Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Optimize your ALM practices with SAP Cloud ALM! Get started by deploying SAP Cloud ALM, defining your project scope, and exploring the tools you'll use. Walk through process management, requirements management, and fit-to-standard workshops. Create and execute tests and then deploy your project, focusing on release and change management features. Follow a continuous example throughout this guide to ensure your SAP Cloud ALM projects run smoothly!Highlights include:1) Deployment2) SAP Activate3) Agile methodology4) Project scope5) Process management6) Requirements management7) Test management8) Change enablement9) Operations10) Extensions11) Integration
New to programming and JavaScript? Look no further! With this beginner's guide, learn the language ABCs and start developing applications. Walk through the programming basics: branches, functions, methods, objects, and more. Then create forms and events; use the Document Object Model (DOM); and work with large data sets, processing strings, mathematics, time, and other data structures. Design your web and mobile applications using tools like Ajax, CSS, jQuery, and Onsen UI. Follow code examples and expert tips, and you'll be developing in no time!In this book, you'll learn about:a. Language BasicsMaster the building blocks of JavaScript programming. From performing calculations to finding and avoiding errors, you'll learn the essential skills you need for web application development.b. JavaScript in PracticeStart developing with JavaScript! Learn how to work with standard and custom objects, forms and events, and the DOM. Design with CSS, add 2D and 3D graphics with SVG and Three.js, simplify your tasks with jQuery, and much more!c. Example ExercisesReinforce your knowledge with programming exercises. For each core concept, follow along with code examples that are available for download. Get insight into professional development with JavaScript through sample projects!Highlights include:1) Programming basics2) Web application development3) Forms and events4) Document Object Model (DOM)5) Ajax6) XML and JSON7) CSS and HTML properties8) Graphics and animations9) jQuery10) Mobile apps with Onsen UI11) Media files12) Example projects
AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possibilities in mitigating cyber risks.
AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possibilities in mitigating cyber risks.
Whether you know Python or not, this book will help you write amazing Python code using the latest versions of Copilot or ChatGPT.Once, to be a programmer you had to write every line of code yourself. Now tools like GitHub Copilot can instantly generate working programs based on your description in plain English. An instant bestseller, Learn AI-Assisted Python Programming has taught thousands of aspiring programmers how to write Python the easy way—with the help of AI. It’s perfect for beginners, or anyone who’s struggled with the steep learning curve of traditional programming. In Learn AI-Assisted Python Programming, Second Edition you’ll learn how to: • Write fun and useful Python applications—no programming experience required! • Use the GitHub Copilot AI coding assistant to create Python programs • Write prompts that tell Copilot exactly what to do • Read Python code and understand what it does • Test your programs to make sure they work the way you want them to • Fix code with prompt engineering or human tweaks • Apply Python creatively to help out on the job AI moves fast, and so the new edition of Learn AI-Assisted Python Programming, Second Edition is fully updated to take advantage of the latest models and AI coding tools. Written by two esteemed computer science university professors, it teaches you everything you need to start programming Python in an AI-first world. You’ll learn skills you can use to create working apps for data analysis, automating tedious tasks, and even video games. Plus, in this new edition, you’ll find groundbreaking techniques for breaking down big software projects into smaller tasks AI can easily achieve. Foreword by Beth Simon. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the technology The way people write computer programs has changed forever. Using GitHub Copilot, you describe in plain English what you want your program to do, and the AI generates it instantly. About the book This book shows you how to create and improve Python programs using AI—even if you’ve never written a line of computer code before. Spend less time on the slow, low-level programming details and instead learn how an AI assistant can bring your ideas to life immediately. As you go, you’ll even learn enough of the Python language to understand and improve what your AI assistant creates. What's inside • Prompts for working code • Tweak code manually and with AI help • AI-test your programs • Let AI handle tedious details About the reader If you can move files around on your computer and install new programs, you can learn to write useful software! About the author Dr. Leo Porter is a Teaching Professor at UC San Diego. Dr. Daniel Zingaro is an Associate Teaching Professor at the University of Toronto. The technical editor on this book was Peter Morgan. Table of Contents 1 Introducing AI-assisted programming with GitHub Copilot 2 Getting started with Copilot 3 Designing functions 4 Reading Python code: Part 1 5 Reading Python code: Part 2 6 Testing and prompt engineering 7 Problem decomposition 8 Debugging and better understanding your code 9 Automating tedious tasks 10 Making some games 11 Creating an authorship identification program 12 Future directions
This book offers a comprehensive overview of how the Internet of Things is reshaping the Management of Soil, Geotechnical Engineering, and Environmental Observations. It equips the reader with the necessary tools to apply IoT solutions to farming processes and increase the effectiveness of construction.
This book contains a compilation of research papers presented at the International Conference on Intelligent Computing and Communication Techniques (ICICCT 2024). It is designed for academics, students, and professionals seeking to engage with research on artificial intelligence, secure transactions, real-time monitoring, and security.
This book contains a compilation of research papers presented at the International Conference on Intelligent Computing and Communication Techniques (ICICCT 2024). It is designed for academics, students, and professionals seeking to engage with research on artificial intelligence, secure transactions, real-time monitoring, and security.
This book contains a compilation of research papers presented at the International Conference on Intelligent Computing and Communication Techniques (ICICCT 2024). It is designed for academics, students, and professionals seeking to engage with research on artificial intelligence, secure transactions, real-time monitoring, and security.
This book provides a description of designing and developing a computer assisted diagnosis (CAD) system based on thermography for diagnosing some of the common ailments such as arthritis, diabetes, and fever. It introduces applications of machine and deep learning methods, and convolutional neural networks in the development of CAD system.
By simulating novel and commonplace situations, augmented reality (AR) is stimulating innovation in a broad range of sectors. This book presents innovative AR applications in education and industry. Filled with case studies of applications, the book also looks at development platforms.
The goal of "Topics and approaches to studying intelligence" is to bring into sharper focus the evolving nature of intelligence studies, which is in the midst of a period of significant expansion that is taking place across a number of dimensions. Working on this foundation of past and contemporary analytic intelligence studies, the chapters in "Topics and approaches to studying intelligence" highlight areas of debate and disagreement, provide insight into new areas of study and broaden the methodological toolset used by researchers. Both qualitative and quantitative approaches investigate analysis, alliances, competitive/private sector intelligence, gendered practices of intelligence agencies, the nature of intelligence studies scholarship, accreditation, intelligence disclosure for diplomacy, and the sharing of nuclear-related intelligence
The book examines the connection between computers and sustainability. It covers a variety of eco-friendly computing-related subjects, such as power management, virtualization, cloud computing, data center optimization, green software development, and more.
SketchUp for Interior Designers provides a focused approach to help interior designers master the essential skills needed to confidently use SketchUp 2024 in their projects. This book takes you through step-by-step tutorials, transforming basic 2D line work into fully realized 3D models of interior spaces.
This book presents strategies and techniques highlighting the sustainability and application of microbial and agricultural biotechnologies to ensure food production and security. This book includes different aspects of applications of Artificial Intelligence in agricultural system, genetic engineering, human health and climate change.
The world today is driven by Industry 4.0, which is generating data at an uncontrolled pace. This book examines Big Data and its applications. It emphasizes how Big Data is transforming Industry 4.0. It also examines systems architectures and complementary technologies including IoT, AI, and machine learning.
This book presents recent advances in data-driven global optimization methods, combining theoretical foundations with real-world applications to address complex engineering optimization challenges.
This book contains a compilation of research papers presented at the International Conference on Intelligent Computing and Communication Techniques (ICICCT 2024). It is designed for academics, students, and professionals seeking to engage with research on artificial intelligence, secure transactions, real-time monitoring, and security.
DESCRIPTIONAdvanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware.This book is a comprehensive and practical guide to understanding and analyzing advanced malware threats. The book explores how malware is created, evolves to bypass modern defenses, and can be effectively analyzed using both foundational and advanced techniques. Covering key areas such as static and dynamic analysis, reverse engineering, malware campaign tracking, and threat intelligence, this book provides step-by-step methods to uncover malicious activities, identify IOCs, and disrupt malware operations. Readers will also gain insights into evasion techniques employed by malware authors and learn advanced defense strategies. It explores emerging trends, including AI and advanced attack techniques, helping readers stay prepared for future cybersecurity challenges.By the end of the book, you will have acquired the skills to proactively identify emerging threats, fortify network defenses, and develop effective incident response strategies to safeguard critical systems and data in an ever-changing digital landscape.WHAT YOU WILL LEARN¿ Gain a complete understanding of malware, its behavior, and how to analyze it using static and dynamic techniques.¿ Reverse engineering malware to understand its code and functionality.¿ Identifying and tracking malware campaigns to attribute threat actors.¿ Identify and counter advanced evasion techniques while utilizing threat intelligence to enhance defense and detection strategies.¿ Detecting and mitigating evasion techniques used by advanced malware.WHO THIS BOOK IS FORThis book is tailored for cybersecurity professionals, malware analysts, students, and incident response teams. Before reading this book, readers should have a basic understanding of operating systems, networking concepts, any scripting language, and cybersecurity fundamentals.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.