Видавець: 8
Joseph Edmonds, Lorna Jane Mitchell
PHP has come a long way since its introduction. While the language has evolved with PHP 8, there are still a lot of websites running on a version of PHP that is no longer supported. If you are a PHP developer working with legacy PHP systems and want to discover the tenants of modern PHP, this is the book for you.The Art of Modern PHP 8 walks you through the latest PHP features and language concepts. The book helps you upgrade your knowledge of PHP programming and practices. Starting with object-oriented programming (OOP) in PHP and related language features, you'll work through modern programming techniques such as inheritance, understand how it contrasts with composition, and finally look at more advanced language features. You'll learn about the MVC pattern by developing your own MVC system and advance to understanding what a DI container does by building a toy DI container. The book gives you an overview of Composer and how to use it to create reusable PHP packages. You’ll also find techniques for deploying these packages to package libraries for other developers to explore.By the end of this PHP book, you'll have equipped yourself with modern server-side programming techniques using the latest versions of PHP.
The Art of Social Engineering. Uncover the secrets behind the human dynamics in cybersecurity
Cesar Bravo, Desilda Toska, Rhonda Childress
Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.You’ll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.By the end of this social engineering book, you’ll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.
Fedor G. Pikus
The great free lunch of performance taking care of itself is over. Until recently, programs got faster by themselves as CPUs were upgraded, but that doesn't happen anymore. The clock frequency of new processors has almost peaked, and while new architectures provide small improvements to existing programs, this only helps slightly. To write efficient software, you now have to know how to program by making good use of the available computing resources, and this book will teach you how to do that.The Art of Efficient Programming covers all the major aspects of writing efficient programs, such as using CPU resources and memory efficiently, avoiding unnecessary computations, measuring performance, and how to put concurrency and multithreading to good use. You'll also learn about compiler optimizations and how to use the programming language (C++) more efficiently. Finally, you'll understand how design decisions impact performance.By the end of this book, you'll not only have enough knowledge of processors and compilers to write efficient programs, but you'll also be able to understand which techniques to use and what to measure while improving performance. At its core, this book is about learning how to learn.
Chinmay Arankalle, Gareth Dwyer, Bas Geerdink, Kunal...
Social networking sites see an average of 350 million uploads daily - a quantity impossible for humans to scan and analyze. Only AI can do this job at the required speed, and to leverage an AI application at its full potential, you need an efficient and scalable data storage pipeline. The Artificial Intelligence Infrastructure Workshop will teach you how to build and manage one.The Artificial Intelligence Infrastructure Workshop begins taking you through some real-world applications of AI. You’ll explore the layers of a data lake and get to grips with security, scalability, and maintainability. With the help of hands-on exercises, you’ll learn how to define the requirements for AI applications in your organization. This AI book will show you how to select a database for your system and run common queries on databases such as MySQL, MongoDB, and Cassandra. You’ll also design your own AI trading system to get a feel of the pipeline-based architecture. As you learn to implement a deep Q-learning algorithm to play the CartPole game, you’ll gain hands-on experience with PyTorch. Finally, you’ll explore ways to run machine learning models in production as part of an AI application.By the end of the book, you’ll have learned how to build and deploy your own AI software at scale, using various tools, API frameworks, and serialization methods.
The ASMR (Arrogant-Sexy-Messy-Roommate)
Ludka Skrzydlewska, Magdalena Szponar
Kiedy największa zołza musi zamieszkać z najweselszym facetem na świecie... ...wszystko może pójść nie tak. Parker, jesieniara i miłośniczka cmentarnego vibe'u, miała wynająć dom ze swoją najlepszą przyjaciółką i zacząć nowy etap życia. W przededniu przeprowadzki zostaje jednak wystawiona, a przez to musi zamieszkać z niejakim Cameronem, który okazuje się hałaśliwym i irytująco pogodnym mięśniakiem. O konflikt nietrudno, tym bardziej że Parker potrzebuje ciszy, by nagrywać swoje ukochane ASMR-y, a Cameron... Cóż, według dziewczyny jej nowy współlokator nawet oddycha zbyt głośno. Gdyby tego było mało, świeżo upieczeni współlokatorzy w wyniku niefortunnego zrządzenia losu muszą udawać parę, a sam Cameron ukrywa przed Parker więcej, niż można by przypuszczać. Komedia omyłek, jesienny klimat, kilka zniczy, kalistenika oraz cała masa ASMR-owych dźwięków - oto historia, która pochłonie Was podczas długich wieczorów pod kocykiem.
The ASMR (Arrogant-Sexy-Messy-Roommate)
Ludka Skrzydlewska, Magdalena Szponar
Kiedy największa zołza musi zamieszkać z najweselszym facetem na świecie... ...wszystko może pójść nie tak. Parker, jesieniara i miłośniczka cmentarnego vibe'u, miała wynająć dom ze swoją najlepszą przyjaciółką i zacząć nowy etap życia. W przededniu przeprowadzki zostaje jednak wystawiona, a przez to musi zamieszkać z niejakim Cameronem, który okazuje się hałaśliwym i irytująco pogodnym mięśniakiem. O konflikt nietrudno, tym bardziej że Parker potrzebuje ciszy, by nagrywać swoje ukochane ASMR-y, a Cameron... Cóż, według dziewczyny jej nowy współlokator nawet oddycha zbyt głośno. Gdyby tego było mało, świeżo upieczeni współlokatorzy w wyniku niefortunnego zrządzenia losu muszą udawać parę, a sam Cameron ukrywa przed Parker więcej, niż można by przypuszczać. Komedia omyłek, jesienny klimat, kilka zniczy, kalistenika oraz cała masa ASMR-owych dźwięków - oto historia, która pochłonie Was podczas długich wieczorów pod kocykiem.
Henry James
The Aspern Papers is one of the masterpieces of the writers small prose, the plots of which are based on the collision of European and American cultural consciousness, the point of view of an individual and social stereotypes, the book perception of the world and individual experience. The tragicomic search by the hapless biographer of the lost letters of the great poet is the conflict of this story.
David J. Gee, Darryl West
Explore the intricacies of CIO and CISO roles with The Aspiring CIO and CISO by David Gee. This book leverages Gee's 20+ years of digital and cyber leadership experience, providing real-world insights, making it a valuable resource for those navigating the evolving landscape of the C-suite.Tailored to entry-level, mid-level, and senior managers looking to advance to the C-suite, this book serves a unique purpose in the realm of career guidance. The narrative speaks directly to individuals uncertain about their readiness for CIO or CISO roles, offering a personal mentorship experience that goes beyond technicalities. Armed with insights into crafting a powerful 90-day plan, you'll be well-equipped to catapult into CIO or CISO roles successfully. Beyond technical proficiency, the book instills survival skills, ensuring longevity and helping you prevent burnout in these pivotal positions. Additionally, by mastering the art of brand development and soft skills, you'll grasp the interpersonal dynamics crucial for executive leadership. This book is an indispensable guide for ambitious professionals, offering foresight and empowerment to thrive in the digital age.By the end of this book, you'll emerge with strategic dexterity, confidently steering your career trajectory towards the C-suite.