Marknadens största urval
Snabb leverans

Böcker utgivna av Springer-Verlag Berlin and Heidelberg GmbH & Co. KG

Filter
Filter
Sortera efterSortera Populära
  • av Robin Bauer
    1 305,-

    This atlas with over 250 illustrations and videos is a modern basic work on palpation for physiotherapists. Members of the medical-therapeutic sector face the daily challenge of having to transfer theoretical knowledge into practice. The Atlas of Palpation addresses this process through its multimedia design. Evidence-based technical texts, the most modern illustrations and practical teaching videos illustrating structures and examination procedures address both students and therapists working in practice. All the essential structures of the body are shown in three-dimensional perspective, so that a basic understanding of interrelationships and movement patterns is conveyed. The palpation grips are explained in an understandable way and described in a comprehensible way.The instructional videos were specially made by the authors and the latest technical equipment in terms of camera, lighting elements and sound ensures the highest possible quality.The book is clearly divided into different body systems, which include bony, articular, ligamentous, muscular, nervous, and vascular system. A clear subdivision into subheadings makes it possible to quickly find the desired content. The multimedia approach of this book represents a unique selling point in the medical-therapeutic sector in the field of palpation. This new type of "living" book opens up completely new perspectives for readers when using it.Trainees and students will find here an optimal introduction for professional palpation; for already experienced physiotherapists it is an ideal reference book for tricky questions.Download the SN More Media app for free, scan a link with play button and access directly on your smartphone or tablet.

  • av Kodi A. Cochran
    745,-

    This book covers all topics and requirements of the CompTIA A+ certification exam. It will allow readers to easily understand the concepts, information, and skills needed to obtain the associated certification. CompTIA A+ certification is at its core an entry-level certification to the information technology world, including cybersecurity. It is comprised of a set of two exams (Exams 220-1101 & 220-1102) created by IT industry professionals that validate skills needed for entry-level IT jobs, including cybersecurity. This certification stands as baseline proof of knowledge of these topics and is largely sought by recruiters. Main exam topics include hardware, networking, mobile devices, security, Windows operating system, other IOS technologies, software troubleshooting and operations procedures. This book has been designed to follow the core requirements for the full scope of the CompTIA A+ certification, covering both examination test requirements.  It has been formatted to follow a logical and easy to follow order to allow a foundational level of understanding prior to moving onto more advanced topics. The book will provide all readers with the appropriate knowledge and information to have a foundational level of many Information Technology components.  It will primarily serve the newer entrants to the field but will also support more experienced individuals that are looking towards certifications. What You Will Learn:Effective communication with clients and colleagues and interpersonal skills for collaboration in team environments. Understanding of motherboard components and architecture. Knowledge of CPU types and socket compatibility. Installation and configuration of operating systems. Software troubleshooting techniques. Installation and configuration of Windows, Linux, and macOS. Management of system settings and user accounts. Identification of laptop components and peripherals. Maintenance procedures for laptops, including cleaning and battery management. Configuration of mobile device settings and preferences. Understanding of mobile operating systems and app installation procedures. Troubleshooting common printer hardware and software issues. Basic networking concepts, including IP addressing and subnetting. Configuration of network devices such as routers and switches. Configuration and management of wireless access points. Implementation of wireless security protocols such as WPA2 and WPA3. Understanding of cloud service models (IaaS, PaaS, SaaS). Deployment and management of virtual machines in the cloud. Recognition of common security threats and vulnerabilities. Implementation of security best practices for data protection. Who this book is for:Anyone that is looking to get into the information technology or cybersecurity fields. This would also include academics looking to pursue bachelor's or master's degrees, as often programs include the A+ certification. There is no necessary prior skill experience or knowledge needed.

  • av Peter von Oven
    745,-

    VMware Workstation is a software solution that provides a type-2 hypervisor, or desktop hypervisor, that runs on x64 Windows and Linux-based operating systems. It enables users to create and run virtual machines, containers, and Kubernetes clusters simultaneously on their physical devices without having to reformat or dual-boot the underlying device.There are several use cases for VMware Workstation. For IT pros, it allows them to test applications andoperating system builds, as well as enable remote control of vSphere datacenter infrastructure. Developers can run multiple different operating systems or different versions of operating systems on a single device giving them the platform flexibility to test, develop, and troubleshoot applications cost-effectively.Finally, for the greater workforce, VMware Workstation can enable BYOD device initiatives allowing employees to run a full corporate environment on their device without deleting or reformatting it. Learning VMware Workstation Pro for Windows - Part 2 provides the reader with a practical, step-by-step guide to creating and managing virtual machines using VMware Workstation, starting with an overview of hypervisors and desktop hypervisors. Next, it talks about each resource, such as CPU, memory, and networking, and how these are configured in a virtual environment. After that, it demonstrates the installation of VMware Workstation, configuration, and then building and managing different virtual machines running on different operating systems such as ChromeOS, and Linux, and building an ESXi lab environment. Towards the end, readers will learn how to use command line tools, such as the REST API, and vmrun, before going on to discuss upgrading and troubleshooting your VMware Workstation environment. By the end of this book, readers will have full knowledge of VMware Workstation Pro. This book is a continuation of " Learning VMware Workstation Pro for Windows - Part 1 " where readers learn how to build and manage different virtual machines running on different operating systems and build an ESXi lab environment with VMware Workstation.  You Will: Learn how to run containers on a VMware workstation Understand how to use the command line to configure and control Workstation Pro and virtual machines Practice the use of REST API for Workstation Pro

  • av Christopher Coutinho
    745,-

    Master the intricacies of Unity's character controllers with a deep dive into Unity's Starter Assets. This book is an essential resource for game developers looking to elevate their skills in Unity game development, offering detailed insights and practical examples to help you create complete, sophisticated, high-performance systems.Part of the Apress cookbook series, the recipes in this book provide a comprehensive guide to creating dynamic and immersive character interactions, equipping developers with the skills necessary to build responsive character controllers for both first-person and third-person perspectives. By leveraging pre-configured assets, developers can streamline the creation process, ensuring optimized performance and enhanced player experiences.Explore Unity's New Input System, a revolutionary framework designed to enhance control and flexibility in game development. Delve into the art of architecting enemy AI using Finite State Machines (FSMs) to create intelligent and responsive behaviors. Build a sophisticated melee combat system inspired by top-tier action games. Unlock the potential of advanced player movement with a focus on parkour mechanics. Implement a robust shooter weapon system that enhances gameplay through strategic weapon interactions. Optimize game performance through efficient object pooling techniques.You will: Implement re-bindable controls and create sophisticated input schemes that elevate gameplay interactions. Set up navigation and pathfinding, creating AI that can dynamically navigate, pursue, and interact with players. Craft a melee combat system that offers a dynamic and engaging player experience Create fluid and responsive parkour mechanics that enhance the realism and excitement of your game. Build a comprehensive shooter weapon system Develop object pooling systems that enhance performance and resource management, ensuring a seamless and immersive gaming experience.

  • av Jayven Nhan
    745,-

    Embark on a journey to build an augmented reality world. This book puts theory into practical application by building unique augmented reality apps specific to each chapter's topic. You'll learn to engineer successful, well-designed, and comprehensive augmented reality applications for iOS devices. This updated edition has been thoroughly revised to cover the latest advancements in iOS 17 and Xcode 15, equipping you with the knowledge and tools to build cutting-edge augmented reality experiences. Starting with the foundation of augmented reality on Apple platforms, you will understand the building blocks and inner workings of the technologies that power augmented reality. Then, delve into the practicalities of building AR apps using ARKit, SceneKit, SpriteKit, RealityKit, and integrating with SwiftUI and advanced features like ReplayKit for recording experiences. Explore augmented reality app business models, designs, and content for the ultimate user experience. This book covers a wide range of ARKit APIs and topics, including surface detection, 3D objects implementation, horizontal plane detection with raycast, physics by launching rocket ships, light estimation, 2D image recognition, world-mapping data for persistence, immersive audio experiences, real-time image analysis, machine learning, face and body motion capture, people occlusion, and more. Chapter by chapter, this book guides you to become an advanced augmented reality engineer for Apple's platforms. By the end of the book, you'll have acquired the necessary mental models and tools to engineer delightful experiences in Apple's augmented reality ecosystem. What You'll Learn Construct AR apps using SceneKit, SpriteKit, RealityKit, and integrate with SwiftUI. Leverage ARKit for advanced features like face and body motion capture, people occlusion, and world tracking. Incorporate 3D objects, surface detection, computer vision, and body motion capture in your apps. Implement persistence in AR experiences and create shared experiences using Multipeer Connectivity.

  • av Thomas Mailund
    625,-

    Build working implementations of hash tables, written in the C programming language. The new and revised Second Edition has been enhanced with simplified code and more comprehensive explanations, aimed at improving clarity and comprehension while exploiting the latest features in C programming.This book starts with simple first attempts devoid of collision resolution strategies. It then progresses through improvements and extensions illustrating different design ideas and approaches, followed by experiments to validate the choices. You will learn how hash tables, when implemented and used appropriately, are exceptionally efficient data structures for representing sets and lookup tables, providing low overhead, constant time, insertion, deletion, and lookup operations. The Joys of Hashing walks you through the implementation of efficient hash tables and the pros and cons of different design choices when building tables. The source code used in the book is available on GitHub for your re-use and experiments.What You Will Learn Master the basic ideas behind hash tables Carry out collision resolution, including strategies for handling collisions and their consequences for performance Resize or grow and shrink tables as needed Store values by handling when values must be stored with keys to make general sets and maps

  • av Venkateswara Vadlamani
    745,-

  • av Aamiruddin Syed
    745,-

    Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has become mission critical. This book offers a comprehensive guide to understanding and implementing next-generation strategies that protect these intricate networks from most pressing risks.This book begins by laying the foundation of modern software supply chain security, exploring the shifting threat landscape and key technologies driving the future. Delve into the heart of how AI and IoT are transforming supply chain protection through advanced predictive analytics, real-time monitoring, and intelligent automation. Discover how integrating application security practices within your supply chain can safeguard critical systems and data.Through real-world case studies and practical insights, learn how to build resilient supply chains equipped to defend against sophisticated attacks like dependency confusion, backdoor injection, and adversarial manipulation. Whether yoüre managing a global software operation or integrating DevSecOps into your CI/CD pipelines, this book offers actionable advice for fortifying your supply chain end-to-end.You Will: Learn the role of AI and machine learning in enhancing supply chain threat detection Find out the best practices for embedding application security within the supply chain lifecycle Understand how to leverage IoT for secure, real-time supply chain monitoring and controlWho Is This Book ForThe target audience for a book would typically include professionals and individuals with an interest or involvement in cloud-native application development and DevOps practices. It will cover fundamentals of cloud-native architecture, DevOps principles, and provide practical guidance for building and maintaining scalable and reliable applications in a cloud-native environment. The book's content will cater to beginner to intermediate level professionals seeking in-depth insights.

  • av Alexsandro Souza
    625,-

    Immerse yourself in this indispensable resource for leaders tasked with the challenge of building or managing effective software development teams. This book is based on practical wisdom, offering actionable guidance to foster high-performing teams that excel in their projects.Despite the pivotal role leadership plays in a team's success, there aren't many companies that employ structured, best-practice-driven leadership methods. The core of the book covers several critical areas essential for any tech leader's success: building high-performance teams, project management, code quality, software design and architecture, software development life cycle (SDLC), software quality insurance, observability, technology and business alignmentThe relevance of structured, principled leadership in tech has never been more important. Tech Leadership Playbook aims to equip leaders with the knowledge and tools necessary to navigate the challenges of evolving business successfully.What You Will Learn Establish industry-proven strategies for building and sustaining high-performance teams Empower teams through mission driven ownership and autonomy Reduce development cost through effective leadership Implement real Agile project management culture Gain a solid understanding of different software design architectures Leverage architectural principles to design robust and maintainable software systems Improve Code Quality with strategic SDLC practicesWho This Book is ForSenior engineers, tech leaders, engineering managers, CTO, CIO, project managers, agile coaches, and founders

  • av Alexander Rees-Evans
    685,-

    Gain the necessary technical skills, tools, and insights to succeed in the crypto working environment. Changing market conditions have created new opportunities and working conditions. This book goes beyond just getting a job, as it shares a myriad of hidden tips on how to thrive within this constantly evolving ecosystem. Through examples and detailed typologies, you'll work out which crypto job is the best fit for you.You'll begin by reviewing some fun facts and anecdotes illustrating life in a Web3 environment, with a careful examination of the various roles in crypto, blockchain, and digital assets. You'll then compare roles in the traditional corporate and financial environments with those in the crypto world from a risk and reward perspective. From there you'll prepare for crypto job interviews with a focus on what to expect and fine-tuning the necessary expertise to excel. Different types of contracts, the onboarding process, communication tools, the intricacies of video conferences, internal storage, and various crypto-specific operational skills will all be clearly explained as well.So You Want to Work in Crypto provides all the strategies you'll need to stay ahead of the curve in the ever-changing crypto world.You will: Examine what job positions exist in Web3 and how to obtain the right one for you. Prepare yourself for the Web3 environment and the type of job you will get. See how to strategically evolve your career in the world of crypto.

  • av Dr. Anil Kumar Rangisetti
    745,-

    Explore virtualized networking environments through the Cloud, Edge, and 5G core networks, and their applications. This book covers the primary approaches related to setting up and experimenting with related cloud and networking environments using virtual networks, and virtual network functions.You'll start by experimenting with future networking environments and learn a variety of Docker basics and essential networking skills. Specifically, containers, networking, volumes, iptables (for Docker environment security) and default orchestration features are discussed to help set up custom cloud, edge, and 5G core networking environments. Hands-on activities related to Docker networking and services features for publishing, scaling, and monitoring of services are also provided. By the end of Part 1, you'll be able to set up a variety of custom networking environments easily using Docker compose features and secure the set-up using iptables.Part 2 introduces Network Function Virtualization (NFV) architecture, and its roles in Cloud and 5G core networks. You'll learn to deploy an open source 5G core platform from OpenAirInterface (OAI) using Docker. Then, you'll set up and evaluate Virtual Network Functions (VNF) over suitable virtual networks. Hands-on activities are featured to guide you through the process of setting up and deploying VNFs such as DHCP, DNS, and proxy servers.Finally, Part 3 discusses key virtual networks such as IP VLANs, MAC VLANs, and overlay networks using Docker cluster setups. You'll use interesting hands-on activities to easily experiment and learn cloud and 5G core network set-up related virtual networks, overlay networks, and network slicing. When done, you'll be able to set up a variety of VNFs, carefully deploying VNFs, and conducting slicing activities over Docker cluster setups.

  • av Stefan Muller-Stach
    625,-

    Inspired by recent developments in dependent type theory and infinity categories, this book presents a history of ideas around the topics of truth, proof, equality and equivalence. Besides selected ideas of Platon, Aristoteles, Leibniz, Kant, Frege and others, the results of Gödel and Tarski on incompleteness, undecidability and truth in deductive systems and their semantic models are covered. The main focus of this textbook is on dependent type theory and its recent variant homotopy type theory. Such theories contain identity types, which give a new understanding of equality, symmetry, equivalence and isomorphism in a conceptual way. The interaction of type theory and infinity category theory yields a new paradigm for a structural view on mathematics. This supports the tendencies towards formalising mathematics with the help of proof assistants.This book was first published in German. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content.

  • av Anil Kumar Rangisetti
    745,-

    Learn how to easily design and implement a software system using object-oriented programming. Through hands-on activities, this book equips you with the real-world practice needed to master OOP skills that can be applied universally across any programming language.This book is dedicated to bridging the gap between theoretical concepts and practical implementation in software development using OOP. Readers will first understand the importance of OOP in handling software complexities before learning how to model real-world problems through access control, extendible object design, and object relationships. Specifically, the author discusses how to use inheritance, association, and polymorphism concepts for implementing reusable and easy-to-use complex software. More importantly, this book covers design patterns and event-driven programming for learning how to model complex interactions among various objects of the software system to implement various use cases.Unlike existing books on OOP which teach syntax and semantics through standard examples, this book leverages an immersive learning experience through a variety of real-world use cases, applications, games, and system software. While written in C++, the skills can be applied to any OOP language of the reader's preference. The book's last chapters will quickly introduce Python and Solidity languages for learning advanced technologies. By the end, novice and seasoned developers will know how to implement practical and reusable software systems with confidence.What You Will Learn Apply OOP concepts through real-time use cases: games, applications software (online shopping, reservations, etc.), system software (protocols, simulators, etc.), and modeling and implementation using C+ Design and implement reusable and extendible software with OOP Understand the importance of design patterns and learn how to use them for solving real-time issues Use event-driven programming for implementing complete interactions of complex application software, system software, and simulators Implement OOP using C++ features and discover Python and Solidity constructs for OOP

  • av Ron Veen
    685,-

    Discover the exciting new APIs introduced by Java's Project Loom. This quick guide covers all the essential concepts the Java developer needs in order to understand virtual threads, structured concurrency, and scoped values.Authors Ron Veen and David Vlijmincx clearly explain the superiority of virtual threads, introduced in Java 21, over the traditional Java threads of the past 25 years. Then they dive into how structured concurrency streamlines interactions by treating related threads as a unified unit of work, akin to the impact of structured programming on regular programming. From there, the authors explore the third Project Loom API and scoped values, clarifying their advantages over regular ThreadLocals and providing efficient usage insights. The book concludes with an exploration of common scheduling strategies.By the end of this book, you will have a solid understanding of the concepts behind Project Loom and will be able to immediately apply this knowledge to your own code .What You Will Learn Discover what virtual threads are, why they were created, and how to use them in your code Gain insight into how concurrency improves the observability of code Write your own StructuredTaskScopes tailored to your needs Understand why you should replace ThreadLocals with Scoped Values Know the different strategies for multithreaded computer programs

  • av Naveed Ahmed
    745,-

    Unlock the full potential of Microsoft Lists, an indispensable tool within the Microsoft 365 suite for tracking and organizing information. This book is your comprehensive guide, from the fundamentals to the advanced capabilities of Microsoft Lists, and will help you improve productivity and foster collaboration. Whether yoüre making a basic to-do list or managing a complex inventory system, Lists is built for a broad spectrum of users, from beginners to professionals, catering to diverse enterprise and consumer use cases.The book provides thorough coverage of a wide array of topics, from the history of the product and initial setup to the entire set of features it offers. Insights are presented on using templates, optimizing columns, managing your lists, mastering the views, JSON features, and the various sharing and collaboration tools to utilize the product for maximum productivity. The book includes the latest features, such as commenting, Lists forms, real-time presence, and an in-depth look at the mobile experience.This guidebook is designed to transform your approach to information tracking and management. It offers practical examples, scenarios, and step-by-step instructions, complemented by rich visuals. The book is ideal for enterprises seeking to boost team productivity and also for individuals who wish to manage information with friends and family. What You Will Learn Optimize information management and manage lists like a pro, with list templates, custom columns, views, and JSON customization Boost collaboration through sharing and commenting, and by employing Microsoft's security and privacy features Maintain productivity on the go by navigating and managing lists on mobile devices, keeping your information accessible anywhere Enhance productivity by connecting Microsoft Lists with other products in the Microsoft 365 ecosystem Who This Book Is ForBusiness professionals. IT administrators, and individuals keen on leveraging Microsoft Lists within the Microsoft 365 ecosystem

  • av Guillermo Guillen
    685,-

    Use Python to develop Rasperry Pi projects to solve common digital image processing and IoT problems. Using a free IoT server yoüll tackle fundamental topics and concepts behind theses two areas. This second edition includes new content on Artificial Intelligence and updated sensor guidance to help you better explore virtual animations, create a homemade spectrometer, and master object classification with Edge Impulse.Start by creating a system to detect movement with a PIR motion sensor and a Raspberry Pi board. Use the MQ2 gas sensor and a Raspberry Pi board as a gas leak alarm system to detect dangerous explosive and fire hazards. Then train your system to send the captured data to the remote server ThingSpeak. Yoüll also develop a weather station with your Raspberry Pi. Using the DHT11 (humidity and temperature sensor) and BMP (barometric pressure and temperature sensor) in conjunction with ThingSpeak and X, you can receive real time weather alerts from your own meterological system!Spectral sensers used with the Raspberry Pi include the AS7262 (six colors), and AS7263 (near infrared) for the construction of a filter spectrometer, sensing colored solutions, and assessing plant foliage health. Finally, expand your skills into the popular machine learning world of digital image processing using OpenCV and a Pi. Make your own object classifiers and finally manipulate an object by means of an image in movement. This skillset has many applications, ranging from recognizing people or objects, to creating your own video surveillance system.With the skills gained from Sensor Projects with Raspberry Pi, you'll be well-equipped to explore other applications in mobile development and electrical engineering as well. What You'll Learn Work with ThingSpeak to receive X alerts from your systems. Cultivate skills in processing sensor inputs that are applicable to mobile and machine learning projects. Incorporate sensors into projects to make interactive devices. Experiment with virtual scenarios and objects. Create Python and Pygame games that contain virtual scenarios and animations. Detect colored solutions and assess the plant foliage health.Who This Book Is ForHobbyists and makers working with robotics and IoT. Electronic engineers and programmers who would like to expand their familiarity with basic sensor projects.

  • av Sanjeev Pulapaka
    625,-

    This is your guide book to Generative AI (GenAI) and its application in addressing real-world challenges within the public sector. The book addresses a range of topics from GenAI concepts and strategy to public sector use cases, architecture patterns, and implementation best practices. With a general background in technology and the public sector, you will be able to understand the concepts in this book.The book will help you develop a deeper understanding of GenAI and learn how GenAI differs from traditional AI. You will explore best practices such as prompt engineering, and fine-tuning, and architectural patterns such as Retrieval Augmented Generation (RAG). And you will discover specific nuances, considerations, and strategies for implementation in a public sector organization. You will understand how to apply these concepts in a public sector setting and address industry-specific challenges and problems by studying a variety of use cases included in the book in the areas of content generation, chatbots, summarization, and program management. What You Will Learn GenAI concepts and how GenAI differs from traditional AI/ML Prompt engineering, fine-tuning, RAG, and customizing foundation models Strategy, methodologies, and frameworks for the public sector Public sector use cases in the areas of content generation, summarization, and chatbots, plus program management, analytics, business intelligence, and reporting Architecture and design patterns Implementation, operations, and maintenance of GenAI applications Who This Book Is ForTechnology and business leaders in the public sector who are new to AI/ML and are keen on exploring and harnessing the potential of Generative AI in their respective organizations.

  • av Armstrong Subero
    745,-

    Are you tired of copying and pasting code into your embedded projects? Do you want to write your own code from scratch for microcontrollers and understand what your code is doing without all the frills and math? This book uses a practical approach to show you how to develop embedded systems with 8-bit PIC microcontrollers using the XC8 compiler.Written for those who want more than an Arduino, but less than the more complex microcontrollers on the market, this new edition is fully updated and covers embedded design principles such as foreground-background loops and event driven programming. Yoüll learn how to interface with things like Motors, PID loop control and writing a browser-based monitoring system! This book is heavy on code, schematics, and images and focuses less on the theoretical aspects of using microcontrollers.Coverage includes writing a display driver, using the DAC for a multitude of waveform generation techniques, and building 8-bit IoT systems, real time telemetry, a countdown timer, and new peripherals. These topics are important if you want to learn more about PIC microcontroller devices as a whole. You'll also see the advantage that MPLAB X offers by running on Windows, Mac and Linux environments. You don't need to be a command line expert to work with PIC microcontrollers, so you can focus less on setting up your environment and more on your application. If you want to move beyond the Arduino, Programming PIC Microcontrollers with XC8 is your complete guide to understanding modern PIC microcontrollers.What Yoüll Learn Set up the MPLAB X and XC8 compilers for microcontroller development Use GPIO and PPS Review EUSART and Software UART communications Use the eXtreme Low Power (XLP) options of PIC microcontrollers Explore wireless communications with WiFi and BluetoothWho This Book Is ForThose with basic electronic device and electronic equipment experience and some knowledge of the C programming and digital electronics. Also targeted towards students wanting a practical overview of microcontrollers outside of the classroom.

  • av Ranadeep Reddy Palle
    625,-

    This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security.The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it gives you important information about the basics of AI, machine learning, and deep learning in simple terms. It also talks about the ethics of using AI in privacy and security, making sure you understand the power and responsibility that come with AI. Next, it takes you through the complex world of information security and data privacy. It covers everything from the current state of security to how AI can detect threats and protect privacy. Additionally, it delves into ethical considerations to ensure the responsible use of AI in managing data privacy. Later chapters discuss strategies and future trends in using AI for data security, finding the right balance between security and privacy, and giving useful advice for organizations.In the end, this book examines the current landscape and foresees the future, underscoring the vital importance of maintaining a balance between innovation and privacy in AI-powered security.What you will learn:How AI is being used to detect and prevent cyberattacks in real-timeWhat are the AI-powered techniques for anonymizing and de-identifying data,What are the latest advancements in AI-powered privacy-enhancing technologies (PETs)How to find the right balance between security and privacyWho this book is for:Information security professionals, data scientists, and software developers seeking to gain an understanding of the latest trends and techniques in AI for information security

  • av Jennifer Harder
    745,-

    Digitally restore your old photos in Photoshop for print out or to use online as still photos. This first of two volumes will show you some of the basic techniques you can use in Photoshop to preserve or repair damaged family and historical photos.In today¿s digital world of smart phones and cameras, you can easily transfer your photos from phone to computer. However, occasionally yoüre left with an old or damaged version of the image and the uncertainty of how to fix them. Aided by the sound advice and tips from author Jennifer Harder, this book will show you how to do so with just a few basic corrections in Photoshop. Using healing tools, basic color correction tools, layer masks, and workspace commands to fill in missing gaps, yoüll be able to print out an unblemished picture or post it on your social media page.A Beginner¿s Guide to Digital Image Repair in Photoshop: Volume 1 provides the know-how to help preserve your family treasures.What You Will Learn Review scanner basics for digitizing your photos Use various ¿healing¿ and color adjustment tools in Photoshop for restoring photos See how custom selections and layer masks can be used in the photo restoration process Apply various workspaces to fill in missing details in an image or merge photosWho Is This Book ForUsers who want to learn how to repair old historical photos and slides for digital presentation or for print as well as those who are interested in basic animation.

  • av Nikhil Gupta
    565,-

    This book is your comprehensive guide to building robust Generative AI solutions using the Databricks Data Intelligence Platform. Databricks is the fastest-growing data platform offering unified analytics and AI capabilities within a single governance framework, enabling organizations to streamline their data processing workflows, from ingestion to visualization. Additionally, Databricks provides features to train a high-quality large language model (LLM), whether you are looking for Retrieval-Augmented Generation (RAG) or fine-tuning. Databricks offers a scalable and efficient solution for processing large volumes of both structured and unstructured data, facilitating advanced analytics, machine learning, and real-time processing. In today's GenAI world, Databricks plays a crucial role in empowering organizations to extract value from their data effectively, driving innovation and gaining a competitive edge in the digital age. This book will not only help you master the Data Intelligence Platform but also help power your enterprise to the next level with a bespoke LLM unique to your organization. Beginning with foundational principles, the book starts with a platform overview and explores features and best practices for ingestion, transformation, and storage with Delta Lake. Advanced topics include leveraging Databricks SQL for querying and visualizing large datasets, ensuring data governance and security with Unity Catalog, and deploying machine learning and LLMs using Databricks MLflow for GenAI. Through practical examples, insights, and best practices, this book equips solution architects and data engineers with the knowledge to design and implement scalable data solutions, making it an indispensable resource for modern enterprises. Whether you are new to Databricks and trying to learn a new platform, a seasoned practitioner building data pipelines, data science models, or GenAI applications, or even an executive who wants to communicate the value of Databricks to customers, this book is for you. With its extensive feature and best practice deep dives, it also serves as an excellent reference guide if you are preparing for Databricks certification exams. What You Will Learn Foundational principles of Lakehouse architecture Key features including Unity Catalog, Databricks SQL (DBSQL), and Delta Live Tables Databricks Intelligence Platform and key functionalities Building and deploying GenAI Applications from data ingestion to model serving Databricks pricing, platform security, DBRX, and many more topics Who This Book Is ForSolution architects, data engineers, data scientists, Databricks practitioners, and anyone who wants to deploy their Gen AI solutions with the Data Intelligence Platform. This is also a handbook for senior execs who need to communicate the value of Databricks to customers. People who are new to the Databricks Platform and want comprehensive insights will find the book accessible.

  • av Enzo Mondello
    1 179,-

    This textbook provides a comprehensive introduction to portfolio management and investments. Focusing on four core areas ¿ portfolio management, equities, bonds, and derivatives ¿ it is primarily intended for undergraduate and graduate students alike. However, it will also benefit practitioners working in the fields of financial analysis and portfolio management and professionals who aspire to such professional activities in the financial industry. To ensure its high practical relevance, the book includes a host of case studies and examples from real-world practice, mainly from the German and Swiss financial markets. Additionally, the book shows how to implement the models in Microsoft Excel.

  • av Sven Sommerlatte
    505 - 509

  • av Wolfgang Fraedrich
    685 - 865

  • av Norbert de Lange
    939,-

    This textbook is intended to display a broad, methodological introduction to geoinformatics and geoinformation science. It deals with the recording, modeling, processing and analysis as well as presenting and distributing of geodata. As an integrated approach it is dedicated to the multidisciplinary application of methods and concepts of computer science to solve spatial tasks. First the reader receives an introduction to the approach and tasks of geoinformatics, basic concepts and general principles of information processing as well as essentials of computer science. Then this textbook focuses on the following topics: spatial reference systems, digital spatial data, interoperability of spatial data, visualization of spatial information, data organization and database systems, geoinformation systems, remote sensing and digital image processing.The result is a comprehensive manual for studies and practical applications in geoinformatics. It serves also as a basis to support and deepen methodological courses in geography, geology, geodesy and surveying as well as all environmental sciences. In this first English edition, the author has updated and significantly expanded the fourth German edition. New additions include the development of apps, graphical presentation on the web, geodata-bases and recent methods of classification. This book is based on the original German 4th edition Geoinformatik in Theorie und Praxis by Norbert de Lange, published by Springer-Verlag GmbH Germany, part of Springer Nature in 2020 and still presents the only integrated perspective on geoinformatics and geoinformation science. This book was translated with the help of artificial intelligence (machine translation by the service DeepL.com) first and then significantly revised with regard to technical terms and special topics of geoinformatics.

  • av Hermann Rock
    939,-

    With this book, Hermann Rock provides time-structured core negotiation strategies that can be immediately applied in practice. The author's expertise comes primarily from negotiations in the context of M&A transactions and management investments. However, the concepts presented are equally applicable to negotiations of financing, car purchase, lease or service contracts and thus universally applicable. Three (scientifically based) basic strategies are presented, which the reader can adapt to his or her specific negotiation situation. The examples chosen for illustration are concrete cases negotiated by the author himself. With the certainty of having understood the three basic strategies, the reader enters the negotiation with a positive basic mood and thus creates the basis for his negotiation success. Hermann Rock has successfully presented his strategies for negotiation management many times in lectures and magazines (Focus) and now presents them for the first time in book form as a consistent further development of the Harvard concept.

  • av Stefania Loredana Nita
    745,-

    Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a robust introduction to Java 21's new features and updates, a roadmap for Jakarta EE 11 security mechanisms, a unique presentation of the "hot points" (advantages and disadvantages) from the Java Cryptography Architecture (JCA), a new chapter on Quantum cryptography, and more. The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.   New to This Edition: The modernized Second Edition is updated to reflect the latest language features in Java 21 and Jakarta 11, along with the introduction of a new chapter on Quantum Cryptography (Chapter 6). What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "good" vs "bad" cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more

  • av Shivam R Solanki
    625,-

    This book explains the field of Generative Artificial Intelligence (AI), focusing on its potential and applications, and aims to provide you with an understanding of the underlying principles, techniques, and practical use cases of Generative AI models.The book begins with an introduction to the foundations of Generative AI, including an overview of the field, its evolution, and its significance in today¿s AI landscape. It focuses on generative visual models, exploring the exciting field of transforming text into images and videos. A chapter covering text-to-video generation provides insights into synthesizing videos from textual descriptions, opening up new possibilities for creative content generation. A chapter covers generative audio models and prompt-to-audio synthesis using Text-to-Speech (TTS) techniques. Then the book switch gears to dive into generative text models, exploring the concepts of Large Language Models (LLMs), natural language generation (NLG), fine-tuning, prompt tuning, and reinforcement learning. The book explores techniques for fixing LLMs and making them grounded and indestructible, along with practical applications in enterprise-grade applications such as question answering, summarization, and knowledge-based generation.By the end of this book, you will understand Generative text, and audio and visual models, and have the knowledge and tools necessary to harness the creative and transformative capabilities of Generative AI. What You Will Learn What is Generative Artificial Intelligence? What are text-to-image synthesis techniques and conditional image generation? What is prompt-to-audio synthesis using Text-to-Speech (TTS) techniques? What are text-to-video models and how do you tune them? What are large language models, and how do you tune them? Who This Book Is ForThose with intermediate to advanced technical knowledge in artificial intelligence and machine learning

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.