Publisher: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
4705
Ebook

Graph Data Science with Neo4j. Learn how to use Neo4j 5 with Graph Data Science library 2.0 and its Python driver for your project

Estelle Scifo

Neo4j, along with its Graph Data Science (GDS) library, is a complete solution to store, query, and analyze graph data. As graph databases are getting more popular among developers, data scientists are likely to face such databases in their career, making it an indispensable skill to work with graph algorithms for extracting context information and improving the overall model prediction performance.Data scientists working with Python will be able to put their knowledge to work with this practical guide to Neo4j and the GDS library that offers step-by-step explanations of essential concepts and practical instructions for implementing data science techniques on graph data using the latest Neo4j version 5 and its associated libraries. You’ll start by querying Neo4j with Cypher and learn how to characterize graph datasets. As you get the hang of running graph algorithms on graph data stored into Neo4j, you’ll understand the new and advanced capabilities of the GDS library that enable you to make predictions and write data science pipelines. Using the newly released GDSL Python driver, you’ll be able to integrate graph algorithms into your ML pipeline.By the end of this book, you’ll be able to take advantage of the relationships in your dataset to improve your current model and make other types of elaborate predictions.

4706
Ebook

IoT and Edge Computing for Architects. Implementing edge and IoT systems from sensors to clouds with communication systems, analytics, and security - Second Edition

Perry Lea

Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices. IoT and Edge Computing for Architects, Second Edition encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP.With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains.

4707
Ebook
4708
Ebook
4709
Ebook

Tableau Desktop Certified Associate: Exam Guide. Develop your Tableau skills and prepare for Tableau certification with tips from industry experts

Dmitry Anoshin, JC Gillet, Fabian Peri, Radhika Biyani, ...

The Tableau Desktop Certified Associate exam measures your knowledge of Tableau Desktop and your ability to work with data and data visualization techniques. This book will help you to become well-versed in Tableau software and use its business intelligence (BI) features to solve BI and analytics challenges.With the help of this book, you'll explore the authors' success stories and their experience with Tableau. You'll start by understanding the importance of Tableau certification and the different certification exams, along with covering the exam format, Tableau basics, and best practices for preparing data for analysis and visualization. The book builds on your knowledge of advanced Tableau topics such as table calculations for solving problems. You'll learn to effectively visualize geographic data using vector maps. Later, you'll discover the analytics capabilities of Tableau by learning how to use features such as forecasting. Finally, you'll understand how to build and customize dashboards, while ensuring they convey information effectively. Every chapter has examples and tests to reinforce your learning, along with mock tests in the last section.By the end of this book, you'll be able to efficiently prepare for the certification exam with the help of mock tests, detailed explanations, and expert advice from the authors.

4710
Ebook

Implementing Identity Management on AWS. A real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments

Jon Lehtinen, Steve "Hutch" Hutchinson

AWS identity management offers a powerful yet complex array of native capabilities and connections to existing enterprise identity systems for administrative and application identity use cases. This book breaks down the complexities involved by adopting a use-case-driven approach that helps identity and cloud engineers understand how to use the right mix of native AWS capabilities and external IAM components to achieve the business and security outcomes they want.You will begin by learning about the IAM toolsets and paradigms within AWS. This will allow you to determine how to best leverage them for administrative control, extending workforce identities to the cloud, and using IAM toolsets and paradigms on an app deployed on AWS. Next, the book demonstrates how to extend your on-premise administrative IAM capabilities to the AWS backplane, as well as how to make your workforce identities available for AWS-deployed applications. In the concluding chapters, you’ll learn how to use the native identity services with applications deployed on AWS.By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems.

4711
Ebook
4712
Ebook

Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity

Dr. Erdal Ozkaya

It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications.By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.