Skip to Main Content

Computing

Books

The quickest way to find out if the library holds the book you need is to search the TU Dublin Library Catalogue.       This will tell you where the textbook is located, the shelf number and if it's available to borrow or available in eBook format.  Search by Title or Author to get the quickest result.  Refine your search by date to see the latest editions.

Finding eBooks

TU Dublin Library Services subscribes to thousands of eBooks.

There are several ways for you to search and access eBooks off-campus:

When accessing the majority of eBooks off-campus you will be required to authenticate using your Student Number and Library PIN or TU Dublin email password.

The following publishers require you to register for a free account with them before you can access their eBooks. Click on the link below to register.

eBook Selection (Click on the image to open)

New Books (click image to open)

Build a Large Language Model (from Scratch)

Learn how to create, train, and tweak large language models (LLMs) by building one from the ground up! In  Build a Large Language Model (from Scratch) bestselling author Sebastian Raschka guides you step by step through creating your own LLM. Each stage is explained with clear text, diagrams, and examples. You'll go from the initial design and creation, to pretraining on a general corpus, and on to fine-tuning for specific tasks. Build a Large Language Model (from Scratch) teaches you how to: Plan and code all the parts of an LLM Prepare a dataset suitable for LLM training Fine-tune LLMs for text classification and with your own data Use human feedback to ensure your LLM follows instructions Load pretrained weights into an LLM Build a Large Language Model (from Scratch) takes you inside the AI black box to tinker with the internal systems that power generative AI. As you work through each key stage of LLM creation, you'll develop an in-depth understanding of how LLMs work, their limitations, and their customization methods. Your LLM can be developed on an ordinary laptop, and used as your own personal assistant.   About the technology  Physicist Richard P. Feynman reportedly said, "I don't understand anything I can't build." Based on this same powerful principle, bestselling author Sebastian Raschka guides you step by step as you build a GPT-style LLM that you can run on your laptop. This is an engaging book that covers each stage of the process, from planning and coding to training and fine-tuning.

VCP-DCV for VSphere 8. x Cert Guide

Learn, prepare, and practice for VCP-DCV for vSphere 8.x Professional exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.   VCP-DCV for vSphere 8.x Cert Guide from Pearson IT Certification helps you prepare to succeed on the VCP-DCV for vSphere 8.x Professional exam by directly addressing the exam's objectives as stated by VMware®. Leading instructors and experts John Davis and Steve Baca share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes Complete coverage of the exam objectives and a test-preparation routine designed to help you pass the exams Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Chapter-ending Key Topic tables, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports An online, interactive Flash Cards application to help you drill on Key Terms by chapter A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that ensure your exam success. This study guide helps you master all the topics on the VMware vSphere 8.x Professional exam, including: Describing vSphere architecture, requirements, and features Implementing, configuring, and managing vSphere storage Configuring secured access and networking in a vSphere environment Monitoring, managing, and optimizing the services and resources in a vSphere environment Provisioning, migrating, and supporting virtual machines in a vSphere environment

Virtualization Essentials

Learn the fundamental concepts and skills by building your own virtual machine Virtualization is more important than ever, it's how the Cloud works! As virtualization continues to expand, millions of companies all over the world are leveraging virtualization. IT professionals need a solid understanding of virtualization concepts and software to compete in today's job market. The updated new edition of Virtualization Essentials teaches you the core concepts and skills necessary to work with virtualization environments. Designed for new and aspiring IT professionals alike, this practical guide offers an applied, real-world approach to help you develop the necessary skill set to work in Cloud computing, the DevOps space, and the rest of the virtual world. Virtualization Essentials simplifies complex concepts to ensure that you fully understand what virtualization is and how it works within the computing environment. Step by step, you'll learn how to build your own virtual machine, both by scratch and by migrating from physical to virtual. Each user-friendly chapter contains an overview of the topic, a discussion of key concepts, hands-on tutorials, end-of-chapter exercises, review questions, and more. Configure and manage a virtual machine's CPU, memory, storage, and networking Distinguish between Type 1 and Type 2 hypervisors Compare the leading hypervisor products in today's market Configure additional devices for a virtual machine Make considerations for availability Understand how cloud computing leverages virtualization Virtualization Essentials is an invaluable 'learn-by-doing' resource for new and aspiring IT professionals looking to gain a solid foundation in virtualization. It is also an excellent reference for more experienced IT admins responsible for managing on-premise and remote computers and workstations.

The SAGE Handbook of Human-Machine Communication

The SAGE Handbook of Human-Machine Communication has been designed to serve as the touchstone text for researchers and scholars engaging in new research in this fast-developing field. Chapters provide a comprehensive grounding of the history, methods, debates and theories that contribute to the study of human-machine communication. Further to this, the Handbook provides a point of departure for theorizing interactions between people and technologies that are functioning in the role of communicators, and for considering the theoretical and methodological implications of machines performing traditionally 'human' roles. This makes the Handbook the first of its kind, and a valuable resource for students and scholars across areas such as communication, media and information studies, and computer science, as well as for practitioners, engineers and researchers interested in the foundational elements of this emerging field. Part 1: Histories and Trajectories Part 2: Approaches and Methods Part 3: Concepts and Contexts Part 4: Technologies and Applications

Black Hat Python, 2nd Edition

Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you'll explore the darker side of Python's capabilities- everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans. All of the code in this edition has been updated to Python 3.x. You'll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites. You'll even learn how to- Create a trojan command-and-control server using GitHubDetect sandboxing and automate common malware tasks like keylogging and screenshottingExtend the Burp Suite web-hacking toolEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machineAbuse Windows COM automationExfiltrate data from a network undetected When it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python.

AI Snake Oil

From two of TIME's 100 Most Influential People in AI, what you need to know about AI--and how to defend yourself against bogus AI claims and products Confused about AI and worried about what it means for your future and the future of the world? You're not alone. AI is everywhere--and few things are surrounded by so much hype, misinformation, and misunderstanding. In AI Snake Oil, computer scientists Arvind Narayanan and Sayash Kapoor cut through the confusion to give you an essential understanding of how AI works and why it often doesn't, where it might be useful or harmful, and when you should suspect that companies are using AI hype to sell AI snake oil--products that don't work, and probably never will. While acknowledging the potential of some AI, such as ChatGPT, AI Snake Oil uncovers rampant misleading claims about the capabilities of AI and describes the serious harms AI is already causing in how it's being built, marketed, and used in areas such as education, medicine, hiring, banking, insurance, and criminal justice. The book explains the crucial differences between types of AI, why organizations are falling for AI snake oil, why AI can't fix social media, why AI isn't an existential risk, and why we should be far more worried about what people will do with AI than about anything AI will do on its own. The book also warns of the dangers of a world where AI continues to be controlled by largely unaccountable big tech companies. By revealing AI's limits and real risks, AI Snake Oil will help you make better decisions about whether and how to use AI at work and home.

Irreplaceable

AI and automation are reshaping our world at an unprecedented speed, making traditional skills obsolete and opening new doors of opportunity. Those who adapt and develop unique, irreplaceable abilities will thrive. What is your plan to remain indispensable, protect your business, and safeguard your humanity in this AI-driven world? Pascal Bornet--award-winning AI expert, former McKinsey executive, and Top Voice in Technology with over 1 million LinkedIn followers--draws on 20 years of pioneering research to introduce the Three Competencies of the Future. These crucial abilities unlock the secrets of thriving in an AI-driven world while amplifying our uniquely human qualities. In this book, you will discover practical strategies to: Better understand AI, where it's going, and what you need to look out for to survive and thrive. Avoid falling into the "AI Obesity" trap and its devastating consequences for you and your business. Elevate your career by learning how to leverage AI to your advantage and not lose your job to automation. Master the "Humics"--uniquely human abilities that AI can NEVER replicate--to create powerful human-AI synergies for you and your company. Scale your business into a powerhouse of efficiency, innovation, and trust. Whether you're future-proofing your career, steering your organization through disruption, or preparing your children for tomorrow, IRREPLACEABLE offers a universal and comprehensive framework. AI is not the destination; it's the vehicle that takes us to a more human future. This book is your GPS. Stand out. Become IRREPLACEABLE.

Data Mining

Data Mining: Concepts and Techniques, Fourth Edition introduces concepts, principles, and methods for mining patterns, knowledge, and models from various kinds of data for diverse applications. Specifically, it delves into the processes for uncovering patterns and knowledge from massive collections of data, known as knowledge discovery from data, or KDD. It focuses on the feasibility, usefulness, effectiveness, and scalability of data mining techniques for large data sets. After an introduction to the concept of data mining, the authors explain the methods for preprocessing, characterizing, and warehousing data. They then partition the data mining methods into several major tasks, introducing concepts and methods for mining frequent patterns, associations, and correlations for large data sets; data classificcation and model construction; cluster analysis; and outlier detection. Concepts and methods for deep learning are systematically introduced as one chapter. Finally, the book covers the trends, applications, and research frontiers in data mining.

PHP Crash Course

PHP Crash Course takes you from beginner to professional PHP programming, through hundreds of in-depth examples and hands-on exercises. You'll explore best practices for developing fast, secure, and easy-to-maintain websites, while establishing a broad foundation of programming knowledge and experience. You'll also learn how to create consistent, modern-looking web pages with easily customizable templates by combining dynamic PHP scripts, static HTML code, and Bootstrap styling; how to write scripts that can communicate with MySQL to enable data-rich web apps; and how to implement best-practice website security. As you follow along, you'll learn real-life patterns and modern programming techniques for creating, extending, and modifying web applications, all using the powerful PHP language.

Java Foundations

For courses in Java Programming. A comprehensive, cohesive, and seamless exploration of Java programming Java Foundations is a comprehensive textbook for introductory programming sequences. The versatile layout supports a two-or three-semester sequence and introduces students to the world of programming-from basic programming concepts to the design and implementation of complex data structures. Inspired by the success of their industry-leading text, Java Software Solutions, authors Lewis, DePasquale, and Chase build a solid framework for lasting comprehension. The 5th Edition is updated to keep the content fully up-to-speed while incorporating changes from user feedback. The biggest change in this edition is the overhaul of the graphical content to fully embrace the JavaFX platform, which has replaced Swing as the supported technology for graphics and Graphical User Interfaces (GUIs) in Java. The switch over to the new approach simplifies GUI development and provides better opportunities to discuss object-oriented programming.

Learn PostgreSQL

This new edition will help you learn PostgreSQL from scratch with the latest version, providing a complete focused view on aspects like configuration, high performance, partitioning, backup, server-side programming and replication.Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Learn the fundamentals of PostgreSQL 16, including SQL statements, replication, and security Enhance your learning journey with the provided Docker images for practical hands-on exercises and tests at the end of each chapter Get new and improved examples, use-cases, and scenarios specifically for concepts like partitioning, replication, back-up and restore, cluster configuration, monitoring and others Book Description The latest edition of this PostgreSQL book will help you to start using PostgreSQL from absolute scratch, helping you to quickly understand the internal workings of the database. With a structured approach and practical examples, go on a journey that covers the basics, from SQL statements and how to run server-side programs, to configuring, managing, securing, and optimizing database performance.This new edition will not only help you get to grips with all the recent changes within the PostgreSQL ecosystem but will also dig deeper into concepts like partitioning and replication with a fresh set of examples. The book is also equipped with Docker images for each chapter which makes the learning experience faster and easier. Starting with the absolute basics of databases, the book sails through to advanced concepts like window functions, logging, auditing, extending the database, configuration, partitioning, and replication. It will also help you seamlessly migrate your existing database system to PostgreSQL and contains a dedicated chapter on disaster recovery. Each chapter ends with practice questions to test your learning at regular intervals.By the end of this book, you will be able to install, configure, manage, and develop applications against a PostgreSQL database. What you will learn Gain a deeper understanding of PostgreSQL internals like transactions, MVCC, security and replication Enhance data management with PostgreSQL's latest partitioning features Choose the right replication strategy for your database See concrete examples of how to migrate data from another database, perform backups and restores, monitor your PostgreSQL installation and more Ensure security and compliance with schemas and user privileges Create customized database functions and extensions Get to grips with server-side programming, window functions, and triggers Who this book is for Learning PostgresSQL 16 book is for anyone interested in learning about the PostgreSQL database from scratch. Anyone looking to build robust data warehousing applications and scale the database for high-availability and performance using the latest features of PostgreSQL will also find this book useful. Although prior knowledge of PostgreSQL is not required, familiarity with databases is expected. ]]>

Head First Python

What will you learn from this book? Want to learn the Python language without slogging your way through how-to manuals? With Head First Python, you'll quickly grasp Python's fundamentals by working with built-in data structures and functions. You'll build your very own web app, which--once it's ready for prime time--runs in the cloud. You'll learn how to wrangle data with Python, scrape data from the web, feed data to pandas, and interact with databases. This third edition is a complete learning experience that will help you become a bona fide Python programmer in no time. What's so special about this book? If you've read a Head First book, you know what to expect: a visually rich format designed for the way your brain works. If you haven't, you're in for a treat. With this book, you'll learn Python through a multisensory experience that engages your mind--rather than a text-heavy approach that puts you to sleep.

Evidence-Based Cybersecurity

The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals' and organizations' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies "in the wild" have been dismissed in the process of encouraging innovation and marketing. Consequently, governmental organizations, public, and private companies allocate a considerable portion of their operations budgets to protecting their computer and internet infrastructures without understanding the effectiveness of various tools and policies in reducing the myriad of risks they face. Unfortunately, this practice may complicate organizational workflows and increase costs for government entities, businesses, and consumers. The success of the evidence-based approach in improving performance in a wide range of professions (for example, medicine, policing, and education) leads us to believe that an evidence-based cybersecurity approach is critical for improving cybersecurity efforts. This book seeks to explain the foundation of the evidence-based cybersecurity approach, review its relevance in the context of existing security tools and policies, and provide concrete examples of how adopting this approach could improve cybersecurity operations and guide policymakers' decision-making process. The evidence-based cybersecurity approach explained aims to support security professionals', policymakers', and individual computer users' decision-making regarding the deployment of security policies and tools by calling for rigorous scientific investigations of the effectiveness of these policies and mechanisms in achieving their goals to protect critical assets. This book illustrates how this approach provides an ideal framework for conceptualizing an interdisciplinary problem like cybersecurity because it stresses moving beyond decision-makers' political, financial, social, and personal experience backgrounds when adopting cybersecurity tools and policies. This approach is also a model in which policy decisions are made based on scientific research findings.

CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE ENCOR 350-401 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert authors Brad Edgeworth, Ramiro Garza Rios, Jason Gooley, and Dave Hucaby share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which let you decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports More than 90 minutes of video mentoring from the author A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Content Update Program: This fully updated second edition includes the latest topics and additional information covering changes to the latest ENCOR 350-401 exam. Visit ciscopress.com/newcerts for information on annual digital updates for this book that align to Cisco exam blueprint version changes. This official study guide helps you master all the topics on the CCNP and CCIE Enterprise Core ENCOR exam, including Enterprise network architecture and designs Virtualization concepts and technologies Network assurance Infrastructure components (Layer 2/3 forwarding, Wireless, and IP Services) Security Automation Companion Website: The companion website contains more than 200 unique practice exam questions, practice exercises, a study planner, and 90 minutes of video training.

Machine Learning for Text

This second edition textbook covers a coherently organized framework for text analytics, which integrates material drawn from the intersecting topics of information retrieval, machine learning, and natural language processing. Particular importance is placed on deep learning methods. The chapters of this book span three broad categories: 1. Basic algorithms: Chapters 1 through 7 discuss the classical algorithms for text analytics such as preprocessing, similarity computation, topic modeling, matrix factorization, clustering, classification, regression, and ensemble analysis. 2. Domain-sensitive learning and information retrieval: Chapters 8 and 9 discuss learning models in heterogeneous settings such as a combination of text with multimedia or Web links. The problem of information retrieval and Web search is also discussed in the context of its relationship with ranking and machine learning methods.  3. Natural language processing: Chapters 10 through 16 discuss various sequence-centric and natural language applications, such as feature engineering, neural language models, deep learning, transformers, pre-trained language models, text summarization, information extraction, knowledge graphs, question answering, opinion mining, text segmentation, and event detection.  Compared to the first edition, this second edition textbook (which targets mostly advanced level students majoring in computer science and math) has substantially more material on deep learning and natural language processing. Significant focus is placed on topics like transformers, pre-trained language models, knowledge graphs, and question answering.

Object-Oriented Systems Analysis And Design

The fourth edition of Object- Oriented Systems Analysis and Design has been revised and updated to reflect the most up-to-date approaches to information systems development. Still a best-seller in its field, Bennett's, McRobb's and Farmer's text remains a key teaching resource for Systems Analysis and Design courses at both undergraduate and postgraduate level. The book provides a clear, practical framework for development that uses all the major techniques from UML 2.2. It follows an iterative and incremental approach based on the industry-standard Unified Process, placing systems analysis and design in the context of the whole systems lifestyle. Structured in four parts, the first provides the background to information systems analysis and design and to object-orientation. The second part focuses on the activities of requirements gathering and systems analysis, as well as the basic notation of UML. Part three covers the activities of systems architecture and design, and UML notation for object design, and the book concludes with the implementation of systems and the issues of how the systems life cycle is organized and how reusable components can be developed.

Technological Approaches to Medical and Pharmaceutical Education

Technological advancements have revolutionized medical and pharmaceutical education, offering innovative approaches to enhance learning and improve outcomes. From virtual reality (VR) simulations and interactive 3D models to artificial intelligence (AI) and online platforms, technology provides various tools that cater to the needs of modern healthcare education. These advancements facilitate a deeper understanding of anatomy, drug mechanisms, and clinical procedures while enabling personalized learning experiences, real-time assessments, and global collaboration. As the healthcare field changes, integrating technology into medical and pharmaceutical education is crucial when developing new skilled professionals. Technological Approaches to Medical and Pharmaceutical Education explores the integration of modern technologies in the teaching and learning processes within the fields of medicine and pharmacy. It addresses the benefits and challenges of incorporating these technologies into educational frameworks, aiming to enhance learning outcomes, improve clinical skills, and prepare students for evolving healthcare organizations. This book covers topics such as medical technology, online learning, and artificial intelligence, and is a useful resource for educators, medical professionals, pharmacologists, academicians, and researchers.

Practical Automation with PowerShell

Take PowerShell beyond simple scripts and build time-saving automations for your team, your users, and the world. In  Practical Automation with PowerShell you will learn how to: Build PowerShell functions to automate common and complex tasks Create smart automations that are adaptable to new challenges Structure your code for sharing and reusability Store and secure your automations Execute automations with Azure Automation, Azure Functions, and Jenkins Share your automations with your team and non-technical colleagues Store and retrieve data, credentials, and variables Use source control solutions to maintain and test code changes Provide front-end UI solutions for PowerShell automations Practical Automation in PowerShell reveals how you can use PowerShell to build automation solutions for a huge number of common admin and DevOps tasks. It takes you beyond scripting basics and shows you how to handle the unforeseen complexities that can keep automations from becoming reusable and resilient. You''ll discover tools and platforms that let you share your automations with your team and even roll them out to non-technical users through easy-to-understand Sharepoint frontends. about the technology Most repetitive tasks you face as an administrator or DevOps engineer can be automated using PowerShell. Mastering the basics of this powerful language, along with some best practices for saving and sharing your automations, can radically improve the consistency and efficiency of your work. about the book Practical Automation with PowerShell teaches you how to build, organize, and share useful automations with PowerShell. You''ll start with development skills you might not have learned as a sysadmin, including techniques to help you structure and manage your code, and common pitfalls to avoid. You''ll quickly progress to essential factors for sharable automations, such as securely storing information, connecting to remote machines, and creating automations that can adapt to different use cases. Finally, you''ll take your automations out into the world. You''ll learn how to share them with your team or end users, and build front ends that allow non-technical people to run them at the touch of a button.

Beyond the Algorithm

As artificial intelligence (AI) becomes more and more woven into our everyday lives--and underpins so much of the infrastructure we rely on--the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.   Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals--and, increasingly, users--are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.   · An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future · Introduction to AI models and implementations, as well as examples of emerging AI trends · Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment · Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology · A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas · An academic resource and guide for the evolving technical and intellectual challenges of AI · Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.

Building LLM Powered Applications

Get hands-on with GPT 3.5, GPT 4, LangChain, Llama 2, Falcon LLM and more, to build LLM-powered sophisticated AI applicationsGet With Your Book: PDF Copy, AI Assistant, and Next-Gen Reader Free Key Features Embed LLMs into real-world applications Use LangChain to orchestrate LLMs and their components within applications Grasp basic and advanced techniques of prompt engineering Book Description Building LLM Powered Applications delves into the fundamental concepts, cutting-edge technologies, and practical applications that LLMs offer, ultimately paving the way for the emergence of large foundation models (LFMs) that extend the boundaries of AI capabilities.The book begins with an in-depth introduction to LLMs. We then explore various mainstream architectural frameworks, including both proprietary models (GPT 3.5/4) and open-source models (Falcon LLM), and analyze their unique strengths and differences. Moving ahead, with a focus on the Python-based, lightweight framework called LangChain, we guide you through the process of creating intelligent agents capable of retrieving information from unstructured data and engaging with structured data using LLMs and powerful toolkits. Furthermore, the book ventures into the realm of LFMs, which transcend language modeling to encompass various AI tasks and modalities, such as vision and audio.Whether you are a seasoned AI expert or a newcomer to the field, this book is your roadmap to unlock the full potential of LLMs and forge a new era of intelligent machines. What you will learn Explore the core components of LLM architecture, including encoder-decoder blocks and embeddings Understand the unique features of LLMs like GPT-3.5/4, Llama 2, and Falcon LLM Use AI orchestrators like LangChain, with Streamlit for the frontend Get familiar with LLM components such as memory, prompts, and tools Learn how to use non-parametric knowledge and vector databases Understand the implications of LFMs for AI research and industry applications Customize your LLMs with fine tuning Learn about the ethical implications of LLM-powered applications Who this book is for Software engineers and data scientists who want hands-on guidance for applying LLMs to build applications. The book will also appeal to technical leaders, students, and researchers interested in applied LLM topics.We don't assume previous experience with LLM specifically. But readers should have core ML/software engineering fundamentals to understand and apply the content. ]]>

Foundation Models for Natural Language Processing

This open access book provides a comprehensive overview of the state of the art in research and applications of Foundation Models and is intended for readers familiar with basic Natural Language Processing (NLP) concepts.  Over the recent years, a revolutionary new paradigm has been developed for training models for NLP. These models are first pre-trained on large collections of text documents to acquire general syntactic knowledge and semantic information. Then, they are fine-tuned for specific tasks, which they can often solve with superhuman accuracy. When the models are large enough, they can be instructed by prompts to solve new tasks without any fine-tuning. Moreover, they can be applied to a wide range of different media and problem domains, ranging from image and video processing to robot control learning. Because they provide a blueprint for solving many tasks in artificial intelligence, they have been called Foundation Models.  After a brief introduction to basic NLP models the main pre-trained language models BERT, GPT and sequence-to-sequence transformer are described, as well as the concepts of self-attention and context-sensitive embedding. Then, different approaches to improving these models are discussed, such as expanding the pre-training criteria, increasing the length of input texts, or including extra knowledge. An overview of the best-performing models for about twenty application areas is then presented, e.g., question answering, translation, story generation, dialog systems, generating images from text, etc. For each application area, the strengths and weaknesses of current models are discussed, and an outlook on further developments is given. In addition, links are provided to freely available program code. A concluding chapter summarizes the economic opportunities, mitigation of risks, and potential developments of AI.

Introduction to Software Testing

Get started and hit the ground running in the world of software testing. This simple and practical guide teaches you the fundamentals of software testing, with no prior experience required. You will start by learning functional and non-functional software testing. Then you will gain an understanding of the primary responsibilities of a tester in the Software Development Life Cycle and how to plan and execute testing activities. You will also learn how testing applies to an agile environment, what challenges you might face in your day-to-day life as a tester, and how to overcome them.  You will learn the most commonly used test design techniques, with ample examples and exercises to practice yourself. By the end of this book, you will understand the software testing ecosystem, from its types, techniques, and tools, to test planning, execution, and reporting. What You Will Learn Master the fundamentals of Software Testing Gain an understanding of different software testing types Plan and execute testing activities Apply test design techniques to concrete examples  Who This Book Is For Software testers, developers, project managers, and other stakeholders involved in software testing.

This work is licensed under CC BY-NC-SA 4.0