio! The industry-standard Istio service mesh radically simplifies security, routing, observability, and other service-to-service communication challenges. With Istio, you use a straightforward declarative configuration style to establish ...