Détail de l'éditeur
BPB Publications |
Documents disponibles chez cet éditeur (454)
Ajouter le résultat dans votre panier Faire une suggestion Affiner la recherche
Continuous Machine Learning with Kubeflow : Performing Reliable MLOps with Capabilities of TFX, Sagemaker and Kubernetes (English Edition) / Aniruddha CHOUDHURY / BPB Publications (2021)
Titre : Continuous Machine Learning with Kubeflow : Performing Reliable MLOps with Capabilities of TFX, Sagemaker and Kubernetes (English Edition) Type de document : e-book Auteurs : Aniruddha CHOUDHURY Editeur : BPB Publications Année de publication : 2021 ISBN/ISSN/EAN : 9789389898507 Note générale : copyrighted Langues : Anglais (eng) Résumé : An insightful journey to MLOps, DevOps, and Machine Learning in the real environment.Key Features? Extensive knowledge and concept explanation of Kubernetes components with examples.? An all-in-one knowledge guide to train and deploy ML pipelines using Docker and Kubernetes.? Includes numerous MLOps projects with access to proven frameworks and the use of deep learning concepts.Description'Continuous Machine Learning with Kubeflow' introduces you to the modern machine learning infrastructure, which includes Kubernetes and the Kubeflow architecture. This book will explain the fundamentals of deploying various AI/ML use cases with TensorFlow training and serving with Kubernetes and how Kubernetes can help with specific projects from start to finish.This book will help demonstrate how to use Kubeflow components, deploy them in GCP, and serve them in production using real-time data prediction. With Kubeflow KFserving, we'll look at serving techniques, build a computer vision-based user interface in streamlit, and then deploy it to the Google cloud platforms, Kubernetes and Heroku. Next, we also explore how to build Explainable AI for determining fairness and biasness with a What-if tool. Backed with various use-cases, we will learn how to put machine learning into production, including training and serving. After reading this book, you will be able to build your ML projects in the cloud using Kubeflow and the latest technology. In addition, you will gain a solid knowledge of DevOps and MLOps, which will open doors to various job roles in companies.What you will learn? Get comfortable with the architecture and the orchestration of Kubernetes.? Learn to containerize and deploy from scratch using Docker and Google Cloud Platform.? Practice how to develop the Kubeflow Orchestrator pipeline for a TensorFlow model.? Create AWS SageMaker pipelines, right from training to deployment in production.? Build the TensorFlow Extended (TFX) pipeline for an NLP application using Tensorboard and TFMA.Who this book is forThis book is for MLOps, DevOps, Machine Learning Engineers, and Data Scientists who want to continuously deploy machine learning pipelines and manage them at scale using Kubernetes. The readers should have a strong background in machine learning and some knowledge of Kubernetes is required.Table of Contents1. Introduction to Kubeflow & Kubernetes Cloud Architecture2. Developing Kubeflow Pipeline in GCP3. Designing Computer Vision Model in Kubeflow4. Building TFX Pipeline5. ML Model Explainability & Interpretability 6. Building Weights & Biases Pipeline Development7. Applied ML with AWS Sagemaker8. Web App Development with Streamlit & Heroku Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88939065 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=563710 Cracking Containers with Docker and Kubernetes : The definitive guide to Docker, Kubernetes, and the Container Ecosystem across Cloud and on-premises (English Edition) / Nisarg VASAVADA / BPB Publications (2021)
Titre : Cracking Containers with Docker and Kubernetes : The definitive guide to Docker, Kubernetes, and the Container Ecosystem across Cloud and on-premises (English Edition) Type de document : e-book Auteurs : Nisarg VASAVADA Editeur : BPB Publications Année de publication : 2021 ISBN/ISSN/EAN : 9789391030797 Note générale : copyrighted Langues : Anglais (eng) Résumé : A book that will help you become the Mozart of MicroservicesKey Features? All codes tested on the latest software versions with visual illustrations.? Covers bleeding-edge DevOps skills to build a future-proof job profile.? Includes expert advice, industry insights, and logical analogies to craft a technical narrative.Description“Cracking Containers with Docker and Kubernetes” aims to be a comprehensive guide for learning and referencing all of the essential topics related to creating, managing, and running containers with Docker and Kubernetes. Students and professionals working on Containerized web applications can use this book to lay strong conceptual foundations and sharpen their skills.The first few chapters provide an overall picture of resource virtualization in computing and demonstrate the potential of containers. The intermediate chapters get to extensive detail about Docker and Kubernetes. You will gain in-demand skills such as Docker and Kubernetes CLI, as well as how to write Dockerfiles, Compose files, and Kubernetes YAML Manifests. Topics like Networking, Storage, Access Control, and Security are discussed with real-world implications. The final chapters move Kubernetes and Containers to the cloud while expanding their ecosystem with tools for Serverless deployment, logging and monitoring, CI/CD, and more for a highly available production-ready setup.After reading this book you will be able to plan your application’s migration to containers, prepare for Docker and Kubernetes Certifications, or apply for six digit DevOps jobs.What you will learn? Learn to create, manage and orchestrate Containers using Docker and Kubernetes.? Practice writing Dockerfiles, Compose Files and Kubernetes YAML Manifests.? Perform container networking, storage, authorization, security, and scaling in a production environment.? Explore shipping, CI/CD, Service Mesh, Logging & Monitoring in detail.? Get the Cracking Containers with Docker and Kubernetes know-how of hosted and Serverless Kubernetes on Cloud.Who this book is forThis book is intended for students, enthusiasts, and professionals in Software Development, DevOps, and Cloud Computing who want to put their career progress on a pedestal by reducing the operational and scaling costs of their web applications and optimizing their IT infrastructure utilization.Table of Contents1. Prologue to the Containers2. Hello Containers!3. Introduction to Docker4. Writing Dockerfiles5. Gearing up the toolbox!6. Connectivity and Storage7. Multi Container Applications with Docker Compose8. Container Orchestration with Docker Swarm9. Introduction to Kubernetes10. Workload Orchestration with Kubernetes11. Networking and Storage with Kubernetes12. Advanced Orchestration with Kubernetes13. Hosted Kubernetes on Cloud14. Containers in Production with GKE15. Serverless Containers16. The Checkpoint Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88939066 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=565176 Cryptography and Network Security : Demystifying the ideas of Network Security, Cryptographic Algorithms, Wireless Security, IP Security, System Security, and Email Security / Bhushan TRIVEDI / BPB Publications (2021)
Titre : Cryptography and Network Security : Demystifying the ideas of Network Security, Cryptographic Algorithms, Wireless Security, IP Security, System Security, and Email Security Type de document : e-book Auteurs : Bhushan TRIVEDI Editeur : BPB Publications Année de publication : 2021 ISBN/ISSN/EAN : 9789389328660 Note générale : copyrighted Langues : Anglais (eng) Résumé : Exploring techniques and tools and best practices used in the real world.Key Features? Explore private and public key-based solutions and their applications in the real world.? Learn about security protocols implemented at various TCP/IP stack layers.? Insight on types of ciphers, their modes, and implementation issues..DescriptionCryptography and Network Security teaches you everything about cryptography and how to make its best use for both, network and internet security. To begin with, you will learn to explore security goals, the architecture, its complete mechanisms, and the standard operational model. You will learn some of the most commonly used terminologies in cryptography such as substitution, and transposition. While you learn the key concepts, you will also explore the difference between symmetric and asymmetric ciphers, block and stream ciphers, and monoalphabetic and polyalphabetic ciphers. This book also focuses on digital signatures and digital signing methods, AES encryption processing, public key algorithms, and how to encrypt and generate MACs. You will also learn about the most important real-world protocol called Kerberos and see how public key certificates are deployed to solve public key-related problems. Real-world protocols such as PGP, SMIME, TLS, and IPsec Rand 802.11i are also covered in detail.What you will learn? Describe and show real-world connections of cryptography and applications of cryptography and secure hash functions.? How one can deploy User Authentication, Digital Signatures, and AES Encryption process.? How the real-world protocols operate in practice and their theoretical implications.? Describe different types of ciphers, exploit their modes for solving problems, and finding their implementation issues in system security.Who this book is forThis book is for security professionals, network engineers, IT managers, students, and teachers who are interested in learning Cryptography and Network Security.Table of Contents1. Network and information security overview2. Introduction to cryptography3. Block ciphers and attacks4. Number Theory Fundamentals5. Algebraic structures6. Stream cipher modes7. Secure hash functions8. Message authentication using MAC9. Authentication and message integrity using Digital Signatures10. Advanced Encryption Standard11. Pseudo-Random numbers12. Public key algorithms and RSA13. Other public-key algorithms14. Key Management and Exchange15. User authentication using Kerberos16. User authentication using public key certificates17. Email security18. Transport layer security19. IP security20. Wireless security21. System securityAbout the Authors Prof. Bhushan Trivedi, Ph. D. is working as the Dean, Faculty of Computer Technology (FoCT) at the GLS University. He has two MOOCs, three international books, 100 odd research papers to his credit. He has conducted numerous workshops and seminar talks on pedagogy, research, online content preparation and management and various realms of security. Dr. Savita Gandhi is Dean, Faculty of Computer Science and IT at GLS University. Prior to holding her current position she was the Director of the School of Computer Science and headed the Dept. of Computer Science at Gujarat University. Dr Dhiren Pandit is working as an Assistant Professor in Mathematics at the Institute of Technology, Nirma University. He did his Doctorate from NIT Surat in the field of image processing and data mining. Due to his interdisciplinary work in the application of mathematics in computer science and experience, he is able to contribute to this project. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88939069 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=565177 Cyber Safety for Everyone : Understand the Interplay between the Internet and one’s Social and Mental Well-Being (English Edition) Ed. 2 / Jaago TEENS / BPB Publications (2021)
Titre : Cyber Safety for Everyone : Understand the Interplay between the Internet and one’s Social and Mental Well-Being (English Edition) Ed. 2 Type de document : e-book Auteurs : Jaago TEENS Editeur : BPB Publications Année de publication : 2021 ISBN/ISSN/EAN : 9789391392567 Note générale : copyrighted Langues : Anglais (eng) Résumé : Techniques and Effective tips to get protected from Cyber CriminalsKey Features? Learn to file a Cybercrime complaint.? Discover the New IT Rules 2021.? Understand the Artificial Intelligence (AI) in Cyber security.? Know how our online lives and real-world lives closely intertwined, each affecting the other.? Tips for protection of very young kids (5yr-8 yr), when online.? Identifying and keeping potential online predators and pedophiles at a distance..DescriptionBook is a step-by-step guide that handholds you through all the essential aspects of internet safety. The content is presented in a simple and easy-to-understand manner. True incidents, practical tips, survey results, conversation starters and teaching ideas given in the book, make the reading experience truly enriching.As per a recent survey amongst our volunteers, 94% said they were more vigilant and discerning towards misinformation primarily due to online safety they’d learned at Jaago Teens. They also felt that 70% of people were likely influenced by fake news during the Covid-19 pandemic.At the end of a Jaago Teens workshop, a teacher conceded. “Both, my daughter and I post a lot of pictures online. But, now I realize doing so can have dangerous consequences.”After a Corporate Jaago Teens Internet Safety workshop, a young 27-year old said, “Today we listened to many different aspects of Internet Safety. I think this was like a mock drill. If a situation arises where we need to apply what we have learned today, we will be able to do so!”What you will learn? Awareness of the IT Rules 2021.? Concept of plagiarism and copyright violation.? To modify the privacy settings on the social media platform, to ensure one’s safety.Who this book is forChildren’s online life is different from those of grown-ups, if their online safety is a constant worry this book is a great resource to use. It tells you the kind of trouble children can get into when they are online, and suggests simple yet effective ways to deal with such situations. This book is a must-read for every parent, teacher or child who wants to avoid the temptations and perils of cyberspace.Table of Contents1. An Introduction to Internet Safety2. Real World and the Virtual World3. Basic Do’s and Don’ts4. Parental Control Options5. Online Gaming6. Recognizing Cyberbullying and Dealing with It7. Privacy of Personal Information8. Online Predators9. Smartphone Safety, Your Phone Isn’t Smart, But You Are!10. Modes of Digital Payments and Safe Online Payments11. Reporting Cybercrime and Laws that protect against Online Harassment12. Online Plagiarism13. Privacy Settings for Various Online Platforms14. A Downloadable JaagoTeens Presentation15. Information Technology (Intermediary Guidelines andDigital Media Ethics Code) Rules 202116. Artificial Intelligence (AI) keeps you safe in the Real World and the Online World Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88942173 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=574534 Cybercrime and Preventive Measures : A Quick Guide to Get Yourself Secured and Protected from Digital Threats, Social Media Risks, and Cyber Criminals (English Edition) / Priyanka TOMAR / BPB Publications (2021)
Titre : Cybercrime and Preventive Measures : A Quick Guide to Get Yourself Secured and Protected from Digital Threats, Social Media Risks, and Cyber Criminals (English Edition) Type de document : e-book Auteurs : Priyanka TOMAR Editeur : BPB Publications Année de publication : 2021 ISBN/ISSN/EAN : 9789390684526 Note générale : copyrighted Langues : Anglais (eng) Résumé : Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes.Key Features? Real-case studies and true events on cyber crime incidents.? Learn how to protect yourself from cyber threats and assist police for crime investigation.? Coverage on financial frauds, social media crimes, mobile payment frauds, and a lot more.DescriptionThe book ‘Cybercrime and Preventive Measures' provides a strong and precise introduction to the world of cybercrime and the need of cyber awareness for everyone. It begins with email-related popular cyber crimes such as phishing, spamming, spoofing, email bombing, etc. It talks about the methodologies adopted by cyber criminals to trap people along with some real-case studies (names of victims changed) and preventive measures to be taken to safeguard against email-related cyber crime.This book exposes you to a variety of financial frauds committed by cyber criminals and the modus of operandi they adopt while committing cyber crimes along with numerous case studies. The book keeps you informed about what preventive and safety measures can be exercised so that you can protect yourself, your family, and even your workplace.This book also assists young teenagers and school students about the methods adopted by hackers and how to remain safe while using social media applications and Internet shopping sites. This book talks about the risks involved and preventive measures that need to be taken while using mobile apps.What you will learn? Get familiar with the top rated cyber crime incidents in India.? Understand the different types of cyber crimes and the modus of operandi adopted by the cyber criminals.? Learn to identify and manage cybersecurity threats and protect yourself from cyber vulnerabilities.Who this book is forThis book is for everyone, students, or professionals, who are frequently using smartphones, computers, laptops, and smart devices over the Internet. This book guides you to protect yourself from cyber threats while browsing the internet, watching videos over the Internet, using emails, and using social media apps such as WhatsApp, Facebook, Twitter, LinkedIn, or playing online games.Table of Contents1. Email-related Cybercrimes2. Financial Frauds and Cybercrime3. Cybercrime in Social Media4. Mobile Application-related Frauds5. To Do List for Working Professionals and Small Businesses6. Complaint Registration Procedure7. ReferencesAbout the Authors Priyanka Tomar, is the Director of New Era System Pvt Ltd and has 18 years of experience in various IT fields, including Cyber Security and Cyber Forensics. She has been a guest faculty at CBI Academy, Ghaziabad since 2014 and is also an advisor to government and private organisations on cybersecurity-related issues, R&D projects, etc.She is a regular speaker and discussion panelist at cybersecurity events. She imparts customized Cyber Security Training on cyber security and cyber forensics such as darknet forensics, cryptocurrency forensics, cyber Intelligence & OSINT, Network Forensics, Protecting Critical Infrastructure, Website Security, Blockchain-based solutions, IoT & Smart Cities Solutions, etc.Blog Link: CybersecurityauditsSanjay Gautam joined CBI in 2002 and has experience in the investigation of anti-corruption cases and cyber crime cases, including crimes against women and children. He has provided technical assistance in various hi-profile cases. He has attended a number of INTERPOL's Train-the-Trainer workshops in India, Cyprus, and South Korea and was ranked 1st among various INTERPOL countries. He is a regular guest faculty for various Central Training Institutes. He was also invited by UNDP and INTERPOL to deliver a lecture at Kuala Lumpur, Malaysia. He has also attended INTERPOL’s Digital Forensics Experts Meeting in South Korea. He has been imparting training to a large number of police officers from CBI, State Police Forces, Judiciary, Security Agencies, CPOs, etc. from India, SAARC.LinkedIn Bio: Sanjay Gautam Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88939070 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=565178 Cybersecurity Fundamentals : Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition) / Rajesh KUMAR GOUTAM / BPB Publications (2021)PermalinkData Processing and Modeling with Hadoop : Mastering Hadoop Ecosystem Including ETL, Data Vault, DMBok, GDPR, and Various Data-Centric Tools / Vinicius AQUINO DO VALE / BPB Publications (2021)PermalinkData Scientist Pocket Guide : Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together / Mohamed SABRI / BPB Publications (2021)PermalinkDecoding JavaScript : A Simple Guide for the Not-so-Simple JavaScript Concepts, Libraries, Tools, and Frameworks (English Edition) / Rushabh MULRAJ SHAH / BPB Publications (2021)PermalinkDemystifying Artificial intelligence : Simplified AI and Machine Learning concepts for Everyone (English Edition) / Prashant KIKANI / BPB Publications (2021)PermalinkDemystifying Azure DevOps Services : A Guide to Architect, Deploy, and Administer DevOps Using Microsoft Azure DevOps Services (English Edition) / Ashish RAJ / BPB Publications (2021)PermalinkDesigning User Interfaces : Exploring User Interfaces, UI Elements, Design Prototypes and the Figma UI Design Tool (English Edition) / Dario CALONACI / BPB Publications (2021)PermalinkDigital Marketing Trends and Prospects : Develop an effective Digital Marketing strategy with SEO, SEM, PPC, Digital Display Ads & Email Marketing techniques. (English Edition) / Shakti KUNDU / BPB Publications (2021)PermalinkElements of Deep Learning for Computer Vision : Explore Deep Neural Network Architectures, PyTorch, Object Detection Algorithms, and Computer Vision Applications for Python Coders (English Edition) / Bharat SIKKA / BPB Publications (2021)PermalinkEmbracing Technology : Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications (English Edition) / Maniik R GROVER / BPB Publications (2021)Permalink
LIBRARY - Campus Rouen
NEOMA Business School
pmb
-
59 Rue Taittinger, 51100 Reims
-
00 33 (0)3 26 77 46 15
Library Campus Reims
-
1 Rue du Maréchal Juin, BP 215
76825 Mont Saint Aignan cedex -
00 33 (0)2 32 82 58 26