Qamar Nomani, Julie Davila, Rehman Khan - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Data Science for Decision Makers. Enhance your leadership skills with data science and AI expertise
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Hands-On Blockchain for Python Developers. Empowering Python developers in the world of blockchain and smart contracts - Second Edition
-
Real-World Edge Computing. Scale, secure, and succeed in the realm of edge computing with Open Horizon
-
Hypermodern Python Tooling
-
Getting Started with DuckDB. A practical guide for accelerating your data science, data analytics, and data engineering workflows
-
ChatGPT. Podstawy i proste zastosowania
-
Data Modeling with Microsoft Power BI
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
Data Management Strategy at Microsoft. Best practices from a tech giant's decade-long data transformation journey
-
Opus magnum C++. Programowanie w języku C++. Wydanie III poprawione (komplet)
-
Opus magnum C++. Misja w nadprzestrzeń C++14/17. Tom 4. Wydanie II poprawione
-
Beginning C++ Game Programming. Learn C++ from scratch by building fun games - Third Edition
-
Enterprise Architecture with .NET. Expert-backed advice for information system design, down to .NET and C# implementation
-
HashiCorp Terraform Associate (003) Exam Guide. Prepare to pass the Terraform Associate exam on your first attempt
-
Learn OpenAI Whisper. Transform your understanding of GenAI through robust and accurate speech processing solutions
-
NGINX HTTP Server. Harness the power of NGINX with a series of detailed tutorials and real-life examples - Fifth Edition
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
-
Szkoła w czasach AI. Jak przygotować dzieci na wyzwania jutra
-
The Ultimate Guide to Snowpark. Design and deploy Snowpark with Python for efficient data workloads
-
Kubernetes and Cloud Native Associate (KCNA) Study Guide
-
Network Automation with Nautobot. Adopt a network source of truth and a data-driven approach to networking
-
Before Machine Learning Volume 1 - Linear Algebra for A.I. The Fundamental Mathematics for Data Science and Artificial Intelligence
-
Data Quality in the Age of AI. Building a foundation for AI strategy and data culture
-
Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition
-
C# 12. Leksykon kieszonkowy
-
Pakiety R. Zarządzanie, testowanie, dokumentacja i udostępnianie kodu. Wydanie II
-
Prompt Engineering for Generative AI
-
Dylemat sztucznej inteligencji. 7 zasad odpowiedzialnego tworzenia technologii
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Efektywny Excel. Zasada 80/20
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Modelowanie w Fusion 360. Praktyczne przykłady
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Apache Iceberg: The Definitive Guide
-
Data Engineering with Google Cloud Platform. A guide to leveling up as a data engineer by building a scalable data platform with Google Cloud - Second Edition
-
Protocol Buffers Handbook. Getting deeper into Protobuf internals and its usage
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Web Development with Blazor. A practical guide to building interactive UIs with C# 12 and .NET 8 - Third Edition
-
Developing Blockchain Solutions in the Cloud. Design and develop blockchain-powered Web3 apps on AWS, Azure, and GCP
-
Learn SQL using MySQL in One Day and Learn It Well. SQL for beginners with Hands-on Project
-
Strategie cyberbezpieczeństwa współczesnego świata
-
Generative AI for Cloud Solutions. Architect modern AI LLMs in secure, scalable, and ethical cloud environments
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III
-
Linkerd: Up and Running
-
Informacja i kodowanie. Krótkie wprowadzenie z przykładami zastosowań
-
Tester samouk w zwinnym zespole. Testowanie agile krok po kroku na podstawie rzeczywistego projektu
-
3D Character Rigging in Blender. Bring your characters to life through rigging and make them animation-ready
-
Enterprise GENERATIVE AI Well-Architected Framework & Patterns. An Architect's Real-life Guide to Adopting Generative AI in Enterprises at Scale
-
Kryptowaluty jako przedmiot przestępstwa
-
Fundamentals of Analytics Engineering. An introduction to building end-to-end analytics solutions
-
Mastering Adobe Commerce Frontend. Build optimized, user-centric e-commerce sites with tailored theme design and enhanced interactivity
-
Solutions Architect's Handbook. Kick-start your career with architecture design principles, strategies, and generative AI techniques - Third Edition
-
The Definitive Guide to Power Query (M). Mastering complex data transformation with Power Query
-
Artificial Intelligence with Microsoft Power BI
-
Mastering Linux Administration. Take your sysadmin skills to the next level by configuring and maintaining Linux systems - Second Edition
-
Web API Cookbook
-
Intelligent interactive systems technologies
-
Tester samouk. Praktyczny przewodnik po testowaniu oprogramowania na bazie gotowego projektu
-
Certyfikowany inżynier wymagań. Na podstawie IREB CPRE. Poziom podstawowy
-
Head First Software Architecture
-
Hands-On Visual Studio 2022. A developer's guide to new features and best practices with .NET 8 and VS 2022 for maximum productivity - Second Edition
-
Linux Pocket Guide. 4th Edition
-
Building Interactive Dashboards in Microsoft 365 Excel. Harness the new features and formulae in M365 Excel to create dynamic, automated dashboards
-
C# Data Structures and Algorithms. Harness the power of C# to build a diverse range of efficient applications - Second Edition
-
Data-Centric Machine Learning with Python. The ultimate guide to engineering and deploying high-quality models based on good data
-
Data Structures and Algorithms with the C++ STL. A guide for modern C++ practitioners
-
Multi-Cloud Handbook for Developers. Learn how to design and manage cloud-native applications in AWS, Azure, GCP, and more
-
Office 2021 i Microsoft 365 Krok po kroku
-
Word 2021 i Microsoft 365 Krok po kroku
-
Wideotwórca. Jak tworzyć filmy w social mediach
-
Software Architecture Patterns for Serverless Systems. Architecting for innovation with event-driven microservices and micro frontends - Second Edition
-
Lean Analytics
-
Prometheus w pełnej gotowości. Jak monitorować pracę infrastruktury i wydajność działania aplikacji. Wydanie II
-
Fluent React
-
.NET MAUI Projects. Build multi-platform desktop and mobile apps from scratch using C# and Visual Studio 2022 - Third Edition
-
Architektura API. Projektowanie, używanie i rozwijanie systemów opartych na API
-
Języki programowania sterowników PLC: LAD, FBD, SCL, STL. Ćwiczenia dla początkujących
-
Różnorodne. O prawdziwym wizerunku kobiet nie tylko w marketingu
-
Deciphering Data Architectures
-
Build Your Own Programming Language. A programmer's guide to designing compilers, interpreters, and DSLs for modern computing problems - Second Edition
-
Data Engineering with Scala and Spark. Build streaming and batch pipelines that process massive amounts of data using Scala
-
Data Labeling in Machine Learning with Python. Explore modern ways to prepare labeled data for training and fine-tuning ML and generative AI models
-
Hands-On Unity Game Development. Unlock the power of Unity 2023 and build your dream game - Fourth Edition
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Managing Data Integrity for Finance. Discover practical data quality management strategies for finance analysts and data professionals
-
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
CI/CD Design Patterns. Design and implement CI/CD through tried and tested design patterns
-
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers
-
Applied Deep Learning on Graphs. Leveraging Graph Data to Generate Impact Using Specialized Deep Learning Architectures
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Azure DevOps Explained. Accelerate your cloud native-software development with Azure DevOps for cloud excellence - Second Edition
-
Modern Time Series Forecasting with Python. Industry-ready machine learning and deep learning time series analysis with PyTorch and pandas - Second Edition
-
Unlocking Creativity with Azure OpenAI. A Practical Guide to Harnessing GenerativeAI- Powered Innovation
-
Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition
-
Infrastructure Management with Azure Bicep. Learn how to build reusable and scalable infrastructure using best practices for Infrastructure as Code (IaC)
-
DevSecOps for Azure. Implementing security best practices into CI/CD pipelines and Azure DevOps
-
Data Analysis with Polars. Get up and running with Polars to perform effective data analysis in Rust
-
Implementing GitOps with Kubernetes. Automate, manage, scale, and secure infrastructure and cloud-native applications on AWS and Azure
-
Mastering Flask Web and API Development. Build and deploy production-ready Flask apps seamlessly across web, APIs, and mobile platforms
-
MuleSoft Platform Architect's Guide. A practical guide to using Anypoint Platform's capabilities to architect, deliver, and operate APIs
-
Offensive Security Using Python. A hacker's handbook to advanced offensive security using Python
-
Unity 2022 Character Animation with Mecanim and Mixamo. Bring your in-game 3D characters to life seamlessly with C# and Unity - Second Edition
-
Tools and Skills for .NET 8. Get the career you want with good practices and patterns to design, debug, and test your solutions
-
Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to threat modeling and securing AI with MLSecOps
-
Building Secure Automotive IoT Applications. A guide to design, develop, and deploy secure automotive IoT applications with automotive processes
-
Certified Information Systems Security Professional (CISSP) Exam Guide. Become a certified CISSP professional with practical exam-oriented knowledge of all eight domains
-
Microsoft eDiscovery in Depth. Become an expert in Microsoft Purview content search and eDiscovery
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
Tableau Certified Data Analyst Certification Guide. Ace the Tableau Data Analyst certification exam with expert guidance and practice material
-
AWS Certified Developer Associate Certification and Beyond. A comprehensive guide to help you succeed in the AWS DVA-C02 certification exam
-
Hands-On Generative Adversarial Networks with PyTorch 2.x. Gain hands-on expertise in utilizing robust Generative AI models to tackle a wide array of challenges - Second Edition
-
Embracing DevOps Release Management. Strategies and tools for accelerating continuous delivery and ensuring quality software deployment
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
AI-Assisted Software Development with GitHub Copilot and ChatGPT. A guide to optimizing developer productivity in machine learning, data science, and app and low code development
-
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture