-
Programming in Python 3
Python 3 is the best version of the language yet: It is more powerful, convenient, consistent, and expressive than ever before. Now, leading Python programmer Mark Summerfield demonstrates how to write code that takes full advantage of Python 3's features and idioms. Programming in Python 3, Second Edition, brings together all the knowledge you need to write any program, use any standard or third party Python 3 library, and create new library modules of your own. Summerfield draws on his many years of Python experience to share deep insights into Python 3 development you won't find anywhere else. He begins by illuminating Python's "beautiful heart": the eight key elements of Python you need to write robust, high performance programs. Building on these core elements, he introduces new topics designed to strengthen your practical expertise-one concept and hands on example at a time. Coverage includes: developing in Python using procedural, objectoriented, and functional programming paradigms,creating custom packages and modules
-
The Quest for Artificial Intelligence a History of Ideas and Achievements
Artificial intelligence (AI) is a field within computer science that is attempting to build enhanced intelligence into computer systems. This book traces the history of the subject, from the early dreams of eighteenth-century (and earlier) pioneers to the more successful work of today’s AI engineers. AI is becoming more and more a part of everyone’s life. The technology is already embedded in face-recognizing cameras, speech-recognition software, Internet search engines, and health-care robots, among other applications. The book’s many diagrams and easy to understand descriptions of AI programs will help the casual reader gain an understanding of how these and other AI systems actually work. Its thorough (but unobtrusive) end of chapter notes containing citations to important source materials will be of great use to AI scholars and researchers. This book promises to be the definitive history of a field that has captivated the imaginations of scientists, philosophers, and writers for centuries.
-
Windows Server 2008 for Dummies
Although a few fortunate individuals may already be acquainted with Windows Server 2008 and the networks it supports, many more people are not only unfamiliar with server-based networking but downright scared of it.
-
Information Technology Essentials
Information Technology Essentials is designed to be an introduction to Information Systems. The material is similar to many of the topics that first-year information technology students study. The book is broken down into sections that cover a variety of areas of information systems. These topics include: why you would want to study information technology, a basic introduction to computer hardware, the software development lifecycle, database management systems, computer networking, an introduction to cloud computing, computer security and the future of computing. This book is for anyone who wants to learn about the Information Technology field, but is ideal for people who are just getting started. The material will provide the reader with a solid understanding of many of the concepts that drive one of the most critical industries in today's world.
-
Informatika va axborot texnologiyalari
Ushbu darslik O'zbekiston Respublikasi Vazirlar Mahkamasining 2017-yil 6-apreldagi "Umumiy o'rta va o'rta maxsus, kasb-hunar ta'limining davlat ta'lim standartlarini tasdiqlash to'g'risida"gi 187-sonli qarori bilan tasdiqlangan umumiy o'rta ta'limning " Informatika va axborot texnologiyalari" fani bo'yicha malaka talablari asosida yaratilgan.
-
Легкий способ выучить Python 3 еще глубже
Воплотите ваши идеи в код самого высокого качества! Зед Шоу — один из тех, кто по-настоящему разбирается в Python. Его советы помогли миллионам программистов по всему миру, помогут они и вам. От вас потребуются лишь дисциплина, желание и упорство, все остальное вы найдете в книге «Легкий способ выучить Python 3 еще глубже». Это вторая часть «Легкого способа выучить Python 3», где Зед описывал базовые принципы программирования на Python 3. Вторая часть углубит ваши знания и поможет приобрести новые навыки с помощью 52 прекрасно составленных заданий.
-
Хрестоматия по слуховому гармоническому анализу.
Предлагаемая хрестоматия ставит своей целю дать преподавателям сольфеджио подобранный в систематическом порядке музыкальный материал который они смогли бы использовать в разделе слухового гармонического анализа.
-
Pro Database Migration to Azure
This book covers the best practices to plan, implement, and operationalize the migration of a database application from your organization’s data center to Microsoft’s Azure cloud platform. Data modernization and migration is a technologically complex endeavor that can also be taxing from a leadership and operational standpoint. This book covers not only the technology, but also the most important aspects of organization culture, communication, and politics that so frequently derail such projects. You will learn the most important steps to ensuring a successful migration and see battle-tested wisdom from industry veterans. From executive sponsorship, to executing the migration, to the important steps following migration, you will learn how to effectively conduct future migrations and ensure that your team and your database application delivers on the expected business value of the project. This book is unlike any other currently in the market. It takes you through the most critical business and technical considerations and workflows for moving your data and databases into the cloud, with special attention paid to those who are deploying to the Microsoft Data Platform in Azure, especially SQL Server. Although this book focuses on migrating on-premises SQL Server enterprises to hybrid or fully cloud-based Azure SQL Database and Azure SQL Managed Instances, it also cover topics involving migrating non-SQL Server database platforms such as Oracle, MySQL, and PostgreSQL applications to Microsoft Azure.
-
Architecture for Blockchain Applications
Provides guidance on assessing the suitability of blockchain, designing blockchain applications, and assessing different architecture designs and tradeoffs. Discusses the functional and non-functional properties of blockchain and how they enable or impact application architectures. Presents an overview of existing blockchain platforms, including Bitcoin, Ethereum, and Hyperledger Fabric. Includes 15 design patterns for blockchain and details how to use model-driven engineering to build blockchain-based applications. Complemented by three detailed real-world use cases that provide additional insights from a practical perspective
-
Black Hat Go. Go Programming for Hackers and Pentesters
Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development.
-
JavaScript. The Comprehensive Guide
Begin your JavaScript journey with this comprehensive, hands-on guide. You’ll learn everything there is to know about professional JavaScript programming, from core language concepts to essential client-side tasks. Build dynamic web applications with step-by-step instructions and expand your knowledge by exploring server-side development and mobile development. Work with advanced language features, write clean and efficient code, and much more. Your all-in-one guide to JavaScript. Work with objects, reference types, events, forms, and web APIs. Build server-side applications, mobile applications, desktop applications, and more. Consult and download practical code examples.
-
Getting Started with Artificial Intelligence
This book is the ideal starting point for your journey into enterprise AI. Through case studies, implementation examples, and a survey of the landscape, developers will learn technologies for automating and detecting patterns that can augment human expertise and empower employees and applications to make rich, data driven decisions. Getting started in enterprise AI can be daunting. Is your data pipeline robust enough? Do you want to mine unstructured data in emails, blog posts, and other documents? Build a chatbot? Use computer vision to classify images? Where do you start? And how do you make sure your first attempts succeed. In the second edition, authors Tom Markiewicz and Josh Zheng--developer advocates for IBM--examine common use cases for AI in the enterprise, including natural language processing (NLP) and computer vision. You'll also explore a new chapter on hybrid and private clouds.
-
Gray Hat Hacking: The Ethical Hacker's Handbook
Cutting-edge techniques for finding and fixing critical security flaws. Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready to try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state of the art resource. And the new topic of exploiting the Internet of things is introduced in this edition. Build and launch spoofing exploits with Ettercap. Induce error conditions and crash software using fuzzers. Use advanced reverse engineering to exploit Windows and Linux software. Bypass Windows Access Control and memory protection schemes.
-
Programming and problem solving with Java
This book has been developed from the ground up to be a Java text. It is not a “Java translation” of our previous texts. We have, however, retained our familiar easy-to-read style and clear approach to introducing new topics. Each chapter has the same overall organization as in our previous books, with a full problem-solving case study, testing and debugging hints, summary, and five types of exercises. Also, some topics, such as problem solving, are independent of the programming language and thus contain familiar discussions. In every regard, this new book is object-oriented in its presentation of the fundamental concepts of computing. From the very first chapter we use object-oriented terminology to describe the software development process. Classes are covered extensively in Chapter 2, where we first encounter Java syntax. Over the course of the next several chapters, students learn to build separately compiled classes representing realistic objects and to add to their sophistication gradually.
-
Интернет бизнеси асослари
Бу қўлланма Интернет тизими сирларини ўрганишга ва бу орқали ўз билимларини оширишга ахд қилган барча сохалар мутахассислари учун мўлжалланган бўлиб, унинг воситасида Интернет тизими бўйича бизнесга оид билимларни етарли даражада эгаллаш мумкин. Унда бир қанча амалий маълумот, кўрсатма ва маслаҳатлар бериладики, уларнинг ёрдамида бу қизиқарли оламни янада яқинроқ билиб олиш хамда уни малакали равишда ўзлаштириш мумкин. Қўлланма талабалар, мактаб ўқувчилари, индивидуал шахслар, тадбиркорлар ва барча қизиққанларнинг Интернет тизимини мустақил равишда ўрганишлари хамда ундан фойдаланиб, пул топишлари учун мўлжалланган.
-
Информатика ўқитиш методикаси
Дарслик педагогика олий ўқув юртларининг бакалавриат йўналишида ўқитиладиган «Информатика ўқитиш методикаси» ўқув фанига бағишланган.