Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für CRAN Recipes

CRAN Recipes

Want to use the power of R sooner rather than later? Don’t have time to plow through wordy texts and online manuals? Use this book for quick, simple code to get your projects up and running. It includes code and examples applicable to many disciplines. Written in everyday language with a minimum of complexity, each chapter provides the building blocks you need to fit R’s astounding capabilities to your analytics, reporting, and visualization needs.CRAN Recipes recognizes how needless jargon and complexity get in your way. Busy professionals need simple examples and intuitive descriptions; side trips and meandering philosophical discussions are left for other books.Here R scripts are condensed, to the extent possible, to copy-paste-run format. Chapters and examples are structured to purpose rather than particular functions (e.g., “dirty data cleanup” rather than the R package name “janitor”). Everyday language eliminates the need to know functions/packages in advance.WHAT YOU WILL LEARN* Carry out input/output; visualizations; data munging; manipulations at the group level; and quick data exploration* Handle forecasting (multivariate, time series, logistic regression, Facebook’s Prophet, and others)* Use text analytics; sampling; financial analysis; and advanced pattern matching (regex)* Manipulate data using DPLYR: filter, sort, summarize, add new fields to datasets, and apply powerful IF functions* Create combinations or subsets of files using joins* Write efficient code using pipes to eliminate intermediate steps (MAGRITTR)* Work with string/character manipulation of all types (STRINGR)* Discover counts, patterns, and how to locate whole words* Do wild-card matching, extraction, and invert-match* Work with dates using LUBRIDATE* Fix dirty data; attractive formatting; bad habits to avoidWHO THIS BOOK IS FORProgrammers/data scientists with at least some prior exposure to R.WILLIAM A. YARBERRY, JR., CPA, CISA, is principal consultant, ICCM Consulting LLC, based in Houston, Texas. His practice is focused on IT governance, Sarbanes-Oxley compliance, security consulting, and business analytics for cost management. He was previously a senior manager with PricewaterhouseCoopers, responsible for telecom and network services in the Southwest region. Yarberry has more than 30 years’ experience in a variety of IT-related services, including application development, internal audit management, outsourcing administration, and Sarbanes-Oxley consulting.His books include The Effective CIO (co-authored), Computer Telephony Integration, $250K Consulting, DPLYR, 50,000 Random Numbers, Telecommunications Cost Management, and GDPR: A Short Primer. In addition, he has written over 20 professional articles on topics ranging from wireless security to change management. One of his articles, "Audit Rights in an Outsource Environment," received the Institute of Internal Auditors Outstanding Contributor Award.Prior to joining PricewaterhouseCoopers, Yarberry was director of telephony services for Enron Corporation. He was responsible for operations, planning, and architectural design for voice communications servers and related systems for more than 7,000 employees. Yarberry graduated Phi Beta Kappa in chemistry from the University of Tennessee and earned an MBA at the University of Memphis. He enjoys reading history, swimming, hiking, and spending time with family.1: DPLYR2: STRINGR3: Lubridate4: Regular Expressions: Introduction5: Typical Uses6: Some Simple Patterns7: Character Classes8: Elements of Regular Expressions9: The Magnificent Seven10: Regular Expressions in Stringr11: Unicode12: Tools for Development and Resources13: Regex Summary14: Recipes for Common R Tasks15: Data Structures16: Visualization17: Simple Prediction Methods18: Smorgasbord of Simple Statistical Tests19: Validation of Data20: Shortcuts and Miscellaneous21: ConclusionAppendices

Regulärer Preis: 66,99 €
Produktbild für Chance, Calculation and Life

Chance, Calculation and Life

Chance, Calculation and Life brings together 16 original papers from the colloquium of the same name, organized by the International Cultural Center of Cerisy in 2019. From mathematics to the humanities and biology, there are many concepts and questions related to chance. What are the different types of chance? Does chance correspond to a lack of knowledge about the causes of events, or is there a truly intrinsic and irreducible chance? Does chance preside over our decisions? Does it govern evolution? Is it at the origin of life? What part do chance and necessity play in biology? This book answers these fundamental questions by bringing together the clear and richly documented contributions of mathematicians, physicists, biologists and philosophers who make this book an incomparable tool for work and reflection. THIERRY GAUDIN is an engineer at MINES ParisTech and holds a doctorate in Information Sciences and Communication from Paris Nanterre University, France. He is a widely renowned expert in innovation policy and has worked with the OECD, the European Commission and the World Bank. MARIE-CHRISTINE MAUREL is Professor at Sorbonne University and a researcher at the Institute of Systematics, Evolution, Biodiversity, MNHN, Paris, France. JEAN-CHARLES POMEROL is Professor Emeritus at Sorbonne University, France. He is a specialist in Decision Support Systems and former project leader for information technology in the Engineering Sciences Department at the CNRS. He was formerly in charge of the Artificial Intelligence laboratory at UPMC, Paris, as well as the President of UPMC between 2006 and 2011. Preface xiThierry GAUDIN, Marie-Christine MAUREL, Jean-Charles POMEROLIntroduction xvThierry GAUDIN, Marie-Christine MAUREL, Jean-Charles POMEROLPART 1. RANDOMNESS IN ALL OF ITS ASPECTS 1CHAPTER 1. CLASSICAL, QUANTUM AND BIOLOGICAL RANDOMNESS AS RELATIVE UNPREDICTABILITY 3Cristian S. CALUDE and Giuseppe LONGO1.1. Introduction 31.1.1. Brief historical overview 41.1.2. Preliminary remarks 51.2. Randomness in classical dynamics 61.3. Quantum randomness 81.4. Randomness in biology 151.5. Random sequences: a theory invariant approach 211.6. Classical and quantum randomness revisited 241.6.1. Classical versus algorithmic randomness 241.6.2. Quantum versus algorithmic randomness 261.7. Conclusion and opening: toward a proper biological randomness 271.8. Acknowledgments 301.9. References 30CHAPTER 2. IN THE NAME OF CHANCE 37Gilles PAGÈS2.1. The birth of probabilities and games of chance 372.1.1. Solutions 382.1.2. To what end? 402.2. A very brief history of probabilities 412.3. Chance? What chance? 422.4. Prospective possibility 452.4.1. LLN + CLT + ENIAC = MC 452.4.2. Generating chance through numbers 462.4.3. Going back the other way 482.4.4. Prospective possibility as master of the world? 502.5. Appendix: Congruent generators, can prospective chance be periodic? 532.5.1. A little modulo n arithmetic 532.5.2. From erratic arithmetic to algorithmic randomness 562.5.3. And, the winner is... Mersenne Twister 623.. 602.6. References 61CHAPTER 3. CHANCE IN A FEW LANGUAGES 63Clarisse HERRENSCHMIDT3.1. Classical Sanskrit 643.2. Persian and Arabic 653.3. Ancient Greek 663.4. Russian 673.5. Latin 673.6. French 693.7. English 713.8. Dice, chance and the symbolic world 723.9. References 77CHAPTER 4. THE COLLECTIVE DETERMINISM OF QUANTUM RANDOMNESS 79François VANNUCCI4.1. True or false chance 794.2. Chance sneaks into uncertainty 814.3. The world of the infinitely small 824.4. A more figurative example 844.5. Einstein’s act of resistance 864.6. Schrödinger’s cat to neutrino oscillations 874.7. Chance versus the anthropic principle 904.8. And luck in life? 924.9. Chance and freedom 94CHAPTER 5. WAVE-PARTICLE CHAOS TO THE STABILITY OF LIVING 97Stéphane DOUADY5.1. Introduction 975.2. The chaos of the wave-particle 975.3. The stability of living things 1045.4. Conclusion 1075.5. Acknowledgments 1085.6. References 108CHAPTER 6. CHANCE IN COSMOLOGY: RANDOM AND TURBULENT CREATION OF MULTIPLE COSMOS 109Michel CASSÉ6.1. Is quantum cosmology oxymoronic? 1096.2. Between two realities – at the entrance and exit – is virtuality 1206.3. Who will sing the metamorphoses of this high vacuum? 1206.4. Loop lament 1216.5. The quantum vacuum exists, Casimir has met it 1226.6. The generosity of the quantum vacuum 1226.7. Landscapes 1266.8. The good works of Inflation 1286.9. Sub species aeternitatis 1296.10. The smiling vacuum 130CHAPTER 7. THE CHANCE IN DECISION: WHEN NEURONS FLIP A COIN 133Mathias PESSIGLIONE7.1. A very subjective utility 1337.2. A minimum rationality 1347.3. There is noise in the choices 1357.4. On the volatility of parameters 1377.5. When the brain wears rose-tinted glasses 1387.6. The neurons that take a vote 1407.7. The will to move an index finger 1427.8. Free will in debate 1437.9. The virtue of chance 1447.10. References 145CHAPTER 8. TO HAVE A SENSE OF LIFE: A POETIC RECONNAISSANCE 147Georges AMAR8.1. References 157CHAPTER 9. DIVINE CHANCE 159Bertrand VERGELY9.1. Thinking by chance 1599.2. Chance, need: why choose? 1609.3. When chance is not chance 1629.4. When chance comes from elsewhere 166CHAPTER 10. CHANCE AND THE CREATIVE PROCESS 169Ivan MAGRIN-CHAGNOLLEAU10.1. Introduction 16910.2. Chance 17010.3. Creation 17310.4. Chance in the artistic creative process 17610.5. An art of the present moment 17910.6. Conclusion 18110.7. References 182PART 2. RANDOMNESS, BIOLOGY AND EVOLUTION 185CHAPTER 11. EPIGENETICS, DNA AND CHROMATIN DYNAMICS: WHERE IS THE CHANCE AND WHERE IS THE NECESSITY? 187David SITBON and Jonathan B. WEITZMAN11.1. Introduction 18711.2. Random combinations 18711.3. Random alterations 18811.4. Beyond the gene 18911.5. Epigenetic variation 19011.6. Concluding remarks 19211.7. Acknowledgments 19311.8. References 193CHAPTER 12. WHEN ACQUIRED CHARACTERISTICS BECOME HERITABLE: THE LESSON OF GENOMES 197Bernard DUJON12.1. Introduction 19712.2. Horizontal genetic exchange in prokaryotes 19912.3. Two specificities of eukaryotes theoretically oppose horizontal gene transfer 20012.4. Criteria for genomic analysis 20112.5. Abundance of horizontal transfers in unicellular eukaryotes 20212.6. Remarkable horizontal genetic transfers in pluricellular eukaryotes 20312.7. Main mechanisms of horizontal genetic transfers 20412.8. Introgressions and limits to the concept of species 20712.9. Conclusion 20812.10. References 208CHAPTER 13. THE EVOLUTIONARY TRAJECTORIES OF ORGANISMS ARE NOT STOCHASTIC213Philippe GRANDCOLAS13.1. Evolution and stochasticity: a few metaphors 21313.2. The Gouldian metaphor of the “replay” of evolution 21413.3. The replay of evolution: what happened 21513.4. Evolutionary replay experiments 21713.5. Phylogenies versus experiments 21813.6. Stochasticity, evolution and extinction 21913.7. Conclusion 21913.8. References 220CHAPTER 14. EVOLUTION IN THE FACE OF CHANCE 221Amaury LAMBERT14.1. Introduction 22114.2. Waddington and the concept of canalization 22414.3. A stochastic model of Darwinian evolution 22814.3.1. Redundancy and neutral networks 22814.3.2. A toy model 22914.3.3. Mutation-selection algorithm 23114.4. Numerical results 23114.4.1. Canalization 23114.4.2. Target selection 23414.4.3. Neighborhood selection 23514.5. Discussion 23814.6. Acknowledgments 239CHAPTER 15. CHANCE, CONTINGENCY AND THE ORIGINS OF LIFE: SOME HISTORICAL ISSUES 241Antonio LAZCANO15.1. Acknowledgments 24615.2. References 246CHAPTER 16. CHANCE, COMPLEXITY AND THE IDEA OF A UNIVERSAL ETHICS 249Jean-Paul DELAHAYE16.1. Cosmic evolution and advances in computation 25016.2. Two notions of complexity 25116.3. Biological computations 25216.4. Energy and emergy 25316.5. What we hold onto 25416.6. Noah knew this already! 25416.7. Create, protect and collect 25516.8. An ethics of organized complexity 25516.9. Not so easy 25616.10. References 258List of Authors 261Index 265

Regulärer Preis: 139,99 €
Produktbild für PostgreSQL Query Optimization

PostgreSQL Query Optimization

Write optimized queries. This book helps you write queries that perform fast and deliver results on time. You will learn that query optimization is not a dark art practiced by a small, secretive cabal of sorcerers. Any motivated professional can learn to write efficient queries from the get-go and capably optimize existing queries. You will learn to look at the process of writing a query from the database engine’s point of view, and know how to think like the database optimizer.The book begins with a discussion of what a performant system is and progresses to measuring performance and setting performance goals. It introduces different classes of queries and optimization techniques suitable to each, such as the use of indexes and specific join algorithms. You will learn to read and understand query execution plans along with techniques for influencing those plans for better performance. The book also covers advanced topics such as the use of functions and procedures, dynamic SQL, and generated queries. All of these techniques are then used together to produce performant applications, avoiding the pitfalls of object-relational mappers.WHAT YOU WILL LEARN* Identify optimization goals in OLTP and OLAP systems* Read and understand PostgreSQL execution plans* Distinguish between short queries and long queries* Choose the right optimization technique for each query type* Identify indexes that will improve query performance* Optimize full table scans* Avoid the pitfalls of object-relational mapping systems* Optimize the entire application rather than just database queriesWHO THIS BOOK IS FORIT professionals working in PostgreSQL who want to develop performant and scalable applications, anyone whose job title contains the words “database developer” or “database administrator" or who is a backend developer charged with programming database calls, and system architects involved in the overall design of application systems running against a PostgreSQL databaseHENRIETTA DOMBROVSKAYA is a database researcher and developer with over 35 years of academic and industrial experience. She holds a PhD in computer science from the University of Saint Petersburg, Russia. At present, she is Associate Director of Databases at Braviant Holdings, Chicago, Illinois. She is an active member of the PostgreSQL community, a frequent speaker at the PostgreSQL conference, and a local organizer of the Chicago PostgreSQL User Group. Her research interests are tightly coupled with practice and are focused on developing efficient interactions between applications and databases. She is a winner of the “Technologist of the Year” 2019 award of the Illinois Technology Association.BORIS NOVIKOV is currently a professor in the Department of Informatics at National Research University Higher School of Economics in Saint Petersburg, Russia. He graduated from Leningrad University’s School of Mathematics and Mechanics. He has worked for Saint Petersburg University for a number of years and moved to his current position in January, 2019. His research interests are in a broad area of information management and include several aspects of design, development, and tuning of databases, applications, and database management systems. He also has interests in distributed scalable systems for stream processing and analytics.ANNA BAILLIEKOVA is Senior Data Engineer at Zendesk. Previously, she built ETL pipelines, data warehouse resources, and reporting tools as a team lead on the Division Operations team at Epic. She has also held analyst roles on a variety of political campaigns and at Greenberg Quinlan Rosner Research. She received her undergraduate degree cum laude with College Honors in political science and computer science from Knox College in Galesburg, Illinois. 1. Why Optimize?2. Theory - Yes, We Need It!3. Even More Theory Algorithms4. Understanding Execution Plans5. Short Queries and Indexes6. Long Queries and Full Scans7. Long Queries: Additional Techniques8. Optimizing Data Modification9. Design Matters10. Application Development and Performance11. Functions12. Dynamic SQL13. Avoiding the Pitfalls of Object-Relational Mapping14. More Complex Filtering and Search15. Ultimate Optimization Algorithm16. Conclusion

Regulärer Preis: 62,99 €
Produktbild für Pointers in C Programming

Pointers in C Programming

Gain a better understanding of pointers, from the basics of how pointers function at the machine level, to using them for a variety of common and advanced scenarios. This short contemporary guide book on pointers in C programming provides a resource for professionals and advanced students needing in-depth hands-on coverage of pointer basics and advanced features. It includes the latest versions of the C language, C20, C17, and C14.You’ll see how pointers are used to provide vital C features, such as strings, arrays, higher-order functions and polymorphic data structures. Along the way, you’ll cover how pointers can optimize a program to run faster or use less memory than it would otherwise.There are plenty of code examples in the book to emulate and adapt to meet your specific needs.WHAT YOU WILL LEARN* Work effectively with pointers in your C programming* Learn how to effectively manage dynamic memory* Program with strings and arrays* Create recursive data structures* Implement function pointersWHO THIS BOOK IS FORIntermediate to advanced level professional programmers, software developers, and advanced students or researchers. Prior experience with C programming is expected.Thomas Mailund is an associate professor in bioinformatics at Aarhus University, Denmark. He has a background in math and computer science, including experience programming and teaching in the C and R programming languages. For the last decade, his main focus has been on genetics and evolutionary studies, particularly comparative genomics, speciation, and gene flow between emerging species.1. Pointers and the random access memory model2. Memory management3. Strings and arrays4. Recursive data structures5. Function pointers

Regulärer Preis: 62,99 €
Produktbild für Responsible Data Science

Responsible Data Science

EXPLORE THE MOST SERIOUS PREVALENT ETHICAL ISSUES IN DATA SCIENCE WITH THIS INSIGHTFUL NEW RESOURCEThe increasing popularity of data science has resulted in numerous well-publicized cases of bias, injustice, and discrimination. The widespread deployment of “Black box” algorithms that are difficult or impossible to understand and explain, even for their developers, is a primary source of these unanticipated harms, making modern techniques and methods for manipulating large data sets seem sinister, even dangerous. When put in the hands of authoritarian governments, these algorithms have enabled suppression of political dissent and persecution of minorities. To prevent these harms, data scientists everywhere must come to understand how the algorithms that they build and deploy may harm certain groups or be unfair.Responsible Data Science delivers a comprehensive, practical treatment of how to implement data science solutions in an even-handed and ethical manner that minimizes the risk of undue harm to vulnerable members of society. Both data science practitioners and managers of analytics teams will learn how to:* Improve model transparency, even for black box models* Diagnose bias and unfairness within models using multiple metrics* Audit projects to ensure fairness and minimize the possibility of unintended harmPerfect for data science practitioners, Responsible Data Science will also earn a spot on the bookshelves of technically inclined managers, software developers, and statisticians.GRANT FLEMING is a Data Scientist at Elder Research Inc. His professional focus is on machine learning for social science applications, model interpretability, civic technology, and building software tools for reproducible data science.PETER BRUCE is the Senior Learning Officer at Elder Research, Inc., author of several best-selling texts on data science, and Founder of the Institute for Statistics Education at Statistics.com, an Elder Research Company.Introduction xixPART I MOTIVATION FOR ETHICAL DATA SCIENCE AND BACKGROUND KNOWLEDGE 1CHAPTER 1 RESPONSIBLE DATA SCIENCE 3The Optum Disaster 4Jekyll and Hyde 5Eugenics 7Galton, Pearson, and Fisher 7Ties between Eugenics and Statistics 7Ethical Problems in Data Science Today 9Predictive Models 10From Explaining to Predicting 10Predictive Modeling 11Setting the Stage for Ethical Issues to Arise 12Classic Statistical Models 12Black-Box Methods 14Important Concepts in Predictive Modeling 19Feature Selection 19Model-Centric vs. Data-Centric Models 20Holdout Sample and Cross-Validation 20Overfitting 21Unsupervised Learning 22The Ethical Challenge of Black Boxes 23Two Opposing Forces 24Pressure for More Powerful AI 24Public Resistance and Anxiety 24Summary 25CHAPTER 2 BACKGROUND: MODELING AND THE BLACK-BOX ALGORITHM 27Assessing Model Performance 27Predicting Class Membership 28The Rare Class Problem 28Lift and Gains 28Area Under the Curve 29AUC vs. Lift (Gains) 31Predicting Numeric Values 32Goodness-of-Fit 32Holdout Sets and Cross-Validation 33Optimization and Loss Functions 34Intrinsically Interpretable Models vs. Black-Box Models 35Ethical Challenges with Interpretable Models 38Black-Box Models 39Ensembles 39Nearest Neighbors 41Clustering 41Association Rules 42Collaborative Filters 42Artificial Neural Nets and Deep Neural Nets 43Problems with Black-Box Predictive Models 45Problems with Unsupervised Algorithms 47Summary 48CHAPTER 3 THE WAYS AI GOES WRONG, AND THE LEGAL IMPLICATIONS 49AI and Intentional Consequences by Design 50Deepfakes 50Supporting State Surveillance and Suppression 51Behavioral Manipulation 52Automated Testing to Fine-Tune Targeting 53AI and Unintended Consequences 55Healthcare 56Finance 57Law Enforcement 58Technology 60The Legal and Regulatory Landscape around AI 61Ignorance Is No Defense: AI in the Context of Existing Law and Policy 63A Finger in the Dam: Data Rights, Data Privacy, and Consumer Protection Regulations 64Trends in Emerging Law and Policy Related to AI 66Summary 69PART II THE ETHICAL DATA SCIENCE PROCESS 71CHAPTER 4 THE RESPONSIBLE DATA SCIENCE FRAMEWORK 73Why We Keep Building Harmful AI 74Misguided Need for Cutting-Edge Models 74Excessive Focus on Predictive Performance 74Ease of Access and the Curse of Simplicity 76The Common Cause 76The Face Thieves 78An Anatomy of Modeling Harms 79The World: Context Matters for Modeling 80The Data: Representation Is Everything 83The Model: Garbage In, Danger Out 85Model Interpretability: Human Understanding for Superhuman Models 86Efforts Toward a More Responsible Data Science 89Principles Are the Focus 90Nonmaleficence 90Fairness 90Transparency 91Accountability 91Privacy 92Bridging the Gap Between Principles and Practice with the Responsible Data Science (RDS) Framework 92Justification 94Compilation 94Preparation 95Modeling 96Auditing 96Summary 97CHAPTER 5 MODEL INTERPRETABILITY: THE WHAT AND THE WHY 99The Sexist Résumé Screener 99The Necessity of Model Interpretability 101Connections Between Predictive Performance and Interpretability 103Uniting (High) Model Performance and Model Interpretability 105Categories of Interpretability Methods 107Global Methods 107Local Methods 113Real-World Successes of Interpretability Methods 113Facilitating Debugging and Audit 114Leveraging the Improved Performance of Black-Box Models 116Acquiring New Knowledge 116Addressing Critiques of Interpretability Methods 117Explanations Generated by Interpretability Methods Are Not Robust 118Explanations Generated by Interpretability Methods Are Low Fidelity 120The Forking Paths of Model Interpretability 121The Four-Measure Baseline 122Building Our Own Credit Scoring Model 124Using Train-Test Splits 125Feature Selection and Feature Engineering 125Baseline Models 127The Importance of Making Your Code Work for Everyone 129Execution Variability 129Addressing Execution Variability with Functionalized Code 130Stochastic Variability 130Addressing Stochastic Variability via Resampling 130Summary 133PART III EDS IN PRACTICE 135CHAPTER 6 BEGINNING A RESPONSIBLE DATA SCIENCE PROJECT 137How the Responsible Data Science Framework Addresses the Common Cause 138Datasets Used 140Regression Datasets—Communities and Crime 140Classification Datasets—COMPAS 140Common Elements Across Our Analyses 141Project Structure and Documentation 141Project Structure for the Responsible DataScience Framework: Everything in Its Place 142Documentation: The Responsible Thing to Do 145Beginning a Responsible Data Science Project 151Communities and Crime (Regression) 151Justification 151Compilation 154Identifying Protected Classes 157Preparation—Data Splitting and Feature Engineering 159Datasheets 161COMPAS (Classification) 164Justification 164Compilation 166Identifying Protected Classes 168Preparation 169Summary 172CHAPTER 7 AUDITING A RESPONSIBLE DATA SCIENCE PROJECT 173Fairness and Data Science in Practice 175The Many Different Conceptions of Fairness 175Different Forms of Fairness Are Trade-Offs with Each Other 177Quantifying Predictive Fairness Within a Data Science Project 179Mitigating Bias to Improve Fairness 185Preprocessing 185In-processing 186Postprocessing 186Classification Example: COMPAS 187Prework: Code Practices, Modeling, and Auditing 187Justification, Compilation, and Preparation Review 189Modeling 191Auditing 200Per-Group Metrics: Overall 200Per-Group Metrics: Error 202Fairness Metrics 204Interpreting Our Models: Why Are They Unfair? 207Analysis for Different Groups 209Bias Mitigation 214Preprocessing: Oversampling 214Postprocessing: Optimizing ThresholdsAutomatically 218Postprocessing: Optimizing Thresholds Manually 219Summary 223CHAPTER 8 AUDITING FOR NEURAL NETWORKS 225Why Neural Networks Merit Their Own Chapter 227Neural Networks Vary Greatly in Structure 227Neural Networks Treat Features Differently 229Neural Networks Repeat Themselves 231A More Impenetrable Black Box 232Baseline Methods 233Representation Methods 233Distillation Methods 234Intrinsic Methods 235Beginning a Responsible Neural Network Project 236Justification 236Moving Forward 239Compilation 239Tracking Experiments 241Preparation 244Modeling 245Auditing 247Per-Group Metrics: Overall 247Per-Group Metrics: Unusual Definitions of “False Positive” 248Fairness Metrics 249Interpreting Our Models: Why Are They Unfair? 252Bias Mitigation 253Wrap-Up 255Auditing Neural Networks for Natural Language Processing 258Identifying and Addressing Sources of Bias in NLP 258The Real World 259Data 260Models 261Model Interpretability 262Summary 262CHAPTER 9 CONCLUSION 265How Can We Do Better? 267The Responsible Data Science Framework 267Doing Better As Managers 269Doing Better As Practitioners 270A Better Future If We Can Keep It 271Index 273

Regulärer Preis: 25,99 €
Produktbild für Das Medium aus der Maschine

Das Medium aus der Maschine

»Die Informatik entwirft drei sehr unterschiedliche Bilder von Computer: Maschine – Werkzeug – Medium. Wie können so gegensätzliche Vorstellungen im gleichen Artefakt einen technologischen Ausdruck finden? Zu welchen Widersprüchen führen so differierende Sichtweisen in der Forschungspraxis der Informatik? Welches sind die Konzepte, über die sie sich verbinden lassen? Und wie verändert sich das Gewicht der Bilder von Maschine, Werkzeug und Medium in der Entwicklungsgeschichte des Computers und der Informatik?«Aus der EinleitungUnveränderter NachdruckHeidi Schelhowe, Prof. Dr., ist Professorin für Digitale Medien in der Bildung in der Informatik an der Universität Bremen und leitet dort die Arbeitsgruppe "Digitale Medien in der Bildung" (dimeb).

Regulärer Preis: 63,99 €
Produktbild für Basiswissen Mobile App Testing

Basiswissen Mobile App Testing

Grundlegende Methoden, Verfahren und Werkzeuge zum Testen von mobilen Applikationen.»Basiswissen Mobile App Testing« vermittelt die Grundlagen des Testens mobiler Apps und gibt einen fundierten Überblick über geeignete Testarten, Testmethoden, den Testprozess und das Testkonzept für mobile Anwendungen. Auch auf Qualitätskriterien, mobile App-Plattformen, Werkzeuge und die Automatisierung der Testausführung wird eingegangen. Viele Beispiele aus realen Kundenprojekten erleichtern die Umsetzung des Gelernten in die Praxis.Die Themen im Einzelnen:Geschäftliche & technische Faktoren, Herausforderungen & Risiken, Teststrategien für mobile AppsTests mit Bezug zur mobilen PlattformÜbliche Testarten und der Testprozess für mobile AppsMobile App-Plattformen, Werkzeuge und UmgebungenAutomatisierung der TestausführungDas Buch ist konform zum ISTQB®-Lehrplan »Certified Mobile Application Tester« und eignet sich mit vielen Beispielen und Übungen nicht nur bestens für die Prüfungsvorbereitung, sondern dient gleichzeitig als kompaktes Basiswerk zum Thema in der Praxis und an Hochschulen.Über die Autoren:Björn Lemke ist Managing Consultant bei der trendig technology services GmbH. Die Schwerpunkte seiner Arbeit sind Softwarequalitätssicherung, Integrated Technology and Operations (ITOps), IT-Service-Management (ITIL), Testmanagement, Testdatenmanagement, Testinfrastrukturmanagement sowie Mobile Application Testing in kleinen bis hin zu sehr grossen Projekten.Nils Röttger arbeitet bei der imbus AG in Möhrendorf als Berater, Projektleiter und Speaker und ist u. a. verantwortlich für die Ausbildung und den Bereich Mobile Testing. In seinen Vorträgen beschäftigt er sich immer wieder mit Themen wie exploratives Testen, Usability oder Ethik im Softwaretest.

Regulärer Preis: 32,90 €
Produktbild für Introducing .NET for Apache Spark

Introducing .NET for Apache Spark

Get started using Apache Spark via C# or F# and the .NET for Apache Spark bindings. This book is an introduction to both Apache Spark and the .NET bindings. Readers new to Apache Spark will get up to speed quickly using Spark for data processing tasks performed against large and very large datasets. You will learn how to combine your knowledge of .NET with Apache Spark to bring massive computing power to bear by distributed processing of extremely large datasets across multiple servers.This book covers how to get a local instance of Apache Spark running on your developer machine and shows you how to create your first .NET program that uses the Microsoft .NET bindings for Apache Spark. Techniques shown in the book allow you to use Apache Spark to distribute your data processing tasks over multiple compute nodes. You will learn to process data using both batch mode and streaming mode so you can make the right choice depending on whether you are processing an existing dataset or are working against new records in micro-batches as they arrive. The goal of the book is leave you comfortable in bringing the power of Apache Spark to your favorite .NET language.WHAT YOU WILL LEARN* Install and configure Spark .NET on Windows, Linux, and macOS * Write Apache Spark programs in C# and F# using the .NET bindings* Access and invoke the Apache Spark APIs from .NET with the same high performance as Python, Scala, and R* Encapsulate functionality in user-defined functions* Transform and aggregate large datasets * Execute SQL queries against files through Apache Hive* Distribute processing of large datasets across multiple servers* Create your own batch, streaming, and machine learning programsWHO THIS BOOK IS FOR.NET developers who want to perform big data processing without having to migrate to Python, Scala, or R; and Apache Spark developers who want to run natively on .NET and take advantage of the C# and F# ecosystemsED ELLIOTT is a data engineer who has been working in IT for 20 years and has focused on data for the last 15 years. He uses Apache Spark at work and has been contributing to the Microsoft .NET for Apache Spark open source project since it was released in 2019. Ed has been blogging and writing since 2014 at his own blog as well as for SQL Server Central and Redgate. He has spoken at a number of events such as SQLBits, SQL Saturday, and the GroupBy conference.IntroductionPART I. GETTING STARTED1. Understanding Apache Spark2. Setting up Spark3. Programming with .NET for Apache SparkPART II. THE APIS4. User-Defined Functions5. The DataFrame API6. Spark SQL and Hive Tables7. Spark Machine Learning APIPART III. EXAMPLES8. Batch Mode Processing9. Structured Streaming10. Troubleshooting11. Delta LakePART IV. APPENDICESAppendix A. Running in the CloudAppendix B. Implementing .Net for Apache Spark Code

Regulärer Preis: 66,99 €
Produktbild für Becoming a Data Head

Becoming a Data Head

"TURN YOURSELF INTO A DATA HEAD. YOU'LL BECOME A MORE VALUABLE EMPLOYEE AND MAKE YOUR ORGANIZATION MORE SUCCESSFUL."Thomas H. Davenport, Research Fellow, Author of Competing on Analytics, Big Data @ Work, and The AI AdvantageYOU'VE HEARD THE HYPE AROUND DATA—NOW GET THE FACTS.In Becoming a Data Head: How to Think, Speak, and Understand Data Science, Statistics, and Machine Learning, award-winning data scientists Alex Gutman and Jordan Goldmeier pull back the curtain on data science and give you the language and tools necessary to talk and think critically about it.You'll learn how to:* Think statistically and understand the role variation plays in your life and decision making* Speak intelligently and ask the right questions about the statistics and results you encounter in the workplace* Understand what's really going on with machine learning, text analytics, deep learning, and artificial intelligence* Avoid common pitfalls when working with and interpreting dataBecoming a Data Head is a complete guide for data science in the workplace: covering everything from the personalities you’ll work with to the math behind the algorithms. The authors have spent years in data trenches and sought to create a fun, approachable, and eminently readable book. Anyone can become a Data Head—an active participant in data science, statistics, and machine learning. Whether you're a business professional, engineer, executive, or aspiring data scientist, this book is for you.ALEX J. GUTMAN, PHD, is a Data Scientist, Corporate Trainer, and Accredited Professional Statistician. His professional focus is on statistical and machine learning and he has extensive experience working as a Data Scientist for the Department of Defense and two Fortune 50 companies.JORDAN GOLDMEIER is a Data Scientist, author, speaker, and community leader. He is a seven-time recipient of the Microsoft Most Valuable Professional Award and he has taught analytics to members of the Pentagon and Fortune 500 companies.Acknowledgments xiiiForeword xxiiiIntroduction xxviiPART ONE THINKING LIKE A DATA HEADCHAPTER 1 WHAT IS THE PROBLEM? 3Questions a Data Head Should Ask 4Why Is This Problem Important? 4Who Does This Problem Affect? 6What If We Don’t Have the Right Data? 6When Is the Project Over? 7What If We Don’t Like the Results? 7Understanding Why Data Projects Fail 8Customer Perception 8Discussion 10Working on Problems That Matter 11Chapter Summary 11CHAPTER 2 WHAT IS DATA? 13Data vs. Information 13An Example Dataset 14Data Types 15How Data Is Collected and Structured 16Observational vs. Experimental Data 16Structured vs. Unstructured Data 17Basic Summary Statistics 18Chapter Summary 19CHAPTER 3 PREPARE TO THINK STATISTICALLY 21Ask Questions 22There Is Variation in All Things 23Scenario: Customer Perception (The Sequel) 24Case Study: Kidney-Cancer Rates 26Probabilities and Statistics 28Probability vs. Intuition 29Discovery with Statistics 31Chapter Summary 33PART TWO SPEAKING LIKE A DATA HEADCHAPTER 4 ARGUE WITH THE DATA 37What Would You Do? 38Missing Data Disaster 39Tell Me the Data Origin Story 43Who Collected the Data? 44How Was the Data Collected? 44Is the Data Representative? 45Is There Sampling Bias? 46What Did You Do with Outliers? 46What Data Am I Not Seeing? 47How Did You Deal with Missing Values? 47Can the Data Measure What You Want It to Measure? 48Argue with Data of All Sizes 48Chapter Summary 49CHAPTER 5 EXPLORE THE DATA 51Exploratory Data Analysis and You 52Embracing the Exploratory Mindset 52Questions to Guide You 53The Setup 53Can the Data Answer the Question? 54Set Expectations and Use Common Sense 54Do the Values Make Intuitive Sense? 54Watch Out: Outliers and Missing Values 58Did You Discover Any Relationships? 59Understanding Correlation 59Watch Out: Misinterpreting Correlation 60Watch Out: Correlation Does Not Imply Causation 62Did You Find New Opportunities in the Data? 63Chapter Summary 63CHAPTER 6 EXAMINE THE PROBABILITIES 65Take a Guess 66The Rules of the Game 66Notation 67Conditional Probability and Independent Events 69The Probability of Multiple Events 69Two Things That Happen Together 69One Thing or the Other 70Probability Thought Exercise 72Next Steps 73Be Careful Assuming Independence 74Don’t Fall for the Gambler’s Fallacy 74All Probabilities Are Conditional 75Don’t Swap Dependencies 76Bayes’ Theorem 76Ensure the Probabilities Have Meaning 79Calibration 80Rare Events Can, and Do, Happen 80Chapter Summary 81CHAPTER 7 CHALLENGE THE STATISTICS 83Quick Lessons on Inference 83Give Yourself Some Wiggle Room 84More Data, More Evidence 84Challenge the Status Quo 85Evidence to the Contrary 86Balance Decision Errors 88The Process of Statistical Inference 89The Questions You Should Ask to Challenge the Statistics 90What Is the Context for These Statistics? 90What Is the Sample Size? 91What Are You Testing? 92What Is the Null Hypothesis? 92Assuming Equivalence 93What Is the Significance Level? 93How Many Tests Are You Doing? 94Can I See the Confidence Intervals? 95Is This Practically Significant? 96Are You Assuming Causality? 96Chapter Summary 97PART THREE UNDERSTANDING THE DATA SCIENTIST’S TOOLBOXCHAPTER 8 SEARCH FOR HIDDEN GROUPS 101Unsupervised Learning 102Dimensionality Reduction 102Creating Composite Features 103Principal Component Analysis 105Principal Components in Athletic Ability 105PCA Summary 108Potential Traps 109Clustering 110k-Means Clustering 111Clustering Retail Locations 111Potential Traps 113Chapter Summary 114CHAPTER 9 UNDERSTAND THE REGRESSION MODEL 117Supervised Learning 117Linear Regression: What It Does 119Least Squares Regression: Not Just a Clever Name 120Linear Regression: What It Gives You 123Extending to Many Features 124Linear Regression: What Confusion It Causes 125Omitted Variables 125Multicollinearity 126Data Leakage 127Extrapolation Failures 128Many Relationships Aren’t Linear 128Are You Explaining or Predicting? 128Regression Performance 130Other Regression Models 131Chapter Summary 131CHAPTER 10 UNDERSTAND THE CLASSIFICATION MODEL 133Introduction to Classification 133What You’ll Learn 134Classification Problem Setup 135Logistic Regression 135Logistic Regression: So What? 138Decision Trees 139Ensemble Methods 142Random Forests 143Gradient Boosted Trees 143Interpretability of Ensemble Models 145Watch Out for Pitfalls 145Misapplication of the Problem 146Data Leakage 146Not Splitting Your Data 146Choosing the Right Decision Threshold 147Misunderstanding Accuracy 147Confusion Matrices 148Chapter Summary 150CHAPTER 11 UNDERSTAND TEXT ANALYTICS 151Expectations of Text Analytics 151How Text Becomes Numbers 153A Big Bag of Words 153N-Grams 157Word Embeddings 158Topic Modeling 160Text Classification 163Naïve Bayes 164Sentiment Analysis 166Practical Considerations When Working with Text 167Big Tech Has the Upper Hand 168Chapter Summary 169CHAPTER 12 CONCEPTUALIZE DEEP LEARNING 171Neural Networks 172How Are Neural Networks Like the Brain? 172A Simple Neural Network 173How a Neural Network Learns 174A Slightly More Complex Neural Network 175Applications of Deep Learning 178The Benefits of Deep Learning 179How Computers “See” Images 180Convolutional Neural Networks 182Deep Learning on Language and Sequences 183Deep Learning in Practice 185Do You Have Data? 185Is Your Data Structured? 186What Will the Network Look Like? 186Artificial Intelligence and You 187Big Tech Has the Upper Hand 188Ethics in Deep Learning 189Chapter Summary 190PART FOUR ENSURING SUCCESSCHAPTER 13 WATCH OUT FOR PITFALLS 193Biases and Weird Phenomena in Data 194Survivorship Bias 194Regression to the Mean 195Simpson’s Paradox 195Confirmation Bias 197Effort Bias (aka the “Sunk Cost Fallacy”) 197Algorithmic Bias 198Uncategorized Bias 198The Big List of Pitfalls 199Statistical and Machine Learning Pitfalls 199Project Pitfalls 200Chapter Summary 202CHAPTER 14 KNOW THE PEOPLE AND PERSONALITIES 203Seven Scenes of Communication Breakdowns 204The Postmortem 204Storytime 205The Telephone Game 206Into the Weeds 206The Reality Check 207The Takeover 207The Blowhard 208Data Personalities 208Data Enthusiasts 209Data Cynics 209Data Heads 209Chapter Summary 210CHAPTER 15 WHAT’S NEXT? 211Index 215

Regulärer Preis: 27,99 €
Produktbild für Practical Internet Server Configuration

Practical Internet Server Configuration

Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.After a chapter explaining the most important Unix basics, you will start with a vanilla server as delivered by a hosting provider and by the end of the book, you will have a fully functional and well-secured enterprise class internet server. You will also be equipped with the expertise needed to keep your server secured and up to date. All configuration examples are given for FreeBSD, Debian and CentOS, so you are free to choose your operating system.No single blueprint exists for an internet server, and an important part of the work of a system administrator consists of analyzing, interpreting and implementing specific wishes, demands and restrictions from different departments and viewpoints within an organization. Practical Internet Server Configuration provides the information you need to succeed as a sysadmin.WHAT YOU'LL LEARN* Configure DNS using Bind 9* Set up Apache and Nginx* Customize a mail server: IMAP (Dovecot) and SMTP (Postfix), spam filtering included* Authenticate mail users using LDAP* Install and maintain MariaDB and PostgreSQL databases* Prepare SSL/TLS certificates for the encryption of web, mail and LDAP traffic* Synchronize files, calendars and address books between devices* Build a firewall: PF for FreeBSD and nftables for LinuxWHO THIS BOOK IS FORThis book can be used by aspiring and beginning system administrators who are working on personal servers, or more experienced system administrators who may know Unix well but need a reference book for the more specialized work that falls outside the daily routine. Basic understanding of Unix and working on the command line is necessary.Robert La Lau has been active on the internet since the mid-90s. What started as a hobby – playing around with Linux, and developing small games and applications using Perl, HTML and JavaScript – turned into a job when he became a full-time freelance web developer in 1999. Shortly thereafter, a web hosting server and freelance Linux and FreeBSD administration were added. In the years that followed, new programming languages were learned, and software development was added to the range of services offered. In his spare time, Rob was involved in several smaller and larger open source projects; among other things, he was the initiator and first administrator for the official online KDE forums. After 15 years of freelance IT work, Rob thought he'd had enough of IT work, finished his running affairs, and left the Netherlands to discover the world. However, the IT kept calling him, and once installed in his new home country France, he decided to return to his old métier. Only this time, it was not to get his own hands dirty in the field, executing orders for clients, but to transfer his knowledge and experience onto the next generations of system administrators and developers. He rebooted his IT career translating and narrating educational books and videos, taught some Unix classes, and seems to have found his destination publishing books now.1. Introduction and Preparations2. Unix and POSIX in a Few Words3. Software management4. Network (Base) and Firewall5. User Management and Permissions6. Domain Name System (DNS)7. Secure shell (SSH)8. Task Scheduling9. Web Server Part 1: Apache/Nginx Basics10. Traffic Encryption: SSL/TLS11. Databases12. Email Basics13. Web Server Part 2: Advanced Apache/Nginx14. Advanced Email15. Backup and Monitoring16. Taking it Further

Regulärer Preis: 79,99 €
Produktbild für Essential TypeScript 4

Essential TypeScript 4

Learn the essentials and more of TypeScript, a popular superset of the JavaScript language that adds support for static typing. TypeScript combines the typing features of C# or Java with the flexibility of JavaScript, reducing typing errors and providing an easier path to JavaScript development.Author ADAM FREEMAN explains how to get the most from TypeScript 4 in this second edition of his best-selling book.He begins by describing the TypeScript language and the benefits it offers and then shows you how to use TypeScript in real-world scenarios, including development with the DOM API, and popular frameworks such as Angular and React. He starts from the nuts-and-bolts and builds up to the most advanced and sophisticated features.Each topic is covered clearly and concisely, and is packed with the details you need to be effective. The most important features are given a no-nonsense, in-depth treatment and chapters include common problems and teach you how to avoid them.WHAT YOU WILL LEARN* Gain a solid understanding of the TypeScript language and tools* Use TypeScript for client- and server-side development* Extend and customize TypeScript* Test your TypeScript code* Apply TypeScript with the DOM API, Angular, React, and Vue.js WHO THIS BOOK IS FORJavaScript developers who want to use TypeScript to create client-side or server-side applicationsADAM FREEMAN is an experienced IT professional who has held senior positions at a range of companies, most recently serving as chief technology officer and chief operating officer of a global bank. Now retired, he spends his time writing and long-distance running.PART 1 - GETTING STARTED WITH TYPESCRIPT1. Your First TypeScript Application2. Understanding TypeScript3. JavaScript Types Primer, Part 14. JavaScript Types Primer, Part 25. Using the TypeScript Compiler6. Testing and Debugging TypeScriptPART 2 - WORKING WITH TYPESCRIPT7. Understanding Status Types8. Using Functions9. Using Arrays, Tuples and Enums10. Working with Objects11. Working with Classes and Interfaces12. Using Generic Types13. Advanced Generic Types14. Working with JavaScriptPART 3 - CREATING WEB APPLICATIONS15. Creating a Stand-Alone Web App, Part 116. Creating a Stand-Alone Web App, Part 217. Creating an Angular App, Part 118. Creating an Angular App, Part 219. Creating a React App, Part 120. Creating a React App, Part 221. Creating a Vue.js App, Part 122. Creating a Vue.js App, Part 2

Regulärer Preis: 66,99 €
Produktbild für Pro ASP.NET Core Identity

Pro ASP.NET Core Identity

Get the most from ASP.NET Core Identity. Best-selling author ADAM FREEMAN teaches developers common authentication and user management scenarios and explains how they are implemented in applications. He covers each topic clearly and concisely, and the book is packed with the essential details you need to be effective.The book takes a deep dive into the Identity framework and explains how the most important and useful features work in detail, creating custom implementations of key components to reveal the inner workings of ASP.NET Core Identity. ASP.NET Core Identity provides authentication and user management for ASP.NET Core applications. Identity is a complex framework in its own right, with support for a wide range of features, including authenticating users with services provided by Google, Facebook, and Twitter.WHAT YOU WILL LEARN* Gain a solid understanding of how Identity provides authentication and authorization for ASP.NET Core applications* Configure ASP.NET Core Identity for common application scenarios, including self-service registration, user management, and authentication with services provided by popular social media platforms* Create robust and reliable user management tools* Understand how Identity works in detailWHO THIS BOOK IS FORDevelopers with advanced knowledge of ASP.NET Core who are introducing Identity into their projects. Prior experience and knowledge of C#, ASP.NET Core is required, along with a basic understanding of authentication and authorization concepts.ADAM FREEMAN is an experienced IT professional who has held senior positions in a range of companies, most recently serving as chief technology officer and chief operating officer of a global bank. Now retired, he spends his time writing and long-distance running. Part 1 - Using ASP.NET Core Identity1. Getting Ready2. Your First Identity Application3. Creating the Example Project4. Using the Identity UI5. Configuring Identity6. Adapting Identity UI7. Using the Identity API8. Signing In and Out and Managing Passwords9. Creating and Deleting Accounts10. Using Roles and Claims11. Two-Factor and External Authentication12. Authenticating API ClientsPart 2 - Understanding ASP.NET Core Identity13. Creating the Example Project14. Working with ASP.NET Core15. Authorizing Requests16. Creating a User Store17. Claims, Roles, and Confirmations18. Signing In with Identity19. Creating a Role Store20. Lockouts and Two-Factor Sign Ins21. Authenticators and Recovery Codes22. External Authentication - Part 123. External Authentication - Part 2

Regulärer Preis: 66,99 €
Produktbild für Practical Machine Learning for Streaming Data with Python

Practical Machine Learning for Streaming Data with Python

Design, develop, and validate machine learning models with streaming data using the Scikit-Multiflow framework. This book is a quick start guide for data scientists and machine learning engineers looking to implement machine learning models for streaming data with Python to generate real-time insights.You'll start with an introduction to streaming data, the various challenges associated with it, some of its real-world business applications, and various windowing techniques. You'll then examine incremental and online learning algorithms, and the concept of model evaluation with streaming data and get introduced to the Scikit-Multiflow framework in Python. This is followed by a review of the various change detection/concept drift detection algorithms and the implementation of various datasets using Scikit-Multiflow.Introduction to the various supervised and unsupervised algorithms for streaming data, and their implementation on various datasets using Python are also covered. The book concludes by briefly covering other open-source tools available for streaming data such as Spark, MOA (Massive Online Analysis), Kafka, and more.WHAT YOU'LL LEARN* Understand machine learning with streaming data concepts* Review incremental and online learning* Develop models for detecting concept drift* Explore techniques for classification, regression, and ensemble learning in streaming data contexts* Apply best practices for debugging and validating machine learning models in streaming data context* Get introduced to other open-source frameworks for handling streaming data.WHO THIS BOOK IS FORMachine learning engineers and data science professionalsDr. Sayan Putatunda is an experienced data scientist and researcher. He holds a Ph.D. in Applied Statistics/ Machine Learning from the Indian Institute of Management, Ahmedabad (IIMA) where his research was on streaming data and its applications in the transportation industry. He has a rich experience of working in both senior individual contributor and managerial roles in the data science industry with multiple companies such as Amazon, VMware, Mu Sigma, and more. His research interests are in streaming data, deep learning, machine learning, spatial point processes, and directional statistics. As a researcher, he has multiple publications in top international peer-reviewed journals with reputed publishers. He has presented his work at various reputed international machine learning and statistics conferences. He is also a member of IEEE.Chapter 1: An Introduction to Streaming DataChapter Goal: Introduce the readers to the concept of streaming data, the various challenges associated with it, some of its real-world business applications, various windowing techniques along with the concepts of incremental and online learning algorithms. This chapter will also help in understanding the concept of model evaluation in case of streaming data and provide and introduction to the Scikit-Multiflow framework in Python.No of pages- 35Sub -Topics1. Streaming data2. Challenges of streaming data3. Concept drift4. Applications of streaming data5. Windowing techniques6. Incremental learning and online learning7. Illustration : Adopting batch learners into incremental learners8. Introduction to Scikit-Multiflow framework9. Evaluation of streaming algorithmsChapter 2: Change DetectionChapter Goal: Help the readers to understand the various change detection/concept drift detection algorithms and its implementation on various datasets using Scikit-Multiflow.No of pages : 35Sub - Topics:1. Change detection problem2. Concept drift detection algorithms3. ADWIN4. DDM5. EDDM6. Page HinkleyChapter 3: Supervised and Unsupervised Learning for Streaming DataChapter Goal: Help the readers to understand the various regression and classification (including Ensemble Learning) algorithms for streaming data and its implementation on various datasets using Scikit-Multiflow. Also, discuss some approaches for clustering with streaming data and its implementation using Python.No of pages: 35Sub - Topics:1. Regression with streaming data2. Classification with streaming data3. Ensemble Learning with streaming data4. Clustering with streaming dataChapter 4: Other Tools and the Path ForwardChapter Goal: Introduce the readers to the other open source tools for handling streaming data such as Spark streaming, MOA and more. Also, educate the reader about additional reading for advanced topics within streaming data analysis.No of pages: 35Sub - Topics:1. Other tools for handling streaming data1.1.1. Apache Spark1.1.2. Massive Online Analysis (MOA)1.1.3. Apache Kafka2. Active research areas and breakthroughs in streaming data analysis3. Conclusion

Regulärer Preis: 62,99 €
Produktbild für Protective Security

Protective Security

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised: cyberattack, data breach, system outage, pandemic, natural disaster, and many more.Rather than being compliance-concentric, this book focuses on how your business can identify the assets that are most valuable to your organization and the threat vectors associated with these assets. You will learn how to apply appropriate mitigation controls to reduce the risks within suitable tolerances.You will gain a comprehensive understanding of the value that effective protective security provides and how to develop an effective strategy for your type of business.WHAT YOU WILL LEARN* Take a deep dive into legal and regulatory perspectives and how an effective protective security strategy can help fulfill these ever-changing requirements* Know where compliance fits into a company-wide protective security strategy* Secure your digital footprint* Build effective 5 D network architectures: Defend, detect, delay, disrupt, deter* Secure manufacturing environments to balance a minimal impact on productivity* Securing your supply chains and the measures needed to ensure that risks are minimizedWho This Book Is ForBusiness owners, C-suite, information security practitioners, CISOs, cybersecurity practitioners, risk managers, IT operations managers, IT auditors, and military enthusiastsJIM (JAMES) SEAMAN has been dedicated to the pursuit of security for his entire adult life. He served 22 years in the RAF Police, covering a number of specialist areas (physical security, aviation security, information security management, IT security management, cyber security management, security investigations, intelligence operations, incident response and disaster recovery), before successfully transitioning his skills to corporate environments (financial services, banking, retail, manufacturing, ecommerce, marketing, etc.) to help businesses enhance their cyber/InfoSec defensive measures working with various industry security standards.CHAPTER 1: WHAT IS PROTECTIVE SECURITY (PS)?An introduction to the term ‘Protective Security’ and a description of why this differs to other industry terms (e.g. Cyber Security, Information Security, IT Security, Network Security, etc.)?Why PS should be an integral for your business operations?CHAPTER 2: PROTECTIVE SECURITY (PS) IN TERMS OF THE LEGAL & REGULATORY PERSPECTIVE.A deep dive into the Legal and Regulatory perspectives and how an effective PS strategy can help fulfil these ever-changing requirements?PS and the European Union General Data Protection Act (EU-GDPR).CHAPTER 3: THE INTEGRATION OF COMPLIANCE WITH PROTECTIVE SECURITY (PS).A description of where compliance fits into a company-wide PS strategy.PS and the Payment Card Industry Data Security Standard (PCI DSS).CHAPTER 4: THE DEVELOPMENT OF AN EFFECTIVE PROTECTIVE SECURITY (PS) STRATEGY.A comprehensive guide to the development of an effective strategy, aligning business assets to their importance for the business objectives and goals, to incorporate the threats, risks, and core components of any strategy.Strategic alignment with the business context.CHAPTER 5: CYBER SECURITY.A deep dive into the concept of Cyber Security, with a focus on Point of Origins (PoO) that occur in the ‘Badlands’ (e.g. outside the corporate network) to compromise internet-facing technologies (e.g. Ecommerce, Digital, Mobile, etc.)Securing your Digital Footprint.CHAPTER 6: NETWORK/IT SECURITY.The importance of secure by design/default networks to help safeguard your most important business IT assets from compromise.Lateral Movement Attacks.CHAPTER 7: INFORMATION SYSTEMS SECURITY.Providing a guide to the securing of these systems, as a separate asset type, based upon the value of the data assets to the business and to aid the application of the 5 Ds of Security (Defend, Detect, Delay, Disrupt & Deter).Building Effective 5 Ds Network Architectures.CHAPTER 8: PHYSICAL SECURITY.A comprehensive guide to the development of appropriate physical security measures and its importance within the Protective Security strategy.Fortifying Your Business Operations.CHAPTER 9: INDUSTRIAL SYSTEMS SECURITYIncreasingly, Manufacturing systems are vulnerable to cyber-attacks. Gain an insight how securing these environments can be balanced with a minimal impact on productivity.Manufacturing Secure Operations.CHAPTER 10: SECURING YOUR SUPPLY CHAINGain an appreciation for securing your Supply Chains and the measures needed to ensure that the Supply Chain risks are minimized.The Weakest Link?CHAPTER 11: DEVELOPING YOUR INTERNAL FIREWALL.A focus on the development of a robust Security Culture, through the proactive engagement with a business’ personnel assets.Security Is Not A Dirty Word.CHAPTER 12: STRICT ACCESS RESTRICTIONSThe ‘Need To Know’/’Need To Access’ are the fundamental principles for any effective Protective Security strategy. Gain an insight into why this is the case and how to ensure that this is the case within your organization.The Keys To Your Empire.CHAPTER 13: BUILDING RESILIENT SYSTEMSGain an appreciation for the business value of building resilient systems and an understanding on what is required to develop resilience into your PS strategy.The Ability To ‘Bounce Back’.CHAPTER 14: DEMONSTRATING THE PROTECTIVE SECURITY (PS) RETURN ON INVESTMENTS (ROI)The value of an effective PS strategy is often underappreciated by business leaders. Gain an understanding on how to demonstrate to that their investments continue to deliver a robust security posture and continues to ensure that they remain a less viable target.The Value of PS.

Regulärer Preis: 56,99 €
Produktbild für Datenschutz nach DS-GVO und Informationssicherheit gewährleisten

Datenschutz nach DS-GVO und Informationssicherheit gewährleisten

In vielen Unternehmen und Behörden gibt es zahlreiche Verfahren, die sowohl die Anforderungen des Datenschutzes als auch die der Informationssicherheit erfüllen müssen. Was liegt da näher als die Auswahl der erforderlichen Sicherungsmaßnahmen in einem einheitlichen Vorgehen zu ermitteln. Mit diesem Werk gibt der Autor dem Praktiker einen Leitfaden an die Hand, den dieser gleichermaßen bei einfachen als auch komplexen Verfahren anwenden kann.Im ersten Teil wird auf Basis des Prozesses ZAWAS die Umsetzung der Anforderungen der DS-GVO (einschl. DSFA) aufgezeigt. Zusätzlich zeigt der Autor im zweiten Teil des Buches auf, wie durch eine kleine Prozesserweiterung dieses Vorgehen auch auf die Ermittlung der erforderlichen Sicherungsmaßnahmen für die Informationssicherheit genutzt werden kann.Dieses Vorgehen reduziert den Gesamtaufwand und führt zu einem höheren Schutzniveau.STEFAN MIEROWSKI, MSc., Dipl. Finanzwirt (FH), studierte Informatik und Rechtswissenschaft, Referent bei der Landesbeauftragten für den Datenschutz Niedersachsen, ehemaliger Referent beim BSI und zertifizierter ISO 27001 Auditor, Schöpfer des Prozesses ZAWAS. Ausgangslage: Anforderung der Digitalisierung.- Darstellung der Informationssicherheit und des Datenschutzes.- Der Prozess zur Auswahl angemessener Sicherungsmaßnahmen (ZAWAS).- Prüfung der Übertragbarkeit des Prozesses ZAWAS auf die Informationssicherheit.- Fazit.- Zusammenfassung

Regulärer Preis: 4,99 €
Produktbild für Introducing Blockchain with Lisp

Introducing Blockchain with Lisp

Implement blockchain from scratch covering all the details with Racket, a general-purpose Lisp. You'll start by exploring what a blockchain is, so you have a solid foundation for the rest of the book. You'll then be ready to learn Racket before starting on your blockchain implementation. Once you have a working blockchain, you'll move onto extending it. The book's appendices provide supporting resources to help you in your blockchain projects.The recommended approach for the book is to follow along and write the code as it’s being explained instead of reading passively. This way you will get the most out of it. All of the source code is available for free download from GitHub.WHAT YOU WILL LEARN* Discover the Racket programming language and how to use it* Implement a blockchain from scratch using Lisp* Implement smart contracts and peer-to-peer support* Learn how to use macros to employ more general abstractionsWHO THIS BOOK IS FORNovices that have at least some experience with programming, as well as some basic working experience with computers. The book also assumes some experience with high school mathematics, such as functions.Boro Sitnikovski has over ten years of experience working professionally as a software engineer. He started programming with assembly on an Intel x86 at the age of ten. While in high school, he won several prizes in competitive programming, varying from 4th, 3rd, and 1st place. He is an informatics graduate - his bachelor’s thesis was titled “Programming in Haskell using algebraic data structures”, and his master’s thesis was titled “Formal verification of Instruction Sets in Virtual Machines”. He has also published a few papers on software verification. Other research interests of his include programming languages, mathematics, logic, algorithms, and writing correct software. He is a strong believer in the open-source philosophy and contributes to various open-source projects. In his spare time, he enjoys some time off with his family.1: Introduction to Blockchain2: Racket Programming Language3: Blockchain Implementation4: Extending the BlockchainConclusionFurther ReadingAppendix A: Macros

Regulärer Preis: 56,99 €
Produktbild für Scrum Master 2.0

Scrum Master 2.0

Das nächste Level - Neuerscheinung in 04/2021!Dieses Buch ist für Scrum Master geschrieben, die festgestellt haben, dass ihnen die Theorie von Scrum alleine nicht weiterhilft. Denn wir arbeiten mit und für ein Team von Menschen, die ihre Schwächen, Stärken und Eigenheiten haben. Und da ist der offizielle Scrum Guide nur ein kleiner Teil der tatsächlichen Arbeitsinhalte. Hier setzt das Buch »Scrum Master 2.0« an: Nach den theoretischen Grundlagen zu diesem agilen Framework geht es um die Arbeit mit dem Team, um die tägliche Gestaltung des Scrum Master-Alltags, seine Vorgehensweisen, seine Tools, seine Interventionen. Scrum Master 2.0 startet da, wo der Scrum Guide endet.Jedes Kapitel konzentriert sich auf einen anderen Praxisbereich. Angesprochen werden Themen wie Teamentwicklung und -motivation, agile Konzepte, Visualisierung, Stressprävention, Kommunikation, Coaching, Kontaktmanagement, agile Moderation und vieles mehr. Dieses Buch ist somit ein unerlässliches Handwerkszeug für jeden Scrum Master.Kenntnisse des Scrum Frameworks werden für dieses Buch vorausgesetzt. Alle Themen lassen sich einfach und effektiv in den Arbeitsalltag integrieren.Leseprobe (PDF-Link)

Regulärer Preis: 34,99 €
Produktbild für Neuronale Netze mit C# programmieren

Neuronale Netze mit C# programmieren

Mit praktischen Beispielen für Machine Learning im Unternehmenseinsatz.Sie wollen neuronale Netze und Machine-Learning-Algorithmen mit C# entwickeln? Dann finden Sie in diesem Buch eine gut verständliche Einführung in die Grundlagen und es wird Ihnen gezeigt, wie Sie neuronale Netze und Machine-Learning-Algorithmen in Ihren eigenen Projekten praktisch einsetzen.Mithilfe von Beispielen erstellen und trainieren Sie Ihr erstes neuronales Netz zur vorausschauenden Wartung einer Produktionsmaschine.Im Praxisteil lernen Sie dann, wie Sie TensorFlow-Modelle in ML.NET benutzen oder Infer.NET direkt verwenden können. Des Weiteren nutzen Sie die Predictive- und Sentiment-Analyse, um sich mit Machine-Learning-Algorithmen vertraut zu machen.Alle im Buch vorgestellten Projekte sind in C# programmiert und stehen als Download zur Verfügung. Grundkenntnisse in C# werden für die Arbeit mit dem Buch vorausgesetzt. Alle Projekte lassen sich ohne größere Rechnerressourcen umsetzen.Daniel Basler arbeitet als Lead Developer und Softwarearchitekt. Seine Schwerpunkte liegen auf Cross-Platform-Apps, Android, JavaScript und Microsoft-Technologien. Er entwickelt u.a. Software für Regal- und Flächenlagersysteme sowie Anlagenvisualisierung und setzt in diesem Umfeld verstärkt Machine-Learning-Methoden ein. Darüber hinaus schreibt er regelmäßig Artikel für die Fachzeitschriften dotnetpro und web&mobile Developer.Leseprobe (PDF-Link)

Regulärer Preis: 59,99 €
Produktbild für Stochastic Approaches to Electron Transport in Micro- and Nanostructures

Stochastic Approaches to Electron Transport in Micro- and Nanostructures

The book serves as a synergistic link between the development of mathematical models and the emergence of stochastic (Monte Carlo) methods applied for the simulation of current transport in electronic devices. Regarding the models, the historical evolution path, beginning from the classical charge carrier transport models for microelectronics to current quantum-based nanoelectronics, is explicatively followed. Accordingly, the solution methods are elucidated from the early phenomenological single particle algorithms applicable for stationary homogeneous physical conditions up to the complex algorithms required for quantum transport, based on particle generation and annihilation. The book fills the gap between monographs focusing on the development of the theory and the physical aspects of models, their application, and their solution methods and monographs dealing with the purely theoretical approaches for finding stochastic solutions of Fredholm integral equations. Part I Aspets of Electron Transport Modeling: 1. Concepts of Device Modeling.- 2. The Semiconductor Model: Fundamentals.- 3. Transport Theories in Phase Space.- 4. Monte Carlo Computing.- Part II Stochastic Algorithms for Boltzmann Transport: 5. Homogeneous Transport: Empirical Approach.-  6.  Homogeneous Transport: Stochastic Approach.- 7. Small Signal Analysis.- 8. Inhomogeneous Stationary Transport.- 9. General Transport: Self-Consistent Mixed Problem.- 10. Event Biasing.- Part III Stochastic Algorithms for Quantum Transport:  11.Wigner Function Modeling.- 12. Evolution in a Quantum Wire.- 13. Hierarchy of Kinetic Models.- 14. Stationary Quantum Particle Attributes.- 15. Transient Quantum Particle Attributes.  

Regulärer Preis: 139,09 €
Produktbild für PHP 8 Objects, Patterns, and Practice

PHP 8 Objects, Patterns, and Practice

Learn how to develop elegant and rock-solid systems using PHP, aided by three key elements: object fundamentals, design principles, and best practices. The 6th edition of this popular book has been fully updated for PHP 8, including attributes, constructor property promotion, new argument and return pseudo-types, and more. It also covers many features new since the last edition including typed properties, the null coalescing operator, and void return types. This book provides a solid grounding in PHP's support for objects, it builds on this foundation to instill core principles of software design and then covers the tools and practices needed to develop, test, and deploy robust code.PHP 8 Objects, Patterns, and Practice begins by covering PHP's object-oriented features. It introduces key topics including class declarations, inheritance, and reflection. The next section is devoted to design patterns. It explains the principles that make patterns powerful. You’ll cover many of the classic design patterns including enterprise and database patterns. The last segment of the book covers the tools and practices that can help turn great code into a successful project. The section shows how to manage multiple developers and releases with git, and how to manage builds and dependencies with Composer. It also explores strategies for automated testing and continuous integration.After reading and using this book, you will have mastered object-oriented enhancements, design patterns, and the essential development tools available for PHP 8.WHAT YOU WILL LEARN* Work with object fundamentals: write classes and methods, instantiate objects, and create powerful class hierarchies using inheritanceMaster advanced object-oriented features, including static methods and properties, managing error conditions with exceptions, and creating abstract classes and interfaces * Understand and use design principles to deploy objects and classes effectively in your projects* Discover a set of powerful patterns that you can implement in your own projects* Guarantee a successful project including unit testing; version control and build, installation, and package management; and continuous integrationWHO THIS BOOK IS FORAnyone with at least a basic knowledge of PHP who wants to use its object-oriented features in their projects. It is also for PHP coders who want to learn about the practices and tools (version control, testing, continuous integration, etc) that can make projects safe, elegant and stable.MATT ZANDSTRA has worked as a web programmer, consultant, and writer for over two decades. He is the author of SAMS Teach Yourself PHP in 24 Hours (three editions) and is a contributor to DHTML Unleashed. He has written articles for Linux Magazine, Zend, IBM DeveloperWorks, and php|architect Magazine, among others. Matt was a senior developer/tech lead at Yahoo and API tech lead at LoveCrafts. Matt works as a consultant advising companies on their architectures and system management, and also develops systems primarily with PHP, and Java. Matt also writes fiction.Part I. Objects.-1. PHP: Design and Management.-2. PHP and Objects.-3. Object Basics.-4. Advanced Features.-5. Object Tools.-6. Objects and Design.-Part II. Patterns.-7. What Are Design Patterns? Why Use Them?.-8. Some Pattern Principles.-9. Generating Objects.-10. Patterns for Flexible Object Programming.-11. Performing and Representing Tasks.-12. Enterprise Patterns.-13. Database Patterns.-Part III. Practice.-14. Good (and Bad) Practice.-15. PHP Standards.-16. PHP Using and Creating Components with Composer.-17. Version Control with Git.-18. Testing.-19. Automated Build with Phing.-20. Vagrant.-21. Continuous Integration.-22. Objects, Patterns, and Practice.-23. App A: Bibliography.-24. App B: A Simple Parser.

Regulärer Preis: 64,99 €
Produktbild für Visualizing Data in R 4

Visualizing Data in R 4

Master the syntax for working with R’s plotting functions in graphics and stats in this easy reference to formatting plots. The approach in Visualizing Data in R 4 toward the application of formatting in ggplot() will follow the structure of the formatting used by the plotting functions in graphics and stats. This book will take advantage of the new features added to R 4 where appropriate including a refreshed color palette for charts, Cairo graphics with more fonts/symbols, and improved performance from grid graphics including ggplot 2 rendering speed.Visualizing Data in R 4 starts with an introduction and then is split into two parts and six appendices. Part I covers the function plot() and the ancillary functions you can use with plot(). You’ll also see the functions par() and layout(), providing for multiple plots on a page. Part II goes over the basics of using the functions qplot() and ggplot() in the package ggplot2. The default plots generated by the functions qplot() and ggplot() give more sophisticated-looking plots than the default plots done by plot() and are easier to use, but the function plot() is more flexible. Both plot() and ggplot() allow for many layers to a plot.The six appendices will cover plots for contingency tables, plots for continuous variables, plots for data with a limited number of values, functions that generate multiple plots, plots for time series analysis, and some miscellaneous plots. Some of the functions that will be in the appendices include functions that generate histograms, bar charts, pie charts, box plots, and heatmaps.WHAT YOU WILL LEARN* Use R to create informative graphics* Master plot(), qplot(), and ggplot()* Discover the canned graphics functions in stats and graphicsFormat plots generated by plot() and ggplot()WHO THIS BOOK IS FORThose in data science who use R. Some prior experience with R or data science is recommended.Margot Tollefson, PhD is a semi-retired freelance statistician, with her own consulting business, Vanward Statistics. She received her PhD in statistics from Iowa State University and has many years of experience applying R to statistical research problems. Dr. Tollefson has chosen to write this book because she often creates graphics using R and would like to share her knowledge and experience. Her professional blog is on WordPress at vanwardstat. Social media: @vanstat1) Introduction: plot(), qplot(), and ggplot(), Plus Somea) plot() – arguments, ancillary functions, and methods; par() and layout()b) qplot() and ggplot() – aesthetics, geometries, and other useful functionsc) other plotting functions in graphics and statsPart I. An Overview of plot()2) The plot() Functiona) what the function is and how the function worksb) will use method .xy for example3) The Arguments to plot()a) Type of plot, axis labels, plot titles, display formatb) Plotting characters, character size, fonts, colors, line styles and widths4) Ancillary Functions to use with plot()a) axis(), box(), clip(), grid(), legend(), mtext(), rug()b) abline(), contour(), curve(), lines(), polypath()c) arrows(), image(), points(), polygon(), rect(), segments(), symbols(), text()d) axTicks(), identify(), locator(), pch(), strwidth(),5) The Methods for plot()a) What are methods?b) Methods in the graphics packagec) Methods in the stats package6) How to Use the Functions par() and layout()a) What par() doesb) Arguments specific to par()c) Multiple plotsPart II. A look at the ggplot2 Package7) The Functions qplot(), ggplot(), and the Specialized Notation in ggplot2a) Working with qplot()b) The ggplot() functionc) Specialized notation8) Themesa) The theme() functionb) The element_*() functions9) Aesthetics and Geometriesa) The aes() functionb) The geom_*() functions10) Controlling the Appearancea) The annotate_*() functionsb) The coord_*() functionsc) The facet_*() functionsd) The guide_*() functionse) The position_*() functionsf) The scale_*() functionsg) The stat_*() functionsAppendix I. Plots for Contingency TablesAppendix II. Plots for Continuous VariablesAppendix III. Plots for Data with a Limited Number of ValuesAppendix IV. Functions that Generate Multiple PlotsAppendix V. Plots for Time SeriesAppendix VI. Miscellaneous Plots

Regulärer Preis: 66,99 €
Produktbild für Microsoft 365 Compliance

Microsoft 365 Compliance

Use the information presented in this book to implement an end-to-end compliance program in your organization using Microsoft 365 tools. You will learn about the solutions available in the Microsoft 365 Compliance Center, including best practices and common pitfalls. IT professionals will benefit from the author’s approach of introducing each topic within a practical business context and scenarios behind the “whys” of compliance. Compliance managers will understand how to implement their requirements in Microsoft 365.Compliance and risk management is often a board- or CEO-level issue. The risks of hefty fines and bad PR from non-compliance are severe. IT is usually responsible for implementing compliance controls and for working with compliance and legal officers to manage the day-to-day risk in an organization.After reading Microsoft 365 Compliance, you will be prepared to have a well-informed conversation with your compliance and legal officers to determine how to work together to identify specific compliance requirements for your organization. You will be able to implement those requirements yourself using Microsoft 365 features. Compliance and legal officers will understand how to communicate their technical requirements to IT.Author Erica Toelle helps you build a solid compliance foundation by teaching you about topics such as information protection, retention, records management, eDiscovery, auditing, compliance with common regulations, managing insider risks, supervising communications, data loss prevention, protecting sensitive information, and using machine learning to reduce compliance costs.What You Will Learn* Understand typical business scenarios and requirements for a Microsoft 365 compliance program* Fulfill these compliance scenarios and requirements using out of the box Microsoft 365 solutions and functionality* Ensure that your Microsoft 365 implementation meets standard compliance regulations, such as GDPR and ISO/IEC 27001:2013* Enlist best practices and things to know when implementing Microsoft 365 solutions* Comprehend required Microsoft licensing and how to implement a least permissions model for each compliance solution* Explore what you can accomplish using the compliance center user interface, without custom scripting or codeThis book is for IT professionals, security managers, compliance officers, risk managers, internal audit, records managers, CIOs, and anyone who would like to learn more about Microsoft 365 compliance.·ERICA TOELLE is a Microsoft MVP in Office Apps and Services. She is an internationally recognized speaker on compliance, Office 365, and SharePoint. Erica has been working with customers to deploy these solutions since 2004 and has been hired as an expert by more than 75 Fortune 500 companies and several Microsoft product teams. Erica is a top 15 International SharePoint Influencer from 2016-present.CHAPTER 1: An Introduction to Compliance in Microsoft 365CHAPTER 2: Compliance ManagerCHAPTER 3: Data ClassificationCHAPTER 4: Data ConnectorsCHAPTER 5: Information ProtectionCHAPTER 6: Data Loss Prevention PoliciesCHAPTER 7: Information BarriersCHAPTER 8: Information GovernanceCHAPTER 9: Records ManagementCHAPTER 10: Insider Risk ManagementCHAPTER 11: Communication ComplianceCHAPTER 12: CONTENT SEARCHChapter 13: Core eDiscoveryChapter 14: Advanced eDiscoveryChapter 15: Data InvestigationsChapter 16: The Unified Audit Log

Regulärer Preis: 56,99 €
Produktbild für Big Data Analytics

Big Data Analytics

Mit diesem Herausgeberwerk führen die Autoren den Begriff „Big Data Analytics“ ein und geben Fallstudien aus unterschiedlichen Anwendungsgebieten. Unter Big Data Analytics wird das Aufbereiten, Analysieren und Interpretieren von großen, oft heterogenen Datenbeständen verstanden, mit dem Ziel, Muster und Zusammenhänge in den Daten aufzudecken und Entscheidungsgrundlagen für wissenschaftliche, betriebliche oder gesellschaftliche Fragestellungen zu erhalten.Nebst den theoretischen Grundlagen widmet sich das Herausgeberwerk der Vielfalt verschiedener Anwendungsmöglichkeiten. Fallbeispiele geben Einblick in die Anwendung von Big Data Analytics und dessen Nutzenpotenziale.Das Werk richtet sich gleichermaßen an Studierende, Fachleute aller Fachrichtungen als auch an interessierte Anwender. Es hilft den Leserinnen und Leser, die Bedeutungsvielfalt des Begriffs Big Data Analytics zu verstehen und verschiedene Einsatzmöglichkeiten im eigenen Umfeld zu erkennen und zu bewerten.SARA D'ONOFRIO ist IT Business Partner Manager eines der größten Detailhandelsunternehmen der Schweiz, Autorin und Herausgeberin der Zeitschrift HMD - Praxis der Wirtschaftsinformatik bei Springer, Gastdozentin an Hochschulen und Mitglied der Stiftung FMsquare, welche die Anwendung von Fuzzy-Logik zur Lösung von wirtschaftlichen und sozialen Problemen fördert. Sie hat Betriebswirtschaft und Wirtschaftsinformatik studiert und in Informatik promoviert.ANDREAS MEIER hat Musik an der Musikakademie in Wien und Mathematik an der Eidgenössischen Technischen Hochschule (ETH) in Zürich studiert, wo er doktorierte und habilitierte. Er arbeitete bei IBM Schweiz, gehörte zum Direktionskader der internationalen Bank SBV und trug Mitverantwortung in der Geschäftsleitung des Versicherers CSS. In der Forschung war er am IBM Research Lab in Kalifornien tätig und gründete das Research Center Fuzzy Management Methods an der Universität Fribourg in der Schweiz.Grundlagen - Textanalyse - Machine Learning - Prädiktive Modelle - Trendforschung

Regulärer Preis: 53,49 €
Produktbild für Robotic Process Automation using UiPath StudioX

Robotic Process Automation using UiPath StudioX

Learn about Robotic Processing Automation (RPA) and how to build bots using UiPath. This book uses hands-on examples to explain the basics of UiPath and then walks you through real-world prototypes for testing your knowledge.Organizations around the world are implementing RPA in some capacity, and there is a shortage of RPA developers in the market. Analysts predict that the RPA market size will be worth $4 Billion by 2025. With UiPath as one of the three major players in the RPA market, professionals and students can use this book to get ahead of the curve.This book helps you kick-start your automation journey with a special focus on one of the most popular RPA tools: UiPath. Robotic Process Automation using UiPath explains in detail the various features and functionalities of the RPA platform including development, debugging, and error handling.WHAT YOU'LL LEARN* Create robots from scratch, using one of the market leaders in RPA* Develop automation apps and deploy them to all the computers in your department* Build, test and perform enterprise automation tasks with UiPath* Understand the key building blocks and components of UiPath * Apply UiPath programming techniques to deploy robot configurations* Review email Automation* Automate Excel and PDF interactionsWHO THIS BOOK IS FORRPA developers and business users alike, bringing the power and skill set of automation to anyone interested in citizen-led development, specifically UiPath StudioX. The simple exercises and no-code platform require no prior programming or RPA knowledge to follow along with this beginner's guide.ADEEL JAVED is an intelligent automation architect, an author, and a speaker. He helps organizations automate work using low-code, business process management (BPM), robotic process automation (RPA), analytics, integrations and ML. He loves exploring new technologies and writing about them. He published his first book, "Building Arduino Projects for the Internet of Things", with Apress back in 2015. He shares his thoughts on various technology trends on his personal blog (adeeljaved.com).ANUM SUNDRANI is a business systems analyst and technology enthusiast who specializes in Business Process Management and Robotic Process Automation. Anum is a Certified Appian Analyst, Tableau Author, Six Sigma Green Belt and Scrum Master, alongside her several trainings in the areas of RPA development and the automation delivery lifecycle. She has an inquisitive eye for simplifying complex business processes and has focused on implementing automation solutions for business users since 2017.NADIA MALIK is a Presales Engineer with a background in software development. She has started her journey as a Software Engineer at IBM developing Cloud storage applications and then joining the UiPath rocket-ship in June of 2018 helping customers design, implement, and provide training in robotics process automation. Today she continues to evangelize RPA and mentor young women in STEM.SIDNEY MADISON PRESCOTT is a senior technology leader, keynote speaker, and robotics evangelist specializing in the creation of Robotic Process Automation Centers of Excellence for Fortune 500 companies. Sidney currently heads up the Global Intelligent Automation initiative at music streaming powerhouse Spotify. In addition to her enterprise technology expertise, Sidney is an executive board member for three global non-profit organizations, where she contributes valuable automation insights to enhance overall program objectives. To round out her career accolades, Sidney was also named a global recipient of the 2020 Top 50 Technology Visionaries award.Part I: IntroductionChapter 1. Robotic Process Automation Overview* Overview* Benefits* Market trends* Major vendors* Real-life use cases* Attended/unattendedChapter 2. UiPath StudioX Overview* Download* Install* Interface OverviewPart II: Activities – Your Building BlocksGoal of this section is to list down each activity under these tiles in UiPath StudioX, provide a brief description of what that activity does, screenshots of different configurations, quick examples. Essentially make this as the ultimate reference material.Chapter 3. Common ActivitiesChapter 4. UI AutomationChapter 5. Outlook AutomationChapter 6. Word AutomationChapter 7. Excel AutomationChapter 8. CSV AutomationChapter 9. File AutomationPart III: Building PrototypesGoal of this section is to build couple of real-life prototypes that uses knowledge acquired in prior sections. We have already developed two sample target applications, one browser-based, the other windows-based.Chapter 10. Real-life prototype 1 (Inventory Management)* Outlook Automation* CSV Automation* UI Automation (Browser)* File AutomationChapter 11. Real-life prototype 2 (Order Management)* UI Automation (App)* Excel Automation* Word Automation* File AutomationChapter 12. Real-life prototype 3 (Excel Management)* Excel AutomationPart IV: Scaling UpGoal of this section/chapter is to help people think about next steps. Most organizations have difficulty scaling up the concepts of citizen development.Chapter 13. Scaling RPA – high-level ideas

Regulärer Preis: 62,99 €