Introduces an assortment of powerful command line utilities that can be combined to create simple, yet powerful shell scripts for processing datasets. The code samples and scripts use the bash shell, and typically involve small datasets so you can focus on understanding the features of grep, sed, and awk. Companion files with code are available ......
Covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches.
This book is intended for those who plan to become data scientists as well as anyone who needs to perform data cleaning tasks using Pandas and NumPy. It contains a variety of code samples and features of NumPy and Pandas, and how to write regular expressions.
This book covers the MATLAB syntax and the environment suitable for someone with no programming background. The first four chapters present information on basic MATLAB programming including computing terminology, MATLAB specific syntax and control structures, operators, arrays and matrices. The next cluster covers grouping data, working with ......
As part of the best-selling Pocket Primer series, this book provides an overview of the major concepts to program using TensorFlow 2. The focus of this book is on basic programming instructions used in machine learning and deep learning. Includes companion files with source code (in Python) and figures. Features: Provides an overview of the ......
This book is designed for use as a primary textbook for a course in cloud computing or as a resource for professionals in industry seeking to explore cloud services. The book highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. It also provides ......
The Inside Story of Y2K Panic and the Greatest Cooperative Effort Ever
The new millennium. The Year 2000. Beyond Mayan prophecies, a more immediate danger loomed: Two-digit year date fields had been used by software programmers to conserve expensive computer storage space for decades. As a consequence, legacy systems reading "00" on January 1, 2000 would most probably interpret the date as 1900. ......
The Nature of Facts and Lies in the Post-Truth Era
Does the idea of a world in which facts mean nothing cause anxiety? Fear? Maybe even paranoia? Disinformation: The Nature of Facts and Lies in the Post-Truth Era cannot cure all the ills of a post-truth world, but by demonstrating how the emergence of digital technology into everyday life has knitted together a number of seemingly loosely related ......
In this book, we describe the online world that youth begin to encounter, often without adult oversight. It is a critical time where they are first getting to know both the outside world and form their own identity. We explain the social forces and sways that influence kids' attitudes and choices, from peers in social apps to influencers. We show ......