Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Kang, Zhang, and Tanaka's comprehensive reference work take an interdisciplinary approach to explain the principles of remote sensing, data characteristics and parameters, and data processing tools; describe the many applications of remote sensing; and explore future trends related to this process.
Social media has become an increasingly prevalent aspect of our lives, used daily by many people. In this timely study, Patrick Lonergan examines the relationship between social media and theatre. He argues that social media is itself a performance space, analysing how it's used by both theatres and audiences and also in connection with each other.
To be ahead of your competitors, you need to know them and for this, it is important to constantly manage news and content. Enterprise systems let you collect, organize, analyze, and disseminate content so it can serve your business goals quickly. How you handle this information can be a competitive advantage for businesses.
This book investigates how women in Africa are being impacted by the fourth industrial revolution, which describes the twenty-first century proliferation of mobile internet, machine learning and artificial intelligence. This book will be of interest to researchers of women and technology in Africa.
Including the latest Microsoft 365 features and enhanced support for Mac users in introductory level modules, Duffy/Cram's ILLUSTRATED MICROSOFT 365 WORD COMPREHENSIVE, FIRST EDITION, helps you quickly master the nuances of Microsoft Office. Its concise, student-friendly approach uses a proven two-page layout that allows you to work through an entire task without turning the page. Each module begins with a brief overview of the principles covered while large, full-color screen images illustrate what you see on your computer. Module Learning Objectives are mapped to Microsoft Office Specialist (MOS) certification objectives, and module scenarios are based on data from market insights, helping you sharpen the critical skills you need for real-world success. In addition, MindTap and SAM (Skills Assessment Manager) digital resources help maximize your study time and results.
This new edition explores the ever-evolving landscape of the autonomous enterprise and AI. While many companies have already begun their journey towards high automation and AI-powered operations, the landscape continues to shift rapidly. Building on the success of the first edition, this book has been fully updated and equips corporate decision-makers with the knowledge to navigate this dynamic environment, including the latest trends. This book helps leaders understand the opportunities and risks that the autonomous enterprise presents and how best to navigate the shifting competitive landscape on their journey of change. This book is your guide to this innovation, presenting the concepts in real world contexts by covering the art of the possible today and providing glimpses into the future of business. Explains how AI is innovating business now, with industry case studiesSuggests how AI is likely to develop in businesses in the future, creating the autonomous enterpriseWritten by a coveted expert in the field of autonomous enterprise
There is a generational transformation in the workforce. But there is good news. Artificial intelligence and machine learning can help improve work processes, thus improving work experience and creating an environment that retains skilled workers.
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. New to This Edition: The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more
This book explains the field of Generative Artificial Intelligence (AI), focusing on its potential and applications, and aims to provide you with an understanding of the underlying principles, techniques, and practical use cases of Generative AI models.The book begins with an introduction to the foundations of Generative AI, including an overview of the field, its evolution, and its significance in today¿s AI landscape. It focuses on generative visual models, exploring the exciting field of transforming text into images and videos. A chapter covering text-to-video generation provides insights into synthesizing videos from textual descriptions, opening up new possibilities for creative content generation. A chapter covers generative audio models and prompt-to-audio synthesis using Text-to-Speech (TTS) techniques. Then the book switch gears to dive into generative text models, exploring the concepts of Large Language Models (LLMs), natural language generation (NLG), fine-tuning, prompt tuning, and reinforcement learning. The book explores techniques for fixing LLMs and making them grounded and indestructible, along with practical applications in enterprise-grade applications such as question answering, summarization, and knowledge-based generation.By the end of this book, you will understand Generative text, and audio and visual models, and have the knowledge and tools necessary to harness the creative and transformative capabilities of Generative AI. What You Will Learn What is Generative Artificial Intelligence? What are text-to-image synthesis techniques and conditional image generation? What is prompt-to-audio synthesis using Text-to-Speech (TTS) techniques? What are text-to-video models and how do you tune them? What are large language models, and how do you tune them? Who This Book Is ForThose with intermediate to advanced technical knowledge in artificial intelligence and machine learning
Discover a groundbreaking approach to introducing DevSecOps. DevSecOps Adventures uses three innovative games to help you to maximize engagement in your training and transform learners¿ mindsets, turning even reluctant sceptics into supporters and advocates of the DevOps culture.The book¿s first coaching game uses LEGO, Chocolate, and role cards to explore the roles and interdependencies of Dev, Ops, and Security. Readers will experience Aha! moments, expand their individual roles, develop T-shaped skills, and experiment with changing organizational culture. The simulations depict an end-to-end product delivery process, highlighting bottlenecks in the value delivery flow. Additionally, the book is updated with two new games, "Fear in the Workplace" and "Safety in the Workplace" which provide insights into safety culture, drawing inspiration from the works of Ron Westrum, William Kahn, Amy C. Edmondson, and Dr. David Rock. Through open conversations, participants learn to identify signs of a fear-ridden culture and apply safety-enhancing practices to foster a culture of experimentation and learning.This Second Edition is enhanced with real-life examples and includes the insights from important State of DevOps reports. The updated ¿Key Takeaway¿ chapter and the new FAQ chapter prepare trainers to deliver an impactful learning experience. It serves as a facilitation guide for gamified experiential learning, provides ideas for effective debriefing, and helps readers relate the issues highlighted in the coaching games to similar challenges they may face in their organizations. What You Will Learn: Gain fundamental understanding of DevOps, DevSecOps, and Safety Culture. Develop the capability to prepare, facilitate, and effectively debrief these coaching games with your teams. Showcase how playfulness can help teams bring down a "wall of confusion" between the different functional silos. Who This Book Is ForProgrammers or system admins/project managers who are new to DevOps.DevOps trainers and Agile Coaches who are interested in offering a collaborative and engaging learning experience to their teams.
Continue your Python network automation journey and delve deeper into advanced techniques and methodologies. Volume 2 of this comprehensive guide takes you beyond the essentials, equipping you with advanced skills and strategies crucial for success in network automation. Building upon the knowledge gained in Volume 1, yoüll set the stage for mastery in this dynamic field.Yoüll start by establishing a robust lab environment for advanced automation projects tailored to your needs and use practical exercises to gain valuable insights into essential networking protocols. Then automate repetitive tasks with precision and efficiency by leveraging powerful Python libraries and tools. Yoüll also see how to streamline IP address management and data center infrastructure management tasks with Python. Discover advanced techniques for network management and monitoring to optimize network performance and security.Explore the development of custom tools and applications for Cisco IOS upgrade tasks in complex network environments and put your skills to the test with real-world scenarios. All this is designed to solidify your expertise and confidence in network automation practices. Your network management capabilities will be enhanced with advanced tools, such as NetBox. Introduction to Python Network Automation Volume 2 - Stepping up provides a comprehensive roadmap to elevate your skills and excel in the dynamic field of network automation. Whether you're a seasoned professional or a newcomer to the field, this guide equips you with the tools and knowledge needed to thrive in today's network automation landscape.What You Will Learn Apply Python fundamentals and network automation strategies effectively. Utilize Python for streamlined network administration, boosting productivity. Consolidate Linux fundamentals and IP network services for enhanced network management. Practice implementing regular expressions in Python for network application development. Develop working Cisco IOS upgrading Python application in PoC environment. Explore Python's extensive applications in enterprise network automation for versatile solutions.Who This Book Is ForIT engineers and developers, network managers and students, who would like to learn network automation using Python.
Responding to the escalating demands placed on organizations and enterprises as they navigate the intricacies of cloud economics, this book offers pragmatic insights for establishing a sturdy foundation for cloud cost management. Scaling Cloud FinOps empowers you with the knowledge and strategies to harness efficient cloud technology usage to proficiently manage cloud costs, refine expenditure, and implement robust, scalable Cloud FinOps practices. At the same time, it arms engineering leaders and executives with the necessary tools to foster a culture of cost awareness critical to greater profitability. At the heart of the book lies author Sasi Kanumuri¿s #Piggy-Bank Framework, an innovative approach to cloud cost governance that offers a practical blueprint to streamline cost reporting, provisioning, and resource management through automation, efficiency, and overall financial performance. Yoüll also delve into the intricacies of the 6-factor formula, a proven approach to cloud cost management. From resource rightsizing and cost allocation models to automated guardrails and vendor management, each factor serves as a pillar to support your organization's financial goals. Looking beyond numbers, Scaling Cloud FinOps will give you the tools needed to orchestrate a cultural shift that can permeate every aspect of your organization. You'll learn how to cultivate a cost-aware engineering culture in which financial policies give every team member the knowledge and motivation to make data-driven decisions that drive efficiency, unlocking significant cost savings and cloud financial excellence. What You Will Learn Cultivate a culture of cost awareness and accountability within engineering teams, fostering collaboration and data-driven decision-making to enhance cloud efficiency Best practices from FinOps pioneers who've scaled world-class FinOps Teams at tech giants and startups Explore unique frameworks enriched with real-world case studies, providing invaluable insights into effective cloud cost management (CCM) Acquire expert techniques in cost optimization, automation, and vendor management, all proven to deliver significant savings and optimal efficacy Who This Book Is ForProfessionals and leaders across the cloud, IT, finance, and procurement industries interested in streamlining cloud expenditures, cultivating a culture of cost awareness across the organization, and establishing robust cloud cost management strategies. Whether you're a novice or seasoned in FinOps practices, this book equips you with the tools to maximize the business value of your cloud investments.
Understand how to use MLOps as an engineering discipline to help with the challenges of bringing machine learning models to production quickly and consistently. This book will help companies worldwide to adopt and incorporate machine learning into their processes and products to improve their competitiveness.The book delves into this engineering discipline's aspects and components and explores best practices and case studies. Adopting MLOps requires a sound strategy, which the book's early chapters cover in detail. The book also discusses the infrastructure and best practices of Feature Engineering, Model Training, Model Serving, and Machine Learning Observability. Ray, the open source project that provides a unified framework and libraries to scale machine learning workload and the Python application, is introduced, and you will see how it fits into the MLOps technical stack.This book is intended for machine learning practitioners, such as machine learning engineers, and data scientists, who wish to help their company by adopting, building maps, and practicing MLOps. What You'll Learn Gain an understanding of the MLOps discipline Know the MLOps technical stack and its components Get familiar with the MLOps adoption strategy Understand feature engineering Who This Book Is ForMachine learning practitioners, data scientists, and software engineers who are focusing on building machine learning systems and infrastructure to bring ML models to production
This book is a comprehensive guide to GitHub Enterprise Cloud and provides a detailed overview of how to set up, manage, administer, and configure GitHub for organizations. In addition to this, you will also learn identity management and the CI/CD pipeline.The book starts with a thorough introduction to GitHub administration and its benefits. You will then learn how to set up and manage a GitHub Enterprise account and organization, guiding administrators through each step. Next, you will go through GitHub Repository Secure Management and Best Practices along with an understanding of how to manage access to GitHub using SAML SSO. GitHub enterprise support strategies and their usage and adoption are discussed next in detail. Moving ahead, you will learn about GitHub Action and Packages followed by GitHub Copilot management. How to automate repetitive tasks and workflows using GitHub Actions and enhancing productivity is discussed in detail with the help of case studies. Towards the end, you will demonstrate securing the software development lifecycle through advanced security and use GitHub Actions for automating business processes.After reading this book, you will be able to leverage the full potential of GitHub Enterprise Cloud for your software development needs.What Will You LearnHow to set up and configure GitHub Enterprise for optimal collaboration, security, and scalability in an enterprise environment.Best practices for managing organizations, repositories, and user access permissions effectively to foster efficient teamwork and code collaboration.Strategies to implement robust CI/CD pipelines using GitHub Actions, automating build, testing, and deployment processes for faster and more reliable software delivery.Proven techniques for ensuring top-notch security and compliance, including authentication methods, access controls, and vulnerability scanning, to protect code repositories and sensitive data.Who Is This Book ForSoftware Development teams, DevOps engineers, and IT professionals who are looking to use GitHub Enterprise Cloud for code collaboration, management, and deployment.
Data is a core asset in the current development of information technology and needs to be stored efficiently and reliably to serve many important real-world applications such as the Internet, big data, artificial intelligence, and high-performance computing. Generations of researchers and practitioners have continued to innovate the design of storage systems to achieve the goals of high performance, ease of use, and high reliability.This textbook provides a thorough and comprehensive introduction to the field of data storage. With 14 chapters, the book not only covers the basics of storage devices, storage arrays, storage protocols, key-value stores, file systems, network storage architecture, distributed storage systems, storage reliability, storage security, and data protection, but also provides in-depth discussions on advanced topics such as storage maintenance, storage solutions, and storage technology trends and developments (e.g., in-storage computing, persistent memory system, blockchain storage, and in-network storage system). For each section, the authors have attempted to provide the latest current academic and industry research progress that will help readers deepen their understanding and application of basic data storage concepts.This textbook is ideal for storage courses targeting upper-level undergraduate or graduate students in computer science and related disciplines. It also serves as a valuable reference for technical professionals.
This textbook comprehensively explores the foundational principles, algorithms, and applications of intelligent optimization, making it an ideal resource for both undergraduate and postgraduate artificial intelligence courses. It remains equally valuable for active researchers and individuals engaged in self-study. Serving as a significant reference, it delves into advanced topics within the evolutionary computation field, including multi-objective optimization, dynamic optimization, constrained optimization, robust optimization, expensive optimization, and other pivotal scientific studies related to optimization. Designed to be approachable and inclusive, this textbook equips readers with the essential mathematical background necessary for understanding intelligent optimization. It employs an accessible writing style, complemented by extensive pseudo-code and diagrams that vividly illustrate the mechanisms, principles, and algorithms of optimization. With a focus on practicality, this textbook provides diverse real-world application examples spanning engineering, games, logistics, and other domains, enabling readers to confidently apply intelligent techniques to actual optimization problems. Recognizing the importance of hands-on experience, the textbook introduces the Open-source Framework for Evolutionary Computation platform (OFEC) as a user-friendly tool. This platform serves as a comprehensive toolkit for implementing, evaluating, visualizing, and benchmarking various optimization algorithms. The book guides readers on maximizing the utility of OFEC for conducting experiments and analyses in the field of evolutionary computation, facilitating a deeper understanding of intelligent optimization through practical application.
This book highlights the numerous potentials and concerns involved with using the metaverse. Furthermore, the project discusses countermeasures to protect any firm from these risks. Insights into practical solutions may assist organizations in using this new business model by raising awareness and preparing them to improve. The book helps readers get insights into technology's future, i.e., the metaverse. The application areas of the metaverse is quite vast, but it also includes security and privacy issues. Addressing the security issues is the need of the hour. Developers are designing the applications, and users are ready to use them, but on the other side, many security issues need to be focused on. Hence, along with the applications, this book helps the reader understand these hidden security and privacy issues.
This book gives in-depth coverage of how to architect, design and orchestrate a 5G capable network that would integrate with 5G RAN, IP transport, data centers, Telco Cloud and 5G packet core networks.
This book focuses on next generation sequencing, which is completely changing how we examine organisms and has a great impact on the areas of biomedical research and disease diagnosis.
In its updated 2nd edition, this book details the complete business process lifecycle from modeling to process enactment and improvement, taking all stakeholders into account. Includes management architectures and such standards as WfMC, SOAP, WSDL and BPEL.
This textbook is intended for students of mathematics who have completed the foundational courses of their undergraduate studies and now want to specialize in Data Science and Machine Learning. It introduces the reader to the most important topics in the latter areas focusing on rigorous proofs and a systematic understanding of the underlying ideas.The textbook comes with 121 classroom-tested exercises. Topics covered include k-nearest neighbors, linear and logistic regression, clustering, best-fit subspaces, principal component analysis, dimensionality reduction, collaborative filtering, perceptron, support vector machines, the kernel method, gradient descent and neural networks.
Starting with the Shannon-Wiener approach to mathematical information theory, allowing a mathematical "measurement" of an amount of information, the book begins by defining the terms message and information and axiomatically assigning an amount of information to a probability. The second part explores countable probability spaces, leading to the definition of Shannon entropy based on the average amount of information; three classical applications of Shannon entropy in statistical physics, mathematical statistics, and communication engineering are presented, along with an initial glimpse into the field of quantum information. The third part is dedicated to general probability spaces, focusing on the information-theoretical analysis of dynamic systems.The book builds on bachelor-level knowledge and is primarily intended for mathematicians and computer scientists, placing a strong emphasis on rigorous proofs.
This practical handbook provides a well-founded insight into the complex preparatory work for the realisation of eLearning projects. The book describes how project managers and media authors work as a team to create a script for eLearning that fulfils learning psychology criteria and current multimedia didactics. Tools for designing and writing scripts are presented and evaluated so that a needs-based selection is possible. The third edition has been revised and updated throughout. A new chapter on "Mobile Learning" shows the latest developments. The draft of instructional videos and the possibilities of the social web are explained in detail.Enriched with valuable tips for work organisation and an outline of the media author's job description, the handbook is aimed at project managers and specialists in companies, further education institutions and multimedia agencies as well as media authors and those who want to become one. Numerous checklists facilitate daily work, e.g. for checking a finished script - a quality assurance measure that helps save time and money. Written directly for everyday professional use, the book uses practical methods and work aids as well as tips and tricks to show how a strong draft and a carefully prepared script make a decisive contribution to the successful production of eLearning applications.
This open access book provides a basic introduction to feature modelling and analysis as well as to the integration of AI methods with feature modelling. It is intended as an introduction for researchers and practitioners who are new to the field and will also serve as a state-of-the-art reference to this audience. While focusing on the AI perspective, the book covers the topics of feature modelling (including languages and semantics), feature model analysis, and interacting with feature model configurators. These topics are discussed along the AI areas of knowledge representation and reasoning, explainable AI, and machine learning.
This book focuses on the relationship between Artificial Intelligence (AI) and the Sustainable Development Goals (SDGs). One of the most important issues the world is facing is sustainability. All members of the United Nations adopted Agenda 2030 and the Sustainable Development Goals. Associated with the SDGs are many serious global problems. These problems include climate change, global poverty, global hunger, human trafficking, homelessness, biodiversity, extinction, and terrorism. The author¿s purpose is to develop a textbook concerning the SDGs and how they relate to these problems. A recent issue has emerged. That is Artificial Intelligence. AI has tremendous potential to do both good and harm. The book is designed in such a way that it can be used as an undergraduate textbook on sustainability. Consequently, the mathematics involved is kept at a reasonable level. One of the author¿s goals is to prepare the reader to further their study of global issues. In particular, to provide them the background needed to examine the three books in the Springer Series Studies in Systems, Decision and Control, volumes 299, 353, and 391. Exercises are provided in the text as well as an instructor's manual. Some topics examined in the book include country achievement of the SDGs, the relationship between human trafficking and the SDGs, climate change, and global problems mentioned above.
This book provides operational guidance on how to bring process mining to the next level, with process intelligence enabling companies to improve process efficiency and realize value. Written by practitioners, it combines the editor¿s 10-year experience in this field gained at Celonis and Siemens, with 12 best practice use cases from international companies representing multiple industries and domains. Part I sets the stage describing the evolution from process mining to process intelligence. The chapters guide the reader step by step, from getting started to driving adoption at scale. Success factors critical for digital transformations and a detailed path to value realization are presented. Best practices on operating models and Centers of Excellence (CoEs) are shared as accelerators for successful digital transformations. Part II presents 12 use cases written by transformation- and CoE leaders who have achieved significant impact and value with process intelligence in their respective organization. All use cases have been written independent from any particular software, with a focus on evangelizing the topic and showcasing how companies like ABB, BMW, Bosch, Merck, PepsiCo, Saint Gobin, Siemens, and others leverage the capability to drive value. Part III provides an outlook on the future of process intelligence from an academic and an operational perspective, with a special focus on the disruptive impact of GenAI with future scenarios, challenges and recommendations.The book is written by practitioners for practitioners. Readers may have responsibilities as senior executives, transformation leaders, process managers and experts, consultants, change evangelists, etc. The book provides operational, hands-on tips on how to accelerate process transformation in organizations by detailing best practices as well as possible pitfalls.
The 2nd edition of this well-established textbook introduces the reader to the fundamentals of contemporary and emerging technologies and services in Internet computing. It covers essential concepts such as distributed systems architecture and web technologies, contemporary paradigms such as cloud, fog, and edge computing, the Internet of things, and emerging technologies like distributed ledger technologies and the InterPlanetary File System. The book also highlights the interconnection and recombination of these Internet-based technologies, which together form a critical information infrastructure with major impacts on individuals, organizations, governments, economies, and society as a whole.Intended as a textbook for upper undergraduate and graduate classes, it features a wealth of examples, learning goals and summaries for every chapter, numerous recommendations for further reading, and questions for checking students¿ comprehension. A dedicated author website offers additional teaching material and more elaborate examples. Accordingly, the book enables students and young professionals in IT-related fields to familiarize themselves with the Internet¿s basic mechanisms, and with the most promising Internet-based technologies of our time.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.