Видавець: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
4065
Eлектронна книга

Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes

John Paul Mueller, Rod Stephens

Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning.As you progress to the second part, you’ll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references.The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary’s reputation. Once you’ve understood hacker goals and detection techniques, you’ll learn about the ramifications of deep fakes, followed by mitigation strategies.This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You’ll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.

4066
Eлектронна книга

Microsoft Power Apps Cookbook. Build user-friendly apps, troubleshoot challenges, and navigate the evolving Power Apps landscape - Third Edition

Eickhel Mendoza

In the rapidly evolving world of low-code development, Microsoft Power Apps stands out as a powerful platform for building custom business solutions. Microsoft Power Apps Cookbook, 3rd Edition, is your hands-on guide to mastering this platform. Through a collection of step-by-step recipes, this updated edition helps you navigate the latest features, such as AI-powered Microsoft Copilot and custom UI elements while empowering you to build efficient and scalable apps.This book emphasizes practical solutions, guiding app makers through building everything from canvas apps to complex data integrations. You will learn how to streamline repetitive tasks using Robotic Process Automation (RPA) and explore how to create external-facing websites using Microsoft Power Pages while handling data management with Dataverse and extending app functionality with the Power Apps Component Framework.Whether you're extending your app's capabilities with custom components or integrating advanced AI features, Microsoft Power Apps Cookbook equips you with the knowledge and skills to take your app development to the next level.

4067
Eлектронна книга

Python: Real World Machine Learning. Take your Python Machine learning skills to the next level

Prateek Joshi, Luca Massaron, John Hearty, Alberto Boschetti, ...

Machine learning is increasingly spreading in the modern data-driven world. It is used extensively across many fields such as search engines, robotics, self-driving cars, and more. Machine learning is transforming the way we understand and interact with the world around us.In the first module, Python Machine Learning Cookbook, you will learn how to perform various machine learning tasks using a wide variety of machine learning algorithms to solve real-world problems and use Python to implement these algorithms.The second module, Advanced Machine Learning with Python, is designed to take you on a guided tour of the most relevant and powerful machine learning techniques and you’ll acquire a broad set of powerful skills in the area of feature selection and feature engineering.The third module in this learning path, Large Scale Machine Learning with Python, dives into scalable machine learning and the three forms of scalability. It covers the most effective machine learning techniques on a map reduce framework in Hadoop and Spark in Python.This Learning Path will teach you Python machine learning for the real world. The machine learning techniques covered in this Learning Path are at the forefront of commercial practice.This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products:? Python Machine Learning Cookbook by Prateek Joshi? Advanced Machine Learning with Python by John Hearty? Large Scale Machine Learning with Python by Bastiaan Sjardin, Alberto Boschetti, Luca Massaron

4068
Eлектронна книга

Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance

Adarsh Nair, Greeshma M. R.

ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. Organizations with significant exposure to information-security–related risks are increasingly choosing to implement an ISMS that complies with ISO 27001. This book will help you understand the process of getting your organization's information security management system certified by an accredited certification body.The book begins by introducing you to the standards, and then takes you through different principles and terminologies. Once you completely understand these standards, you’ll explore their execution, wherein you find out how to implement these standards in different sizes of organizations. The chapters also include case studies to enable you to understand how you can implement the standards in your organization. Finally, you’ll get to grips with the auditing process, planning, techniques, and reporting and learn to audit for ISO 27001.By the end of this book, you’ll have gained a clear understanding of ISO 27001/27002 and be ready to successfully implement and audit for these standards.

4069
Eлектронна книга

Data Stewardship in Action. A roadmap to data value realization and measurable business outcomes

Pui Shing Lee, Dr. Toa Charm

In the competitive data-centric world, mastering data stewardship is not just a requirement—it's the key to organizational success. Unlock strategic excellence with Data Stewardship in Action, your guide to exploring the intricacies of data stewardship and its implementation for maximum efficiency.From business strategy to data strategy, and then to data stewardship, this book shows you how to strategically deploy your workforce, processes, and technology for efficient data processing. You’ll gain mastery over the fundamentals of data stewardship, from understanding the different roles and responsibilities to implementing best practices for data governance. You’ll elevate your data management skills by exploring the technologies and tools for effective data handling. As you progress through the chapters, you’ll realize that this book not only helps you develop the foundational skills to become a successful data steward but also introduces innovative approaches, including leveraging AI and GPT, for enhanced data stewardship.By the end of this book, you’ll be able to build a robust data governance framework by developing policies and procedures, establishing a dedicated data governance team, and creating a data governance roadmap that ensures your organization thrives in the dynamic landscape of data management.

4070
Eлектронна книга
4071
Eлектронна книга

CQRS by Example. Master CQRS: Build Efficient and Scalable Systems with Real-World Examples

Carlos Buenosvinos, Christian Soronellas, Keyvan Akbary

This course offers an in-depth exploration of the Command Query Responsibility Segregation (CQRS) pattern, a powerful architecture design that separates read and write operations to achieve greater scalability and performance in software systems. You'll begin by understanding the core principles behind CQRS and why it is essential for handling complex, high-traffic applications. Throughout the course, we’ll work through real-world examples that demonstrate how to apply CQRS to achieve a cleaner and more efficient codebase.Next, we will guide you through the practical aspects of implementing CQRS in a variety of use cases, focusing on how it enhances system maintainability and performance. You'll learn to distinguish between commands and queries effectively, and how to manage data consistency across distributed systems using techniques like event sourcing and eventual consistency.By the end of the course, you will have a comprehensive understanding of CQRS and its benefits. You'll be able to implement it in your own projects, whether you're building new applications or improving legacy systems. With a focus on scalability, maintainability, and performance, this course equips you with the skills needed to take on complex architectural challenges confidently.

4072
Eлектронна книга