Udvidet returret til d. 31. januar 2025

Bøger udgivet af Springer-Verlag Berlin and Heidelberg GmbH & Co. KG

Filter
Filter
Sorter efterSorter Populære
  • af Miguel Figueiredo
    472,95 kr.

    Explore Generative AI and understand its key concepts, architecture, and tangible business use cases. This book will help you develop the skills needed to use SAP AI Core service features available in the SAP Business Technology Platform.You'll examine large language model (LLM) concepts and gain the practical knowledge to unleash the best use of Gen AI. As you progress, you'll learn how to get started with your own LLM models and work with Generative AI use cases. Additionally, you'll see how to take advantage Amazon Bedrock stack using AWS SDK for ABAP.To fully leverage your knowledge, Generative AI with SAP and Amazon Bedrock offers practical step-by-step instructions for how to establish a cloud SAP BTP account model and create your first GenAIartifacts. This work is an important prerequisite for those who want to take full advantage of generative AI with SAP.You will: Master the concepts and terminology of artificial intelligence and GenAI Understand opportunities and impacts for different industries with GenAI Become familiar with SAP AI Core, Amazon Bedrock, AWS SDK for ABAP and develop your firsts GenAI projects Accelerate your development skills Gain more productivity and time implementing GenAI use cases

  • af Reitse van der Wekken
    485,95 kr.

    anage project objectives between supplier and customer. This book introduces a dedicated method for suppliers to follow to ensure supplier and customer expectations are successfully meet. The method integrates a day-to-day high awareness, urgency and focus on the management of all objectives within the project to provide maximum benefit for an organization.You'll learn that formal targets are routinely established at the start of a project and captured in a contract or project charter. Customer expectations, such as timelines and budget, are often pitted against internal day-to-day challenges, such as cost increases and other unexpected changes. These challenges can seem even more daunting as a project progresses.To combat this, you'll follow detailed instructions on how handle such potential roadblocks by applying the established method. Each chapter expands the dedicated method itself and provides insight into this philosophy. In the end you'll have all the necessary prerequisites for a successful implementation of these principles within your organization.You will: Handle day-to-day challenges on a project, such as communication, unexpected changes, cost increases, and more Facilitate the formal and informal targets and project goals Balance customer and supplier expectations

  • af Ahmed Bouzid
    522,95 kr.

    In the fast-evolving digital landscape, understanding the potential of generative AI is a strategic advantage. This book can serve as an easy to read introduction to the topic of the transformative power of AI in content creation, customer engagement, and operational efficiency. By deciphering complex AI concepts into practical insights, we empower decision-makers to envision innovative strategies, foster cross-industry collaborations, and navigate ethical considerations. The book will help executives and business decision makers to harness the immense potential of generative AI responsibly, ensuring data integrity and compliance while fostering a competitive edge. The book is focused on (1) Explaining in jargon-free language what Generative AI, and AI in general, (2) What problems they solve, and (3) What technologies make them possible.What You Will LearnHow generative AI models are built, how they generate new data or content, and the underlying algorithms powering these processesVarious practical applications of generative AI in business contextsThe challenges that could arise during the integration of generative AI into business processesWho This Book is ForThis book is meant to be bought and read by busy executives and business leaders

  • af Donnie Wendt
    485,95 kr.

    This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three concepts. The book is divided into four sections, one addressing each underlying concept and the final section discussing integrating them to harness their full potential.With the expected growth of AI and machine learning (ML), cybersecurity professionals must understand its core concepts to defend AI and ML-based systems. Also, most cybersecurity tools now incorporate AI and ML. However, many cybersecurity professionals lack a fundamental understanding of AI and ML. The book's first section aims to demystify AI and ML for cybersecurity practitioners by exploring how AI and ML systems work, where they are vulnerable, and how to defend them.Next, we turn our attention to security automation. Human-centered cyber defense processes cannot keep pace with the threats targeting organizations. Security automation can help defenders drastically increase the speed of detection and response. This section will discuss core use cases that security teams can implement, including intelligence processing, incident triage, detection, and response. This section will end with strategies for a successful security automation implementation and strategies that can lead to failure.Accelerating the defense is but one side of the equation. Defenders can also implement ACD methods to disrupt and slow the attacker. Of course, ACD spans a broad spectrum, including some that could raise legal and ethical concerns. This section will explore some ACD methods and discuss their applicability, as well as the need to include business, legal, and ethical considerations when implementing them.Security teams often treat AI, automation, and ACD as disparate solutions, addressing specific problems. However, there is much overlap, and security teams must develop a cohesive approach to realize the full potential. The last section combines these three concepts to form a comprehensive strategy. The resulting strategy will have AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker. What You Will Learn: Understand the many uses of AI and ML and the concepts underpinning these technologies. Learn how to protect AI and ML systems by recognizing the vulnerabilities throughout their lifecycle. Integrate AI and ML-based systems to enhance cybersecurity. Develop security automation processes to enhance situation awareness, speed the time to respond, and increase the bandwidth of the limited security operations staff. Develop an ACD strategy to slow the attackers while minimizing legal and ethical concerns. Design a comprehensive strategy with AI as the foundation, incorporating automation to speed up defense and ACD to disrupt the attacker.

  • af Evgenij Smirnov
    531,95 kr.

    Break the vicious circle of designs perpetuating the errors of the past and "just click next and accept the defaults" implementations preventing a secure and reliable future. This book looks at the typical patterns and antipatterns in Active Directory (AD) design, deployment, and operations and provides an approach to building and operating AD that is based on engineering (analyzing and fulfilling requirements) rather than design (formulating requirements). The book starts with an historical overview of AD and its future 25 years later. You then learn about the challenges that organizations running AD are facing today followed by understanding how to avoid them while learning modern requirements for more efficient and effective AD performance. After that, you go through business requirements influencing the AD topology along with ways to engineer information lookup to protect high-value objects. The book looks at two main protocols and the many dialects that AD offers to engineer an authentication service that fulfills modern requirements while leaving insecure legacy configurations behind. Managing AD from both the security and usability perspectives is discussed next in the book. Building, operating, and transitioning to a modern AD is demonstrated in detail. The book guides you with the next steps of your journey to achieve a secure and reliable AD. After reading this book, you will be able to bridge the gap between the two approaches by analyzing real-world business requirements, explaining the decision-making process in both design and engineering, and ultimately providing concrete engineering guidelines for typical implementation scenarios. What Will You Learn Build a modern Active Directory (AD), leaving behind design antipatterns that are not valid anymore Build a "secure by design" AD and accommodate legacy technology without compromising the overall security Understand advanced AD functionality such as controlling object visibility and partitioning Kerberos authentication by Authentication Policies Operate a modern AD, react to changing business requirements, and respond to ever-evolving security threats

  • af Dillon Dayton
    547,95 kr.

    Explore Snowflake's core concepts and unique features that differentiates it from industry competitors, such as, Azure Synapse and Google BigQuery. This book provides recipes for architecting and developing modern data pipelines on the Snowflake data platform by employing progressive techniques, agile practices, and repeatable strategies.You'll walk through step-by-step instructions on ready-to-use recipes covering a wide range of the latest development topics.  Then build scalable development pipelines and solve specific scenarios common to all modern data platforms, such as, data masking, object tagging, data monetization, and security best practices. Throughout the book you'll work with code samples for Amazon Web Services, Microsoft Azure, and Google Cloud Platform. There's also a chapter devoted to solving machine learning problems with Snowflake.Authors Dillon Dayton and John Eipe are both Snowflake SnowPro Core certified, specializing in data and digital services, and understand the challenges of finding the right solution to complex problems. The recipes in this book are based on real world use cases and examples designed to help you provide quality, performant, and secured data to solve business initiatives.You will: Handle structured and un- structured data in Snowflake. Apply best practices and different options for data transformation. Understand data application development.  Implement data sharing, data governance and security.

  • af Engy Fouda
    692,95 kr.

    Harness the capabilities of Python and gain the expertise need to master data science techniques. This step-by-step book guides you through using Python to achieve tasks related to data cleaning, statistics, and visualization.You'll start by reviewing the foundational aspects of the data science process. This includes an extensive overview of research points and practical applications, such as the insightful analysis of presidential elections. The journey continues by navigating through installation procedures and providing valuable insights into Python, data types, typecasting, and essential libraries like Pandas and NumPy. You'll then delve into the captivating world of data visualization. Concepts such as scatter plots, histograms, and bubble charts come alive through detailed discussions and practical code examples, unraveling the complexities of creating compelling visualizations for enhanced data understanding.Statistical analysis, linear models, and advanced data preprocessing techniques are also discussed before moving on to preparing data for analysis, including renaming variables, variable rearrangement, and conditional statements. Finally, you'll be introduced to regression techniques, demystifying the intricacies of simple and multiple linear regression, as well as logistic regression.You will: Understand installation procedures and valuable insights into Python, data types, typecasting Examine the fundamental statistical analysis required in most data science and analytics reports Clean the most common data set problems Use linear progression for data prediction

  • af Satej Kumar Sahu
    531,95 kr.

    Learn how to protect PHP applications from potential vulnerabilities and attacks. As cyberattacks and data breaches continue to rise, it's crucial for developers and organizations to prioritize security in their PHP applications. The book offers an all-encompassing guide to securing PHP applications, covering topics ranging from PHP core security to web security, framework security (with a focus on Laravel), security standards, and protocol security.After examining PHP core security and essential topics, such as input validation, output encoding, secure session management, and secure file handling, you'll move on to common security risks in PHP applications and provides practical examples to demonstrate effective security measures. From there, you'll delve into web security, addressing XSS, SQL injection, and CSRF, reviewing in-depth explanations and mitigation techniques.A significant portion of the book focuses on Laravel's built-in security features, guiding readers to avoid common pitfalls. Industry-standard security protocols like HTTP, OAuth, and JSON Web Tokens are explained with demonstrations for how to effectively use them to ensure integrity, confidentiality, and authenticity in web applications. Additionally, protocol security is discussed, including secure communication, file transfer protocols (SFTP), and email handling. Security in cloud and hybrid environments is also discussed.This book's comprehensive and inclusive approach spans a wide range of security topics related to PHP and ensures that no critical areas are overlooked. It goes beyond theoretical concepts by providing practical guidance and actionable steps. It includes code snippets, real-world examples, case studies, and hands-on exercises, enabling you to apply the knowledge gained in practical scenarios. Building Secure PHP Applications provides a holistic approach to security, empowering you to build robust and resilient PHP applications.

  • af Konrad Kokosa
    992,95 kr.

    Understand .NET memory management internal workings, pitfalls, and techniques in order to effectively avoid a wide range of performance and scalability problems in your software. Despite automatic memory management in .NET, there are many advantages to be found in understanding how .NET memory works and how you can best write software that interacts with it efficiently and effectively. This book is your comprehensive guide to writing better software by understanding and working with memory management in .NET, from Framework up to .NET 8.Thoroughly vetted by the .NET Team at Microsoft, this book contains 25 valuable troubleshooting scenarios designed to help diagnose challenging memory problems. You will also benefit from a multitude of .NET memory management "rules" to live by that introduce methods for writing memory-aware code and the means for avoiding common, destructive pitfalls.What You'll Learn Understand the theoretical underpinnings of automatic memory management Take a deep dive into every aspect of .NET memory management, including detailed coverage of garbage collection (GC) implementation, that would otherwise take years of experience to acquire Get practical advice on how this knowledge can be applied in real-world software development Use practical knowledge of tools related to .NET memory management to diagnose various memory-related issues Explore various aspects of advanced memory management, including use of Span and Memory types

  • af Ronald Steelman
    242,95 kr.

    This book is your essential guide to mastering Snowflake's SQL API, offering a comprehensive understanding of this powerful tool. In today's data-driven world, robust, flexible, and scalable solutions are crucial, and Snowflake's Data Cloud platform is a game-changer in cloud data warehousing and analytics. The book includes examples using both Snowflake and the Laravel PHP Framework, assuming basic knowledge of SQL and Laravel. Key topics include SQL API development, SQL basics, advanced techniques, data security, performance tuning, best practices for data warehousing, integrations, real-world use cases, future trends in data analytics, and leveraging PHP in Laravel for dynamic web applications. This book equips you with the skills to unlock insights, make data-driven decisions, and stay ahead in your industry. Whether you're aiming to advance your career, enhance your organization's data infrastructure, or confidently make data-driven decisions, Mastering Snowflake SQL API with Laravel 10 is a must-have resource for excelling in integrated data analytics and cloud data warehousing. What You Will Learn Master SQL fundamentals and advanced techniques Explore data loading, security, and performance optimization Keep up-to-date on best practices for efficient data warehousing Gain insights into real-world use cases Prepare for future Snowflake and data innovations

  • af Volker Caspari
    531,95 kr.

  • af Werner Gross
    397,95 kr.

  • af Hans-Hennig von Grunberg
    522,95 kr.

  • af Christian Mittelstedt
    997,95 kr.

  • af Reiner M. Dreizler
    877,95 kr.

  • af Oliver Kayser
    592,95 kr.

  • af Andreas Korn-Muller
    301,95 kr.

  • af Christian Mittelstedt
    623,95 kr.

    This book contains an introduction to the fundamental principles of the theory of stability of elastic bodies and structures. Beginning with very basic explanations of stability problems, this book starts with the treatment of systems of rigid beams, before beams under normal force and bending as well as the classical field of beam buckling are treated. For the case of beam buckling, an energetic consideration then follows, which forms the basis for a series of approximation methods. In addition to beam buckling, the stability cases of lateral-torsional buckling and lateral buckling are also of fundamental importance, to each of which a separate chapter is dedicated. This is followed by a discussion of plate buckling, and the book concludes with an introduction to shell buckling. This book is aimed at students at technical colleges and universities, as well as engineers in practice and researchers in the engineering sciences.

  • af Rico Baldegger
    627,95 kr.

  • af Kathleen Thiels
    328,95 kr.

  • af Christoph Meinel
    301,95 kr.

    How does the most important technology of our time - the Internet and WWW - work? The authors explain in simple language and in short the individual technical building blocks and organizational structures, behind the greatest innovation of our time. Only those who know how the technologies that determine our everyday lives can deal with them confidently and in souvereignity. Although digitalization is shaping our daily lives, the technologies behind the Internet and WWW remain obscure to most people. This book provides the key to understanding the huge developments of our time.About The AuthorsChristoph Meinel is the Founding President of the German University of Digital Sciences and previously has been Director and CEO of the Hasso Plattner Institute. He heads the Internet Technologies and Systems department and is author of numerous scientific publications, developer of large digital systems, such as openHPI.de and HPI Schul-Cloud, and a sought-after consultant for politics and business.Maxim Asjoma is Head of Public Partnerships at Hasso Plattner Institute and holds a doctorate in philosophy with a specialization in economics and digitalization. The focus of his work interest is how digital technologies are transforming societies.

  • af Hans-Dieter Barke
    531,95 kr.

  • af Marcus J. Neuer
    439,95 kr.

  • af Lydia Evelyn
    531,95 kr.

    Unlock the future of software development and empower yourself to elevate your Python applications by harnessing the power of AI as this field continues to grow and evolve. Perfect for beginner to intermediate Python programmers, this book breaks down the essentials of using ChatGPT and OpenAI APIs.You'll start with the basics, learning to authenticate, send prompts, generate responses, test in the Playground, and handle errors with ease. Each chapter includes hands-on exercises that bring concepts to life, demonstrating different API functionalities and practical applications. You'll master models like GPT-4o, GPT-4, GPT-3.5, Whisper, and DALL-E, enabling you to enhance your applications with cutting-edge AI.Discover how generative AI tools like ChatGPT can automate tedious tasks rather than replace jobs. Leverage ChatGPT's powerful Natural Language Processing (NLP) capabilities to handle various formats of unstructured text within your Python apps. Quickly see how easy it is to use ChatGPT as your AI-pair programmer, boosting your productivity and speed.This step-by-step guide will have you creating intelligent chatbots that can automatically process messages from Slack or Discord. With Beginning ChatGPT for Python, you'll master the ChatGPT and OpenAI APIs, building intelligent applications that offer a personalized and engaging user experience.You will: Connect with the ChatGPT and OpenAI APIs and send effective prompts. Harness parameters like temperature and top_p to create unique and engaging responses from ChatGPT. Create an intelligent assistant bot for Slack that automates tasks and enhances productivity. Develop a bot that can moderate conversations and manage communities on Discord. Add context to your prompts to get more accurate and relevant responses.

  • af Dr. Gomathi S
    531,95 kr.

    Embark on a journey into Dynamics 365 Business Central development with this comprehensive guide to the MB-820 certification exam. This book will help you prepare for the examination and also help you understand Dynamics 365 Business Central better with real-world examples, exercises, and tips. The book starts with an introduction to the Exam pattern to help you understand the overall requirements. Next, you will delve into the fundamentals of Dynamics 365 Business Central Development, exploring its development tools and environment. After that, you will explore the installation, development, and deployment processes for Dynamics 365 Business Central. AL objects for Dynamics 365 Business Central are discussed next and you will go through creating and modifying AL objects along with their best practices. Further coverage is given to development tools essential for Dynamics 365 Business Central, followed by their integration with other applications. To end your journey, you will be guided with practice tests and exercises to help you prepare for the exam.After reading this book, you will be able to prepare yourself for the MB-820 Exam and be equipped with the basics of Dynamics 365 Business Central. What You Will Learn Understand application life cycle management principles and techniques Gain proficiency in debugging and troubleshooting Dynamics 365 Business Central solutions Apply advanced development techniques and concepts in real-world scenarios Understand AL language syntax and best practices

  • af William Hawkins
    547,95 kr.

    This is a comprehensive exploration into the world of Artificial Intelligence, designed to bridge the gap between theoretical concepts and practical, real-world applications.This book unravels the mystique of AI, breaking down its components into understandable elements. From the early dawn of AI's inception to its current state of rapid evolution, we cover the essential building blocks necessary for leveraging AI in business, and personal development, and understanding its broader impacts on society. Through an engaging conversational format, readers are guided through the intricacies of AI, covering topics such as machine learning, AI governance,, data security, and the ethical challenges facing AI today. This book is an invaluable resource for those looking to understand the fundamentals of AI, its practical applications, and its significant implications for the future.After reading this book, you will be able to integrate AI into your business strategies and learn the intricacies of AI advancements.What You Will Learn: Key concepts and definitions within AI, including types of AI, machine learning, and neural networks and how they are utilized in AI apps like M365 Copilot Practical applications of AI for personal and business growth, focusing on the pillars of using AI to evolve these fronts effectively and sustainably How AI is transforming businesses and what organizational shifts must be made to realize the value Navigating the challenges and ethical considerations in AI to ensure informed and responsible usageWho This Book Is For:Professionals looking to integrate AI into their business strategies or organizations.

  • af Puthiyavan Udayakumar
    531,95 kr.

    Unlock the potential of IoT with Microsoft Azure through this comprehensive guide, designed to elevate your understanding and implementation of cutting-edge IoT network and security solutions. Whether you are a beginner or a seasoned professional, this book offers clear, actionable insights to help you master the intricacies of IoT with Azure. This book equips you with the expertise to design and deploy secure, efficient, and scalable IoT networks using Microsoft Azure. It is your key to becoming a proficient IoT architect and security specialist. What You Will Learn Know the fundamentals of IoT networks and security, including key concepts, terminologies, and the importance of securing IoT deployments Dive into Azure Edge Services to design and deploy edge solutions that bring computation and data storage closer to the data source, enhancing speed and efficiency Explore the architecture and deployment of Azure IoT networks to gain practical knowledge on setting up scalable, reliable, and secure IoT networks tailored to your needs Study best practices and strategies for securing your IoT environment and ensuring robust protection against emerging threats Monitor and manage your IoT solutions effectively via tools and techniques for maintaining optimal performance, diagnosing issues, and ensuring seamless operation of your IoT networks Who This Book Is ForIoT network and security engineers, architects, and Azure IoT developers

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.