Tin học (396)



Subscribe to this collection to receive daily e-mail notification of new additions

List of document in the collection

Item Submit Date - Descending [/1]

  • TVS.003339 - Compositing visual effects in after effects_ essential techniques (2016, Focal Press)_TT.pdf.jpg
  • Sách/Book


  • Authors: Lanier, Lee (2015)

  • In Compositing Visual Effects in After Effects, industry veteran Lee Lanier covers all the common After Effects techniques any serious visual effects artist needs to know, combining the latest, professionally-vetted studio practices and workflows with multi-chapter projects and hands-on lessons.

  • TVS.006010_TT_Jake VanderPlas - Python Data Science Handbook_ Essential Tools for Working with Data-O_Reilly Media (2023).pdf.jpg
  • Sách/Book


  • Authors: Vanderplas, Jacob T (2023)

  • Python is a first-class tool for many researchers, primarily because of its libraries for storing, manipulating, and gaining insight from data. Several resources exist for individual pieces of this data science stack, but only with the new edition of Python Data Science Handbook do you get them all--IPython, NumPy, pandas, Matplotlib, scikit-learn, and other related tools

  • TVS.006012_TT_Max Pumperla, Edward Oakes, Richard Liaw - Learning Ray_ Flexible Distributed Python for Machine Learning-O_Reilly Media (2023).pdf.jpg
  • Sách/Book


  • Authors: Pumperla, Max (2023)

  • Get started with Ray, the open source distributed computer framework that simplifies the process of scaling comute-intensive Python workloads. With this practical book, Python programmers, data engineers, and data scientists will learn how to leverage Ray locally and spin with compute clusters. You'll be able to use Ray to structure and run machine learning programs at scale.

  • TVS.006013_TT_Katharine Jarmul - Practical Data Privacy (Final Release)-O_Reilly Media, Inc. (2023).pdf.jpg
  • Sách/Book


  • Authors: Jarmul, Katharine (2023)

  • Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differential privacy, federated learning, and encrypted computation. Based on hard-won lessons, this book provides solid advice and best practices for integrating breakthrough privacy-enhancing technologies into production systems.

  • TVS.006014_TT_Matt Stauffer - Laravel Up & Running-O_Reilly Media, Inc. (2023).pdf.jpg
  • Sách/Book


  • Authors: Stauffer, Matt (2023)

  • The third edition of this practical guide provides the definitive introduction to one of today's most popular web frameworks.

  • TVS.006015_TT_Marc Loy, Patrick Niemeyer, and Daniel Leuck - Learning Java, 6th Edition (Third Early Release)-O_Reilly Media, Inc. (2023).pdf.jpg
  • Sách/Book


  • Authors: Loy, Marc (2023)

  • This guide helps you: Learn the structure of the Java language and Java applications Write, compile, and execute Java applications Understand the basics of Java threading and concurrent programming Learn Java I/O basics, including local files and network resources Create compelling interfaces with an eye toward usability Learn how functional features have been integrated in Java Keep up with Java developments as new versions are released

  • TVS.006030_TT_Patrick Hall, James Curtis, and Parul Pandey - Machine Learning for High-Risk Applications_ Techniques for Responsible AI (11th Early Re.pdf.jpg
  • Sách/Book


  • Authors: Hall, Patrick (2023)

  • This book describes approaches to responsible AI—a holistic framework for improving AI/ML technology, business processes, and cultural competencies that builds on best practices in risk management, cybersecurity, data privacy, and applied social science. Authors Patrick Hall, James Curtis, and Parul Pandey created this guide for data scientists who want to improve real-world AI/ML system outcomes for organizations, consumers, and the public.

  • TVS.006040_TT_(Routledge International Handbooks) David E. Bloom, Alfonso Sousa-Poza, Uwe Sunde - The Routledge Handbook of the Economics of Ageing-Ro.pdf.jpg
  • Sách/Book


  • Authors: Bloom, David E (2023)

  • "Drawing on an international pool of scholars, this cutting-edge Handbook surveys the micro, macro and institutional aspects of the economics of ageing. Structured in seven parts, the volume addresses a broad range of themes, including health economics, labour economics, pensions and social security, generational accounting, wealth inequality and regional perspectives. Each chapter combines a succinct overview of the state of current research with a sketch of a promising future research agenda. This Handbook will be an essential resource for advanced students, researchers and policymakers looking at the economics of ageing across the disciplines of economics, demography, public policy...

  • TVS.006032_TT_Donald Farmer, Jim Horbury - Embedded Analytics_ Integrating Analysis with the Business Workflow-O_Reilly Media (2023).pdf.jpg
  • Sách/Book


  • Authors: Farmer, Donald (2023)

  • This book explores the most important techniques for taking that adoption further: embedding analytics into the workflow of our everyday operations. Author Donald Farmer, principal of TreeHive Strategy, shows business users how to improve decision-making without becoming analytic specialists.

  • TVS.006033_TV_David Pine - Learning Blazor-O’Reilly Media, Inc. (2023).pdf.jpg
  • Sách/Book


  • Authors: Pine, David (2023)

  • Take advantage of your C# skills to build UI components and client-side experiences with .NET. With this practical guide, you'll learn how to use Blazor WebAssembly to develop next-generation web experiences. Built on top of ASP.NET Core, Blazor represents the future of .NET single-page applications (SPA) investments. Author David Pine, who focuses on

  • TVS.006034_TT_Ben Weidig - A Functional Approach to Java_ Augmenting Object-Oriented Java Code with Functional Principles-O_Reilly Media (2023).pdf.jpg
  • Sách/Book


  • Authors: Weidig, Ben (2023)

  • ava developers usually tackle the complexity of software development through object-oriented programming (OOP). But not every problem is a good match for OOP. The functional programming (FP) paradigm offers you another approach to solving problems, and Java provides easy-to-grasp FP tools such as lambda expressions and Streams. If you're interested in applying FP concepts to your Java code, this book is for you.

  • TVS.006035_TT_Anthony Sarkis - Training Data for Machine Learning_ Human Supervision from Annotation to Data Science (8th Early release)-O_Reilly Medi.pdf.jpg
  • Sách/Book


  • Authors: Sarkis, Anthony (2023)

  • Training Data controls the system by defining the ground truth goals for the creation of Machine Learning models. This involves technical representations, people decisions, processes, tooling, system design, and a variety of new concepts specific to Training Data. In a sense, a Training Data mindset is a paradigm upon which a growing list of theories, research and standards are emerging. A Machine Learning (ML) Model that is created as the end result of a ML Training Process.

  • TVS.006036_TT_Ali Iranmanesh - Frontiers of Quality Electronic Design (QED). AI, IoT and Hardware Security-Springer (2023) (1).pdf.jpg
  • Sách/Book


  • Authors: Ali Iranmanesh (2023)

  • This book explores the latest trends in several key topics related to quality electronic design, with emphasis on Hardware Security, Cybersecurity, Machine Learning, and application of Artificial Intelligence (AI). The book includes topics in nonvolatile memories (NVM), Internet of Things (IoT), FPGA, and Neural Networks.

  • TVS.006037_TT_ Kyle Gallatin and Chris Albon - Machine Learning with Python Cookbook, 2nd Edition (6th Early Release)-O_Reilly Media, Inc. (2023).pdf.jpg
  • Sách/Book


  • Authors: Gallatin, Kyle (2023)

  • This practical guide provides more than 200 self-contained recipes to help you solve Machine Learning challenges you may encounter in your work. If you're comfortable with Python and its libraries, including pandas and scikit-learn, you'll be able to address specific problems all the way from loading data to training models and leveraging neural networks

  • TVS.006038_TT_(Texts in Computer Science) Zhe Hou - Fundamentals of Logic and Computation_ With Practical Automated Reasoning and Verification-Springe.pdf.jpg
  • Sách/Book


  • Authors: Hou, Zhe (2021)

  • This textbook aims to help the reader develop an in-depth understanding of logical reasoning and gain knowledge of the theory of computation. The book combines theoretical teaching and practical exercises; the latter is realised in Isabelle/HOL, a modern theorem prover, and PAT, an industry-scale model checker. I also give entry-level tutorials on the two software to help the reader get started.

  • TVS.006031_TT_Sean P. Kane - Docker_ Up & Running_ Shipping Reliable Containers in Production, 3rd Edition-O_Reilly Media (2023).pdf.jpg
  • Sách/Book


  • Authors: Kane, Sean (2023)

  • This edition includes significant updates to the examples and explanations that reflect the substantial changes that have occurred since Docker was first released almost a decade ago. Sean Kane and Karl Matthias have updated the text to reflect best practices and to provide additional coverage of new features like BuildKit, multi-architecture image support, rootless containers

  • TVS.005119_TT_Fei Hu, Xiali Hei - AI, Machine Learning and Deep Learning_ A Security Perspective-CRC Press (2023).pdf.jpg
  • Sách/Book


  • Authors: Hu, Fei (2023)

  • Today Artificial Intelligence (AI) and Machine/Deep Learning (ML/DL) have become the hottest areas in the information technology. In our society, there are so many intelligent devices that rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms/tools have used in many Internet applications and electronic devices, they are also vulnerable to various attacks and threats. The AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, and many other attacks/threats. Those attacks make the AI products dangerous to use