Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
While engineering and social science perspectives on designing human-robot interactions are readily available, the body of knowledge and practices related to design often remain tacit. This book fills a gap in the human-robot interaction (HRI) community and acts as a guide to navigating design-specific methods, tools, and techniques.
While engineering and social science perspectives on designing human-robot interactions are readily available, the body of knowledge and practices related to design often remain tacit. This book fills a gap in the human-robot interaction (HRI) community and acts as a guide to navigating design-specific methods, tools, and techniques.
These two volumes on site characterization and geotechnical structures form a definitive reference and guide to databases in geotechnical and rock engineering, to enhance decision-making in geotechnical practice using data-driven methods.
Artifical intelligence is one of the most significant technological developments of the current century, and its impact is just beginning. In its simplest form, AI is making machines that learn and think like humans. We can expect to interact with AI in nearly everything we do, for example, managing finances, obtaining medical care, finding information, writing, and creating art. This book provides a clear, accessible guide to using AI safely and effectively in daily life. There are seemingly unlimited options to employ AI daily, and almost as many AI tools available. Readers will gain the skills to critically evaluate AI and navigate its limitations, fostering digital literacy and independence. Concrete examples of how AI can impact daily life make this book relatable and relevant to the target audience. The book also dedicates significant space to educating readers about potential risks of AI and providing proactive security measures.
Master Python 3 to develop your offensive arsenal tools and exploits for ethical hacking and red teamingDESCRIPTION This book starts with an understanding of penetration testing and red teaming methodologies, and teaches Python 3 from scratch for those who are not familiar with programming. The book also guides on how to create scripts for cracking and brute force attacks. The second part of this book will focus on network and wireless level. The book will teach you the skills to create an offensive tool using Python 3 to identify different services and ports. You will learn how to use different Python network modules and conduct network attacks. In the network monitoring section, you will be able to monitor layer 3 and 4. Finally, you will be able to conduct different wireless attacks. The third part of this book will focus on web applications and exploitation developments. It will start with how to create scripts to extract web information, such as links, images, documents etc. We will then move to creating scripts for identifying and exploiting web vulnerabilities and how to bypass web application firewall. It will move to a more advanced level to create custom Burp Suite extensions that will assist you in web application assessments.This edition brings chapters that will be using Python 3 in forensics and analyze different file extensions. The next chapters will focus on fuzzing and exploitation development, starting with how to play with stack, moving to how to use Python in fuzzing, and creating exploitation scripts. Finally, it will give a guide on how to use ChatGPT to create and enhance your Python 3 scripts.WHAT YOU WILL LEARN¿ Learn to code Python scripts from scratch to prevent network attacks and web vulnerabilities.¿ Conduct network attacks, create offensive tools, and identify vulnerable services and ports.¿ Perform deep monitoring of network up to layers 3 and 4.¿ Execute web scraping scripts to extract images, documents, and links.¿ Use Python 3 in forensics and analyze different file types.¿ Use ChatGPT to enhance your Python 3 scripts.WHO THIS BOOK IS FORThis book is for penetration testers, security researchers, red teams, security auditors and IT administrators who want to start with an action plan in protecting their IT systems. All you need is some basic understanding of programming concepts and working of IT systems.
Java microservices: The ultimate pattern guideDESCRIPTION Microservices, a popular software architecture style, breaks down applications into small, independent services built with Java, a versatile and widely used programming language. This book serves as a roadmap for mastering design patterns that solve common problems encountered during microservices development in Java.Start with microservices setup for team success. Discover various architectural styles and communication approaches for seamless service interaction. Learn effective data management within microservices. Acquire skills for handling unforeseen scenarios in transactions and crafting secure APIs for user service access. Lastly, grasp crucial monitoring, testing, and deployment practices to identify and address issues, ensuring smooth production deployment."Microservices Design Patterns with Java" positions itself as an indispensable tool in the arsenal of today's software professionals. It not only aids in navigating the complexities of microservices architecture but also enhances the reader's ability to deliver robust, high-quality software solutions efficiently.WHAT YOU WILL LEARN¿ Architect scalable, resilient microservices using Java-based design patterns.¿ Implement efficient communication and data management strategies within microservices.¿ Design secure, robust external APIs for microservices integration and interaction.¿ Monitor and maintain microservices with advanced logging, tracing, and health checks.¿ Deploy microservices with Docker, Kubernetes, and serverless platforms effectively.¿ Automate CI/CD pipelines for microservices for streamlined development and deployment.WHO THIS BOOK IS FORThis book is for seasoned microservices developers seeking to expand their repertoire of design patterns and practices, as well as for newcomers looking for comprehensive guidance on patterns and practices throughout the entire development lifecycle. It is tailored for architects, developers, team leads, and DevOps engineers.
In the digital landscape, the Metaverse emerges as a frontier of boundless possibilities. Yet, its potential remains largely untapped. The pressing challenge lies in harnessing the power of machine learning to navigate this uncharted territory, where virtual reality, augmented reality, and immersive technologies converge to redefine human interaction and experience. Impact and Potential of Machine Learning in the Metaverse offers a comprehensive examination of how machine learning techniques can shape the future of the Metaverse. This advanced work addresses key domains such as healthcare, education, gaming, and beyond. By delving into topics like digital twins in healthcare and blockchain-enabled security, the book not only sheds light on advancements but also confronts challenges head-on, inspiring scholars to explore new research directions and interdisciplinary collaborations. Through real-world case studies and practical applications, readers gain actionable insights into leveraging machine learning for transformative impact in the Metaverse.
A fast-paced, useful, and easy introduction to Microsoft 365 For those who need the show as well as the tell, Teach Yourself VISUALLY Microsoft 365 is the visual walkthrough to Microsoft’s latest suite of office products that will get you up-to-speed faster than any other resource on the market. This book offers image- and screenshot-rich tutorials alongside step-by-step instructions so you can see what you need to do to make the most of Microsoft 365. From getting a grip on the most basic Microsoft 365 functions to the advanced, new features known only by power users, the book provides you with the tools you need to make your work more streamlined and efficient. You’ll also get: Up to date—and visually supported—guidance on the major Office apps that are part of Microsoft 365: Word, Excel, PowerPoint, Outlook, and Access Full-color, two-page tutorials that get you up and running fast Easy-to-read instructions and stepwise advice to accompany the informative and crystal-clear imagesIdeal for people using Microsoft 365 for the very first time, Teach Yourself VISUALLY Microsoft 365 is also a can’t-miss resource for long-time users of the software suite who need an introduction to the latest version and Office veterans seeking a refresher on what Microsoft 365 is capable of.
Thorough review of foundational concepts and advanced techniques in natural language processing (NLP) and its impact across sectors Supported by examples and case studies throughout, Language Intelligence provides an in-depth exploration of the latest advancements in natural language processing (NLP), offering a unique blend of insight on theoretical foundations, practical applications, and future directions in the field. Composed of 10 chapters, this book provides a thorough understanding of both foundational concepts and advanced techniques, starting with an overview of the historical development of NLP and essential mechanisms of Natural Language Understanding (NLU) and Natural Language Generation (NLG). It delves into the data landscape crucial for NLP, emphasizing ethical considerations, and equips readers with fundamental text processing techniques. The book also discusses linguistic features central to NLP and explores computational and cognitive approaches that enrich the field's advancement. Practical applications and advanced processing techniques across various sectors like healthcare, legal, finance, and education are showcased, along with a critical examination of NLP metrics and methods for evaluation. The appendices offer detailed explorations of text representation methods, advanced applications, and Python's NLP capabilities, aiming to inform, inspire, and ignite a passion for NLP in the ever-expanding digital universe. Written by a highly qualified academic with significant research experience in the field, Language Intelligence covers sample topics including: Fundamental text processing, covering text cleaning, sentence splitting, tokenization, lemmatization and stemming, stop-word removal, part-of-speech tagging, and parsing and syntactic analysis Computational and cognitive approaches, covering human-like reasoning, transfer learning, and learning with minimal examples Affective, psychological, and content analysis, covering sentiment analysis, emotion recognition, irony, humour, and sarcasm detection, and indicators of distress Multilingual natural language processing, covering translation and transliteration, cross-lingual models and embeddings, low-resource language processing, and cultural nuance and idiom recognition Language Intelligence is an ideal reference on the subject for professionals across sectors and graduate students in related programs of study who have a foundational understanding of computer science, linguistics, and artificial intelligence and are looking to delve deeper into the intricacies of NLP.
Unlock the power of AI while ensuring your data security and customer privacy In Securing Microsoft Azure OpenAI, author Karl Ots delivers an essential guide to harnessing the vast AI capabilities of Microsoft Azure, with a strong emphasis on data security. This book serves as your gateway to understanding and utilizing large language models like GPT-4 and GPT-3.5-Turbo, within the secure confines of Microsoft Azure. It's designed for professionals who aim to integrate AI into their applications responsibly, ensuring that data privacy and security are never compromised. The content within this comprehensive guide serves as an introduction to Microsoft Azure's partnership with OpenAI, offering insights into deploying AI technologies securely and ethically. It navigates the criticality of data security in AI development, covering the spectrum from preserving privacy and protecting intellectual property to avoiding model biases and mitigating financial and reputational risks. Through practical use cases and best practices, Karl Ots illustrates how to apply responsible AI principles in real-world scenarios, ensuring your innovations are both powerful and principled. In the book, you'll: Learn how to leverage advanced AI models within a secure cloud-based platform, ensuring your data's integrity and privacy Understand the importance of data security in AI, including how to protect sensitive information and intellectual property Discover strategies for responsible AI deployment, focusing on minimizing bias, ethical practices, and harm mitigation Securing Microsoft Azure OpenAI is an intuitive roadmap to deploying AI technologies with confidence and integrity. Whether you're an IT professional, a data scientist, or a business leader, this book equips you with the knowledge to use Azure OpenAI services effectively while safeguarding your most valuable asset: your data. Dive into the future of AI with security at its heart--make Securing Microsoft Azure OpenAI your next essential read.
Prepare for the aPHR and aPHRi exams--as well as a new career in HR--smarter and faster In the aPHR and aPHRi Associate Professional Human Resources Certification Study Guide: 2024 Exams, a team of dedicated human resources professionals and educators delivers a must-read roadmap to obtaining the entry-level Associate in Professional Human Resources and Associate in Professional Human Resources (International) credentials. Unique certifications in the industry, the aPHR and aPHRi do not require any prior work experience or education and are perfect for non-HR professionals and newcomers to the field interested in exploring the industry or upgrading their skillset to include core human resources concepts, including talent acquisition, learning and development, compensation and benefits, employee relations, and compliance and risk management. aPHR and aPHRi Associate Professional Human Resources Certification Study Guide walks you through its comprehensive coverage of every functional area on the exams and offers complimentary access to an interactive online learning environment and test bank. In the book: Access to electronic flashcards, a glossary of key terms, a practice exam, and an assessment test prepare you for the exam Discussions of brand-new diversity, equity, and inclusion concepts and the differences between the international and domestic versions of the exam The knowledge you'll need to hit the ground running in an entry-level position in human resources An essential read for experienced professionals looking to expand their knowledge base into human resources and aspiring human resources professionals seeking to begin a new and rewarding career in the industry, the aPHR and aPHRi Associate Professional Human Resources Certification Study Guide: 2024 Exams will help you prepare for the exam--and a new job in HR--smarter and faster.
A hands-on, beginner-friendly intro to web application pentesting In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date exploration of web app pentesting. In the book, Ali takes a dual approach--emphasizing both theory and practical skills--equipping you to jumpstart a new career in web application security. You'll learn about common vulnerabilities and how to perform a variety of effective attacks on web applications. Consistent with the approach publicized by the Open Web Application Security Project (OWASP), the book explains how to find, exploit and combat the ten most common security vulnerability categories, including broken access controls, cryptographic failures, code injection, security misconfigurations, and more. A Beginner's Guide to Web Application Penetration Testing walks you through the five main stages of a comprehensive penetration test: scoping and reconnaissance, scanning, gaining and maintaining access, analysis, and reporting. You'll also discover how to use several popular security tools and techniques--like as well as: Demonstrations of the performance of various penetration testing techniques, including subdomain enumeration with Sublist3r and Subfinder, and port scanning with Nmap Strategies for analyzing and improving the security of web applications against common attacks, including Explanations of the increasing importance of web application security, and how to use techniques like input validation, disabling external entities to maintain security Perfect for software engineers new to cybersecurity, security analysts, web developers, and other IT professionals, A Beginner's Guide to Web Application Penetration Testing will also earn a prominent place in the libraries of cybersecurity students and anyone else with an interest in web application security.
Volume IV of the Remote Sensing Handbook, Second Edition, is focused on the use of remote sensing in forestry, biodiversity, ecology, land use and land cover, and global terrestrial carbon mapping and monitoring. This book is an essential resource for researchers at all levels interested in using remote sensing.
Volume III of the Remote Sensing Handbook, Second Edition, is focused on agriculture, food security, vegetation, phenology, rangelands, soils, and global biomass modeling, mapping, and monitoring using multi-sensor remote sensing. This book is an essential resource for researchers at all levels interested in using remote sensing.
Volume II of the Remote Sensing Handbook, Second Edition, is focused on digital image processing including image classification methods in land cover and land use. It discusses object-based segmentation and pixel-based image processing algorithms, change detection techniques, and image classification for a wide array of applications.
Volume I of the Remote Sensing Handbook, Second Edition, is focused on satellites and sensors including Radar, LiDAR, Microwave, Hyperspectral, UAVs and their applications. It integrates discussions of remote sensing principles, data, methods, development, applications, and scientific and social context.
This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August/September 2022.The 9 full papers and 5 workshop and tutorial papers included in this volume were carefully reviewed and selected from 23 submissions. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.
The book is intended to serve as an introductory course in group theory geared towards second-year university students. It aims to provide them with the background needed to pursue more advanced courses in algebra and to provide a rich source of examples and exercises. Studying group theory began in the late eighteenth century and is still gaining importance due to its applications in physics, chemistry, geometry, and many fields in mathematics. The text is broadly divided into three parts. The first part establishes the prerequisite knowledge required to study group theory. This includes topics in set theory, geometry, and number theory. Each of the chapters ends with solved and unsolved exercises relating to the topic. By doing this, the authors hope to fill the gaps between all the branches in mathematics that are linked to group theory. The second part is the core of the book which discusses topics on semigroups, groups, symmetric groups, subgroups, homomorphisms, isomorphism, and Abelian groups. The last part of the book introduces SAGE, a mathematical software that is used to solve group theory problems. Here, most of the important commands in SAGE are explained, and many examples and exercises are provided.
This book explains the ideas behind one of the most well-known methods for knowledge graph embedding of transformations to compute vector representations from a graph, known as RDF2vec. The authors describe its usage in practice, from reusing pre-trained knowledge graph embeddings to training tailored vectors for a knowledge graph at hand. They also demonstrate different extensions of RDF2vec and how they affect not only the downstream performance, but also the expressivity of the resulting vector representation, and analyze the resulting vector spaces and the semantic properties they encode.
This practical guide shows, step by step, how to use machine learning to carry out actionable decisions that do not discriminate based on numerous human factors, including ethnicity and gender. The authors examine the many kinds of bias that occur in the field today and provide mitigation strategies that are ready to deploy across a wide range of technologies, applications, and industries.Edited by engineering and computing experts, Mitigating Bias in Machine Learning includes contributions from recognized scholars and professionals working across different artificial intelligence sectors. Each chapter addresses a different topic and real-world case studies are featured throughout that highlight discriminatory machine learning practices and clearly show how they were reduced.Mitigating Bias in Machine Learning addresses: Ethical and Societal Implications of Machine LearningSocial Media and Health Information DisseminationComparative Case Study of Fairness ToolkitsBias Mitigation in Hate Speech DetectionUnintended Systematic Biases in Natural Language Processing Combating Bias in Large Language ModelsRecognizing Bias in Medical Machine Learning and AI ModelsMachine Learning Bias in HealthcareAchieving Systemic Equity in Socioecological SystemsCommunity Engagement for Machine Learning
The Routledge Companion to Libraries, Archives, and the Digital Humanities covers a wide range of issues encountered in the world's libraries and archives as they continue to expand their support of, and direct engagement in, DH research and teaching.
The book presents the latest developments in intelligent communication networks based on applicability from various domains of artificial intelligence and machine learning including channel modeling, model-based structure, channel prediction, and signal detection.
Virtual Reality for Serious Illness explores the important role virtual reality interventions can play in symptom management, anxiety control, and spiritual meaning.
Virtual Reality for Serious Illness explores the important role virtual reality interventions can play in symptom management, anxiety control, and spiritual meaning.
The book provides an in-depth exploration of cutting-edge technologies and how they are used to support data-driven marketing strategies and empower organizations to make the right decisions.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.