Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Self-Service AI mit Power BI

Self-Service AI mit Power BI

In diesem Buch wird erklärt, wie Sie die in Power BI Desktop geladenen Daten durch den Zugriff auf eine Reihe von Funktionen der künstlichen Intelligenz (KI) anreichern können. Diese KI-Funktionen sind in Power BI Desktop integriert und helfen Ihnen, neue Erkenntnisse aus vorhandenen Daten zu gewinnen. Einige der Funktionen sind automatisiert und stehen Ihnen auf Knopfdruck oder durch das Schreiben von Datenanalyseausdrücken (DAX) zur Verfügung. Andere Funktionen sind durch das Schreiben von Code in den Sprachen R, Python oder M verfügbar. Dieses Buch eröffnet Ihnen die gesamte Palette der KI-Funktionen mit klaren Beispielen, die zeigen, wann sie am besten angewendet werden und wie Sie sie auf Ihre eigenen Datensätze anwenden können. Ganz gleich, ob Sie Geschäftsanwender, Analyst oder Datenwissenschaftler sind - Power BI verfügt über KI-Funktionen, die auf Sie zugeschnitten sind. In diesem Buch erfahren Sie, welche Arten von Erkenntnissen Power BI automatisch liefern kann. Sie erfahren, wie Sie die Sprachen R und Python für Statistiken integrieren und nutzen können, wie Sie beim Laden von Daten mit Cognitive Services und Azure Machine Learning Services zusammenarbeiten, wie Sie Ihre Daten durch Fragen in einfachem Englisch erkunden können ... und vieles mehr! Es gibt KI-Funktionen für die Entdeckung Ihrer Daten, die Charakterisierung unerforschter Datensätze und die Erstellung von Was-wäre-wenn-Szenarien.Es gibt viel zu mögen und von diesem Buch zu lernen, ob Sie ein Neuling in Power BI oder ein erfahrener Benutzer sind. Power BI Desktop ist ein frei verfügbares Tool zur Visualisierung und Analyse. Dieses Buch hilft Ihnen, das Beste aus diesem Tool herauszuholen, indem Sie einige seiner neuesten und fortschrittlichsten Funktionen nutzen.WAS SIE LERNEN WERDEN:- Stellen Sie Fragen in natürlicher Sprache und erhalten Sie Antworten aus Ihren Daten- Lassen Sie sich von Power BI erklären, warum sich ein bestimmter Datenpunkt von den anderen unterscheidet- Lassen Sie Power BI die wichtigsten Einflussfaktoren über Datenkategorien anzeigen- Zugriff auf die in der Azure-Cloud verfügbaren Funktionen für künstliche Intelligenz- Gehen Sie denselben Drilldown-Pfad in verschiedenen Teilen Ihrer Hierarchie- Laden Sie Visualisierungen, um Ihre Berichte intelligenter zu gestalten- Simulieren Sie Änderungen an Daten und sehen Sie sofort die Folgen- Kennen Sie Ihre Daten, noch bevor Sie Ihren ersten Bericht erstellen- Erstellen Sie neue Spalten, indem Sie Beispiele für die benötigten Daten angeben- Transformieren und visualisieren Sie Ihre Daten mit Hilfe von R- und Python-SkriptenFÜR WEN DIESES BUCH GEDACHT IST:Für den begeisterten Power BI-Anwender, der modernste Funktionen der künstlichen Intelligenz (KI) einsetzen möchte, um neue Erkenntnisse aus vorhandenen Daten zu gewinnen. Für Endanwender und IT-Fachleute, die sich nicht scheuen, in die neue Welt des maschinellen Lernens einzutauchen, und bereit sind, diesen Schritt zu tun und einen tieferen Blick in ihre Daten zu werfen. Für diejenigen, die von einfachen Berichten und Visualisierungen zu diagnostischen und prädiktiven Analysen übergehen wollen.Markus Ehrenmueller-Jensen ist ein Datenexperte, der seine Karriere als Berater für Business Intelligence-Lösungen auf einem IBM AS/400-System begann, bevor er 2006 in die Welt von Microsofts Data Platform eingeführt wurde. Seitdem hat er Data Warehouses und Business Intelligence-Lösungen für eine Vielzahl von Kunden entwickelt. Sein Portfolio umfasst Schulungen und Workshops, Architekturentwürfe und die Entwicklung von datenorientierten Lösungen. Im Jahr 2018 gründete er Savory Data, ein unabhängiges Beratungsunternehmen.Markus ist als Microsoft Certified Solution Expert (MCSE) für Data Platform und Business Intelligence sowie als Microsoft Certified Trainer (MCT) zertifiziert. Er unterrichtet Datenbanken, Informationsmanagement und Projektmanagement an der HTL Leonding, Österreich. Er ist Mitbegründer von PASS Austria und PUG Austria und Mitorganisator des jährlich stattfindenden SQL Saturday in Wien. Seit 2017 ist er jedes Jahr ein Microsoft Most Valuable Professional (MVP).1. Fragen in natürlicher Sprache stellen2. Die Insights-Funktion3. Entdeckung wichtiger Einflussfaktoren4. Drill-Down und Zerlegung von Hierarchien5. Hinzufügen intelligenter Visualisierungen6. Mit Szenarien experimentieren7. Einen Datensatz charakterisieren8. Spalten aus Beispielen erstellen9. Ausführen von R- und Python-Visualisierungen10. Datenumwandlung mit R und Python11. Ausführen von Machine Learning Modellen in der Azure Cloud

Regulärer Preis: 26,99 €
Produktbild für Critical Theory of AI

Critical Theory of AI

We live in an age of artificial intelligence. Machines think and act in ever more complex ways, making suggestions and decisions on our behalf. While AI might be seen as practical and profitable, issues of data surveillance, algorithmic control, and sexist and racist bias persist. In this rapidly changing landscape, social analysis of AI risks getting scaled down to issues of ‘ethics’, ‘responsibility’, and ‘fairness’. While these are important issues, they must be addressed not from an ‘AI first’ perspective, but more thoroughly in terms of power and contention.Approaching artificial intelligence from the often overlooked perspective of critical social theory, this book provides a much-needed intervention on how both old and new theories conceptualize the social consequences of AI. Questions are posed about the ideologies driving AI, the mythologies surrounding AI, and the complex relationship between AI and power. Simon Lindgren provides a way of defining AI as an object of social and political critique, and guides the reader through a set of contentious areas where AI and politics intersect. In relation to these topics, critical theories are drawn upon, both as an argument for and an illustration of how AI can be critiqued.Given the opportunities and challenges of AI, this book is a must-read for students and scholars in the humanities, social sciences, and STEM disciplines.SIMON LINDGREN is Professor of Sociology at Umeå University.1. AI and critical theory2. AI assemblage3. Ideology behind AI4. Ideology within AI5. Social machines6. AI at work7. AI subjects8. AI in the loopReferencesIndex

Regulärer Preis: 14,99 €
Produktbild für Introduction to Ansible Network Automation

Introduction to Ansible Network Automation

This book provides a comprehensive learning journey aimed at helping you master Ansible and efficiently automate a range of enterprise network devices, such as routers, switches, firewalls, Wireless LAN Controller (WLC), and Linux servers. Introduction to Ansible Network Automation combines the fundamentals of three books into one, covering basics of Linux administration, Ansible concepts, and Ansible network automation.Authors Brendan Choi and Erwin Medina have created a structured learning path that starts with the fundamentals and allows you to progressively enhance your skill sets with each chapter. Part I serves as an Ansible primer, guiding you through Linux basics using WSL on Windows 11 and assisting in the setup of your learning environment. Part II covers essential Ansible concepts through practical lab activities involving four Linux servers. In Part III, you will learn how to apply your Linux skills from Part I and the concepts from Part II to real-world scenarios by creating Ansible automation YAML scripts.What sets this book apart is its unique focus on Ansible and Network Automation, combined with a strong emphasis on understanding Linux. It is specifically designed for novice network automation engineers and students, assuming no prior Linux expertise, and provides first-hand experience starting from scratch. It also offers practical insights by sharing real-life examples of Ansible playbooks derived from production enterprise infrastructure, allowing you to gain an understanding of how Ansible can be effectively applied in real-world enterprise network environments.Upon completion of this book, you will have developed foundational skills in Ansible network automation and general Linux administration, and will understand how to apply this newly acquired knowledge to real-life scenarios.WHAT YOU WILL LEARN* Develop a comprehensive understanding of Ansible and its essential concepts for automating enterprise network devices and applying them to real-world scenarios* Master the basics of Ansible operations within Linux automation and progress to applying Ansible concepts specifically to network device automation* Execute Ansible ad-hoc commands and playbooks for a range of network operational tasks, including configuration management, software and system updates, and upgrades* Work with real-life examples of Ansible playbooks derived from actual enterprise infrastructure, gaining practical experience in writing Ansible YAML scripts* Acquire the skills to automate network operations using Ansible, streamline network management processes, and replace manual-driven tasks with directives in Ansible playbooksWHO IS THIS BOOK FORNetwork, security, UC and systems engineers, as well as technical leaders, IT managers and network students.BRENDAN (BYONG CHOL) CHOI is a highly accomplished tech lead at Secure Agility, with over 19 years of hands-on experience in the ICT industry. He is a certified Cisco, VMware, and Fortinet Engineer, and has worked for renowned enterprises such as Cisco Systems, NTT (Dimension Data), Fujitsu, as well as reputable Australian IT integrators like Telstra and Secure Agility. Brendan specializes in optimizing enterprise IT infrastructure management and enterprise business process optimization, utilizing both open and proprietary tools. He is the author of Python Network Automation: Building an Integrated Virtual Lab as well as Introduction to Python Network Automation: The First Journey. Through these publications, Brendan shared his knowledge with the IT community. He has trained over 200 Network and Systems Engineers on Python and Ansible Network automation and enjoys sharing industry-acquired knowledge through social media, blogging, and his YouTube channel. Brendan's current interests revolve around private cloud, enterprise networking, security, virtualization, and automation technologies. His dedication and passion for enterprise infrastructure management are evident in his commitment to continuous learning, knowledge sharing, and contributing to the ICT industry as a whole.ERWIN MEDINA is an experienced Senior Security and Network Engineer in the ICT industry with over 11 years of experience. He holds certifications in Cisco, Palo Alto, Fortinet, and Juniper technologies. Currently employed at CSIRO, Erwin contributes to the organization's security, network, and system operations and optimization, utilizing both open and proprietary tools. Erwin began his career as a field engineer in telecommunications before transitioning to ICT as a network engineer. Working with diverse networks in customers' production environments, he recognizes the crucial role of automation in simplifying complex network and security challenges. Embracing Ansible as his primary IT tool, Erwin has successfully transitioned away from manual-driven tasks. During his time at Telstra, Erwin had the privilege of being mentored by Brendan for over two years, gaining invaluable experience in leveraging Ansible and Python for enterprise network and security device management. Currently, Erwin applies Ansible in real-production scenarios to drive efficiency and productivity within his organization. He thrives on technical challenges and eagerly adapts to the ever-evolving ICT landscape, actively contributing to his organization's success. Erwin's commitment, expertise, and passion to share his knowledge with others make him a valuable asset in the ICT industry.Part 1: The IntrosChapter 1: Is Ansible good for Network Automation?Chapter 2: Shall We Linux? (Part I)Chapter 3: Shall We Linux? (Part II)Chapter 4: Creating an Ansible Learning EnvironmentPart 2: The ConceptsChapter 5: Data Types and File Formats in AnsibleChapter 6: Ansible Concepts I - SSH and Ad-Hoc CommandsChapter 7: Ansible Concepts II - Practical Application of Ad-Hoc CommandsChapter 8: Ansible Concepts III - Using when, Improving Playbooks, and Targeted NodesChapter 9: Ansible Concepts IV - Git Integration, Tags, File, and Service ManagementChapter 10: Ansible Concepts V - Users, Roles, Host Variables, Templates, and Password VaultChapter 11: Building an Ansible Learning Environment for Network and SecurityPart 3: The PracticalChapter 12: Ansible Practical I - Configuring Cisco Routers and SwitchesChapter 13: Ansible Practical II - Backing Up Cisco Network Device ConfigurationsChapter 14: Ansible Practical III - Developing a Network Configuration Comparison ToolChapter 15: Ansible Practical IV - Upgrading Cisco IOS-XE RoutersChapter 16: Ansible Practical V - Upgrading Cisco Wireless LAN Controllers (WLC)Chapter 17: Ansible Practical VI - Creating User Accounts on Palo Alto and Fortinet FirewallsChapter 18: Ansible Practical VII - Creating Security Policies on Palo Alto and Fortinet FirewallsChapter 19: Ansible Practical VIII - Creating IPsec Tunnels on Palo Alto FirewallsChapter 20: Ansible Practical IX - Creating Object Addresses on Palo Alto FirewallsChapter 21: Ansible Practical X - Upgrading Palo Alto Firewalls

Regulärer Preis: 62,99 €
Produktbild für CompTIA DataSys+ Study Guide

CompTIA DataSys+ Study Guide

YOUR ALL-IN-ONE GUIDE TO PREPARING FOR THE COMPTIA DATASYS+ EXAMIn CompTIA DataSys+ Study Guide: Exam DS0-001, a team of accomplished IT experts delivers a practical and hands-on roadmap to succeeding on the challenging DS0-001 exam and in a new or existing career as a data systems professional. In the book, you’ll explore the essentials of databases, their deployment, management, maintenance, security, and more.Whether you’re preparing for your first attempt at the CompTIA DataSys+ exam or for your first day on the job at a new database-related IT position, this book walks you through the foundational and intermediate skills you need to have to succeed. It covers every objective tested by the DS0-001 and skills commonly required in the real-world.You’ll also find:* Practice test questions that measure your readiness for the real exam and your ability to handle the challenges of a new data systems position* Examples and scenarios drawn from real life, as well as challenging chapter review questions* Complimentary access to Sybex’s interactive online learning environment and test bank, accessible from multiple devices, and including electronic flashcards and a searchable glossaryPerfect for anyone getting ready to write the DS0-001 certification exam, CompTIA DataSys+ Study Guide: Exam DS0-001 is also an essential resource for everyone seeking the foundational knowledge and skills required to move into a database administrator role.ABOUT THE AUTHORSMIKE CHAPPLE, PHD, SECURITY+, CYSA+, CISSP, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 30 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CompTIA Data+, CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides IT certification resources at his website, CertMike.com. SHARIF NIJIM is an Associate Teaching Professor of IT, Analytics, and Operations at Notre Dame’s Mendoza College of Business, where he also serves as the Academic co-Director of the residential Master of Science in Business Analytics program. Prior to Notre Dame, Sharif co-founded and served on the board of a customer data integration company serving the airline industry. Introduction xxiAssessment Test xxviiiCHAPTER 1 TODAY’S DATA SYSTEMS PROFESSIONAL 1Data Drives the Modern Business 2Data 3Storage 3Computing Power 5Data Systems 5Database Fundamentals 6Database Deployment 7Database Management and Maintenance 8Data and Database Security 8Business Continuity 9Careers in Data Systems 10Summary 11CHAPTER 2 DATABASE FUNDAMENTALS 13Types of Databases 14The Relational Model 14Relational Databases 18Nonrelational Databases 22Linear vs. Nonlinear Format 27NoSQL Database Tools 28Programming and Database Operations 29Object- Relational Mapping 30Process to Gauge Impact 31Summary 33Exam Essentials 34Review Questions 36CHAPTER 3 SQL AND SCRIPTING 41Flavors of SQL 42Data Definition Language 43Data Manipulation Language 46Set- Based Logic 50Transaction Control Languages 54ACID Principles 58SQL 58Programmatic SQL 59SQL and Set-Based Logic 68Automating Operations 72Script Purpose and Runtime Location 74Languages 75Command- Line Scripting 76Summary 77Exam Essentials 79Review Questions 81CHAPTER 4 DATABASE DEPLOYMENT 87Planning and Design 88Requirements Gathering 88Database Architecture 99Schema Design 106Design Documentation 116Implementation, Testing, and Deployment 121Acquisition of Assets 121Phases of Deployment 122Database Connectivity 122Testing 127Database Validation 135Summary 139Exam Essentials 140Review Questions 142CHAPTER 5 DATABASE MANAGEMENT AND MAINTENANCE 147Monitoring and Reporting 148System Alerts and Notifications 149Log Files 157Deadlock Monitoring 158Connections and Sessions 159Maintenance 160Database Stability 160Database Performance 163Database Reliability 168Facilitating Operations 172Data Management Tasks 180Data Management 181Summary 189Exam Essentials 191Review Questions 193CHAPTER 6 GOVERNANCE, SECURITY, AND COMPLIANCE 199Data Governance 200Data Governance Roles 200Access Requirements 201Data Retention 206Identity and Access Management 207Identification, Authentication, and Authorization 207Authentication Techniques 208Password Policies 209Account Types 211Data Security 212Protecting Data at Rest 213Protecting Data in Transit 213Data Loss Prevention 216Data Classification 217Personally Identifiable Information 217Protected Health Information 218Payment Card Information 220Regional Requirements 221Breach Reporting Requirements 222Routine Auditing 223Expired Accounts 223Connection Requests 223SQL Code 224Credential Storage Checks 224Summary 225Exam Essentials 225Review Questions 227CHAPTER 7 DATABASE SECURITY 231Database Infrastructure Security 232Physical Security 232Logical Security 237Database Attacks 242SQL Injection 242Denial of Service 248On- Path Attacks 249Malware 250Phishing 253Password Attacks 255Summary 255Exam Essentials 256Review Questions 258CHAPTER 8 BUSINESS CONTINUITY 265The Nature of Disaster 266Natural Disasters 266Human-Made Disasters 272Disaster Recovery Planning 275Prioritizing Disaster Recovery Efforts 275Disaster Recovery Documentation 277Disaster Recovery Technology 280Disaster Recovery Plan Testing 285Lessons Learned 287Plan Maintenance 288Backup and Restore 288Summary 292Exam Essentials 293Review Questions 294APPENDIX ANSWERS TO REVIEW QUESTIONS 299Chapter 2: Database Fundamentals 300Chapter 3: SQL and Scripting 301Chapter 4: Database Deployment 304Chapter 5: Database Management and Maintenance 309Chapter 6: Governance, Security, and Compliance 312Chapter 7: Database Security 314Chapter 8: Business Continuity 316Index 319

Regulärer Preis: 38,99 €
Produktbild für Cybernetical Intelligence

Cybernetical Intelligence

CYBERNETICAL INTELLIGENCEHIGHLY COMPREHENSIVE, DETAILED, AND UP-TO-DATE OVERVIEW OF ARTIFICIAL INTELLIGENCE AND CYBERNETICS, WITH PRACTICAL EXAMPLES AND SUPPLEMENTARY LEARNING RESOURCESCybernetical Intelligence: Engineering Cybernetics with Machine Intelligence is a comprehensive guide to the field of cybernetics and neural networks, as well as the mathematical foundations of these technologies. The book provides a detailed explanation of various types of neural networks, including feedforward networks, recurrent neural networks, and convolutional neural networks as well as their applications to different real-world problems. This groundbreaking book presents a pioneering exploration of machine learning within the framework of cybernetics. It marks a significant milestone in the field’s history, as it is the first book to describe the development of machine learning from a cybernetics perspective. The introduction of the concept of “Cybernetical Intelligence” and the generation of new terminology within this context propel new lines of thought in the historical development of artificial intelligence. With its profound implications and contributions, this book holds immense importance and is poised to become a definitive resource for scholars and researchers in this field of study. Each chapter is specifically designed to introduce the theory with several examples. This comprehensive book includes exercise questions at the end of each chapter, providing readers with valuable opportunities to apply and strengthen their understanding of cybernetical intelligence. To further support the learning journey, solutions to these questions are readily accessible on the book’s companion site. Additionally, the companion site offers programming practice exercises and assignments, enabling readers to delve deeper into the practical aspects of the subject matter. Cybernetical Intelligence includes information on:* The history and development of cybernetics and its influence on the development of neural networks* Developments and innovations in artificial intelligence and machine learning, such as deep reinforcement learning, generative adversarial networks, and transfer learning* Mathematical foundations of artificial intelligence and cybernetics, including linear algebra, calculus, and probability theory* Ethical implications of artificial intelligence and cybernetics as well as responsible and transparent development and deployment of AI systemsPresenting a highly detailed and comprehensive overview of the field, with modern developments thoroughly discussed, Cybernetical Intelligence is an essential textbook that helps students make connections with real-life engineering problems by providing both theory and practice, along with a myriad of helpful learning aids. PROF. DR. KELVIN K. L. WONG, is a distinguished expert in medical image processing and computational science, earning his Ph.D. from The University of Adelaide. With a strong academic background from Nanyang Technological University and The University of Sydney, he has been at the forefront of merging the fields of cybernetics and artificial intelligence (AI). He is renowned for coining the term “Cybernetical Intelligence” and is the inventor and founder of Deep Red AI. Preface xvAbout the Author xixAbout the Companion Website xxi1 ARTIFICIAL INTELLIGENCE AND CYBERNETICAL LEARNING 11.1 Artificial Intelligence Initiative 11.2 Intelligent Automation Initiative 41.2.1 Benefits of IAI 51.3 Artificial Intelligence Versus Intelligent Automation 51.3.1 Process Discovery 61.3.2 Optimization 71.3.3 Analytics and Insight 81.4 The Fourth Industrial Revolution and Artificial Intelligence 91.4.1 Artificial Narrow Intelligence 101.4.2 Artificial General Intelligence 121.4.3 Artificial Super Intelligence 131.5 Pattern Analysis and Cognitive Learning 141.5.1 Machine Learning 151.5.1.1 Parametric Algorithms 161.5.1.2 Nonparametric Algorithms 171.5.2 Deep Learning 201.5.2.1 Convolutional Neural Networks in Advancing Artificial Intelligence 211.5.2.2 Future Advancement in Deep Learning 221.5.3 Cybernetical Learning 231.6 Cybernetical Artificial Intelligence 241.6.1 Artificial Intelligence Control Theory 241.6.2 Information Theory 261.6.3 Cybernetic Systems 271.7 Cybernetical Intelligence Definition 281.8 The Future of Cybernetical Intelligence 30Summary 32Exercise Questions 32Further Reading 332 CYBERNETICAL INTELLIGENT CONTROL 352.1 Control Theory and Feedback Control Systems 352.2 Maxwell’s Analysis of Governors 372.3 Harold Black 392.4 Nyquist and Bode 402.5 Stafford Beer 422.5.1 Cybernetic Control 422.5.2 Viable Systems Model 422.5.3 Cybernetics Models of Management 432.6 James Lovelock 432.6.1 Cybernetic Approach to Ecosystems 432.6.2 Gaia Hypothesis 442.7 Macy Conference 442.8 McCulloch–Pitts 452.9 John von Neumann 472.9.1 Discussions on Self-Replicating Machines 472.9.2 Discussions on Machine Learning 48Summary 48Exercise Questions 49Further Reading 503 THE BASICS OF PERCEPTRON 513.1 The Analogy of Biological and Artificial Neurons 513.1.1 Biological Neurons and Neurodynamics 523.1.2 The Structure of Neural Network 533.1.3 Encoding and Decoding 563.2 Perception and Multilayer Perceptron 573.2.1 Back Propagation Neural Network 593.2.2 Derivative Equations for Backpropagation 593.3 Activation Function 613.3.1 Sigmoid Activation Function 613.3.2 Hyperbolic Tangent Activation Function 623.3.3 Rectified Linear Unit Activation Function 623.3.4 Linear Activation Function 64Summary 65Exercise Questions 67Further Reading 674 THE STRUCTURE OF NEURAL NETWORK 694.1 Layers in Neural Network 694.1.1 Input Layer 694.1.2 Hidden Layer 704.1.3 Neurons 704.1.4 Weights and Biases 714.1.5 Forward Propagation 724.1.6 Backpropagation 724.2 Perceptron and Multilayer Perceptron 734.3 Recurrent Neural Network 754.3.1 Long Short-Term Memory 764.4 Markov Neural Networks 774.4.1 State Transition Function 774.4.2 Observation Function 784.4.3 Policy Function 784.4.4 Loss Function 784.5 Generative Adversarial Network 78Summary 79Exercise Questions 80Further Reading 815 BACKPROPAGATION NEURAL NETWORK 835.1 Backpropagation Neural Network 835.1.1 Forward Propagation 855.2 Gradient Descent 855.2.1 Loss Function 855.2.2 Parameters in Gradient Descent 885.2.3 Gradient in Gradient Descent 885.2.4 Learning Rate in Gradient Descent 895.2.5 Update Rule in Gradient Descent 895.3 Stopping Criteria 895.3.1 Convergence and Stopping Criteria 905.3.2 Local Minimum and Global Minimum 915.4 Resampling Methods 915.4.1 Cross-Validation 935.4.2 Bootstrapping 935.4.3 Monte Carlo Cross-Validation 945.5 Optimizers in Neural Network 945.5.1 Stochastic Gradient Descent 945.5.2 Root Mean Square Propagation 965.5.3 Adaptive Moment Estimation 965.5.4 AdaMax 975.5.5 Momentum Optimization 97Summary 97Exercise Questions 99Further Reading 1006 APPLICATION OF NEURAL NETWORK IN LEARNING AND RECOGNITION 1016.1 Applying Backpropagation to Shape Recognition 1016.2 Softmax Regression 1056.3 K-Binary Classifier 1076.4 Relational Learning via Neural Network 1086.4.1 Graph Neural Network 1096.4.2 Graph Convolutional Network 1116.5 Cybernetics Using Neural Network 1126.6 Structure of Neural Network for Image Processing 1156.7 Transformer Networks 1166.8 Attention Mechanisms 1166.9 Graph Neural Networks 1176.10 Transfer Learning 1186.11 Generalization of Neural Networks 1196.12 Performance Measures 1206.12.1 Confusion Matrix 1206.12.2 Receiver Operating Characteristic 1216.12.3 Area Under the ROC Curve 122Summary 123Exercise Questions 123Further Reading 1247 COMPETITIVE LEARNING AND SELF-ORGANIZING MAP 1257.1 Principal of Competitive Learning 1257.1.1 Step 1: Normalized Input Vector 1287.1.2 Step 2: Find the Winning Neuron 1287.1.3 Step 3: Adjust the Network Weight Vector and Output Results 1297.2 Basic Structure of Self-Organizing Map 1297.2.1 Properties Self-Organizing Map 1307.3 Self-Organizing Mapping Neural Network Algorithm 1317.3.1 Step 1: Initialize Parameter 1327.3.2 Step 2: Select Inputs and Determine Winning Nodes 1327.3.3 Step 3: Affect Neighboring Neurons 1327.3.4 Step 4: Adjust Weights 1337.3.5 Step 5: Judging the End Condition 1337.4 Growing Self-Organizing Map 1337.5 Time Adaptive Self-Organizing Map 1367.5.1 TASOM-Based Algorithms for Real Applications 1387.6 Oriented and Scalable Map 1397.7 Generative Topographic Map 141Summary 145Exercise Questions 146Further Reading 1478 SUPPORT VECTOR MACHINE 1498.1 The Definition of Data Clustering 1498.2 Support Vector and Margin 1528.3 Kernel Function 1558.3.1 Linear Kernel 1558.3.2 Polynomial Kernel 1568.3.3 Radial Basis Function 1578.3.4 Laplace Kernel 1598.3.5 Sigmoid Kernel 1598.4 Linear and Nonlinear Support Vector Machine 1608.5 Hard Margin and Soft Margin in Support Vector Machine 1648.6 I/O of Support Vector Machine 1678.6.1 Training Data 1678.6.2 Feature Matrix and Label Vector 1688.7 Hyperparameters of Support Vector Machine 1698.7.1 The C Hyperparameter 1698.7.2 Kernel Coefficient 1698.7.3 Class Weights 1708.7.4 Convergence Criteria 1708.7.5 Regularization 1718.8 Application of Support Vector Machine 1718.8.1 Classification 1718.8.2 Regression 1738.8.3 Image Classification 1738.8.4 Text Classification 174Summary 174Exercise Questions 175Further Reading 1769 BIO-INSPIRED CYBERNETICAL INTELLIGENCE 1779.1 Genetic Algorithm 1789.2 Ant Colony Optimization 1819.3 Bees Algorithm 1849.4 Artificial Bee Colony Algorithm 1869.5 Cuckoo Search 1899.6 Particle Swarm Optimization 1939.7 Bacterial Foraging Optimization 1969.8 Gray Wolf Optimizer 1979.9 Firefly Algorithm 199Summary 200Exercise Questions 201Further Reading 20210 LIFE-INSPIRED MACHINE INTELLIGENCE AND CYBERNETICS 20310.1 Multi-Agent AI Systems 20310.1.1 Game Theory 20510.1.2 Distributed Multi-Agent Systems 20610.1.3 Multi-Agent Reinforcement Learning 20710.1.4 Evolutionary Computation and Multi-Agent Systems 20910.2 Cellular Automata 21110.3 Discrete Element Method 21210.3.1 Particle-Based Simulation of Biological Cells and Tissues 21410.3.2 Simulation of Microbial Communities and Their Interactions 21510.3.3 Discrete Element Method-Based Modeling of Biological Fluids and Soft Materials 21610.4 Smoothed Particle Hydrodynamics 21810.4.1 SPH-Based Simulations of Biomimetic Fluid Dynamic 21910.4.2 SPH-Based Simulations of Bio-Inspired Engineering Applications 220Summary 221Exercise Questions 222Further Reading 22311 REVISITING CYBERNETICS AND RELATION TO CYBERNETICAL INTELLIGENCE 22511.1 The Concept and Development of Cybernetics 22511.1.1 Attributes of Control Concepts 22511.1.2 Research Objects and Characteristics of Cybernetics 22611.1.3 Development of Cybernetical Intelligence 22711.2 The Fundamental Ideas of Cybernetics 22711.2.1 System Idea 22711.2.2 Information Idea 22911.2.3 Behavioral Idea 23011.2.4 Cybernetical Intelligence Neural Network 23111.3 Cybernetic Expansion into Other Fields of Research 23411.3.1 Social Cybernetics 23411.3.2 Internal Control-Related Theories 23711.3.3 Software Control Theory 23711.3.4 Perceptual Cybernetics 23811.4 Practical Application of Cybernetics 24011.4.1 Research on the Control Mechanism of Neural Networks 24011.4.2 Balance Between Internal Control and Management Power Relations 24011.4.3 Software Markov Adaptive Testing Strategy 24211.4.4 Task Analysis Model 244Summary 245Exercise Questions 246Further Reading 24712 TURING MACHINE 24912.1 Behavior of a Turing Machine 25012.1.1 Computing with Turing Machines 25112.2 Basic Operations of a Turing Machine 25212.2.1 Reading and Writing to the Tape 25312.2.2 Moving the Tape Head 25412.2.3 Changing States 25412.3 Interchangeability of Program and Behavior 25512.4 Computability Theory 25612.4.1 Complexity Theory 25712.5 Automata Theory 25812.6 Philosophical Issues Related to Turing Machines 25912.7 Human and Machine Computations 26012.8 Historical Models of Computability 26112.9 Recursive Functions 26212.10 Turing Machine and Intelligent Control 263Summary 264Exercise Questions 265Further Reading 26513 ENTROPY CONCEPTS IN MACHINE INTELLIGENCE 26713.1 Relative Entropy of Distributions 26813.2 Relative Entropy and Mutual Information 26813.3 Entropy in Performance Evaluation 26913.4 Cross-Entropy Softmax 27113.5 Calculating Cross-Entropy 27213.6 Cross-Entropy as a Loss Function 27313.7 Cross-Entropy and Log Loss 27413.8 Application of Entropy in Intelligent Control 27513.8.1 Entropy-Based Control 27513.8.2 Fuzzy Entropy 27613.8.3 Entropy-Based Control Strategies 27713.8.4 Entropy-Based Decision-Making 278Summary 279Exercise Questions 279Further Reading 28014 SAMPLING METHODS IN CYBERNETICAL INTELLIGENCE 28314.1 Introduction to Sampling Methods 28314.2 Basic Sampling Algorithms 28414.2.1 Importance of Sampling Methods in Machine Intelligence 28614.3 Machine Learning Sampling Methods 28714.3.1 Random Oversampling 28814.3.2 Random Undersampling 29014.3.3 Synthetic Minority Oversampling Technique 29014.3.4 Adaptive Synthetic Sampling 29214.4 Advantages and Disadvantages of Machine Learning Sampling Methods 29314.5 Advanced Sampling Methods in Cybernetical Intelligence 29414.5.1 Ensemble Sampling Method 29514.5.2 Active Learning 29714.5.3 Bayesian Optimization in Sampling 29914.6 Applications of Sampling Methods in Cybernetical Intelligence 30214.6.1 Image Processing and Computer Vision 30214.6.2 Natural Language Processing 30414.6.3 Robotics and Autonomous Systems 30714.7 Challenges and Future Directions 30814.8 Challenges and Limitations of Sampling Methods 30914.9 Emerging Trends and Innovations in Sampling Methods 309Summary 310Exercise Questions 311Further Reading 31215 DYNAMIC SYSTEM CONTROL 31315.1 Linear Systems 31415.2 Nonlinear System 31615.3 Stability Theory 31815.4 Observability and Identification 32015.5 Controllability and Stabilizability 32115.6 Optimal Control 32315.7 Linear Quadratic Regulator Theory 32415.8 Time-Optimal Control 32615.9 Stochastic Systems with Applications 32815.9.1 Stochastic System in Control Systems 32915.9.2 Stochastic System in Robotics and Automation 32915.9.3 Stochastic System in Neural Networks 330Summary 331Exercise Questions 331Further Reading 33216 DEEP LEARNING 33316.1 Neural Network Models in Deep Learning 33516.2 Methods of Deep Learning 33616.2.1 Convolutional Neural Networks 33716.2.2 Recurrent Neural Networks 34016.2.3 Generative Adversarial Networks 34216.2.4 Deep Learning Based Image Segmentation Models 34516.2.5 Variational Auto Encoders 34816.2.6 Transformer Models 35016.2.7 Attention-Based Models 35216.2.8 Meta-Learning Models 35416.2.9 Capsule Networks 35716.3 Deep Learning Frameworks 35816.4 Applications of Deep Learning 35916.4.1 Object Detection 36016.4.2 Intelligent Power Systems 36116.4.3 Intelligent Control 362Summary 362Exercise Questions 363References 364Further Reading 36517 NEURAL ARCHITECTURE SEARCH 36717.1 Neural Architecture Search and Neural Network 36917.2 Reinforcement Learning-Based Neural Architecture Search 37117.3 Evolutionary Algorithms-Based Neural Architecture Search 37417.4 Bayesian Optimization-Based Neural Architecture Search 37617.5 Gradient-Based Neural Architecture Search 37817.6 One-shot Neural Architecture Search 37917.7 Meta-Learning-Based Neural Architecture Search 38117.8 Neural Architecture Search for Specific Domains 38317.8.1 Cybernetical Intelligent Systems: Neural Architecture Search in Real-World 38417.8.2 Neural Architecture Search for Specific Cybernetical Control Tasks 38517.8.3 Neural Architecture Search for Cybernetical Intelligent Systems in Real-World 38617.8.4 Neural Architecture Search for Adaptive Cybernetical Intelligent Systems 38817.9 Comparison of Different Neural Architecture Search Approaches 389Summary 391Exercise Questions 391Further Reading 392Final Notes on Cybernetical Intelligence 393Index 399

Regulärer Preis: 115,99 €
Produktbild für Cybernetical Intelligence

Cybernetical Intelligence

CYBERNETICAL INTELLIGENCEHIGHLY COMPREHENSIVE, DETAILED, AND UP-TO-DATE OVERVIEW OF ARTIFICIAL INTELLIGENCE AND CYBERNETICS, WITH PRACTICAL EXAMPLES AND SUPPLEMENTARY LEARNING RESOURCESCybernetical Intelligence: Engineering Cybernetics with Machine Intelligence is a comprehensive guide to the field of cybernetics and neural networks, as well as the mathematical foundations of these technologies. The book provides a detailed explanation of various types of neural networks, including feedforward networks, recurrent neural networks, and convolutional neural networks as well as their applications to different real-world problems. This groundbreaking book presents a pioneering exploration of machine learning within the framework of cybernetics. It marks a significant milestone in the field’s history, as it is the first book to describe the development of machine learning from a cybernetics perspective. The introduction of the concept of “Cybernetical Intelligence” and the generation of new terminology within this context propel new lines of thought in the historical development of artificial intelligence. With its profound implications and contributions, this book holds immense importance and is poised to become a definitive resource for scholars and researchers in this field of study. Each chapter is specifically designed to introduce the theory with several examples. This comprehensive book includes exercise questions at the end of each chapter, providing readers with valuable opportunities to apply and strengthen their understanding of cybernetical intelligence. To further support the learning journey, solutions to these questions are readily accessible on the book’s companion site. Additionally, the companion site offers programming practice exercises and assignments, enabling readers to delve deeper into the practical aspects of the subject matter. Cybernetical Intelligence includes information on:* The history and development of cybernetics and its influence on the development of neural networks* Developments and innovations in artificial intelligence and machine learning, such as deep reinforcement learning, generative adversarial networks, and transfer learning* Mathematical foundations of artificial intelligence and cybernetics, including linear algebra, calculus, and probability theory* Ethical implications of artificial intelligence and cybernetics as well as responsible and transparent development and deployment of AI systemsPresenting a highly detailed and comprehensive overview of the field, with modern developments thoroughly discussed, Cybernetical Intelligence is an essential textbook that helps students make connections with real-life engineering problems by providing both theory and practice, along with a myriad of helpful learning aids. PROF. DR. KELVIN K. L. WONG, is a distinguished expert in medical image processing and computational science, earning his Ph.D. from The University of Adelaide. With a strong academic background from Nanyang Technological University and The University of Sydney, he has been at the forefront of merging the fields of cybernetics and artificial intelligence (AI). He is renowned for coining the term “Cybernetical Intelligence” and is the inventor and founder of Deep Red AI. Preface xvAbout the Author xixAbout the Companion Website xxi1 ARTIFICIAL INTELLIGENCE AND CYBERNETICAL LEARNING 11.1 Artificial Intelligence Initiative 11.2 Intelligent Automation Initiative 41.2.1 Benefits of IAI 51.3 Artificial Intelligence Versus Intelligent Automation 51.3.1 Process Discovery 61.3.2 Optimization 71.3.3 Analytics and Insight 81.4 The Fourth Industrial Revolution and Artificial Intelligence 91.4.1 Artificial Narrow Intelligence 101.4.2 Artificial General Intelligence 121.4.3 Artificial Super Intelligence 131.5 Pattern Analysis and Cognitive Learning 141.5.1 Machine Learning 151.5.1.1 Parametric Algorithms 161.5.1.2 Nonparametric Algorithms 171.5.2 Deep Learning 201.5.2.1 Convolutional Neural Networks in Advancing Artificial Intelligence 211.5.2.2 Future Advancement in Deep Learning 221.5.3 Cybernetical Learning 231.6 Cybernetical Artificial Intelligence 241.6.1 Artificial Intelligence Control Theory 241.6.2 Information Theory 261.6.3 Cybernetic Systems 271.7 Cybernetical Intelligence Definition 281.8 The Future of Cybernetical Intelligence 30Summary 32Exercise Questions 32Further Reading 332 CYBERNETICAL INTELLIGENT CONTROL 352.1 Control Theory and Feedback Control Systems 352.2 Maxwell’s Analysis of Governors 372.3 Harold Black 392.4 Nyquist and Bode 402.5 Stafford Beer 422.5.1 Cybernetic Control 422.5.2 Viable Systems Model 422.5.3 Cybernetics Models of Management 432.6 James Lovelock 432.6.1 Cybernetic Approach to Ecosystems 432.6.2 Gaia Hypothesis 442.7 Macy Conference 442.8 McCulloch–Pitts 452.9 John von Neumann 472.9.1 Discussions on Self-Replicating Machines 472.9.2 Discussions on Machine Learning 48Summary 48Exercise Questions 49Further Reading 503 THE BASICS OF PERCEPTRON 513.1 The Analogy of Biological and Artificial Neurons 513.1.1 Biological Neurons and Neurodynamics 523.1.2 The Structure of Neural Network 533.1.3 Encoding and Decoding 563.2 Perception and Multilayer Perceptron 573.2.1 Back Propagation Neural Network 593.2.2 Derivative Equations for Backpropagation 593.3 Activation Function 613.3.1 Sigmoid Activation Function 613.3.2 Hyperbolic Tangent Activation Function 623.3.3 Rectified Linear Unit Activation Function 623.3.4 Linear Activation Function 64Summary 65Exercise Questions 67Further Reading 674 THE STRUCTURE OF NEURAL NETWORK 694.1 Layers in Neural Network 694.1.1 Input Layer 694.1.2 Hidden Layer 704.1.3 Neurons 704.1.4 Weights and Biases 714.1.5 Forward Propagation 724.1.6 Backpropagation 724.2 Perceptron and Multilayer Perceptron 734.3 Recurrent Neural Network 754.3.1 Long Short-Term Memory 764.4 Markov Neural Networks 774.4.1 State Transition Function 774.4.2 Observation Function 784.4.3 Policy Function 784.4.4 Loss Function 784.5 Generative Adversarial Network 78Summary 79Exercise Questions 80Further Reading 815 BACKPROPAGATION NEURAL NETWORK 835.1 Backpropagation Neural Network 835.1.1 Forward Propagation 855.2 Gradient Descent 855.2.1 Loss Function 855.2.2 Parameters in Gradient Descent 885.2.3 Gradient in Gradient Descent 885.2.4 Learning Rate in Gradient Descent 895.2.5 Update Rule in Gradient Descent 895.3 Stopping Criteria 895.3.1 Convergence and Stopping Criteria 905.3.2 Local Minimum and Global Minimum 915.4 Resampling Methods 915.4.1 Cross-Validation 935.4.2 Bootstrapping 935.4.3 Monte Carlo Cross-Validation 945.5 Optimizers in Neural Network 945.5.1 Stochastic Gradient Descent 945.5.2 Root Mean Square Propagation 965.5.3 Adaptive Moment Estimation 965.5.4 AdaMax 975.5.5 Momentum Optimization 97Summary 97Exercise Questions 99Further Reading 1006 APPLICATION OF NEURAL NETWORK IN LEARNING AND RECOGNITION 1016.1 Applying Backpropagation to Shape Recognition 1016.2 Softmax Regression 1056.3 K-Binary Classifier 1076.4 Relational Learning via Neural Network 1086.4.1 Graph Neural Network 1096.4.2 Graph Convolutional Network 1116.5 Cybernetics Using Neural Network 1126.6 Structure of Neural Network for Image Processing 1156.7 Transformer Networks 1166.8 Attention Mechanisms 1166.9 Graph Neural Networks 1176.10 Transfer Learning 1186.11 Generalization of Neural Networks 1196.12 Performance Measures 1206.12.1 Confusion Matrix 1206.12.2 Receiver Operating Characteristic 1216.12.3 Area Under the ROC Curve 122Summary 123Exercise Questions 123Further Reading 1247 COMPETITIVE LEARNING AND SELF-ORGANIZING MAP 1257.1 Principal of Competitive Learning 1257.1.1 Step 1: Normalized Input Vector 1287.1.2 Step 2: Find the Winning Neuron 1287.1.3 Step 3: Adjust the Network Weight Vector and Output Results 1297.2 Basic Structure of Self-Organizing Map 1297.2.1 Properties Self-Organizing Map 1307.3 Self-Organizing Mapping Neural Network Algorithm 1317.3.1 Step 1: Initialize Parameter 1327.3.2 Step 2: Select Inputs and Determine Winning Nodes 1327.3.3 Step 3: Affect Neighboring Neurons 1327.3.4 Step 4: Adjust Weights 1337.3.5 Step 5: Judging the End Condition 1337.4 Growing Self-Organizing Map 1337.5 Time Adaptive Self-Organizing Map 1367.5.1 TASOM-Based Algorithms for Real Applications 1387.6 Oriented and Scalable Map 1397.7 Generative Topographic Map 141Summary 145Exercise Questions 146Further Reading 1478 SUPPORT VECTOR MACHINE 1498.1 The Definition of Data Clustering 1498.2 Support Vector and Margin 1528.3 Kernel Function 1558.3.1 Linear Kernel 1558.3.2 Polynomial Kernel 1568.3.3 Radial Basis Function 1578.3.4 Laplace Kernel 1598.3.5 Sigmoid Kernel 1598.4 Linear and Nonlinear Support Vector Machine 1608.5 Hard Margin and Soft Margin in Support Vector Machine 1648.6 I/O of Support Vector Machine 1678.6.1 Training Data 1678.6.2 Feature Matrix and Label Vector 1688.7 Hyperparameters of Support Vector Machine 1698.7.1 The C Hyperparameter 1698.7.2 Kernel Coefficient 1698.7.3 Class Weights 1708.7.4 Convergence Criteria 1708.7.5 Regularization 1718.8 Application of Support Vector Machine 1718.8.1 Classification 1718.8.2 Regression 1738.8.3 Image Classification 1738.8.4 Text Classification 174Summary 174Exercise Questions 175Further Reading 1769 BIO-INSPIRED CYBERNETICAL INTELLIGENCE 1779.1 Genetic Algorithm 1789.2 Ant Colony Optimization 1819.3 Bees Algorithm 1849.4 Artificial Bee Colony Algorithm 1869.5 Cuckoo Search 1899.6 Particle Swarm Optimization 1939.7 Bacterial Foraging Optimization 1969.8 Gray Wolf Optimizer 1979.9 Firefly Algorithm 199Summary 200Exercise Questions 201Further Reading 20210 LIFE-INSPIRED MACHINE INTELLIGENCE AND CYBERNETICS 20310.1 Multi-Agent AI Systems 20310.1.1 Game Theory 20510.1.2 Distributed Multi-Agent Systems 20610.1.3 Multi-Agent Reinforcement Learning 20710.1.4 Evolutionary Computation and Multi-Agent Systems 20910.2 Cellular Automata 21110.3 Discrete Element Method 21210.3.1 Particle-Based Simulation of Biological Cells and Tissues 21410.3.2 Simulation of Microbial Communities and Their Interactions 21510.3.3 Discrete Element Method-Based Modeling of Biological Fluids and Soft Materials 21610.4 Smoothed Particle Hydrodynamics 21810.4.1 SPH-Based Simulations of Biomimetic Fluid Dynamic 21910.4.2 SPH-Based Simulations of Bio-Inspired Engineering Applications 220Summary 221Exercise Questions 222Further Reading 22311 REVISITING CYBERNETICS AND RELATION TO CYBERNETICAL INTELLIGENCE 22511.1 The Concept and Development of Cybernetics 22511.1.1 Attributes of Control Concepts 22511.1.2 Research Objects and Characteristics of Cybernetics 22611.1.3 Development of Cybernetical Intelligence 22711.2 The Fundamental Ideas of Cybernetics 22711.2.1 System Idea 22711.2.2 Information Idea 22911.2.3 Behavioral Idea 23011.2.4 Cybernetical Intelligence Neural Network 23111.3 Cybernetic Expansion into Other Fields of Research 23411.3.1 Social Cybernetics 23411.3.2 Internal Control-Related Theories 23711.3.3 Software Control Theory 23711.3.4 Perceptual Cybernetics 23811.4 Practical Application of Cybernetics 24011.4.1 Research on the Control Mechanism of Neural Networks 24011.4.2 Balance Between Internal Control and Management Power Relations 24011.4.3 Software Markov Adaptive Testing Strategy 24211.4.4 Task Analysis Model 244Summary 245Exercise Questions 246Further Reading 24712 TURING MACHINE 24912.1 Behavior of a Turing Machine 25012.1.1 Computing with Turing Machines 25112.2 Basic Operations of a Turing Machine 25212.2.1 Reading and Writing to the Tape 25312.2.2 Moving the Tape Head 25412.2.3 Changing States 25412.3 Interchangeability of Program and Behavior 25512.4 Computability Theory 25612.4.1 Complexity Theory 25712.5 Automata Theory 25812.6 Philosophical Issues Related to Turing Machines 25912.7 Human and Machine Computations 26012.8 Historical Models of Computability 26112.9 Recursive Functions 26212.10 Turing Machine and Intelligent Control 263Summary 264Exercise Questions 265Further Reading 26513 ENTROPY CONCEPTS IN MACHINE INTELLIGENCE 26713.1 Relative Entropy of Distributions 26813.2 Relative Entropy and Mutual Information 26813.3 Entropy in Performance Evaluation 26913.4 Cross-Entropy Softmax 27113.5 Calculating Cross-Entropy 27213.6 Cross-Entropy as a Loss Function 27313.7 Cross-Entropy and Log Loss 27413.8 Application of Entropy in Intelligent Control 27513.8.1 Entropy-Based Control 27513.8.2 Fuzzy Entropy 27613.8.3 Entropy-Based Control Strategies 27713.8.4 Entropy-Based Decision-Making 278Summary 279Exercise Questions 279Further Reading 28014 SAMPLING METHODS IN CYBERNETICAL INTELLIGENCE 28314.1 Introduction to Sampling Methods 28314.2 Basic Sampling Algorithms 28414.2.1 Importance of Sampling Methods in Machine Intelligence 28614.3 Machine Learning Sampling Methods 28714.3.1 Random Oversampling 28814.3.2 Random Undersampling 29014.3.3 Synthetic Minority Oversampling Technique 29014.3.4 Adaptive Synthetic Sampling 29214.4 Advantages and Disadvantages of Machine Learning Sampling Methods 29314.5 Advanced Sampling Methods in Cybernetical Intelligence 29414.5.1 Ensemble Sampling Method 29514.5.2 Active Learning 29714.5.3 Bayesian Optimization in Sampling 29914.6 Applications of Sampling Methods in Cybernetical Intelligence 30214.6.1 Image Processing and Computer Vision 30214.6.2 Natural Language Processing 30414.6.3 Robotics and Autonomous Systems 30714.7 Challenges and Future Directions 30814.8 Challenges and Limitations of Sampling Methods 30914.9 Emerging Trends and Innovations in Sampling Methods 309Summary 310Exercise Questions 311Further Reading 31215 DYNAMIC SYSTEM CONTROL 31315.1 Linear Systems 31415.2 Nonlinear System 31615.3 Stability Theory 31815.4 Observability and Identification 32015.5 Controllability and Stabilizability 32115.6 Optimal Control 32315.7 Linear Quadratic Regulator Theory 32415.8 Time-Optimal Control 32615.9 Stochastic Systems with Applications 32815.9.1 Stochastic System in Control Systems 32915.9.2 Stochastic System in Robotics and Automation 32915.9.3 Stochastic System in Neural Networks 330Summary 331Exercise Questions 331Further Reading 33216 DEEP LEARNING 33316.1 Neural Network Models in Deep Learning 33516.2 Methods of Deep Learning 33616.2.1 Convolutional Neural Networks 33716.2.2 Recurrent Neural Networks 34016.2.3 Generative Adversarial Networks 34216.2.4 Deep Learning Based Image Segmentation Models 34516.2.5 Variational Auto Encoders 34816.2.6 Transformer Models 35016.2.7 Attention-Based Models 35216.2.8 Meta-Learning Models 35416.2.9 Capsule Networks 35716.3 Deep Learning Frameworks 35816.4 Applications of Deep Learning 35916.4.1 Object Detection 36016.4.2 Intelligent Power Systems 36116.4.3 Intelligent Control 362Summary 362Exercise Questions 363References 364Further Reading 36517 NEURAL ARCHITECTURE SEARCH 36717.1 Neural Architecture Search and Neural Network 36917.2 Reinforcement Learning-Based Neural Architecture Search 37117.3 Evolutionary Algorithms-Based Neural Architecture Search 37417.4 Bayesian Optimization-Based Neural Architecture Search 37617.5 Gradient-Based Neural Architecture Search 37817.6 One-shot Neural Architecture Search 37917.7 Meta-Learning-Based Neural Architecture Search 38117.8 Neural Architecture Search for Specific Domains 38317.8.1 Cybernetical Intelligent Systems: Neural Architecture Search in Real-World 38417.8.2 Neural Architecture Search for Specific Cybernetical Control Tasks 38517.8.3 Neural Architecture Search for Cybernetical Intelligent Systems in Real-World 38617.8.4 Neural Architecture Search for Adaptive Cybernetical Intelligent Systems 38817.9 Comparison of Different Neural Architecture Search Approaches 389Summary 391Exercise Questions 391Further Reading 392Final Notes on Cybernetical Intelligence 393Index 399

Regulärer Preis: 115,99 €
Produktbild für Inside Abacus und die verrückte Geschichte der Schweizer IT-Branche

Inside Abacus und die verrückte Geschichte der Schweizer IT-Branche

Die drei HSG-Absolventen Claudio Hintermann, Eliano Ramelli und Thomas Köberl hatten keinen Plan, als sie 1985 die Software-Firma Abacus gründeten – ausser, dass sie nicht angestellt sein wollten. Sie und der später dazugestossene Daniel Senn zuckten mit den Schultern, als man sie im New-Economy-Hype zu Millionären machen wollte und legten sich immer wieder mit Behörden oder grossen Konzernen an. Ihr Fokus lag auf den Mitarbeitenden und auf gutem Essen, gutem Wein, tollen Partys und Kultur. Und darauf, die beste Software zu programmieren.In der zweiten Hälfte der 1980er- Jahre gab es in der Schweiz zahlreiche Firmen, die betriebswirtschaftliche Software entwickelten. Viele gingen unter. Auch multinationale Unternehmen wie Microsoft und SAP kündigten an, den Schweizer KMU-Markt zu erobern – und scheiterten.Christoph Hugenschmidt, IT-Journalist und Autor, erzählt die aussergewöhnliche Geschichte von Abacus und der Schweizer Software-Industrie.PrologGier und Grössenwahn«Eine Packung Fischstäbchen kostete 2.80»Freitags BierHilfe! Die Multis kommen!Sackgassen, Irr- und UmwegeGeier, Gemeinden, Goldgruben … und der Neubau der SoftwareÈ un gruppo di pazziDas Prinzip Blätterteig – Eine Reportage von Lukas Tobler«Jetzt sind sie zu weit gegangen»Die neue AbacusEpilog – Das Abacus-GeheimnisAnhang

Regulärer Preis: 37,99 €
Produktbild für Balkonkraftwerke - Verstehen und einfach einsteigen

Balkonkraftwerke - Verstehen und einfach einsteigen

Mit wenig Aufwand viel Energie sparen. Ganz neu im heise shop aus Oktober 2023.Die Stromrechnung senken und gleichzeitig die Umwelt schützen? Gar nicht so schwierig, wie man vielleicht denken mag! Wie's geht, zeigt Ihnen Jörg Rippel Schritt für Schritt in diesem Ratgeber. Neben Hinweisen zum Stromsparen finden Sie praktische Hilfestellungen und Tipps rund um Balkonkraftwerke. Sie beginnen mit der Erfassung des eigenen Strombedarfs, richten Ihr persönliches Sonnenkraftwerk ein, kümmern sich um ein bisschen Papierkram und erzeugen flugs Ihren eigenen Strom. Aus dem Inhalt:Off the Grid: unterwegs Strom erzeugenDer Papierkram: Anmeldung, Förderung, VersicherungDas Balkonkraftwerk installierenDer richtige Platz: Ausrichtung und AufstellungDas passende Modell findenDo it yourself: was Sie selbst machen könnenDen Verbrauch im Blick behaltenStrom (und Geld) sparenWie viel Strom brauche ich überhaupt?Ist das wirklich alles so einfach? Einstieg in die Photovoltaik

Regulärer Preis: 24,90 €
Produktbild für Softwareentwicklung für Kraftfahrzeuge

Softwareentwicklung für Kraftfahrzeuge

Im ersten Teil dieses Lehrbuchs werden Funktions- und Softwareentwicklung für Kraftfahrzeuge eingeführt. Dabei wird auf den Prozess der strukturierten Funktions- und Softwareentwicklung von der Erhebung der Anforderungen über die Softwareerstellung bis zum Test sowie Reifegradmodelle eingegangen. Im zweiten Teil werden diese Prozesse aus Wissenschaft und Lehre mit etablierten Vorgehensweisen aus der industriellen Praxis konkretisiert. Die pragmatische Beschreibung der konkreten Vorgehensweisen ist eine Basis für die Ausgestaltung detaillierter Prozesse im Unternehmensalltag sowie deren tägliche Anwendung im Projektgeschäft. Funktions- und Softwareentwicklung.- Softwareentwicklungsprozess in der Automobilindustrie.

Regulärer Preis: 49,99 €
Produktbild für Künstliche Intelligenz (6. Auflg.)

Künstliche Intelligenz (6. Auflg.)

Künstliche Intelligenz. Wissensverarbeitung - Neuronale Netze. 6., aktualisierte Auflage, Oktober 2023.Künstliche Intelligenz (KI) ganz praktischSymbolverarbeitende künstliche Intelligenz und künstliche neuronale Netze in einem BuchBusiness Rules und WissensnetzeConvolutional Neural Networks und Deep LearningÜbungen in PROLOG sowie mit JavaNNS und PythonDie künstliche Intelligenz hat unseren Alltag erreicht: Wir nutzen Chatbots, reden mit Sprachassistenten, KI digitalisiert die Dokumentenverarbeitung, die Muster-, Bild- oder Objekt-Erkennung. Sie ermöglicht neue, intelligentere Lösungen in vielen Bereichen, von der Medizin bis zum autonomen Fahren.Das Buch gibt eine Einführung in die KI. Es wird gezeigt, wie symbolverabeitende KI in Form von Wissensnetzen oder Geschäftsregeln heute angewendet und wie künstliche neuronale Netze in der Mustererkennung oder auch im Data Mining eingesetzt werden können. Wissensrepräsentation und -verarbeitung auf Basis der Logik wird unter Nutzung der logischen Programmiersprache PROLOG eingeführt. Logische Schlussfolgerungen lassen sich in PROLOG wesentlich leichter als in Python oder Java implementieren. Die Konzepte neuronaler Netze werden mit dem System JavaNNS und mittels Python praktisch vertieft. Fragen und Aufgaben am Ende eines Abschnittes fordern zum aktiven Lesen und Lernen auf. Die Webseiten zum Buch enthalten Demo-Programme, die diskutierte Vorgehensweisen veranschaulichen und das Verständnis fördern.Aus dem Inhalt:Überblick zur künstlichen IntelligenzDarstellung und Verarbeitung von WissenProblemlösung mittels SucheWissensverarbeitung mit PROLOGKünstliche neuronale NetzeVorwärtsgerichtete neuronale NetzeWettbewerbslernenAutoassoziative NetzeEntwicklung neuronaler NetzeNeu in der 6. Auflage sind Abschnitte zu den Themen ChatGPT sowie Decision Model and Notation (DMN) bei Prozessbeschreibungen.Leseprobe (PDF-Link)

Regulärer Preis: 34,99 €
Produktbild für Beginning C++23

Beginning C++23

Begin your programming journey with C++ , starting with the basics and progressing through step-by-step examples that will help you become a proficient C++ programmer. This book includes new features from the C++23 standard. All you need are Beginning C++23 and any recent C++ compiler and you'll soon be writing real C++ programs.There is no assumption of prior programming knowledge. All language concepts that are explained in the book are illustrated with working program examples, and all chapters include exercises for you to test and practice your knowledge. Free source code downloads are provided for all examples from the text and solutions to the exercises.This latest edition has been fully updated to the latest version of the language, C++23, and to all conventions and best practices of modern C++. This book also introduces elements of the C++ Standard Library that provide essential support for C++23. After completing this book, you will have the knowledge and skills needed to build your first C++ applications.WHAT YOU WILL LEARN* Begin programming with the C++23 standard* Carry out modular programming in C++* Work with arrays and loops, pointers and references, strings, and more* Write your own functions, types, and operators* Discover the essentials of object-oriented programming* Use overloading, inheritance, virtual functions, and polymorphism* Write generic function and class templates, and make them safer using concepts * Learn the ins and outs of containers, algorithms, and ranges* Use auto type declarations, exceptions, move semantics, lambda expressions, and much moreWHO THIS BOOK IS FORProgrammers new to C++ and those who may be looking for a refresh primer on C++ in general. IVOR HORTON is self-employed in consultancy and writes programming tutorials. He is the author of many programming books. Ivor worked for IBM for many years and holds a bachelor's degree, with honors, in mathematics. Horton's experience at IBM includes programming in most languages (including assembler and high-level languages on a variety of machines), real-time programming, and designing and implementing real-time closed loop industrial control systems. He has extensive experience teaching programming to engineers and scientists (Fortran, PL/1, APL, etc.). Horton is an expert in mechanical, process, and electronic CAD systems; mechanical CAM systems; and DNC/CNC systems.PETER VAN WEERT works for Danaher in its R&D unit for digital dentistry software, developing software for the dental practice of tomorrow. In his spare time, he has co-authored two books on C++ and two award-winning Windows 8 apps and is a regular expert speaker at, and board member of, the Belgian C++ Users Group. He is a software engineer whose main interests and expertise are application software development, programming languages, algorithms, and data structures.He received his master of science degree in computer science summa cum laude with congratulations of the Board of Examiners from the University of Leuven. In 2010, he completed his PhD thesis there on the design and efficient compilation of rule-based programming languages at the research group for declarative programming languages and artificial intelligence. During his doctoral studies, he was a teaching assistant for object-oriented programming (Java), software analysis and design, and declarative programming. After graduating, Peter worked at Nikon Metrology for more than six years on large-scale, industrial application software in the area of 3D laser scanning and point cloud inspection. He learned to master C++ and refactoring and debugging of very large code bases, and he gained further proficiency in all aspects of the software development process, including the analysis of functional and technical requirements, and agile and scrum-based project and team management.1. Basic Ideas2. Introducing Fundamental Types of Data3. Working Fundamental Types4. Making Decisions5. Arrays and Loops6. Pointers and References7. Working with Strings8. Defining Functions9. Vocabulary Types10. Function Templates11. Modules and Namespaces12. Defining your own Data Types13. Operator Overloading14. Inheritance15. Polymorphism16. Runtime Errors and Exceptions17. Class Templates18. Move Semantics19. First-Class Functions20. Containers and Algorithms21. Constrained Templates and ConceptsAppendix A (online only; to be offered as part of source code download)

Regulärer Preis: 64,99 €
Produktbild für Hands-On Web Scraping with Python

Hands-On Web Scraping with Python

Web scraping is a powerful tool for extracting data from the web, but it can be daunting for those without a technical background. Designed for novices, this book will help you grasp the fundamentals of web scraping and Python programming, even if you have no prior experience.Adopting a practical, hands-on approach, this updated edition of Hands-On Web Scraping with Python uses real-world examples and exercises to explain key concepts. Starting with an introduction to web scraping fundamentals and Python programming, you’ll cover a range of scraping techniques, including requests, lxml, pyquery, Scrapy, and Beautiful Soup. You’ll also get to grips with advanced topics such as secure web handling, web APIs, Selenium for web scraping, PDF extraction, regex, data analysis, EDA reports, visualization, and machine learning.This book emphasizes the importance of learning by doing. Each chapter integrates examples that demonstrate practical techniques and related skills. By the end of this book, you’ll be equipped with the skills to extract data from websites, a solid understanding of web scraping and Python programming, and the confidence to use these skills in your projects for analysis, visualization, and information discovery.

Regulärer Preis: 29,99 €
Produktbild für TypeScript Basics

TypeScript Basics

Jumpstart your working knowledge of Typescript with a quick, practical guide and start using this open source, object orientated language with confidence. This book highlights how Typescript works with JavaScript and its frameworks, giving it greater functionality, especially for larger enterprise projects.  You'll start by reviewing some fundamentals such as how to run a TypeScript file and compile it to JavaScript as well as understand how it sits within the full ecosystem alongside React, Redux, Angular and Webpack. Using a practical project-led approach, you'll go through key concepts and aspects of Typescript such as compilers, arrays, classes and interfaces. Once you complete the fundamental basics, you'll move onto more complex topics like advanced types.  You'll also learn about Decorators, which are a must-have feature in Angular. The book then presents a small To-do list project followed by a  larger 'Drag and Drop' project. You'll see how to divide the drag and drop project into small manageable modules and learn to make the project more efficient with Webpack. Lastly, you'll create two more React projects, a party app with React and then one with React and Redux.  Typescript Basics reveals how this JavaScript extension is currently the fastest growing language for web development with more and more developers and companies looking to utilize and adopt it within their current workflows and projects.  You will: * Understand the particulars of Typescript and how it feeds into the JS and Web development eco-system * Implement Typescript for enterprise projects * Use Typescript with practical projects and examples * See how Typescript interacts with major frameworks like React and Angular Jumpstart your working knowledge of Typescript with a quick, practical guide and start using this open source, object orientated language with confidence. This book highlights how Typescript works with JavaScript and its frameworks, giving it greater functionality, especially for larger enterprise projects.  You'll start by reviewing some fundamentals such as how to run a TypeScript file and compile it to JavaScript as well as understand how it sits within the full ecosystem alongside React, Redux, Angular and Webpack. Using a practical project-led approach, you'll go through key concepts and aspects of Typescript such as compilers, arrays, classes and interfaces. Once you complete the fundamental basics, you'll move onto more complex topics like advanced types.  You'll also learn about Decorators, which are a must-have feature in Angular. The book then presents a small To-do list project followed by a  larger 'Drag and Drop' project. You'll see howto divide the drag and drop project into small manageable modules and learn to make the project more efficient with Webpack. Lastly, you'll create two more React projects, a party app with React and then one with React and Redux.  Typescript Basics reveals how this JavaScript extension is currently the fastest growing language for web development with more and more developers and companies looking to utilize and adopt it within their current workflows and projects.  What You'll Learn * Understand the particulars of Typescript and how it feeds into the JS and Web development eco-system * Implement Typescript for enterprise projects * Use Typescript with practical projects and examples * See how Typescript interacts with major frameworks like React and Angular Who This Book Is For Those who want to learn about TypeScript and implement it in their Enterprise or hobby projects with React and Angular. Beginners will find it easy to learn the basic concepts and principles to get started and to progress onto more advanced projects and how to implement them. Nabendu Biswas is a Full Stack JavaScript developer, who has been working in the IT industry for the past 16 years for some of world's top development firms and investment banks. He is a passionate tech blogger, YouTuber, and currently runs an EdTech company, specializing in teaching students about web-app development and the JavaScript ecosystem. He is also the author of five Apress books focusing on topics such as Gatsby, MERN, and React Firebase, all of which can be found on Amazon. 1.Getting Started.- 2. TypeScript Basics.- 3. TypeScript Compilers.- 4. Classes and Interfaces 5. Advanced Types  6. Generics & Decorators.- 7. To-do List With TypeScript.- 8.Drag Drop Project.- 9.Modules and Webpack.- 10. React TypeScript Project.- 11. React Redux with TypeScript..

Regulärer Preis: 46,99 €
Produktbild für Practical Implementation of a Data Lake

Practical Implementation of a Data Lake

This book explains how to implement a data lake strategy, covering the technical and business challenges architects commonly face. It also illustrates how and why client requirements should drive architectural decisions.   Drawing upon a specific case from his own experience, author Nayanjyoti Paul begins with the consideration from which all subsequent decisions should flow: what does your customer need? He also describes the importance of identifying key stakeholders and the key points to focus on when starting a new project. Next, he takes you through the business and technical requirement-gathering process, and how to translate customer expectations into tangible technical goals. From there, you’ll gain insight into the security model that will allow you to establish security and legal guardrails, as well as different aspects of security from the end user’s perspective. You’ll learn which organizational roles need to be onboarded into the data lake, their responsibilities, the services they need access to, and how the hierarchy of escalations should work. Subsequent chapters explore how to divide your data lakes into zones, organize data for security and access, manage data sensitivity, and techniques used for data obfuscation. Audit and logging capabilities in the data lake are also covered before a deep dive into designing data lakes to handle multiple kinds and file formats and access patterns. The book concludes by focusing on production operationalization and solutions to implement a production setup.   After completing this book, you will understand how to implement a data lake, the best practices to employ while doing so, and will be armed with practical tips to solve business problems.   You will: * Understand the challenges associated with implementing a data lake * Explore the architectural patterns and processes used to design a new data lake * Design and implement data lake capabilities * Associate business requirements with technical deliverables to drive success This book explains how to implement a data lake strategy, covering the technical and business challenges architects commonly face. It also illustrates how and why client requirements should drive architectural decisions.   Drawing upon a specific case from his own experience, author Nayanjyoti Paul begins with the consideration from which all subsequent decisions should flow: what does your customer need? He also describes the importance of identifying key stakeholders and the key points to focus on when starting a new project. Next, he takes you through the business and technical requirement-gathering process, and how to translate customer expectations into tangible technical goals. From there, you’ll gain insight into the security model that will allow you to establish security and legal guardrails, as well as different aspects of security from the end user’s perspective. You’ll learn which organizational roles need to be onboarded into the data lake, their responsibilities, the services they need access to, and how the hierarchy of escalations should work. Subsequent chapters explore how to divide your data lakes into zones, organize data for security and access, manage data sensitivity, and techniques used for data obfuscation. Audit and logging capabilities in the data lake are also covered before a deep dive into designing data lakes to handle multiple kinds and file formats and access patterns. The book concludes by focusing on production operationalization and solutions to implement a production setup.   After completing this book, you will understand how to implement a data lake, the best practices to employ while doing so, and will be armed with practical tips to solve business problems.   What You Will Learn * Understand the challenges associated with implementing a data lake * Explore the architectural patterns and processes used to design a new data lake * Design and implement data lake capabilities * Associate business requirements with technical deliverables to drive success   Who This Book Is For Data Scientists and Architects, Machine Learning Engineers, and Software Engineers. Nayanjyoti Paul is an Associate Director and Chief Azure Architect for GenAI and LLM CoE for Accenture. He is the product owner and creator of a patented asset. Presently, he leads multiple projects as a lead architect around generative AI , large language models, data analytics, and machine learning. Nayan is a certified Master Technology Architect, certified Data Scientist, and certified Databricks Champion with additional AWS and Azure certifications. He is a speaker at conferences like Strata Conference, Data Works Summit, and AWS Reinvent. He also delivers guest lectures at Universities. Chapter 1: Understanding the Customer Needs.- Chapter 2: Security Model.- Chapter 3: Organizational Model.- Chapter 4: Data Lake Structure.- Chapter 5: Production Playground.- Chapter 6: Production Operationalization.- Chapter 7: Miscellaneous.

Regulärer Preis: 26,99 €
Produktbild für Attribute-based Encryption (ABE)

Attribute-based Encryption (ABE)

ATTRIBUTE-BASED ENCRYPTION (ABE)ENABLES READERS TO UNDERSTAND APPLICATIONS OF ATTRIBUTE-BASED ENCRYPTION SCHEMES IN CLOUD COMPUTING WITH THE SUPPORT OF BLOCKCHAIN TECHNOLOGYWith a focus on blockchain technology, Attribute-based Encryption (ABE) provides insight into the application of attribute-based encryption (ABE) schemes, discussing types of blockchains, fundamentals of blockchain, and how blockchains are constructed. Comprised of 16 chapters, the text provides an overview of the components that go into creating a dual ABE system of encryption proofs within the following: composite bilinear groups, dual pairing vector space framework, matrix pairing framework, framework for matrix pairing, and the application of cryptographic scheme on blockchain. The team of authors discuss the basic construction components of ABE and share the security models, including the selective and semi- adaptive security models, applying these to either prime order or composite order groups. The book also discusses the tools used for converting a composite order ABE scheme to prime order and an adaptive secure ABE scheme based on prime order. In Attribute-based Encryption (ABE), readers can expect to find information on:* Mathematical background of ABE, covering group and cyclic group, elliptic curves, curve selection, supersingular curves, ordinary curves, and weil and tate pairing* Basic construction components of ABE, covering access structure, monotone Boolean formula, linear secret-sharing scheme, and ordered binary decision diagram* Tools for converting composite order ABE schemes to prime order, covering security assumptions and conversion based on vectors for preliminaries, scheme construction, and security proof technique* Foundations of blockchain technology, covering blocks, miners, hash functions, and public key cryptographyAttribute-based Encryption (ABE) is an essential resource for professionals working in the field of design and cybersecurity who wish to understand how to use blockchain and the ABE scheme to provide fine-grained access control in outsourced data on third-party cloud servers. QI XIA received her PhD in Computer Science from the University of Electronic Science and Technology of China in 2010. JIANBIN GAO received his PhD in Computer Science from the University of Electronic Science and Technology of China in 2012. ISAAC AMANKONA OBIRI received his Master’s and PhD in Computer Science and Technology from the University of Electronic Science and Technology of China. KWAME OMONO ASAMOAH received his Master’s and PhD in Computer Science and Technology from the University of Electronic Science and Technology of China. DANIEL ADU WORAE is currently pursuing his Master’s degree in Computer Science and Technology at the University of Electronic Science and Technology of China. About the Authors xiiiPreface xvAcknowledgments xviiPart I Attribute-Based Encryption (ABE) 11 Foundation of Attribute-Based Encryption 31.1 Introduction 31.1.1 Symmetric Encryption 41.1.2 Asymmetric Key Encryption 41.1.3 Identity-Based Encryption 51.2 Functional Encryption 71.2.1 Applications of Attribute-Based Encryption 81.2.2 Problems with Attribute-Based Encryption 91.2.3 A Brief History of Security Proof of Functional Encryption 91.2.4 Dual System of Encryption 101.2.5 Summary 11References 122 Mathematical Background 152.1 Group Theory 152.1.1 Law of Composition 152.1.2 Groups 152.1.3 Subgroups 162.1.4 Homomorphisms 172.1.5 Cyclic Group 172.2 Ring Theory 202.2.1 Ideals and Quotient Rings 212.2.2 Euler’s Totient Function 222.2.3 Polynomial Rings 222.2.4 Irreducible and Monic Polynomials 222.2.5 Field Theory 232.2.5.1 Quotient Field 242.2.6 Field Characteristic 24Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page vi[1][1] [1][1]vi Contents2.2.7 Algebraic Extension Felds 242.3 Elliptic Curves 242.3.1 Plane Curve 242.3.2 Group Operations on Elliptic Curves 262.3.2.1 Point Addition 262.3.2.2 Point Doubling 272.4 Divisors and Bilinear Map 282.4.1 Divisors 282.4.2 The Degree and Support ofD 292.4.3 The Divisor of a Function f onE 292.4.4 Equivalence of Divisors 302.4.5 Bilinear Map 312.4.6 Weil Pairing 312.4.7 Miller’s Algorithm 322.4.8 The Tate Pairing 342.5 Summary 36References 363 Attribute-Based Encryption 373.1 Introduction 373.2 Basic Components of ABE Construction 393.2.1 Secret-Sharing Schemes 393.2.2 Polynomial Interpolation 413.2.2.1 Polynomials Over the Reals 413.2.2.2 Polynomials ModulusP 443.2.3 Shamir Secret Sharing 453.2.4 Verifiable Secret Sharing (VSS) 473.2.4.1 Algorithm for Converting Access Structure Into LSSS Matrix 473.2.4.2 Access Structure Example 483.2.4.3 Algorithms in Attribute-Based Encryption 493.2.5 Properties of Attribute-Based Encryption 513.2.6 Prime Order Group 513.3 Cryptographic Hard Assumptions 513.3.1 Composite Order Bilinear Groups 543.3.2 Complexity Assumptions 553.4 Provable Security 563.5 Security Notions 573.5.1 Summary 57References 584 Data Access Control 614.1 Introduction 614.1.1 Coarse-Grained 624.1.2 Fine-Grained Access Control 634.1.3 Importance of Fine-Grained Access Control 644.2 Concerns About Cloud-Based Access Control that Are Trustworthy 654.2.1 Encryption Access Control 65Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page vii[1][1] [1][1]Contents vii4.2.2 Requirements for Encryption-Based Access Control 674.3 Summary 67References 675 Selective Secure ABE Schemes Based on Prime Order Group 695.1 Introduction 695.1.1 Selective Security Model for KP-ABE 705.1.2 Selective Security Model for CP-ABE 705.1.3 ABE Schemes 715.2 The KP-ABE Scheme 715.2.1 Concrete Scheme Construction 715.2.2 Security Proof 735.3 The CP-ABE Scheme 745.3.1 Concrete Scheme Construction 745.3.2 Security Proof 765.4 Summary 77References 776 Fully Secure ABE Schemes Based on Composite and Prime Order Groups 796.1 Introduction 796.2 A Fully Secure CP-ABE from Composite Order Group 816.2.1 CP-ABE Construction 826.2.2 Adaptive Security Proof 836.2.2.1 Description of Hybrids 836.2.3 Security Proof 846.3 A Fully Secure KP-ABE Scheme Based on Dual Vector Space 846.3.1 KP-ABE Construction 856.3.2 Adaptive Security 876.3.3 Security Proof 886.4 KP-ABE Scheme Based on Matrix 896.4.1 The Scheme 896.4.2 Adaptive Security 906.4.3 Security Proof 916.5 Summary 91References 92Part II Concepts of Blockchain Technology 957 Blockchain Technology 977.1 Introduction 977.1.1 History 977.1.2 Preliminary Concepts of Blockchain Technology 987.1.3 Characteristics of Blockchain 1007.1.4 Evolution and Types of Blockchain 1047.1.4.1 The Blockchain 1.0 1047.1.4.2 Blockchain 2.0 104Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page viii[1][1] [1][1]viii Contents7.1.4.3 Blockchain 3.0 1057.1.5 Permissionless vs Permissioned Blockchains 1057.1.6 Types of Blockchain 1057.2 Architecture of Blockchain 1067.2.1 Architecture of Blockchain 1.0 (Cryptocurrencies) 1067.2.2 Block 1067.2.3 Node 1077.2.4 Types of Blockchain Nodes 1077.2.5 Consensus 1107.3 Architecture of Blockchain 2.0 (Smart Contracts) 1107.3.1 Introduction to Smart Contracts 1107.3.2 How Smart ContractsWork 1117.3.3 Example of Smart Contract 1117.3.4 Uses of Smart Contracts 1117.3.5 Advantages of Smart Contracts 1127.3.6 Limitations of Smart Contracts 1127.4 Architecture of Blockchain 3.0 (Blockchain Applications) 1137.4.1 Consensus Mechanism 1137.5 Blockchain 4.0 1187.5.1 Blockchain 4.0 Applications 1197.5.2 Metaverse 1197.5.3 Industrial Revolution 4.0 1207.5.4 Blockchain 4.0 for Businesses 120References 1208 Scaling-Out Blockchains with Sharding 1258.1 Introduction 1258.1.1 Scalability Trilemma 1268.1.2 Nakamoto-Based – Monoxide – Chu-ko-nu Mining 1288.1.3 Elastico 1288.1.4 OmniLedger 1298.1.5 Rapid Chain 1308.1.6 Learnings 1318.1.7 General Improvements 1328.1.7.1 Reducing Transaction Latency 1338.1.7.2 Inter-Communication Protocol 1338.1.7.3 Shards Ledger Pruning 1348.1.7.4 Decentralized Bootstrapping 1348.1.7.5 Securing the Epoch Reconfiguration 1348.1.7.6 Sharded Smart Contract 1358.1.7.7 Replay Attacks and Defenses Against Cross-Shard Protocols 1358.2 Off-Chain Solution: Layer 2 Solutions 1368.2.1 State Channels 1368.2.2 Side Chains of the Plasma 1388.2.3 Problems with Data Accessibility 1398.3 Rollups 139Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page ix[1][1] [1][1]Contents ix8.3.1 Rollups Based on Zero Knowledge 1408.3.2 Proofs of Zero-Knowledge 1408.3.3 Protocol Schnorr 1428.3.4 Protocol Pedersen 1438.3.5 zk-SNARKs 1448.4 Summary 144References 145Part III Applying Blockchain with Real-Time Technologies 1479 Blockchain Technology for Supply Management 1499.1 Introduction 1499.1.1 System Design 1539.1.2 System Architecture 1539.1.3 Entities of the System 1549.1.3.1 Users 1549.1.4 Smart Contract Control 1579.1.5 Blockchain Network 1579.1.5.1 Processing Nodes 1579.1.5.2 System Application Layer 1589.1.5.3 Storage Infrastructure 1589.1.6 System Decryption 1589.1.7 Blocks 1599.1.7.1 Block Design 1609.2 System Flow 1639.2.1 System Advantages 1639.2.2 Conclusion 164References 16510 Satellite Communication 16710.1 Introduction 16710.1.1 Low-Orbit Constellation Communication Networks 16910.1.2 Interstellar Link Length 17110.1.3 Model of Satellite Motion 17110.1.4 Edge Computing Technologies 17210.2 Analysis of Edge Computing Requirements of Low-Orbit ConstellationCommunication Networks 17510.2.1 Design of Edge Computing Architecture for Low-Orbit Constellation CommunicationNetworks 17510.2.2 Satellite 17610.2.3 System Entities 18010.2.4 System Process Flow 18010.2.5 Security Properties 18310.3 Summary 183References 183Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page x[1][1] [1][1]x Contents11 Foundation of Information-Centric Communication 18511.1 Introduction 18511.2 Information-Centric Communication 18511.3 Name-Based Routing of Content 18711.4 Benefits of Using ICN 18711.5 Cost-Efficient and Scalable Distribution of Content Design Principles 18911.6 ICN Design Challenges 19011.6.1 Content Naming 19011.6.2 Caching of Content 19111.6.3 Data Integrity 19211.6.4 Resolution System’s Scalability and Name-Based Routing 192References 19312 Security Overall in Information-Centric Networks 19512.1 Introduction 19512.2 Content-Centric Network (CCN) Architecture 19512.3 Naming System Design 19712.4 Secure Naming Scheme for Information-Centric Networks 19812.5 Data Transmission – Content Delivery 19812.6 Traffic Load in Network Caching 19912.6.1 Store Unique Naming of Content in Caches 20012.6.2 Storage Limitation in Caching Space Devices 20112.7 Content’s Freshness Detection 20112.8 ICN Security 20112.9 Attacks in ICN Architectures 20212.10 ICN Attributes to Ensure Security Threats 20412.11 Traffic Analysis and Prediction 20412.12 Some Key Problem Statements 20512.13 Blockchain-Based ICN Scheme Improvement 20612.13.1 Protection Against DDos 20612.14 A Secured Information-Centric Network Based on Blockchain 20612.14.1 Blockchain-Based ICN Structure 20712.14.1.1 Data Integrity 20712.15 Attribute-Based Encryption Scheme for the Information-Centric Network 20812.15.1 Applying Ciphertext-Policy ABE (CP-ABE) Scheme in ICN 20912.15.2 System Design of CP-ABE Scheme in ICN 210References 21213 Subscriber Data Management System Based on Blockchain 21513.1 Introduction 21513.1.1 Motivation 21613.1.2 Problem Statement 21613.1.3 Contributions 21613.2 Literature Review 21713.3 System Design Description 21713.3.1 Assumptions 217Trim Size: 7in x 10in Single Column Xia989356 ftoc.tex V1 - 06/28/2023 7:58pm Page xi[1][1] [1][1]Contents xi13.3.2 Ciphertext-Policy Attribute-Based Encryption (CP-ABE) 21813.3.3 CP-ABE Construction 21813.3.4 System Components 21913.3.4.1 Data Subscribers (DSs) 21913.3.4.2 Data Providers (DPs) 22013.3.4.3 Key Generation and Distribution Center (KGDC) 22013.3.4.4 IPFS Distributed Storage 22013.3.4.5 Blockchain Platform 22013.3.5 Process Description 22213.3.5.1 Subscriber Registration 22413.3.5.2 Subscriber Data Storage 22413.3.5.3 Subscriber Data Request 22413.3.6 Benefits of Proposed Design 22513.3.7 Security Requirements 22613.4 Summary 227References 22714 A Secure Data-Sharing Blockchain-Based Crowdfunding System 22914.1 Introduction 22914.2 Literature Review 23114.2.1 Present-Day Centralized Crowdfunding 23114.2.2 Crowdfunding Models 23314.2.3 Problems of Traditional Crowdfunding 23414.2.4 Blockchain-Based Crowdfunding 23414.2.5 Advantages of Blockchain-Based Crowdfunding 23514.3 Proposed System 23614.3.1 System Model 23614.3.1.1 Key Components 23714.3.2 System Framework Overview 23814.3.2.1 Application Layer 23914.3.2.2 Blockchain Layer 23914.3.2.3 Data Storage Layer 23914.3.3 System Assumptions and Threat Model 24014.3.4 Process Description 24014.3.5 Smart Contract Interactions 24114.3.5.1 User Registration Contract (URC) 24114.3.5.2 User Verification Contract (UVC) 24114.3.5.3 Project Data Access Contract (PDAC) 24114.3.6 Concrete Implementation 24114.3.6.1 User Register 24214.3.6.2 Data Encrypt 24214.3.6.3 Data Search 24214.3.6.4 Fine-Grained Access Authorization 24214.3.6.5 Data Decrypt 24314.3.6.6 Transaction Confirmation 24314.3.7 Security Requirements 24314.3.7.1 Fine-Grained Access Control 24314.3.7.2 Key Counterfeiting 24314.3.7.3 Data Integrity 24414.4 Summary 244References 244Index 247

Regulärer Preis: 96,99 €
Produktbild für Using and Administering Linux: Volume 2

Using and Administering Linux: Volume 2

Learn to be a Linux sysadmin and an expert user of the Linux operating system, even with no previous Linux experience. This second edition of the popular and highly rated Linux self-study training course has been fully updated to Fedora Linux 37 with expanded and revised content and figures as well new chapters on the BTRFS file system, using Zram for swap, NetworkManager, automation with Ansible, and systemd.Like the previous version, this edition has been reviewed for technical accuracy by a highly respected Linux expert and will prepare you to manage complex systems with ease and equip you for a new career. It has also been reviewed by a student who took this course to ensure its readability and flow for those with little or no previous experience with Linux. This second volume builds upon what you learned in the first and depends upon the virtual network and virtual machine created there.You’ll see how to manage and monitor running processes, discover the power of the special filesystems, monitor and tune the kernel while it is running – without a reboot. You’ll then turn to regular expressions and the power that using them for pattern matching can bring to the command line, and learn to manage printers and printing from the command line and unlock the secrets of the hardware on which your Linux operating system is running.Experiment with command line programming and how to automate various administrative tasks, networking, and the many services that are required in a Linux system. Use the logs and journals to look for clues to problems and confirmation that things are working correctly, and learn to enhance the security of your Linux systems and how to perform easy local and remote backups.WHAT YOU WILL LEARN* Understand Logical Volume Management, using file managers, and special filesystems* Exploit everything is a file* Perform command line programming and basic automation* Configure printers and manage other hardware* Manage system services with systemd, user management, security, and local and remote backups using simple and freely available toolsWHO THIS BOOK IS FORAnyone who wants to continue to learn Linux in depth as an advanced user and system administrator at the command line while using the GUI desktop to leverage productivity.DAVID BOTH is an Open Source Software and GNU/Linux advocate, trainer, writer, and speaker. He has been working with Linux and Open Source Software for more than 20 years and has been working with computers for over 45 years. He is a strong proponent of and evangelist for the "Linux Philosophy for System Administrators." David has been in the IT industry for over forty years.He worked for IBM for 21 years and, while working as a Course Development Representative in Boca Raton, FL, in 1981, wrote the training course for the first IBM PC. He has taught RHCE classes for Red Hat and has worked at MCI Worldcom, Cisco, and the State of North Carolina. In most of the places he has worked since leaving IBM in 1995, he has taught classes on Linux ranging from Lunch'n'Learns to full five day courses. Helping others learn about Linux and open source software is one of his great pleasures.David had some amazing teachers and mentors in his 40 years in IT and more than 20 years working with Linux. At their core, Linux and open source in general are about sharing and helping others and about contributing to the community. These books, along with “The Linux philosophy for SysAdmins,” are a continuation of his desire to pass on his knowledge and to provide mentoring to anyone interested in learning about Linux.David is the author of The Linux Philosophy for SysAdmins (Apress, 2018), co-author of Linux for Small Business Owners (Apress, 2022) and can be found on Twitter @linuxgeek46

Regulärer Preis: 72,99 €
Produktbild für Using and Administering Linux: Volume 3

Using and Administering Linux: Volume 3

In Using and Administering Linux: Volume 3 you’ll work with multiple VMs on a single physical host to create a network in which to sharpen your sysadmin skills. Chapters have been fully updated to Fedora Linux 38 with expanded content and figures as well brand new material on the BTRFS file system, using Zram for swap, NetworkManager, automation with Ansible, as well as systemd.Focusing on network and other advanced services, this second edition of the final series volume builds upon the skills you have learned so far in volumes 1&2 and will depend upon the virtual network and VMs created there. Start by reviewing the administration of Linux servers and install and configure various Linux server services such as DHCP, DNS, NTP, and SSH server that will be used to provide advanced network services. You’ll then learn to install and configure servers such as BIND for name services, DHCP for network host configuration, and SSH for secure logins to remote hosts.Other topics covered include public/private keypairs to further enhance security, SendMail and IMAP and antispam protection for email, using Apache and WordPress to create and manage web sites, NFS, SAMBA, and Chrony. This volume also covers SELinux and its use in making your systems even more secure., You will learn to build RPMs to be used to distribute automation scripts. All of these services are installed on a single server host over the course of the book and by the time you are finished you will have a single server that provides these services for your network.WHAT YOU WILL LEARN* Install, configure, and manage several Linux server services such as email with spam management and single and multiple web sites* Work with NTP time synchronization, DHCP, SSH, and file sharing with Unix/Linux and Windows clients* Create RPMs for distribution of scripts and administrative programs.* Understand and work with enhanced security. WHO THIS BOOK IS FORThose who are already Linux power users – SysAdmins who can administer Linux workstation hosts that are not servers – who want to learn to administer the services provided by Linux servers such as web, time, name, email, SSH, and more.DAVID BOTH is an Open Source Software and GNU/Linux advocate, trainer, writer, and speaker. He has been working with Linux and Open Source Software for more than 20 years and has been working with computers for over 45 years. He is a strong proponent of and evangelist for the "Linux Philosophy for System Administrators." David has been in the IT industry for over forty years.He worked for IBM for 21 years and, while working as a Course Development Representative in Boca Raton, FL, in 1981, wrote the training course for the first IBM PC. He has taught RHCE classes for Red Hat and has worked at MCI Worldcom, Cisco, and the State of North Carolina. In most of the places he has worked since leaving IBM in 1995, he has taught classes on Linux ranging from Lunch'n'Learns to full five day courses. Helping others learn about Linux and open source software is one of his great pleasures.David had some amazing teachers and mentors in my 40 years in IT and my more than 20 years working with Linux. At their core, Linux and open source in general are about sharing and helping others and about contributing to the community. These books, along with “The Linux philosophy for SysAdmins,” are a continuation of his desire to pass on my knowledge and to provide mentoring to anyone interested in learning about Linux.David is the author of The Linux Philosophy for SysAdmins (Apress, 2018) and can be found on Twitter @linuxgeek46.42. Server Preparation.- 43. Name services.- 44. Routing.- 45. Remote Access with SSH.- 46. Security.- 47. Backup everything - frequently.- 48. Introducing Email.- 49. Advanced Email Topics.- 50. Combating Spam.- 51. Apache Web Server.- 52. WordPress.- 53. Mailing Lists.- 54. Security.- 55. Advanced Package Management.- 56. File Sharing.- 57. Where Do I Go From Here?.- Bibliography.

Regulärer Preis: 62,99 €
Produktbild für Metaverse and Immersive Technologies

Metaverse and Immersive Technologies

METAVERSE AND IMMERSIVE TECHNOLOGIESTHE BOOK COVERS THE MULTIDIMENSIONAL PERSPECTIVES OF THE METAVERSE THROUGH THE PRISM OF VIRTUAL REALITY, AUGMENTED REALITY, BLOCKCHAIN, ARTIFICIAL INTELLIGENCE, AND IOT, RANGING FROM RUDIMENTARY TO ADVANCED APPLICATIONS.This book provides a thorough explanation of how the technology behind metaverse and other virtual reality technologies are changing the world. The primary objective is to present the revolutionary innovation of the 21st century—the metaverse—and exhibit its wide range of applications in different domains. Although blockchain and VR/AR were the first popularly known applications of the metaverse, several other applications also exist. While some still believe the metaverse is overhyped, in reality, it is transforming almost every industry—healthcare, 3D, 4D, industry, game industry, business management, artificial intelligence, and IoT, just to name a few. This technological breakthrough not only paved the way for virtual reality but also provided useful solutions for other areas of technology. The unique nature of the technology, which is a single, shared, immersive, persistent, 3D virtual space where humans experience life in ways not possible in the physical world, makes it suitable for all real-world applications; it has great potential to transform business, and companies are already in the race for different product offerings. AUDIENCEAI and computer science researchers, engineers and graduate students, IT personnel in business as well as entrepreneurs and policymakers. CHANDRASHEKHAR A, PHD, is an assistant professor in the Department of Mechatronics, ICFAI Foundation for Higher Education, Hyderabad, Telangana, India. He has 8 patents to his name and has published numerous research articles in international journals. SHAIK HIMAM SAHEB, PHD, is an assistant professor in the Department of Mechatronics Engineering, ICFAI Foundation for Higher Education, Hyderabad, Telangana, India. He has published numerous research articles in international journals. SANDEEP KUMAR PANDA, PHD, is an associate professor in the Department of Data Science and Artificial Intelligence, Faculty of Science and Technology, ICFAI Foundation for Higher Education, Hyderabad, Telangana, India. He has published numerous research articles in international journals and has 18 Indian patents to his name. In 2020, he received the “Research and Innovation of the Year Award 2020” from the Govt. of India. S. BALAMURUGAN, PHD, is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/conferences, and 35 patents. SHENG-LUNG PENG, PHD, is a professor in the Department of Creative Technologies and Product Design, National Taipei University of Business, Taiwan. He is an honorary professor of Beijing Information Science and Technology, University of China, and a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. He has published more than 120 international journal and conference papers.

Regulärer Preis: 173,99 €
Produktbild für Learn Data Mining Through Excel

Learn Data Mining Through Excel

Use popular data mining techniques in Microsoft Excel to better understand machine learning methods. Most software tools and programming language packages take data input and deliver data mining results directly, presenting no insight on working mechanics and creating a chasm between input and output. This is where Excel can help, and this book will show you exactly how.This updated edition demonstrates how to work with data in a transparent manner using Excel. When you open an Excel file, data is visible immediately and you can work with it directly. You’ll see how to examine intermediate results even as you are still conducting your mining task, offering a deeper understanding of how data is manipulated, and results are obtained. These are critical aspects of the model construction process that are often hidden in software tools and programming language packages.Over the course of Learn Data Mining Through Excel, you will learn the data mining advantages the application offers when the data sets are not too large. You’ll see how to use Excel’s built-in features to create visual representations of your data, enabling you to present your findings in an accessible format. Author Hong Zhou walks you through each step, offering not only an active learning experience, but teaching you how the mining process works and how to find hidden patterns within the data.Upon completing this book, you will have a thorough understanding of how to use an application you very likely already have to mine and analyze data, and how to present results in various formats.WHAT YOU WILL LEARN* Comprehend data mining using a visual step-by-step approach* Gain an introduction to the fundamentals of data mining* Implement data mining methods in Excel* Understand machine learning algorithms* Leverage Excel formulas and functions creatively* Obtain hands-on experience with data mining and ExcelWHO THIS BOOK IS FORAnyone who is interested in learning data mining or machine learning, especially data science visual learners and people skilled in Excel who would like to explore data science topics and/or expand their Excel skills. A basic or beginner level understanding of Excel is recommended.HONG ZHOU, PHD is a professor of computer science and mathematics and has been teaching courses in computer science, data science, mathematics, and informatics at the University of Saint Joseph for nearly 20 years. His research interests include bioinformatics, data mining, software agents, and blockchain. Prior to his current position, he was as a Java developer in Silicon Valley. Dr. Zhou believes that learners can develop a better foundation of data mining models when they visually experience them step-by-step, which is what Excel offers. He has employed Excel in teaching data mining and finds it an effective approach for both data mining learners and educators.Chapter 1: Excel and Data Mining.- Chapter 2: Linear Regression.- Chapter 3: K-Means Clustering.- Chapter 4: Linear Discriminant Analysis.- Chapter 5: Cross Validation and ROC.- Chapter 6: Logistic Regression.- Chapter 7: K-nearest Neighbors.- Chapter 8: Naïve Bayes Classification.- Chapter 9: Decision Trees.- Chapter 10: Association Analysis.- Chapter 11: Artificial Neural Networks.- Chapter 12: Text Mining.- Chapter 13: Hierarchical Clustering and Dendrogram.- Chapter 14 Exploratory Data Analysis (EDA).- Chapter 15: After Excel.

Regulärer Preis: 54,99 €
Produktbild für Toolkit für Agile Coaches und Scrum Master

Toolkit für Agile Coaches und Scrum Master

Viele Organisationen gehen zu einer agilen Arbeitsweise über. Oft werden dazu Scrum, Kanban & Co. eingeführt. Diese Frameworks bringen jedoch nicht automatisch Agilität mit sich, denn den Kern des agilen Arbeitens bilden immer die Menschen und ihre Interaktionen. Doch welche Herausforderungen erwachsen daraus in der Praxis? Und wie geht man am besten damit um?Dieses Arbeitsbuch für Agile Coaches und Scrum Master enthält 99 praxiserprobte Übungen und Workshop-Formate für die vielfältigen Aspekte agilen Arbeitens:- Mit einem Team starten- Teams voranbringen- Managementteams unterstützen- Transparenz schaffen- Product Owner unterstützen- Meetings begleiten- Moderationstechniken- Remote-ArbeitKurze Interventionen wie verschiedene Energizer- und Kennenlernübungen, konkrete Praktiken, Formate und Simulationen, deren Ablauf jeweils kurz und prägnant Schritt für Schritt vorgestellt wird, helfen dir dabei, schnell und gut vorbereitet loszulegen.Das Buch ist Werkzeugkasten und Nachschlagewerk zugleich, das du immer dann zur Hand nehmen kannst, wenn du deine Teamarbeit verbessern, ein Problem angehen oder ein neues Projekt planen möchtest. Profitiere von neuen Formaten, praktischen Impulsen und Inspirationen, um deine Arbeit im Team und in der Organisation effektiver zu gestalten!Charlotte Bendermacher arbeitet als Agile Coach und Trainerin bei Prowareness WeON. In ihrer Rolle als Agile Coach unterstützt sie Kunden bei ihrer agilen Transformation. Mit ihrem Fokus auf Menschen und Teams, die sie in Bewegung bringt und bei der Zusammenarbeit und gemeinsamen Zielerreichung begleitet, sorgt sie dafür, dass der Wandel im Unternehmen stattfindet. Aus dem Coaching, Training und der Moderation schöpft sie viel Energie. Gemeinsam mit Cleo Kampschuur bietet Charlotte unter anderem Trainings zu agilen Arbeitsmethoden an. Cleo Kampschuur ist Agile Coach bei Prowareness WeON und unterstützt in dieser Rolle und als Scrum Master Kunden bei ihrer agilen Transformation. Sie hat bereits mehrere Organisationen auf ihrem Weg zur Agilität durch Training, Coaching und Moderation begleitet. Cleo hat viel Erfahrung in der Unterstützung von (verteilten) Teams und hat dabei eine große Leidenschaft für Kultur entwickelt. Sie ist Expertin darin, diese Teams zu High-Performern zu entwickeln. Gemeinsam mit Charlotte Bendermacher bietet Cleo Trainings zu agilen Arbeitsmethoden an.Rini van Solingen ist CTO bei Prowareness WeOn. In dieser Rolle unterstützt er Kunden dabei, ihr Unternehmen schneller und agiler aufzustellen. Darüber hinaus lehrt er in Teilzeit als Dozent an der TU Delft und hält regelmäßig Vorlesungen an der Universität Nyenrode. Rini ist vor allem als Speaker und Autor tätig. Sein Spezialgebiet ist die Schnelligkeit und Agilität von Menschen und Organisationen. Jedes Jahr hält er etwa 150 Vorträge zu diesem Thema auf Weiterbildungsveranstaltungen, Konferenzen und Firmenevents. Seine bekanntesten (Management-)Bücher sind: Die Kraft von Scrum (mit Eelco Rustenburg und Henning Wolf, dpunkt.verlag 2014), Der Bienenhirte (dpunkt.verlag 2017), Formel X (mit Jurriaan Kamer, dpunkt.verlag 2019) und Agile (dpunkt.verlag 2020). Übersetzer Rolf Dräther ist freiberuflich als Berater und Coach, Autor und Übersetzer tätig. Dabei ist für ihn Freude bei der Arbeit ein zentraler Erfolgsfaktor und besonderes Anliegen.

Regulärer Preis: 36,90 €
Produktbild für Crafting Docs for Success

Crafting Docs for Success

Developer documentation is a powerful tool in developer relations because it provides all the necessary information during the onboarding process and keeps your users informed on changes such as release notes, status reports and new and updated topics. Using a design thinking approach, this book aims to provide an easy to follow blueprint for building successful developer documentation by using the award winning platformOS developer portal as inspiration.You'll work with practical usable templates, workflows, and tools validated and peer-reviewed by international experts in the fields of documentation, technical writing, developer relations, and UX design. This book reveals the many factors that must be considered while crafting developer documentation, such as hitting the right target audience, designing a seamless onboarding experience, and selecting the right workflows and data analysis methods. You'll delve into this complex mix of topics, each with its unique considerations, and understand why it’s difficult for those working on developer documentation to understand the process, as well as all the necessary ingredients, tools, and resources to overcome that challenge.Crafting Docs for Success is your one-stop resource for empowering your team and community to contribute and help maintain your documentation, as well as further improve diversity and inclusion.WHAT YOU'LL LEARN* Examine how user research facilitates documentation development* Utilize design thinking, community-driven documentation, and Docs as Code* Understand editorial workflows and what happens at each step* Write a style guide from scratch and use it for content production* Review how methods and strategies fall into place during technical implementationWHO THIS BOOK IS FORSoftware developers and designers, documentation maintainers and managers, technical writers, developer relations practitioners and advocates, technical community managers, developer marketers, and start-up founders, CTOs, and CEOsDIANA LAKATOS is an experienced Technical Writer specialized in developer documentation. She developed the documentation processes for the multiple award-winning platformOS Developer Portal and manages all phases of the editorial workflow, creates templates, incorporates best practices, and writes, edits, and reviews content. She spoke about various aspects of building world-class developer docs at conferences like Write The Docs, tcworld, DevRelCon, and API The Docs.1: Approaches2: Discovery3: Editorial Workflow4: Content production5: Implementation6: Contribution7: Communication8: Accessibility9: Sustainability10. Team Roles and Responsibilities11: Metrics12:Tools

Regulärer Preis: 46,99 €
Produktbild für Informatik für Dummies, Das Lehrbuch (2. Auflg.)

Informatik für Dummies, Das Lehrbuch (2. Auflg.)

Sie studieren und müssen sich mit Informatik auseinandersetzen? Dann dürfen Sie sich freuen:Dieses Buch verschafft Ihnen ? so einfach, schnell und unterhaltsam wie möglich ? einen umfassenden Überblick über die praktische, theoretische und technische Informatik. Sie können das Buch ergänzend zur Vorlesung oder zum Selbststudium nutzen. Der Autor kennt die typischen Probleme der Studierenden. Überwinden Sie Ihre Scheu vor Formalismen. Entdecken Sie den Reiz der Computerwissenschaften! Dies ist das perfekte Buch für den Einstieg in die Informatik.E.-G. Haffner studierte an der Universität Kaiserslautern Informatik und Mathematik und promovierte dort. Seit 2002 ist er Professor an der Hochschule Trier mit Lehrverantwortung für die Studiengänge Elektrotechnik, Medizintechnik sowie Wirtschaftsingenieurwesen.

Regulärer Preis: 26,99 €
Produktbild für The DevSecOps Playbook

The DevSecOps Playbook

THE DEVSECOPS PLAYBOOKAN ESSENTIAL AND UP-TO-DATE GUIDE TO DEVSECOPSIn The DevSecOps Playbook: Deliver Continuous Security at Speed, the Chief Information and Information Security Officer at Wiley, Sean D. Mack, delivers an insightful and practical discussion of how to keep your business secure. You’ll learn how to leverage the classic triad of people, process, and technology to build strong cybersecurity infrastructure and practices. You’ll also discover the shared responsibility model at the core of DevSecOps as you explore the principles and best practices that make up contemporary frameworks. The book explains why it’s important to shift security considerations to the front-end of the development cycle and how to do that, as well as describing the evolution of the standard security model over the last few years and how that has impacted modern cybersecurity. A must-read roadmap to DevSecOps for practicing security engineers, security leaders, and privacy practitioners, The DevSecOps Playbook will also benefit students of information technology and business, as well as governance, risk, and compliance specialists who want to improve their understanding of cybersecurity’s impact on their organizations. SEAN D. MACK, MBA, CISO, is the Chief Information Officer at Wiley, an education and research company. He has extensive experience leading DevOps, infrastructure, enterprise applications, security, ad desktop services in the educational technology and publishing industry.

Regulärer Preis: 22,99 €
Produktbild für Impact Measurement and Outcomes Evaluation Using Salesforce for Nonprofits

Impact Measurement and Outcomes Evaluation Using Salesforce for Nonprofits

Conduct impact measurement and outcomes evaluation, with a specific focus on nonprofits, using Salesforce Nonprofit Cloud (aka Salesforce for Nonprofits). As funding grows more challenging for nonprofits, having a robust technology system in place allows nonprofits to better seek out funding and receive more when they do. Readers of this book will be better positioned to ensure the long-term success of their organization and make maximum use of their technology.The book begins with an introduction to Salesforce and to Nonprofit Cloud for users who may be new to the platform. Next, you will learn the fundamentals of impact measurement and outcomes evaluation. You will understand why these are important and discover several frameworks that can be used to select outcomes that make sense for your organization to prove that its work is successful. These frameworks include Social Return on Investment (SROI), Cost-Benefit Analysis (CBA), and Pre and Post Comparison (and others).You will use your chosen framework to develop a logic model or theory of change which demonstrates how the work that nonprofits do translates into the outputs and outcomes that clients experience and that nonprofits seek funding to deliver. After covering the theory, author Dustin MacDonald teaches you how to translate the framework you chose into Salesforce. You will learn how to create reports, dashboards, formula fields, roll up summaries, and other basic Salesforce tools in order to collect the information you need to validate your framework.This book also demonstrates how to report on the outcomes you have achieved, tweak results to improve performance, and see the entire end-to-end experience in practice through a set of case studies. The book concludes with a discussion of advanced tools and techniques available inside Salesforce, such as Einstein Prediction Builder, as well as information on how you can immediately apply what you have learned to your own organization.WHAT YOU WILL LEARN* Understand how to use Nonprofit Cloud to collect and analyze data* Know how to create a theory of change that shows your impact* Become adept at working with impact measurement frameworks* Build everything you need in Salesforce without writing a single line of code* Turn your insights into new funding to keep your organization strongWHO THIS BOOK IS FORSalesforce administrators, nonprofit staff members, and others working at nonprofits who are required to conduct impact measurement and outcomes evaluation. Additionally, business analysts and technical architects who are designing and implementing solutions for nonprofits at implementation partners will benefit from this book. DUSTIN K. MACDONALD is 10x Salesforce Certified, including as a nonprofit Cloud Consultant. He holds an Accredited Professional in Einstein Prediction Builder and is currently a Senior Consultant at a mid-sized Salesforce Implementation Partner that focuses exclusively on nonprofits and public sector organizations. He is a former Affiliate Professor in Data Science at Eastern University in St. David’s, Pennsylvania and holds several degrees: Bachelor of Professional Arts in Human Services, Master of Science in Data Science, and Master of Business Administration. Dustin was motivated to write this book because there are no books available on Nonprofit Cloud for nonprofit users who may lack technical knowledge, and the timing is right as Salesforce is increasing its focus on this vertical.

Regulärer Preis: 52,99 €