Verleger: K-i-s-publishing

97
Wird geladen...
E-BOOK

Advanced TypeScript 3 Programming Projects. Build 9 different apps with TypeScript 3 and JavaScript frameworks such as Angular, React, and Vue

Peter O'Hanlon

With the demand for ever more complex websites, the need to write robust, standard-compliant JavaScript has never been greater. TypeScript is modern JavaScript with the support of a first-class type system, which makes it simpler to write complex web systems. With this book, you’ll explore core concepts and learn by building a series of websites and TypeScript apps.You’ll start with an introduction to TypeScript features that are often overlooked in other books, before moving on to creating a simple markdown parser. You’ll then explore React and get up to speed with creating a client-side contacts manager. Next, the book will help you discover the Angular framework and use the MEAN stack to create a photo gallery. Later sections will assist you in creating a GraphQL Angular Todo app and then writing a Socket.IO chatroom. The book will also lead you through developing your final Angular project which is a mapping app. As you progress, you’ll gain insights into React with Docker and microservices. You’ll even focus on how to build an image classification program with machine learning using TensorFlow. Finally, you’ll learn to combine TypeScript and C# to create an ASP.NET Core-based music library app.By the end of this book, you’ll be able to confidently use TypeScript 3.0 and different JavaScript frameworks to build high-quality apps.

98
99
Wird geladen...
E-BOOK

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips you with the skills to secure AI technologies. Learn how to defend AI and LLM systems against manipulation and intrusion through adversarial attacks such as poisoning, trojan horses, and model extraction, leveraging DevSecOps, MLOps, and other methods to secure systems.This is a comprehensive guide to AI security, combining structured frameworks with practical examples to help you identify and counter adversarial attacks. Part 1 introduces the foundations of AI and adversarial attacks. Parts 2, 3, and 4 cover key attack types, showing how each is performed and how to defend against them. Part 5 presents secure-by-design AI strategies, including threat modeling, MLSecOps, and guidance aligned with OWASP and NIST. The book concludes with a blueprint for maturing enterprise AI security based on NIST pillars, addressing ethics and safety under Trustworthy AI.By the end of this book, you’ll be able to develop, deploy, and secure AI systems against the threat of adversarial attacks effectively.*Email sign-up and proof of purchase required

100
Wird geladen...
HÖRBUCH

Adversarial Tradecraft in Cybersecurity Audiobook. Offense versus defense in real-time computer conflict

Dan Borges

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.This audiobook contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.Throughout this audiobook, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors’ motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.By the end of this audiobook, you will have achieved a solid understanding of cyberattacks from both an attacker’s and a defender’s perspective.

101
Wird geladen...
E-BOOK

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors’ motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker’s and a defender’s perspective.

102
Wird geladen...
E-BOOK

Advertising on Google: The High Performance Cookbook. Cracking pay-per-click on Google can increase your visitor numbers and profits. Here are over 120 practical recipes to help you set up, optimize and manage your Adwords campaign with step-by-step instructions

Kristina Cutura

This book contains practical recipes on everything from creating an Adwords account, reporting, analyzing, bidding effectively to remarketing. The book is a guide to getting hands-on experience in Adwords strategies. It is extensively focussed on helping you build an Adwords account, which appeals to the visitors and attracts more clicks!This book is great for the users, who are ready to start using Adwords, as well as for experienced advertisers, who are looking to take their accounts to the next level. Just create an Adwords account and run ad campaigns to take advantage of the hands-on recipes.

103
Wird geladen...
E-BOOK

Agentic Architectural Patterns for Building Multi-Agent Systems. Proven design patterns and practices for GenAI, agents, RAG, LLMOps, and enterprise-scale AI systems

Dr. Ali Arsanjani, Juan Pablo Bustos, Thomas...

Generative AI has moved beyond the hype, and enterprises now face the challenge of turning prototypes into scalable solutions. This book is your guide to building intelligent agents powered by LLMs.Starting with a GenAI maturity model, you’ll learn how to assess your organization’s readiness and create a roadmap toward agentic AI adoption. You’ll master foundational topics such as model selection and LLM deployment, progressing to advanced methods such as RAG, fine-tuning, in-context learning, and LLMOps, especially in the context of agentic AI. You'll explore a rich library of agentic AI design patterns to address coordination, explainability, fault tolerance, and human-agent interaction. This book introduces a concrete, hierarchical multi-agent architecture where high-level orchestrator agents manage complex business workflows by delegating entire sub-processes to specialized agents. You’ll see how these agents collaborate and communicate using the Agent-to-Agent (A2A) protocol.To ensure your systems are production-ready, we provide a practical framework for observability using life cycle callbacks, giving you the granular traceability needed for debugging, compliance, and cost management. Each pattern is backed by real-world scenarios and code examples using the open source Agent Development Kit (ADK).*Email sign-up and proof of purchase required

104
Wird geladen...
E-BOOK

Agile Machine Learning with DataRobot. Automate each step of the machine learning life cycle, from understanding problems to delivering value

Bipin Chadha, Sylvester Juwe

DataRobot enables data science teams to become more efficient and productive. This book helps you to address machine learning (ML) challenges with DataRobot's enterprise platform, enabling you to extract business value from data and rapidly create commercial impact for your organization.You'll begin by learning how to use DataRobot's features to perform data prep and cleansing tasks automatically. The book then covers best practices for building and deploying ML models, along with challenges faced while scaling them to handle complex business problems. Moving on, you'll perform exploratory data analysis (EDA) tasks to prepare your data to build ML models and ways to interpret results. You'll also discover how to analyze the model's predictions and turn them into actionable insights for business users. Next, you'll create model documentation for internal as well as compliance purposes and learn how the model gets deployed as an API. In addition, you'll find out how to operationalize and monitor the model's performance. Finally, you'll work with examples on time series forecasting, NLP, image processing, MLOps, and more using advanced DataRobot capabilities.By the end of this book, you'll have learned to use DataRobot's AutoML and MLOps features to scale ML model building by avoiding repetitive tasks and common errors.