Видавець: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
1897
Eлектронна книга

LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries. Design powerful and reliable compilers using the latest libraries and tools from LLVM

Min-Yih Hsu

Every programmer or engineer, at some point in their career, works with compilers to optimize their applications. Compilers convert a high-level programming language into low-level machine-executable code. LLVM provides the infrastructure, reusable libraries, and tools needed for developers to build their own compilers. With LLVM’s extensive set of tooling, you can effectively generate code for different backends as well as optimize them.In this book, you’ll explore the LLVM compiler infrastructure and understand how to use it to solve different problems. You’ll start by looking at the structure and design philosophy of important components of LLVM and gradually move on to using Clang libraries to build tools that help you analyze high-level source code. As you advance, the book will show you how to process LLVM IR – a powerful way to transform and optimize the source program for various purposes. Equipped with this knowledge, you’ll be able to leverage LLVM and Clang to create a wide range of useful programming language tools, including compilers, interpreters, IDEs, and source code analyzers.By the end of this LLVM book, you’ll have developed the skills to create powerful tools using the LLVM framework to overcome different real-world challenges.

1898
Eлектронна книга
1899
Eлектронна книга
1900
Eлектронна книга

Learn Clip Studio Paint. A beginner's guide to creating compelling art in manga, comics, and animation - Fourth Edition

Inko Ai Takita, Liz Staley

Ever dreamed of creating your own manga art or comic books? Learn Clip Studio Paint, Fourth Edition, is your roadmap to becoming a digital artist! This beginner-friendly guide takes you on a step-by-step journey of digital illustration.You'll get to grips with one of the essential features of digital illustration, layering, as you go through the process of penciling and inking your art. If you're interested in creating a webtoon graphic novel or web comic, you'll be happy to learn about comic-making essentials such as panels, sound effects, and speech bubbles.In this edition, you'll learn artistic techniques alongside Clip Studio Paint features, including a new focus on how to bring your artwork to life with proportions and perspective. You'll learn how to draw characters with various brushes and brush customizations, as well as exploring coloring methods and rulers to make your stories pop. This edition also dives into exciting new features like using 3D models to draw poses and the basics of creating animations. Packed with clear instructions and illustrated examples, this book is your one-stop shop for learning Clip Studio Paint. If you dream of creating your own manga art or comics, this guide equips you with the skills required to achieve your goals.

1901
Eлектронна книга
1902
Eлектронна книга

Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

Alessandro Parisi

Today's organizations spend billions of dollars globally on cybersecurity. Artificial intelligence has emerged as a great solution for building smarter and safer security systems that allow you to predict and detect suspicious network activity, such as phishing or unauthorized intrusions.This cybersecurity book presents and demonstrates popular and successful AI approaches and models that you can adapt to detect potential attacks and protect your corporate systems. You'll learn about the role of machine learning and neural networks, as well as deep learning in cybersecurity, and you'll also learn how you can infuse AI capabilities into building smart defensive mechanisms. As you advance, you'll be able to apply these strategies across a variety of applications, including spam filters, network intrusion detection, botnet detection, and secure authentication.By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI.

1903
Eлектронна книга

Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA

Marco Fanti

MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience.You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with how MFA works and the various types of solutions currently available. As you progress through the chapters, you'll learn how to choose the proper MFA setup to provide the right combination of security and user experience. The book then takes you through methods hackers use to bypass MFA and measures to safeguard your applications. After familiarizing yourself with enabling and managing leading cloud and on-premise MFA solutions, you’ll see how MFA efficiently curbs cyber threats, aided by insights from industry best practices and lessons from real-world experiences. Finally, you’ll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys.By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud.

1904
Eлектронна книга

Extending Power BI with Python and R. Perform advanced analysis using the power of analytical languages - Second Edition

Luca Zavarella

With this updated second edition, you'll not only learn how to configure the Power BI environment to run Python and R scripts at peak performance—you'll also become familiar with the appropriate solutions to the most common problems you may encounter. Extending Power BI with Python and R explores data ingestion and data transformation extensions before moving on to focus on data enrichment and data visualization. You'll learn how to ingest data larger than available memory, import data from external sources, and transform data using complex algorithms, as well as implementing personal data de-identification methods such as pseudonymization, anonymization, and masking in Power BI. You'll find out how to call external APIs to enrich your data much faster, and address I/O performance issues using Python and R. Next, you'll learn advanced Python and R techniques to perform in-depth analysis and extract valuable information using statistics and machine learning. You'll also get to grips with the key statistical features of data sets by plotting multiple visual graphs in the process of building a machine learning model. Your knowledge will be tested through questions and answers at the end of each chapter.By the end of this book, you’ll be able to enrich your Power BI data models and unlock valuable insights using Python and R.