-
-
-
-
-
-
-
Aloqa. Kommunikatsiya texnologiyalari
-
Active Machine Learning with Python
Active machine learning is a method used in machine learning where the algorithm can query an oracle to label new data points with the desired outputs. It stands at the crossroads of optimization and humancomputer interaction, enabling machines to learn more effectively with less data. This is particularly valuable in scenarios where data labeling is costly, time-consuming, or requires expert knowledge. Throughout this book, we leverage Python, a leading programming language in the field of data science and machine learning, known for its simplicity and powerful libraries. Python serves as an excellent medium for exploring the concepts of active machine learning, providing both beginners and experienced practitioners with the tools needed to implement sophisticated models
-
Accelerate Model Training with PyTorch 2.X
HPC systems comprise powerful computing resources tightly integrated to solve complex problems. The main goal of HPC is to employ resources, techniques, and methods to accelerate the execution of highly intensive computing tasks. Traditionally, HPC environments have been used to execute scientific applications from biology, physics, chemistry, and many other areas. But this has changed in the past few years. Nowadays, HPC systems run tasks beyond scientific applications. In fact, the most prominent non-scientific workload executed in HPC environments is precisely the subject of this book: the building process of complex neural network models.
-
A CISO Guide to Cyber Resilience
Greetings, fellow cybersecurity enthusiasts! Welcome to the world of cyber resilience, where the goal is to build a security program that enables your organization to not only withstand cyber-attacks but also to recover swiftly. As the United States Department of Homeland Security aptly defines it, cyber resiliency is the “ability to resist, absorb, recover from or successfully adapt to adversity or a change in conditions.”1 It’s not just a process; it’s an ultimate state of readiness. An organization achieves resilience when it can bounce back from any disruption, be it a ransomware attack or any other cyber threat, without major disruptions.
-
3D Printing with Fusion 360
In this book, you will learn how to open CAD and mesh files in Fusion, repair and edit them, and prepare them for 3D printing. In the context of print preparation, you will be introduced to print settings, support structures, and part orientation. The book will also highlight the various preferences of Fusion for additive manufacturing. In subsequent chapters, you will learn about choosing the right orientation and creating appropriate support structures based on printing technology and you will simulate the printing process to detect and remedy common print failures associated with the metal powder bed fusion process. This book will also cover how to arrange parts depending on the printing technology. By the end of this book, you will be acquainted with utilizing templates and scripts to automate common tasks around print preparation
-
Communication Patterns
Communication underlies pretty much everything you do, from your facial expres‐ sion showing disapproval or enjoyment, to your email about the latest project update, to what you say in a meeting or presentation. But what is communication, and how do you make it successful? The Oxford English Dictionary defines communication as “the activity or process of expressing ideas and feelings or of giving people information.” This encompasses many of the important aspects of communication but doesn’t indicate what would make it successful. The same dictionary defines communicate as “to share or exchange information, news, ideas, feelings, etc.” This definition provides more detail, but we still need to go further to work out how to make communication successful.
-
Zero Trust Networks
Building trusted systems in hostile networks has been a passion of ours for many years. In building and designing such systems, we have found frustration in the pace of progress toward solving some of the more fundamental security problems plaguing our industry. We’d very much like to see the industry move more aggressively toward building systems that strive to solve these problems. To that end, we propose that the world take a new stance toward building and main‐ taining secure computer networks. Rather than being something that is layered on top, only considered after some value has been built, security must be fundamentally infused with the operation of the system itself. It must be ever-present, enabling operation rather than restricting it. As such, this book sets forth a collection of design patterns and considerations which, when heeded, can produce systems that are resilient to the vast majority of modern-day attack vectors
-
Web Scraping with Python
The automated gathering of data from the internet is nearly as old as the internet itself. Although web scraping is not a new term, in years past the practice has been more commonly known as screen scraping, data mining, web harvesting, or similar variations. General consensus today seems to favor web scraping, so that is the term I use throughout the book, although I also refer to programs that specifically traverse multiple pages as web crawlers or refer to the web scraping programs themselves as bots. In theory, web scraping is the practice of gathering data through any means other than a program interacting with an API (or, obviously, through a human using a web browser). This is most commonly accomplished by writing an automated program that queries a web server, requests data (usually in the form of HTML and other files that compose web pages), and then parses that data to extract needed information.
-
Understanding DeFi
Decentralized finance, or DeFi, is just about finance without banks. It’s one of the core use cases for blockchain, which is really an innovation in accounting. DeFi will eventually be a key part of finance for people, and one of the primary ways people earn returns on their assets, whether fiat or cryptocurrency. Banks need competitors, and so do DeFi protocols. Together, they will allow people to get the highest and best returns on their assets for the lowest cost and risk.This book is not about promoting specific DeFi protocols, or even about promoting the current state of DeFi. It is about understanding the entirety of the space—where it fits into blockchain, its core elements, how to operate in the space, and the future of DeFi.
-
Training Data for Machine Learning
Will your life really be affected? Here’s a test. Are you in tech, working on a software product? Does your work, or your company’s product, have any form of repetitive tasks? Things you or users of your product do on a regular cycle? If you answered yes to any of these questions, AI and machine learning (ML) have the potential to take on more of the workload, enabling you or your users to focus on higher-level work, and will therefore impact you. If you want to better align with this new AI wave, this book will reveal many of the nuts and bolts that make AI actually work in practice. It will help accelerate your success in your current job and prepare you for new AI-centric roles. Speaking of jobs, you know how the first few days or weeks on a new job are—stress‐ful, crazy, unpredictable? Then all of the sudden, the work, all the day-to-day stuff, snaps into place and makes sense? What was once unimaginable becomes ordinary because you learned how to fit in, how to adapt. Over a relatively short period of time you go from spilling coffee on the boss’s shirt to being a productive part of the system.
-
Tidy Modeling with R
Welcome to Tidy Modeling with R! This book is a guide to using a collection of software in the R programming language for model building called tidymodels, and it has two main goals: • First and foremost, this book provides a practical introduction to how to use these specific R packages to create models. We focus on a dialect of R called the tidyverse that is designed with a consistent, human-centered philosophy and demonstrate how the tidyverse and the tidymodels packages can be used to produce high quality statistical and machine learning models. • Second, this book will show you how to develop good methodology and statistical practices. Whenever possible, our software, documentation, and other materials attempt to prevent common pitfalls.
-
Konchilik ishi asoslari (1 modul. Foydali qazilma konlarini ochiq usulda qazib chiqarish asoslari)
Ushbu o‛quv qo‛llanma texnika yo‛nalishidagi oliy o‛quv yurtlarining 60721500 – “Konchilik ishi”. 60721900 – “Konchilik elektr mexanikasi” va 60720700 – “Texnologik mashinalar va jihozlar” ta‛lim yo‛nalishi talabalariga konchilik yo‛nalishi bo‛yicha boshlangich nаzаriy bilimlаrni berishgа mo‛ljаllаngаn
-
Dancing with Qubits
When most people think about computers, they consider laptops or maybe even bigger systems such as the servers that power the web, the Internet, and the cloud. If you look around, you may start seeing computers in other places. Modern cars, for example, have anywhere from around 20 computers to more than 100 to control all the systems that allow you to move, brake, monitor the air conditioning, and control the entertainment system. The smartphone is the computer many people use more than anything else in a typical day. A modern phone contains a 64-bit processor, whatever a ‘‘64-bit processor’’ is. The amount of memory used for running all those apps might be 3GB, which means 3 gigabytes. All these computers are called classical computers, and the original ideas for them go ack to the 1940s. Sounding more scientific, we say these computers have a von Neumann architecture, named after the mathematician and physicist John von Neumann.
-
Cybersecurity Strategies and Best Practices
Welcome to Cybersecurity Strategies and Best Practices, a guide for cybersecurity professionals to navigate the constantly evolving landscape of cybersecurity. With the advancement of technology, cyber adversaries are now using increasingly sophisticated tactics such as malware, ransomware, social engineering, and insider threats. This book will guide you through mitigating the risks associated with these evolving threats using case studies and industry best practices. This book covers profiling adversaries, assessing weaknesses, and developing comprehensive strategies that align with business objectives. Organizations can mitigate risks and respond effectively to incidents by fostering security awarness and leveraging advanced technologies. In today’s interconnected world, cybersecurity is a necessity. Whether you’re an experienced expert or new to the field, this book equips you with the necessary tools to protect data, systems, and rputation, ensuring a secure digital future. By the end of the book, you’ll be well-equipped to safeguard your data, systems, and reputation, ensuring a secure digital future.
-
Cybersecurity Architect’s Handbook
Cyber threats pose ever-growing risks, yet security measures often lag behind. As organizations increasingly rely on interconnected technologies, the need for robust yet flexible cybersecurity architecture becomes imperative. This book equips you to meet that need. It provides IT and security professionals with a comprehensive guide to becoming proficient cybersecurity architects capable of designing and evolving strategic defenses tailored to unique environments. Spanning foundations, career pathways, and advancements, the book explores core tenets of security alongside real-world implementation. Early chapters establish critical baseline knowledge regarding key concepts such as confidentiality, networking, risk management, and compliance. The discussion then progresses to navigating career growth as an architect, highlighting crucial skills such as documentation, vendor management, and team collaboration. Advanced sections detail processes for selecting and implementing controls, aligning security with business objectives, and cultivating personal adaptability amid constant change
-
C# Interview Guide
Welcome to C# Interview Guide, your comprehensive resource for mastering the C# programming language and acing technical interviews. As a versatile and powerful language, C# is widely used in various fields such as gaming, web services, and enterprise software. This guide is meticulously crafted to help you navigate every step of your job application process, from crafting standout résumés and engaging cover letters to preparing for challenging interviews. It provides in-depth insights into C# fundamentals, advanced concepts, best practices, and the latest frameworks and libraries. Whether you’re a beginner looking to make your mark in the world of C# development or an experienced programmer seeking to polish your interview skills, this book is designed to equip you with the knowledge, strategies, and confidence needed to excel in your career and secure your dream job in the ever-evolving tech industry.
-
Сервер на Windows и Linux
В этой книге вы сможете найти полезную информацию по администрированию и использованию серверов на Windows и Linux, причем как физических (локальных), так и виртуальных. Вы узнаете об отличиях, недостатках и преимуществах физического и виртуального сервера - вполне возможно, что это поможет вам определиться с типом сервера для своих личных задач. В первой части книги будет рассмотрен Windows Server - вы узнаете об управлении сервером; мониторинге процессов, сервисов и событий; автоматизации административных задач; основах безопасности; управлении учетными записями пользователя и группы, как управлять сетью ТСР/I и использовать сервисы DNS и DHCP. Также подробно рассмотрим Active Directory - разворачивание, основы администрирования, доменные службы Active Directory. Во второй части книги будет рассмотрен Linux-сервер для локальной сети - вы узнаете об управлении процессами и загрузкой ОС; маршрутизации и настройке брандмауэра; доменной системе имен; как использовать удаленный вход в систему по SSH. Отдельно будет рассказано про файловый сервер FTP и DHCP-сервер, приведены примеры использования сервера.