Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Build working implementations of hash tables, written in the C programming language. The new and revised Second Edition has been enhanced with simplified code and more comprehensive explanations, aimed at improving clarity and comprehension while exploiting the latest features in C programming.This book starts with simple first attempts devoid of collision resolution strategies. It then progresses through improvements and extensions illustrating different design ideas and approaches, followed by experiments to validate the choices. You will learn how hash tables, when implemented and used appropriately, are exceptionally efficient data structures for representing sets and lookup tables, providing low overhead, constant time, insertion, deletion, and lookup operations. The Joys of Hashing walks you through the implementation of efficient hash tables and the pros and cons of different design choices when building tables. The source code used in the book is available on GitHub for your re-use and experiments.What You Will Learn Master the basic ideas behind hash tables Carry out collision resolution, including strategies for handling collisions and their consequences for performance Resize or grow and shrink tables as needed Store values by handling when values must be stored with keys to make general sets and maps
Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has become mission critical. This book offers a comprehensive guide to understanding and implementing next-generation strategies that protect these intricate networks from most pressing risks.This book begins by laying the foundation of modern software supply chain security, exploring the shifting threat landscape and key technologies driving the future. Delve into the heart of how AI and IoT are transforming supply chain protection through advanced predictive analytics, real-time monitoring, and intelligent automation. Discover how integrating application security practices within your supply chain can safeguard critical systems and data.Through real-world case studies and practical insights, learn how to build resilient supply chains equipped to defend against sophisticated attacks like dependency confusion, backdoor injection, and adversarial manipulation. Whether yoüre managing a global software operation or integrating DevSecOps into your CI/CD pipelines, this book offers actionable advice for fortifying your supply chain end-to-end.You Will: Learn the role of AI and machine learning in enhancing supply chain threat detection Find out the best practices for embedding application security within the supply chain lifecycle Understand how to leverage IoT for secure, real-time supply chain monitoring and controlWho Is This Book ForThe target audience for a book would typically include professionals and individuals with an interest or involvement in cloud-native application development and DevOps practices. It will cover fundamentals of cloud-native architecture, DevOps principles, and provide practical guidance for building and maintaining scalable and reliable applications in a cloud-native environment. The book's content will cater to beginner to intermediate level professionals seeking in-depth insights.
Immerse yourself in this indispensable resource for leaders tasked with the challenge of building or managing effective software development teams. This book is based on practical wisdom, offering actionable guidance to foster high-performing teams that excel in their projects.Despite the pivotal role leadership plays in a team's success, there aren't many companies that employ structured, best-practice-driven leadership methods. The core of the book covers several critical areas essential for any tech leader's success: building high-performance teams, project management, code quality, software design and architecture, software development life cycle (SDLC), software quality insurance, observability, technology and business alignmentThe relevance of structured, principled leadership in tech has never been more important. Tech Leadership Playbook aims to equip leaders with the knowledge and tools necessary to navigate the challenges of evolving business successfully.What You Will Learn Establish industry-proven strategies for building and sustaining high-performance teams Empower teams through mission driven ownership and autonomy Reduce development cost through effective leadership Implement real Agile project management culture Gain a solid understanding of different software design architectures Leverage architectural principles to design robust and maintainable software systems Improve Code Quality with strategic SDLC practicesWho This Book is ForSenior engineers, tech leaders, engineering managers, CTO, CIO, project managers, agile coaches, and founders
Gain the necessary technical skills, tools, and insights to succeed in the crypto working environment. Changing market conditions have created new opportunities and working conditions. This book goes beyond just getting a job, as it shares a myriad of hidden tips on how to thrive within this constantly evolving ecosystem. Through examples and detailed typologies, you'll work out which crypto job is the best fit for you.You'll begin by reviewing some fun facts and anecdotes illustrating life in a Web3 environment, with a careful examination of the various roles in crypto, blockchain, and digital assets. You'll then compare roles in the traditional corporate and financial environments with those in the crypto world from a risk and reward perspective. From there you'll prepare for crypto job interviews with a focus on what to expect and fine-tuning the necessary expertise to excel. Different types of contracts, the onboarding process, communication tools, the intricacies of video conferences, internal storage, and various crypto-specific operational skills will all be clearly explained as well.So You Want to Work in Crypto provides all the strategies you'll need to stay ahead of the curve in the ever-changing crypto world.You will: Examine what job positions exist in Web3 and how to obtain the right one for you. Prepare yourself for the Web3 environment and the type of job you will get. See how to strategically evolve your career in the world of crypto.
Explore virtualized networking environments through the Cloud, Edge, and 5G core networks, and their applications. This book covers the primary approaches related to setting up and experimenting with related cloud and networking environments using virtual networks, and virtual network functions.You'll start by experimenting with future networking environments and learn a variety of Docker basics and essential networking skills. Specifically, containers, networking, volumes, iptables (for Docker environment security) and default orchestration features are discussed to help set up custom cloud, edge, and 5G core networking environments. Hands-on activities related to Docker networking and services features for publishing, scaling, and monitoring of services are also provided. By the end of Part 1, you'll be able to set up a variety of custom networking environments easily using Docker compose features and secure the set-up using iptables.Part 2 introduces Network Function Virtualization (NFV) architecture, and its roles in Cloud and 5G core networks. You'll learn to deploy an open source 5G core platform from OpenAirInterface (OAI) using Docker. Then, you'll set up and evaluate Virtual Network Functions (VNF) over suitable virtual networks. Hands-on activities are featured to guide you through the process of setting up and deploying VNFs such as DHCP, DNS, and proxy servers.Finally, Part 3 discusses key virtual networks such as IP VLANs, MAC VLANs, and overlay networks using Docker cluster setups. You'll use interesting hands-on activities to easily experiment and learn cloud and 5G core network set-up related virtual networks, overlay networks, and network slicing. When done, you'll be able to set up a variety of VNFs, carefully deploying VNFs, and conducting slicing activities over Docker cluster setups.
Inspired by recent developments in dependent type theory and infinity categories, this book presents a history of ideas around the topics of truth, proof, equality and equivalence. Besides selected ideas of Platon, Aristoteles, Leibniz, Kant, Frege and others, the results of Gödel and Tarski on incompleteness, undecidability and truth in deductive systems and their semantic models are covered. The main focus of this textbook is on dependent type theory and its recent variant homotopy type theory. Such theories contain identity types, which give a new understanding of equality, symmetry, equivalence and isomorphism in a conceptual way. The interaction of type theory and infinity category theory yields a new paradigm for a structural view on mathematics. This supports the tendencies towards formalising mathematics with the help of proof assistants.This book was first published in German. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content.
Learn how to easily design and implement a software system using object-oriented programming. Through hands-on activities, this book equips you with the real-world practice needed to master OOP skills that can be applied universally across any programming language.This book is dedicated to bridging the gap between theoretical concepts and practical implementation in software development using OOP. Readers will first understand the importance of OOP in handling software complexities before learning how to model real-world problems through access control, extendible object design, and object relationships. Specifically, the author discusses how to use inheritance, association, and polymorphism concepts for implementing reusable and easy-to-use complex software. More importantly, this book covers design patterns and event-driven programming for learning how to model complex interactions among various objects of the software system to implement various use cases.Unlike existing books on OOP which teach syntax and semantics through standard examples, this book leverages an immersive learning experience through a variety of real-world use cases, applications, games, and system software. While written in C++, the skills can be applied to any OOP language of the reader's preference. The book's last chapters will quickly introduce Python and Solidity languages for learning advanced technologies. By the end, novice and seasoned developers will know how to implement practical and reusable software systems with confidence.What You Will Learn Apply OOP concepts through real-time use cases: games, applications software (online shopping, reservations, etc.), system software (protocols, simulators, etc.), and modeling and implementation using C+ Design and implement reusable and extendible software with OOP Understand the importance of design patterns and learn how to use them for solving real-time issues Use event-driven programming for implementing complete interactions of complex application software, system software, and simulators Implement OOP using C++ features and discover Python and Solidity constructs for OOP
Discover the exciting new APIs introduced by Java's Project Loom. This quick guide covers all the essential concepts the Java developer needs in order to understand virtual threads, structured concurrency, and scoped values.Authors Ron Veen and David Vlijmincx clearly explain the superiority of virtual threads, introduced in Java 21, over the traditional Java threads of the past 25 years. Then they dive into how structured concurrency streamlines interactions by treating related threads as a unified unit of work, akin to the impact of structured programming on regular programming. From there, the authors explore the third Project Loom API and scoped values, clarifying their advantages over regular ThreadLocals and providing efficient usage insights. The book concludes with an exploration of common scheduling strategies.By the end of this book, you will have a solid understanding of the concepts behind Project Loom and will be able to immediately apply this knowledge to your own code .What You Will Learn Discover what virtual threads are, why they were created, and how to use them in your code Gain insight into how concurrency improves the observability of code Write your own StructuredTaskScopes tailored to your needs Understand why you should replace ThreadLocals with Scoped Values Know the different strategies for multithreaded computer programs
Unlock the full potential of Microsoft Lists, an indispensable tool within the Microsoft 365 suite for tracking and organizing information. This book is your comprehensive guide, from the fundamentals to the advanced capabilities of Microsoft Lists, and will help you improve productivity and foster collaboration. Whether yoüre making a basic to-do list or managing a complex inventory system, Lists is built for a broad spectrum of users, from beginners to professionals, catering to diverse enterprise and consumer use cases.The book provides thorough coverage of a wide array of topics, from the history of the product and initial setup to the entire set of features it offers. Insights are presented on using templates, optimizing columns, managing your lists, mastering the views, JSON features, and the various sharing and collaboration tools to utilize the product for maximum productivity. The book includes the latest features, such as commenting, Lists forms, real-time presence, and an in-depth look at the mobile experience.This guidebook is designed to transform your approach to information tracking and management. It offers practical examples, scenarios, and step-by-step instructions, complemented by rich visuals. The book is ideal for enterprises seeking to boost team productivity and also for individuals who wish to manage information with friends and family. What You Will Learn Optimize information management and manage lists like a pro, with list templates, custom columns, views, and JSON customization Boost collaboration through sharing and commenting, and by employing Microsoft's security and privacy features Maintain productivity on the go by navigating and managing lists on mobile devices, keeping your information accessible anywhere Enhance productivity by connecting Microsoft Lists with other products in the Microsoft 365 ecosystem Who This Book Is ForBusiness professionals. IT administrators, and individuals keen on leveraging Microsoft Lists within the Microsoft 365 ecosystem
Use Python to develop Rasperry Pi projects to solve common digital image processing and IoT problems. Using a free IoT server yoüll tackle fundamental topics and concepts behind theses two areas. This second edition includes new content on Artificial Intelligence and updated sensor guidance to help you better explore virtual animations, create a homemade spectrometer, and master object classification with Edge Impulse.Start by creating a system to detect movement with a PIR motion sensor and a Raspberry Pi board. Use the MQ2 gas sensor and a Raspberry Pi board as a gas leak alarm system to detect dangerous explosive and fire hazards. Then train your system to send the captured data to the remote server ThingSpeak. Yoüll also develop a weather station with your Raspberry Pi. Using the DHT11 (humidity and temperature sensor) and BMP (barometric pressure and temperature sensor) in conjunction with ThingSpeak and X, you can receive real time weather alerts from your own meterological system!Spectral sensers used with the Raspberry Pi include the AS7262 (six colors), and AS7263 (near infrared) for the construction of a filter spectrometer, sensing colored solutions, and assessing plant foliage health. Finally, expand your skills into the popular machine learning world of digital image processing using OpenCV and a Pi. Make your own object classifiers and finally manipulate an object by means of an image in movement. This skillset has many applications, ranging from recognizing people or objects, to creating your own video surveillance system.With the skills gained from Sensor Projects with Raspberry Pi, you'll be well-equipped to explore other applications in mobile development and electrical engineering as well. What You'll Learn Work with ThingSpeak to receive X alerts from your systems. Cultivate skills in processing sensor inputs that are applicable to mobile and machine learning projects. Incorporate sensors into projects to make interactive devices. Experiment with virtual scenarios and objects. Create Python and Pygame games that contain virtual scenarios and animations. Detect colored solutions and assess the plant foliage health.Who This Book Is ForHobbyists and makers working with robotics and IoT. Electronic engineers and programmers who would like to expand their familiarity with basic sensor projects.
This is your guide book to Generative AI (GenAI) and its application in addressing real-world challenges within the public sector. The book addresses a range of topics from GenAI concepts and strategy to public sector use cases, architecture patterns, and implementation best practices. With a general background in technology and the public sector, you will be able to understand the concepts in this book.The book will help you develop a deeper understanding of GenAI and learn how GenAI differs from traditional AI. You will explore best practices such as prompt engineering, and fine-tuning, and architectural patterns such as Retrieval Augmented Generation (RAG). And you will discover specific nuances, considerations, and strategies for implementation in a public sector organization. You will understand how to apply these concepts in a public sector setting and address industry-specific challenges and problems by studying a variety of use cases included in the book in the areas of content generation, chatbots, summarization, and program management. What You Will Learn GenAI concepts and how GenAI differs from traditional AI/ML Prompt engineering, fine-tuning, RAG, and customizing foundation models Strategy, methodologies, and frameworks for the public sector Public sector use cases in the areas of content generation, summarization, and chatbots, plus program management, analytics, business intelligence, and reporting Architecture and design patterns Implementation, operations, and maintenance of GenAI applications Who This Book Is ForTechnology and business leaders in the public sector who are new to AI/ML and are keen on exploring and harnessing the potential of Generative AI in their respective organizations.
Are you tired of copying and pasting code into your embedded projects? Do you want to write your own code from scratch for microcontrollers and understand what your code is doing without all the frills and math? This book uses a practical approach to show you how to develop embedded systems with 8-bit PIC microcontrollers using the XC8 compiler.Written for those who want more than an Arduino, but less than the more complex microcontrollers on the market, this new edition is fully updated and covers embedded design principles such as foreground-background loops and event driven programming. Yoüll learn how to interface with things like Motors, PID loop control and writing a browser-based monitoring system! This book is heavy on code, schematics, and images and focuses less on the theoretical aspects of using microcontrollers.Coverage includes writing a display driver, using the DAC for a multitude of waveform generation techniques, and building 8-bit IoT systems, real time telemetry, a countdown timer, and new peripherals. These topics are important if you want to learn more about PIC microcontroller devices as a whole. You'll also see the advantage that MPLAB X offers by running on Windows, Mac and Linux environments. You don't need to be a command line expert to work with PIC microcontrollers, so you can focus less on setting up your environment and more on your application. If you want to move beyond the Arduino, Programming PIC Microcontrollers with XC8 is your complete guide to understanding modern PIC microcontrollers.What Yoüll Learn Set up the MPLAB X and XC8 compilers for microcontroller development Use GPIO and PPS Review EUSART and Software UART communications Use the eXtreme Low Power (XLP) options of PIC microcontrollers Explore wireless communications with WiFi and BluetoothWho This Book Is ForThose with basic electronic device and electronic equipment experience and some knowledge of the C programming and digital electronics. Also targeted towards students wanting a practical overview of microcontrollers outside of the classroom.
This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security.The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it gives you important information about the basics of AI, machine learning, and deep learning in simple terms. It also talks about the ethics of using AI in privacy and security, making sure you understand the power and responsibility that come with AI. Next, it takes you through the complex world of information security and data privacy. It covers everything from the current state of security to how AI can detect threats and protect privacy. Additionally, it delves into ethical considerations to ensure the responsible use of AI in managing data privacy. Later chapters discuss strategies and future trends in using AI for data security, finding the right balance between security and privacy, and giving useful advice for organizations.In the end, this book examines the current landscape and foresees the future, underscoring the vital importance of maintaining a balance between innovation and privacy in AI-powered security.What you will learn:How AI is being used to detect and prevent cyberattacks in real-timeWhat are the AI-powered techniques for anonymizing and de-identifying data,What are the latest advancements in AI-powered privacy-enhancing technologies (PETs)How to find the right balance between security and privacyWho this book is for:Information security professionals, data scientists, and software developers seeking to gain an understanding of the latest trends and techniques in AI for information security
Digitally restore your old photos in Photoshop for print out or to use online as still photos. This first of two volumes will show you some of the basic techniques you can use in Photoshop to preserve or repair damaged family and historical photos.In today¿s digital world of smart phones and cameras, you can easily transfer your photos from phone to computer. However, occasionally yoüre left with an old or damaged version of the image and the uncertainty of how to fix them. Aided by the sound advice and tips from author Jennifer Harder, this book will show you how to do so with just a few basic corrections in Photoshop. Using healing tools, basic color correction tools, layer masks, and workspace commands to fill in missing gaps, yoüll be able to print out an unblemished picture or post it on your social media page.A Beginner¿s Guide to Digital Image Repair in Photoshop: Volume 1 provides the know-how to help preserve your family treasures.What You Will Learn Review scanner basics for digitizing your photos Use various ¿healing¿ and color adjustment tools in Photoshop for restoring photos See how custom selections and layer masks can be used in the photo restoration process Apply various workspaces to fill in missing details in an image or merge photosWho Is This Book ForUsers who want to learn how to repair old historical photos and slides for digital presentation or for print as well as those who are interested in basic animation.
This book is your comprehensive guide to building robust Generative AI solutions using the Databricks Data Intelligence Platform. Databricks is the fastest-growing data platform offering unified analytics and AI capabilities within a single governance framework, enabling organizations to streamline their data processing workflows, from ingestion to visualization. Additionally, Databricks provides features to train a high-quality large language model (LLM), whether you are looking for Retrieval-Augmented Generation (RAG) or fine-tuning. Databricks offers a scalable and efficient solution for processing large volumes of both structured and unstructured data, facilitating advanced analytics, machine learning, and real-time processing. In today's GenAI world, Databricks plays a crucial role in empowering organizations to extract value from their data effectively, driving innovation and gaining a competitive edge in the digital age. This book will not only help you master the Data Intelligence Platform but also help power your enterprise to the next level with a bespoke LLM unique to your organization. Beginning with foundational principles, the book starts with a platform overview and explores features and best practices for ingestion, transformation, and storage with Delta Lake. Advanced topics include leveraging Databricks SQL for querying and visualizing large datasets, ensuring data governance and security with Unity Catalog, and deploying machine learning and LLMs using Databricks MLflow for GenAI. Through practical examples, insights, and best practices, this book equips solution architects and data engineers with the knowledge to design and implement scalable data solutions, making it an indispensable resource for modern enterprises. Whether you are new to Databricks and trying to learn a new platform, a seasoned practitioner building data pipelines, data science models, or GenAI applications, or even an executive who wants to communicate the value of Databricks to customers, this book is for you. With its extensive feature and best practice deep dives, it also serves as an excellent reference guide if you are preparing for Databricks certification exams. What You Will Learn Foundational principles of Lakehouse architecture Key features including Unity Catalog, Databricks SQL (DBSQL), and Delta Live Tables Databricks Intelligence Platform and key functionalities Building and deploying GenAI Applications from data ingestion to model serving Databricks pricing, platform security, DBRX, and many more topics Who This Book Is ForSolution architects, data engineers, data scientists, Databricks practitioners, and anyone who wants to deploy their Gen AI solutions with the Data Intelligence Platform. This is also a handbook for senior execs who need to communicate the value of Databricks to customers. People who are new to the Databricks Platform and want comprehensive insights will find the book accessible.
This textbook provides a comprehensive introduction to portfolio management and investments. Focusing on four core areas ¿ portfolio management, equities, bonds, and derivatives ¿ it is primarily intended for undergraduate and graduate students alike. However, it will also benefit practitioners working in the fields of financial analysis and portfolio management and professionals who aspire to such professional activities in the financial industry. To ensure its high practical relevance, the book includes a host of case studies and examples from real-world practice, mainly from the German and Swiss financial markets. Additionally, the book shows how to implement the models in Microsoft Excel.
This textbook is intended to display a broad, methodological introduction to geoinformatics and geoinformation science. It deals with the recording, modeling, processing and analysis as well as presenting and distributing of geodata. As an integrated approach it is dedicated to the multidisciplinary application of methods and concepts of computer science to solve spatial tasks. First the reader receives an introduction to the approach and tasks of geoinformatics, basic concepts and general principles of information processing as well as essentials of computer science. Then this textbook focuses on the following topics: spatial reference systems, digital spatial data, interoperability of spatial data, visualization of spatial information, data organization and database systems, geoinformation systems, remote sensing and digital image processing.The result is a comprehensive manual for studies and practical applications in geoinformatics. It serves also as a basis to support and deepen methodological courses in geography, geology, geodesy and surveying as well as all environmental sciences. In this first English edition, the author has updated and significantly expanded the fourth German edition. New additions include the development of apps, graphical presentation on the web, geodata-bases and recent methods of classification. This book is based on the original German 4th edition Geoinformatik in Theorie und Praxis by Norbert de Lange, published by Springer-Verlag GmbH Germany, part of Springer Nature in 2020 and still presents the only integrated perspective on geoinformatics and geoinformation science. This book was translated with the help of artificial intelligence (machine translation by the service DeepL.com) first and then significantly revised with regard to technical terms and special topics of geoinformatics.
With this book, Hermann Rock provides time-structured core negotiation strategies that can be immediately applied in practice. The author's expertise comes primarily from negotiations in the context of M&A transactions and management investments. However, the concepts presented are equally applicable to negotiations of financing, car purchase, lease or service contracts and thus universally applicable. Three (scientifically based) basic strategies are presented, which the reader can adapt to his or her specific negotiation situation. The examples chosen for illustration are concrete cases negotiated by the author himself. With the certainty of having understood the three basic strategies, the reader enters the negotiation with a positive basic mood and thus creates the basis for his negotiation success. Hermann Rock has successfully presented his strategies for negotiation management many times in lectures and magazines (Focus) and now presents them for the first time in book form as a consistent further development of the Harvard concept.
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter. New to This Edition: The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more
Learn all about GitLab administration, the open-source DevOps platform helping millions develop and deploy safe and secure software. This book is designed to be your one-stop shop to get up and running with complete ease.Start with the basics like setting up a GitLab account and exploring user options before moving on to GitLab¿s primary function as a source code management tool. From there, yoüll learn about one of the most unique features of GitLab: CI/CD configuration files. The next step on the journey is a discussion of how to organize code into projects and groups, along with defining access permissions using roles. Yoüll also examine the various planning tools provided by GitLab.With the basic features out of the way, yoüll delve into more specialized services such as the built-in Docker image repository, the package registry, web page creation, and binary file storage. The book concludes with more advanced administrative topics such as working with GitLab¿s REST and GraphQL APIs, setting up a proof-of-concept GitLab service using Amazon Web Services (AWS), and spinning up a production service that takes high availability and disaster recovery into account.With an abundance of information available for deploying secure software, selecting the right documentation can often be daunting. From planning to monitoring, Practical GitLab Services eliminates the unknown in your DevOps lifecycle.What You Will Learn Use GitLab to manage source code files, track and plan issues, run builds and tests, and deploy software See how administrators can support developers using GitLab Set up your own standalone installation using AWSWho This Book Is ForSoftware developers, potential GitLab administrators, supporting team members such as testers and project managers.
Embark on an exhilarating journey through the digital landscape with Microsoft Copilots, a suite of AI-powered tools that help you create, edit, and optimize content, code, and data across various Microsoft platforms. This book will be your indispensable guide to harnessing the power of generative AI within the Microsoft ecosystem, introducing you to various copilots and their impact on your business processes. The book will guide you as a manager to leverage Microsoft Copilot to improve your personal productivity, your team's productivity, and achieve your business goals with success.This book is organized into five parts. The first part introduces you to Microsoft Copilot and its features and benefits. In the second part, you will get an overview of the integration of Microsoft Copilot with M365 tools. The third part teaches you about the maker copilot in Power Platform services followed by the business expert copilot for Sales and Service for Business Applications such as Dynamics 365 and Salesforce. The book also introduces you to Copilot Studio to help you extend the copilots or build your own.By the end of this book, you will have a solid understanding of Microsoft Copilot and how to use copilots effectively and efficiently with various transformation platforms. You will also have a collection of tips, tricks, and best practices to help you get the most out of Microsoft Copilot.What Will You Learn Set up and activate Microsoft Copilot on various Microsoft platforms Use Microsoft Copilot to generate and enhance content, code, and data with M365, Power Platform, and Business Applications tools Understand tips, tricks, and best practices to get the most out of Microsoft Copilot Build your own copilot using your own organization data
This book delivers cloud-based applications that are both scalable and reliable, aligning with the evolving needs of the present user base. This innovative approach blends the agility of cloud computing with the efficiency of contemporary DevOps methodologies. The book starts by providing valuable insights into the ever-evolving software landscape of Cloud-native DevOps. It delves into strategies for crafting scalable and dependable applications and illustrates the art of leveraging open-source tools to enhance collaboration. It navigates through the integral role of microservices in contemporary software development and imparts the know-how to integrate them with DevOps practices. The book simplifies container technology, with a focus on Docker and Kubernetes. It further elucidates the process of streamlining software delivery through Continuous Integration and Continuous Deployment (CI/CD). As you progress, you will explore open-source tools, including Argo, Kubeflow Pipelines, and AWS Step Functions. The concluding section covers real-world case studies and best practices for implementing Cloud-native DevOps. The book reviews the core concepts covered throughout and provides an exciting glimpse into the future of Cloud-native DevOps. Upon completing this book, you will be well-versed in the principles and practices of Cloud-native DevOps, understand real-world applications, and recognize the critical importance of security in cloud computing. What You Will Learn Create cloud-based applications that can scale with the changing needs of today's user base Combine the flexibility of cloud computing with the efficiency of modern DevOps methodologies Understand the core concepts and principles of Cloud-native DevOps Understand microservices, containers, and continuous integration and continuous deployment (CI/CD) Who This Book Is ForDevOps engineers, cloud architects, software developers, system administrators, IT managers, team leads, and business decision makers
This book explains the field of Generative Artificial Intelligence (AI), focusing on its potential and applications, and aims to provide you with an understanding of the underlying principles, techniques, and practical use cases of Generative AI models.The book begins with an introduction to the foundations of Generative AI, including an overview of the field, its evolution, and its significance in today¿s AI landscape. It focuses on generative visual models, exploring the exciting field of transforming text into images and videos. A chapter covering text-to-video generation provides insights into synthesizing videos from textual descriptions, opening up new possibilities for creative content generation. A chapter covers generative audio models and prompt-to-audio synthesis using Text-to-Speech (TTS) techniques. Then the book switch gears to dive into generative text models, exploring the concepts of Large Language Models (LLMs), natural language generation (NLG), fine-tuning, prompt tuning, and reinforcement learning. The book explores techniques for fixing LLMs and making them grounded and indestructible, along with practical applications in enterprise-grade applications such as question answering, summarization, and knowledge-based generation.By the end of this book, you will understand Generative text, and audio and visual models, and have the knowledge and tools necessary to harness the creative and transformative capabilities of Generative AI. What You Will Learn What is Generative Artificial Intelligence? What are text-to-image synthesis techniques and conditional image generation? What is prompt-to-audio synthesis using Text-to-Speech (TTS) techniques? What are text-to-video models and how do you tune them? What are large language models, and how do you tune them? Who This Book Is ForThose with intermediate to advanced technical knowledge in artificial intelligence and machine learning
Discover a groundbreaking approach to introducing DevSecOps. DevSecOps Adventures uses three innovative games to help you to maximize engagement in your training and transform learners¿ mindsets, turning even reluctant sceptics into supporters and advocates of the DevOps culture.The book¿s first coaching game uses LEGO, Chocolate, and role cards to explore the roles and interdependencies of Dev, Ops, and Security. Readers will experience Aha! moments, expand their individual roles, develop T-shaped skills, and experiment with changing organizational culture. The simulations depict an end-to-end product delivery process, highlighting bottlenecks in the value delivery flow. Additionally, the book is updated with two new games, "Fear in the Workplace" and "Safety in the Workplace" which provide insights into safety culture, drawing inspiration from the works of Ron Westrum, William Kahn, Amy C. Edmondson, and Dr. David Rock. Through open conversations, participants learn to identify signs of a fear-ridden culture and apply safety-enhancing practices to foster a culture of experimentation and learning.This Second Edition is enhanced with real-life examples and includes the insights from important State of DevOps reports. The updated ¿Key Takeaway¿ chapter and the new FAQ chapter prepare trainers to deliver an impactful learning experience. It serves as a facilitation guide for gamified experiential learning, provides ideas for effective debriefing, and helps readers relate the issues highlighted in the coaching games to similar challenges they may face in their organizations. What You Will Learn: Gain fundamental understanding of DevOps, DevSecOps, and Safety Culture. Develop the capability to prepare, facilitate, and effectively debrief these coaching games with your teams. Showcase how playfulness can help teams bring down a "wall of confusion" between the different functional silos. Who This Book Is ForProgrammers or system admins/project managers who are new to DevOps.DevOps trainers and Agile Coaches who are interested in offering a collaborative and engaging learning experience to their teams.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.