Computer Performance Engineering
This book constitutes the refereed proceedings of the 20th European Workshop on Computer Performance Engineering, EPEW 2024, held in Venice, Italy, on June 14, 2024. The 10 papers presented in this volume together with one invited talk were carefully reviewed and selected from 14 submissions. The concept of performance in EPEW 2024 is considered in its broadest sense including the notions of Quality of Service, scalability as well as reliability, availability and systems management, among the others.
Learning Langchain
If you're looking to build a production-ready AI application that enables users to "chat" with your company's private data, then you'll need to master LangChain--a premier AI development framework used by global corporations and startups like Zapier, Replit, Databricks, and more. This guide is an indispensable resource for developers who understand Python or JavaScript but are beginners eager to harness the power of AI. Authors Mayo Oshin and Nuno Campos demystify the use of LangChain through practical insights and in-depth tutorials. Starting with basic concepts, this book will show you step-by-step how to build a production-ready AI chatbot trained on your own data. After reading this book, you'll be equipped to: Understand and use the core components of LangChain in your development projects Harness the power of retrieval-augmented generation (RAG) to enhance the accuracy of LLMs using external, up-to-date data Develop and deploy AI chatbots that interact intelligently and contextually with users Utilize LangChain Expression Language to create custom, efficient AI operational chains Integrate and manage third-party APIs and tools to extend the functionality of your AI applications Learn the foundations of LLM app development and how they can be used with LangChain
Cyber Certainty
Cybercrime has become an inescapable reality for every business and government today. Large enterprises are not impervious to cyber compromise, crisis, or crash, regardless of economic strength, influence, or power. Cybercriminals, emboldened by their prowess and power, are now masterfully exploiting the weakest links in your organization's defences, whether through people or technology.The time has come to usher in a new era of Cyber Certainty: a proactive mindset and thinking to stay ahead of the risk, broaden the threat curve, and deepen cyber concern.In Cyber Certainty, Daniel Tobok, CEO of CYPFER, a leading cybersecurity firm, lays out the elements of a strong defence in clear, accessible language, bridging the gap between technical IT security practitioners and the business leaders responsible for safeguarding the organization.This essential guide empowers business leaders to make informed decisions about protecting their intellectual property, trade secrets, client lists, and critical data. Through real-world case studies, practical advice, and forward-thinking strategies, Cyber Certainty equips leaders with the knowledge they need to conduct business confidently, free from the fear of downtime, asset loss, or reputational damage. No organization is immune to this new breed of criminals-be prepared.
Ultimate Figma for UI/UX Design
Crack the Code to Solving Customer Problems with Exceptional User Experience Designs Powered by Figma. Book DescriptionFigma is a powerful, collaborative design tool that has transformed the UI/UX design process. With its intuitive interface and advanced features, it enables seamless collaboration and the creation of exceptional user experiences, making it the go-to choice for designers. Ultimate Figma for UX/UI Design guides you through Figma's capabilities, covering everything from the basics to advanced features, collaboration, and real-world applications. Each chapter includes hands-on exercises and examples to reinforce learning, covering topics such as Figma's interface, design principles (shapes, colors, typography), UI element design, interactive prototypes, real-time collaboration, plugin integration, responsive design, and more. This book offers a structured approach for professionals at all design skill levels. Readers will gain tips, tricks, and best practices to enhance their efficiency, collaboration, and design skills, opening doors to success in UX design. Through practical exercises and real-world examples, this guide equips you to excel with Figma and become a proficient UX designer. Unlock your full design potential-dive into Ultimate Figma for UX/UI Design and start crafting exceptional user experiences today! Table of Contents1. Introduction to Figma2. Understanding Design Principles in Figma3. Mastering the Figma Interface4. Designing UI in Figma5. Prototyping and Iterating User Interface Design6. Advanced Design Techniques in Figma7. Collaboration and Team Workflows8. Integrating Plugins and External Tools9. Designing Responsively for Multiple Devices10. Real-World Projects and Case Studies Index
Safeguarding the Future
Safeguarding the Future by Dr. Alan Tang offers a comprehensive guide to navigating these challenges, providing a holistic framework to secure and protect the privacy of these cutting-edge technologies.
CyberMedics
CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world.
Combating Cyberattacks Targeting the AI Ecosystem
This book explores in detail the AI-driven cyber threat landscape, including inherent AI threats and risks that exist in Large Language Models (LLMs), Generative AI applications, and the AI infrastructure. The book highlights hands-on technical approaches to detect security flaws in AI systems and applications utilizing the intelligence gathered from real-world case studies. Lastly, the book presents a very detailed discussion of the defense mechanisms and practical solutions to secure LLMs, GenAI applications, and the AI infrastructure. The chapters are structured with a granular framework, starting with AI concepts, followed by practical assessment techniques based on real-world intelligence, and concluding with required security defenses. Artificial Intelligence (AI) and cybersecurity are deeply intertwined and increasingly essential to modern digital defense strategies. The book is a comprehensive resource for IT professionals, business leaders, and cybersecurity experts for understanding and defending against AI-driven cyberattacks. FEATURES: Includes real-world case studies with detailed examples of AI-centric attacks and defense mechanismsFeatures hands-on security assessments with practical techniques for evaluating the security of AI systemsDemonstrates advanced defense strategies with proven methods to protect LLMs, GenAI applications, and the infrastructure
The Art of Mac Malware, Volume 2
This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem. As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these constantly evolving and increasingly sophisticated threats is through learning and applying robust heuristic-based detection techniques. To that end, Wardle draws upon decades of experience to guide you through the programmatic implementation of such detection techniques. By exploring how to leverage macOS's security-centric frameworks (both public and private), diving into key elements of behavioral-based detection, and highlighting relevant examples of real-life malware, Wardle teaches and underscores the efficacy of these powerful approaches. Across 14 in-depth chapters, you'll learn how to: Capture critical snapshots of system state to reveal the subtle signs of infectionEnumerate and analyze running processes to uncover evidence of malwareParse the macOS's distribution and binary file formats to detect malicious anomaliesUtilize code signing as an effective tool to identify malware and reduce false positivesWrite efficient code that harnesses the full potential of Apple's public and private APIsLeverage Apple's Endpoint Security and Network Extension frameworks to build real-time monitoring toolsThis comprehensive guide provides you with the knowledge to develop tools and techniques, and to neutralize threats before it's too late.
Shared Wisdom
How to build a flourishing society by using what we know about human nature to design our technology--rather than let technology shape our society. In Shared Wisdom, Alex Pentland delves into the history of innovation, emphasizing the importance of understanding how technologies and cultural inventions impact human society. Humanity's great leaps forward--the rise of civilizations, the Enlightenment, and the Scientific Revolution--were all propelled by cultural inventions that accelerated our rate of innovation and built collective wisdom. Solving current global challenges such as climate change, pandemics, and failing social institutions will require similarly fundamental inventions. Shared Wisdom provides a unique perspective on human society and offers insights into how we can use technologies like digital media and AI to aid, rather than replace, our human capacity for deliberation. Drawing on his expertise in both social science and technology, the author bridges the gap between these two disciplines and offers a holistic view of the challenges and opportunities we face in the age of AI. By looking deep into our history, Pentland argues that the better we understand the key factors that accelerate cultural evolution, the greater our chances of surmounting our current problems.
Broadband Communications, Networks, and Systems
This two-volume set, LNICST 601 and LNICST 602, constitutes the refereed post-conference proceedings of the 14th International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024, held in Hyderabad, India, in February 16-17, 2024. The 49 full papers presented here were carefully reviewed and selected from 122 submissions. These papers have been organized under the following topical sections in the two volumes: - Part I: Communications, Networks and Architectures; Smart City Smart Grid; Communication-inspired Machine Learning (ML) for 5G/6G. Part II: Wireless Network Security and Privacy; AI applications for 5G/6G.
Broadband Communications, Networks, and Systems
This two-volume set, LNICST 601 and LNICST 602, constitutes the refereed post-conference proceedings of the 14th International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024, held in Hyderabad, India, in February 16-17, 2024. The 49 full papers presented here were carefully reviewed and selected from 122 submissions. These papers have been organized under the following topical sections in the two volumes: - Part I: Communications, Networks and Architectures; Smart City Smart Grid; Communication-inspired Machine Learning (ML) for 5G/6G. Part II: Wireless Network Security and Privacy; AI applications for 5G/6G.
From Street-smart to Web-wise(R)
In Book 3, 5th and 6th graders are maturing, becoming more independent and online activities are second nature. "From Street-smart to Web-wise(R) A Cyber Safety Training Manual Built for Teachers and Designed for Children," isn't just another book-it's a passionate call to action for teachers.
Securing the Digital Realm
This book "Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics" is a comprehensive guide that explores the intricate world of digital security and forensics.
Java Basics Using Chatgpt/GPT-4
This book is designed for those new to Java and interested in understanding how ChatGPT/GPT-4 can enhance programming. It offers a unique approach to learning Java, combining traditional hand-written code with cutting-edge ChatGPT-generated examples. The book covers the basics of Java programming and development environments, including understanding recursion, strings, arrays, fundamental data structures, algorithm analysis, queues and stacks, and follows with the role of ChatGPT in generating, explaining, and debugging code. Companion files with source code and figures available for downloading. It's an essential resource for those starting Java programming and for anyone curious about the applications of ChatGPT in coding. FEATURESCombines hand-crafted Java code with ChatGPT-generated examples for a multifaceted learning experienceOffers practical Java coding skills, with examples in recursion, data structures, and algorithm analysisCovers the capabilities of ChatGPT for code generation, debugging, and explanation, providing a modern perspective on programmingIncludes companion files for downloading with source code and figures
Organized Skepticism in the Age of Misinformation
This book offers a novel conceptual framework that views information as a form of gossip. It provides a nuanced understanding of the "grammar" of gossip that permeates both online and real-world environments, and sheds light on the often overused and confused terms of our time: information, misinformation, and knowledge.
Pipeline for Automated Code Generation from Backlog Items (Pacgbi)
An Efficient Security Routing Protocol for Cloud-Based Networks
30-Minute Groups: Online Safety
Are you ready to equip your students with the digital skills they need to thrive in the online world? In today's interconnected world, online safety is more crucial than ever. Our Online Safety for Middle and High School curriculum provides the tools and strategies to empower your students to navigate the digital landscape responsibly. Key Features and Benefits: Engaging Activities: Interactive exercises and discussions spark interest and critical thinking. Real-World Scenarios: Relatable examples help students understand the potential risks and consequences of online behavior. Practical Tips: Students learn essential skills for protecting their privacy, avoiding cyberbullying, communicating respectfully, and recognizing online scams. Ethical Considerations: The curriculum promotes ethical online behavior and digital citizenship. Flexible Format: The lessons can be adapted to fit various classroom settings and group sizes. Topics Include: Technology UseProtecting Your InformationSextortionEmotional SafetyBeing Kind Online Online Predators What's Inside: 10 Comprehensive Lessons: Each lesson includes clear objectives, engaging activities, discussion prompts, and reflection questions. Permission and Completion Letters to send to caregiversAttendance LogsPre- and Post-Surveys to measure the success of the programmingResults Template to share with interested parties Equip your students with the knowledge and skills to thrive in the digital age. Protect their future, empower their minds.
TypeScript 5 Design Patterns and Best Practices - Second Edition
Unlock TypeScript 5 patterns for durable, maintainable apps with modern techniques.Free with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key Features: - Avoid common pitfalls and anti-patterns in TypeScript app development- Leverage functional and reactive paradigms for effective TypeScript development- Discover how to improve your application's code reusability and testability- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Design patterns are the foundation of many world-class software applications, from commercial solutions to open-source projects. This guide equips you with the skills to architect robust, scalable, and maintainable TypeScript 5 applications. Whether you're looking to master modern TypeScript or apply proven software architecture patterns effectively, this book is your go-to resource.Written by Theofanis Despoudis, a recognized TypeScript expert, this second edition is fully updated with TypeScript 5's latest features, including improved type inference, union enums, and decorators. These updates will help you write cleaner, more maintainable code that adapts to future changes. You'll dive into classic Gang of Four design patterns through both traditional and modern real-world implementations, gaining hands-on experience with practical applications. You'll also gain a clear understanding of the power of functional and reactive programming patterns specifically designed for idiomatic TypeScript development.By the end of this book, you'll be able to identify and apply the right design pattern for any scenario and craft well-structured, maintainable, and testable code.*Email sign-up and proof of purchase requiredWhat You Will Learn: - Understand the principles of design patterns and their role in TypeScript development- Learn essential patterns, including creational, structural, and behavioral, with TypeScript- Differentiate between patterns and design concepts and apply them effectively- Gain hands-on experience implementing patterns in real-world TypeScript projects- Explore advanced techniques from functional and reactive programming paradigms- Write efficient, high-quality TypeScript code that enhances performance and flexibilityWho this book is for: If you are a TypeScript developer working on frontend, backend, or full-stack applications looking to learn how to apply established design patterns to solve common programming problems instead of reinventing solutions, you'll find this book useful. Prior knowledge of design patterns is not necessary-all you need is basic TypeScript knowledge to get started with this book.Table of Contents- Getting Started with TypeScript 5- TypeScript Core Principles- Creational Design Patterns- Structural Design Patterns- Behavioral Design Patterns for Object Communication- Behavioral Design Patterns for Managing State and Behavior- Functional Programming with TypeScript- Reactive and Asynchronous Programming- Developing Modern and Robust TypeScript Applications- Anti-Patterns and Workarounds- Exploring Design Patterns in Open Source Architectures
Applied Natural Language Processing with PyTorch 2.0
Unlock the Power of PyTorch 2.0 for Next-Level Natural Language Processing. Discover how to bring applied natural language processing with PyTorch 2.0 to life and gain proficiency in advanced NLP techniques for scalable AI models. This comprehensive, easy-to-follow guide is packed with real-world text classification and sentiment analysis projects, step-by-step instructions for machine translation and text generation, and best practices for training and evaluating NLP models with PyTorch. Book Description Natural Language Processing (NLP) is revolutionizing industries, from chatbots to data insights. PyTorch 2.0 offers the tools to build powerful NLP models. Applied Natural Language Processing with PyTorch 2.0 provides a practical guide to mastering NLP with this advanced framework. This book starts with a strong foundation in NLP concepts and the essentials of PyTorch 2.0, ensuring that you are well-equipped to tackle advanced topics. It covers key techniques such as transformer models, pre-trained language models, sequence-to-sequence models, and more. Each chapter includes hands-on examples and code implementations for real-world application. With a focus on practical use cases, the book explores NLP tasks like sentiment analysis, text classification, named entity recognition, machine translation, and text generation. You'll learn how to preprocess text, design neural architectures, train models, and evaluate results. Whether you're a beginner or an experienced professional, this book will empower you to develop advanced NLP models and solutions. Get started today and unlock the potential of NLP with PyTorch 2.0! What You'll Learn Inside: Implement sequence-to-sequence models in PyTorch 2.0 for neural network text solutionsStep-by-step lessons on sentiment analysis in Python and text classification with PyTorch to solve real business challengesComprehensive applied NLP guide covering preprocessing text data for neural architecturesActionable examples of named entity recognition, information extraction, and NLP case studiesMaster transformer models and pre-trained language models in NLP for state-of-the-art resultsInsights on building and tuning deep learning NLP pipelines for practical deploymentsSee future trends and innovations in Python NLP books for continued skill developmentWho Should Read This Book?Data scientists, engineers, and developers searching for an up-to-date PyTorch NLP book and applied NLP guidePython enthusiasts eager to apply sentiment analysis, machine translation NLP, and sequence models in real projectsProfessionals and students seeking to master neural network text understanding and deep learning solutions.Why This Guide?All information is authentic and policy-compliant-no unauthorized brands or characters are usedOptimized for Amazon search and human readability, using established keywords for higher ranking and conversionWritten in a clear, natural style suited for both advanced and beginning practitionersStart mastering applied NLP techniques with PyTorch 2.0-build scalable, production-ready AI models today! Table of Contents1. Introduction to Natural Language Processing2. Getting Started with PyTorch3. Text Preprocessing4. Building NLP Models with PyTorch5. Advanced NLP Techniques with PyTorch6. Model Training and Evaluation7. Improving NLP Models with PyTorch8. Deployment and Productionization9. Case Studies and Practical Examples10. Future Trends in Natural Language Processing and PyTorch Index