Book picks similar to
AI as a Service: Serverless machine learning with AWS by Peter Elger
manning-unread
mlops
software
virtual-shelf
Raspberry Pi User Guide
Eben Upton - 2012
And now you can learn how to use this amazing computer from its co-creator, Eben Upton, in Raspberry Pi User Guide. Cowritten with Gareth Halfacree, this guide gets you up and running on Raspberry Pi, whether you're an educator, hacker, hobbyist, or kid. Learn how to connect your Pi to other hardware, install software, write basic programs, and set it up to run robots, multimedia centers, and more.Gets you up and running on Raspberry Pi, a high-tech computer the size of a credit card Helps educators teach students how to program Covers connecting Raspberry Pi to other hardware, such as monitors and keyboards, how to install software, and how to configure Raspberry Pi Shows you how to set up Raspberry Pi as a simple productivity computer, write basic programs in Python, connect to servos and sensors, and drive a robot or multimedia center Adults, kids, and devoted hardware hackers, now that you've got a Raspberry Pi, get the very most out of it with Raspberry Pi User Guide.
Doing Data Science
Cathy O'Neil - 2013
But how can you get started working in a wide-ranging, interdisciplinary field that’s so clouded in hype? This insightful book, based on Columbia University’s Introduction to Data Science class, tells you what you need to know.In many of these chapter-long lectures, data scientists from companies such as Google, Microsoft, and eBay share new algorithms, methods, and models by presenting case studies and the code they use. If you’re familiar with linear algebra, probability, and statistics, and have programming experience, this book is an ideal introduction to data science.Topics include:Statistical inference, exploratory data analysis, and the data science processAlgorithmsSpam filters, Naive Bayes, and data wranglingLogistic regressionFinancial modelingRecommendation engines and causalityData visualizationSocial networks and data journalismData engineering, MapReduce, Pregel, and HadoopDoing Data Science is collaboration between course instructor Rachel Schutt, Senior VP of Data Science at News Corp, and data science consultant Cathy O’Neil, a senior data scientist at Johnson Research Labs, who attended and blogged about the course.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
The Hitchhiker's Guide to Python: Best Practices for Development
Kenneth Reitz - 2016
More than any other language, Python was created with the philosophy of simplicity and parsimony. Now 25 years old, Python has become the primary or secondary language (after SQL) for many business users. With popularity comes diversity--and possibly dilution.This guide, collaboratively written by over a hundred members of the Python community, describes best practices currently used by package and application developers. Unlike other books for this audience, The Hitchhiker's Guide is light on reusable code and heavier on design philosophy, directing the reader to excellent sources that already exist.
Natural Language Processing with Python
Steven Bird - 2009
With it, you'll learn how to write Python programs that work with large collections of unstructured text. You'll access richly annotated datasets using a comprehensive range of linguistic data structures, and you'll understand the main algorithms for analyzing the content and structure of written communication.Packed with examples and exercises, Natural Language Processing with Python will help you: Extract information from unstructured text, either to guess the topic or identify "named entities" Analyze linguistic structure in text, including parsing and semantic analysis Access popular linguistic databases, including WordNet and treebanks Integrate techniques drawn from fields as diverse as linguistics and artificial intelligenceThis book will help you gain practical skills in natural language processing using the Python programming language and the Natural Language Toolkit (NLTK) open source library. If you're interested in developing web applications, analyzing multilingual news sources, or documenting endangered languages -- or if you're simply curious to have a programmer's perspective on how human language works -- you'll find Natural Language Processing with Python both fascinating and immensely useful.
The Forgotten Prince William: The House of Windsor's First Modern Prince
Parker Healy - 2012
A young page in Queen Elizabeth and Prince Philip’s wedding, in thirty short years William became the House of Windsor's first modern prince but has been largely forgotten. He tested the limits of royal convention in work and love by pursuing a career in business and diplomacy and dating women who could never be accepted as a royal bride. William also lived an adventurous life, escaping several near death experiences during travels around the world, witnessing one of the most tragic periods in American history, and becoming a competitive pilot before his life was cut short in a tragic accident.Based on personal accounts by the family and friends who knew William best, extracts from his own reflections on his life and family, and photographs at different stages of his life, this book provides a unique glimpse into a prince’s coming of age and what growing up in the British royal family is really like.
Make Love Not Scars
Ria Sharma - 2019
Pick up this book only if you want to be inspired to change the world’ —–KAPIL DEVA Delhi brat studying fashion design at Leeds College of Art decides to devote her final-year project to ‘women’s empowerment'. What begins as a one-off engagement with the lives of acid-attack survivors draws her back to India to shoot a documentary on their lives. Then, an effort to raise funds for one of the survivors catapults Ria Sharma into the corrosive, devastating world of acid attacks. Today, she runs the award-winning NGO Make Love Not Scars, which works with survivors to raise funds. This is the story of how, over the years, Ria slowly learnt to find her groove as a campaigner and crusader as well as counter death threats, ageism and sexism. Her own story is closely woven with the stories of the many women who have helped her grow from a fickle girl into a woman of substance. Peppered with humour and bubbling with wisdom, Make Love Not Scars is an unusual coming-of-age tale.
Think Python
Allen B. Downey - 2002
It covers the basics of computer programming, including variables and values, functions, conditionals and control flow, program development and debugging. Later chapters cover basic algorithms and data structures.
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Lee Holmes - 2007
Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem
Functional Thinking
Neal Ford - 2014
This practical guide from renowned software architect Neal Ford helps you transition from a Java-writing imperative programmer to a functional programmer, using Java, Clojure, and Scala as examples.Rather than focus on specific language features, Functional Thinking looks at a variety of common practices in OOP languages and then shows you how to solve the same problems with a functional language. For instance, you know how to achieve code-reuse in Java via mechanisms such as inheritance and polymorphism. Code reuse is also possible in functional languages, using high-order functions, composition, and multi-methods.Ford encourages you to value results over steps, so you can begin to think like a functional programmer. Expect your mind to be bent, but you’ll finish with a much better understanding of both the syntax and semantics of functional languages.
Elasticsearch: The Definitive Guide: A Distributed Real-Time Search and Analytics Engine
Clinton Gormley - 2014
This practical guide not only shows you how to search, analyze, and explore data with Elasticsearch, but also helps you deal with the complexities of human language, geolocation, and relationships.If you're a newcomer to both search and distributed systems, you'll quickly learn how to integrate Elasticsearch into your application. More experienced users will pick up lots of advanced techniques. Throughout the book, you'll follow a problem-based approach to learn why, when, and how to use Elasticsearch features.Understand how Elasticsearch interprets data in your documentsIndex and query your data to take advantage of search concepts such as relevance and word proximityHandle human language through the effective use of analyzers and queriesSummarize and group data to show overall trends, with aggregations and analyticsUse geo-points and geo-shapes--Elasticsearch's approaches to geolocationModel your data to take advantage of Elasticsearch's horizontal scalabilityLearn how to configure and monitor your cluster in production
Restful Java with Jax-RS
Bill Burke - 2009
With this hands-on reference, you'll focus on implementation rather than theory, and discover why the RESTful method is far better than technologies like CORBA and SOAP. It's easy to get started with services based on the REST architecture. RESTful Java with JAX-RS includes a technical guide that explains REST and JAX-RS, how they work, and when to use them. With the RESTEasy workbook that follows, you get step-by-step instructions for installing, configuring, and running several working JAX-RS examples using the JBoss RESTEasy implementation of JAX-RS.Work on the design of a distributed RESTful interface, and develop it in Java as a JAX-RS serviceDispatch HTTP requests in JAX-RS, and learn how to extract information from themDeploy your web services within Java Enterprise Edition using the Application class, Default Component Model, EJB Integration, Spring Integration, and JPADiscover several options for securing your web servicesLearn how to implement RESTful design patterns using JAX-RSWrite RESTful clients in Java using libraries and frameworks such as java.net.URL, Apache HTTP Client, and RESTEasy Proxy
Thirteen Degrees: 13 Scary Stories and Tales of Horror
Brenden Dean - 2015
Bring a blanket, huddle around the fire, and try to keep warm as you encounter psychotic abductors, deadly spirits and demons of the woods. When They Come Alone - One man's Halloween ritual is far more vicious than it seems. His playful prank is a mask for something more. A Monster in his Closet - A boy is troubled by something in his closet. But, as we will soon see, there is no monster in his closet. Eat Your Heart Out - A quarreling lesbian couple's camping trip goes awry. They may not survive the night when something intrudes in the night. Meet Me at the Looking Tree - A tragic tale of two boys, a towering tree, and a new pair of binoculars. When one of them goes missing, the other's life will never be the same. The Deer Cam - An avid hunter's first hunt of the season turns horrific when noises send him running home. The terror is not over when noises accompany his sleep. What Mustn't be Seen - One night, a boy hears his next door neighbor's home being invaded. But what he witnesses is much worse than a couple of thieves. He Who Waits - Ever since childhood, a girl is constantly watched by a suited man just outside her home. Nobody else can see him. Later in life, a tragedy shows the man's dreadful intentions. The Orb - A metallic, glowing sphere lands in a small town, and those who come close to it are flooded with euphoric visions. Those who touch it disappear in a flash. But unknown horrors await them on the other side. The Way of the World - A wealthy man invites a beggar over for dinner, but the menu may not be to his liking. You Should've Opened the Door - A lonely woman hears news of an escaped killer. That night, the strange knocking begins. Forgetful - A man awaits much needed sleep. But he soon realizes he has forgotten a few routine things. One of which may cost him his life. Sensations - A little girl enjoys spending the night at her grandparents, save for the fact that something visits her at night. Soon, she will learn the horrid truth of the sensations she feels at night. A Stranger's Approach - A distraught woman is having enough trouble affording life when a stranger begins to follow her. Quickly, the stalking becomes too much, and a fateful climax ensues. What people are saying about Brenden Dean's works - “Beautifully written. Absolutely amazing.” –David B. “Holy s***. That was amazing.” -Jacob S. “Now that’s how you write a f****** twist.” -Stefan T. “There’s a lot of good stories out there, but [When They Come Alone] is great.” -Fredrick H. “. . . It's very well written and personable. High praise.” -R. Bowers “F****** amazing. I love it.” -Paula M. “Oh, this is the first thing I’ve read on /r/NoSleep that actually freaked me out. Good job. Good f****** job.” -Cassie A. “Wow. Holy s***. . . The ending really got me.” -Bradley S. "This is probably the saddest story I’ve ever read on /r/NoSleep. God damn, made me cry even.
Yes, And
Cindy Gunderson - 2020
Yes, she is old. Yes, she sometimes forgets where she put her glasses, or her heart medication. But doesn't everyone? That doesn't give workers--paid to assist her, mind you--the right to rifle through her personal belongings, or "accidentally" forget something of hers in their pocket. It definitely does not give them the right to embezzle thousands of dollars from her family trust.Just when she is most desperate, a young neighbor takes her by surprise. Bonding over their shared love of soap operas, Jo and Toby engage in old-school reconnaissance to find answers. Together, they brave roller skates, walks along uneven ground, and even downtown parking on what may be Jo's most exciting adventure in forty years."Yes, And" is a feel-good story that explores the hearts of two misunderstood, kindred spirits, connected just when they need each other most.