—————
—————
▎Table of Contents
Part 1. Understanding and Exploring DeepSeek
1. What Is DeepSeek?
2. Deep Dive into DeepSeek
3. Prompting DeepSeek
Part 2. Using DeepSeek
4. Using DeepSeek. Case Studies
5. Building with DeepSeek
6. Agents with DeepSeek
Part 3. Distilling and Deploying DeepSeek
7. DeepSeek-Driven Fine-Tuning of Gemma 3 for Legal Reasoning
8. Deploying DeepSeek Models
9. Epilogue
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
1. Introduction to General Purpose Robotics
2. Robot Perception. Sensors and Image Processing
3. Robot Perception. 3D Data and Sensor Fusion
4. Foundation Models in Robotics
5. Simulation
6. Mapping, Localization, and Navigation
7. Reinforcement Learning and Control
8. Self-Driving Vehicles
9. Industrial Robotics
10. Humanoid Robotics
11. Data-Driven Robotics in Practice
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
1. Introduction
2. Prerequisites
3. Bootstrap
4. IO, IO, It’s Off to Work We Go…
5. Reactor
6. Data Access
7. HTTP
8. Testing
9. RSocket
10. Service Orchestration and Composition
11. Action!
Acknowledgements
12. About the Author
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1. Building the Foundations
1. Getting Started as an Azure Architect
2. Solution Architecture
3. Infrastructure Design
4. Working with Azure Kubernetes Service (AKS)
5. Working with Other Container Services
6. Developing and Designing Applications with Azure
Part 2. Designing Intelligent and Secure Architectures
7. Data Architecture
8. Artificial Intelligence Architecture
9. Security Architecture
10. Closing Thoughts and Next Steps
11. Unlock Your Exclusive Benefits
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
1. Thinking Computationally
2. Abstraction in Detail
3. Algorithmic Thinking and Complexity
4. Understanding the Machine
5. Data Structures
6. Reusing Your Code and Modularity
7. Outlining the Challenge
8. Building a Simple Command-Line Interface
9. Reading Data from Different Formats
10. Finding Information in Text
11. Clustering Data
12. Reflecting on What We Have Built
13. The Problems of Scale
14. Dealing with GPUs and Specialized Hardware
15. Profiling Your Code
16. Unlock Your Exclusive Benefits
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1. Foundations of LLM Security
1. Fundamentals and Introduction to Large Language Models
2. Securing Large Language Models
3. The Dual Nature of LLM Risks. Inherent Vulnerabilities and Malicious Actors
4. Mapping Trust Boundaries in LLM Architectures
5. Aligning LLM Security with Organizational Objectives and Regulatory Landscapes
Part 2. The OWASP Top 10 for LLM Applications
6. Identifying and Prioritizing LLM Security Risks with OWASP
7. Diving Deep. Profiles of the Top 10 LLM Security Risks
8. Mitigating LLM Risks. Strategies and Techniques for Each OWASP Category
9. Adapting the OWASP Top 10 to Diverse Deployment Scenarios
Part 3. Building Secure LLM Systems
10. Designing LLM Systems for Security. Architecture, Controls, and Best Practices
11. Integrating Security into the LLM Development Life Cycle. From Data Curation to Deployment
12. Operational Resilience. Monitoring, Incident Response, and Continuous Improvement
13. The Future of LLM Security. Emerging Threats, Promising Defenses, and the Path Forward
Appendices. Latest OWASP Top 10 for LLM and OWASP AIVSS Agentic AI Core Risks
A. OWASP Top 10 for LLM Applications - 2025 Update
B. OWASP AIVSS Core Agentic AI Security Risks
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1. Getting started with Kubernetes Autoscaling
1. Introduction to Kubernetes Autoscaling
2. Workload Autoscaling Overview
3. Workload Autoscaling with HPA and VPA
Part 2. Workload Autoscaling and KEDA
4. Kubernetes Event-Driven Autoscaling – Part 1
5. Kubernetes Event-Driven Autoscaling – Part 2
6. Workload Autoscaling Operations
Part 3. Node Autoscaling and Karpenter
7. Data Plane Autoscaling Overview
8. Node Autoscaling with Karpenter — Part 1
9. Node Autoscaling with Karpenter — Part 2
10. Karpenter Management Operations
Part 4. Use Cases, Patterns, and Recommendations
11. Practical Use Cases for Autoscaling in Kubernetes
12. Patterns and Recommendations
13. Unlock Your Exclusive Benefits
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1
—————
—————
▎Table of Contents
Part I: Getting Started
1 . Starting with Linux
2 . Creating the Perfect Linux Desktop
Part II: Becoming a Linux Power User
3 . Using the Shell
4 . Moving Around the Filesystem
5 . Working with Text Files
6 . Managing Running Processes
7 . Writing Simple Shell Scripts
Part III: Becoming a Linux System Administrator
8 . Learning System Administration
9 . Installing Linux
10 . Getting and Managing Software
11 . Managing User Accounts
12 . Managing Disks and Filesystems
Part IV: Becoming a Linux Server Administrator
13 . Understanding Server Administration
14 . Administering Networking
15 . Starting and Stopping Services
16 . Configuring a Print Server
17 . Configuring a Web Server
18 . Configuring an FTP Server
19 . Configuring a Windows File Sharing (Samba) Server
20 . Configuring an NFS File Server
21 . Troubleshooting Linux
22 . Configuring an Artificial Intelligence Chatbot
Part V: Learning Linux Security Techniques
23 . Understanding Basic Linux Security
24 . Understanding Advanced Linux Security
25 . Enhancing Linux Security with SELinux
26 . Securing Linux on a Network
Part VI: Engaging with Cloud Computing
27 . Shifting to Clouds and Containers
28 . Using Linux for Cloud Computing
29 . Deploying Linux to the Cloud
30 . Automating Apps and Infrastructure with Ansible
31 . Deploying Applications as Containers with Kubernetes
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
کتابفروشی آی تی هلو
—————
—————
▎Table of Contents
1. Introducing Real-World Web Development Using .NET
2. Building Websites Using ASP.NET Core MVC
3. Model Binding, Validation, and Data Using EF Core
4. Building and Localizing Web User Interfaces
5. Authentication and Authorization
6. Performance and Scalability Optimization Using Caching
7. Web User Interface Testing Using Playwright
8. Configuring and Containerizing ASP.NET Core Projects
9. Building Web Services Using ASP.NET Core Web API
10. Building Clients for Web Services
11. Testing and Debugging Web Services
12. Building Web Services Using ASP.NET Core OData
13. Building Web Services Using FastEndpoints
14. Web Content Management Using Umbraco CMS
15. Customizing and Extending Umbraco CMS
Epilogue
Appendix A. Answers to the Test Your Knowledge Questions
Appendix B. Setting Up Your Development Environment
Appendix C. Looking For Help
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
کتابفروشی آی تی هلو
—————
—————
▎Table of Contents
Part 1. Swift
1. Hello, Xcode
2. Simple Values and Types
3. Conditionals and Optionals
4. Range Operators and Loops
5. Collection Types
6. Functions and Closures
7. Classes, Structures, and Enumerations
8. Protocols, Extensions, and Error Handling
9. Swift Concurrency
Part 2. Design
10. Set Up the User Interface
11. Build the User Interface
12. Complete the User Interface
13. Modify App Screens
Part 3. Code
14. MVC and Table Views
15. Get Data into Table Views
16. Pass Data Between View Controllers
17. Core Location and MapKit
18. JSON Files
19. Custom Views
20. Camera and Photo Library
21. Search
22. Collection Views
Part 4. Features
23. Adopt Liquid Glass
24. Icon Composer
25. Apple Intelligence
26. Foundation Models
27. Test and Submit Your App to the App Store
28. Unlock Your Exclusive Benefits
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part I. Introduction
1. Remote Work is the Future
2. Symptoms of a Dysfunctional Remote Team
3. Effective Remote Teams
Part II. The Setup
4. Ecosystem
5. Onboarding
Part III. The Work
6. The Workweek
7. The Strike Team
Part IV. Keeping It Together
8. Handling Change and Growth
9. Building a Community
10. Longevity
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2
—————
—————
▎Table of Contents
Part 1: Getting started
1: Getting to know Redis
2: Anatomy of a Redis web application
Part 2: Core concepts
3: Commands in Redis
4: Keeping data safe and ensuring performance
5: Using Redis for application support
6: Application components in Redis
7: Search-based applications
8: Building a simple social network
Part 3: Next steps
9: Reducing memory use
10: Scaling Redis
11: Scripting Redis with Lua
appendix A: Quick and dirty setup
appendix B: Other resources and references
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1 First steps
1 What is OAuth 2.0 and why should you care?
2 The OAuth dance
Part 2 Building an OAuth 2 environment
3 Building a simple OAuth client
4 Building a simple OAuth protected resource
5 Building a simple OAuth authorization server
6 OAuth 2.0 in the real world
Part 3 OAuth 2 implementation and vulnerabilites
7 Common client vulnerabilities
8 Common protected resources vulnerabilities
9 Common authorization server vulnerabilities
10 Common OAuth token vulnerabilities
Part 4 Taking OAuth further
11 OAuth tokens
12 Dynamic client registration
13 User authentication with OAuth 2.0
14 Protocols and profiles using OAuth 2.0
15 Beyond bearer tokens
16 Summary and conclusions
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1—Foundations
1 Podman: A next-generation container engine
2 Command line
3 Volumes
4 Pods
Part 2—Design
5 Customization and configuration files
6 Rootless containers
Part 3—Advanced topics
7 Integration with systemd
8 Working with Kubernetes
9 Podman as a service
Part 4—Container security
10 Security container isolation
11 Additional security considerations
Appendix A—Podman-related container tools
Appendix B—OCI runtimes
Appendix C—Getting Podman
Appendix D—Contributing to Podman
Appendix E—Podman on macOS
Appendix F—Podman on Windows
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
1. Connect to and Transform Data
2. Exploring Data: Getting Familiar with the Tableau Desktop Interface
3. Analyzing Data in Tableau Desktop
4. Developing User Interactions
5. Combining Visualizations in Dashboards and Stories
6. Distributing and Sharing Your Visualizations
A. Practice Exam
B. Answer Key for the Practice Exam
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1. Laying the Groundwork for AI Success
1. Understanding the Perils of AI Products
2. Building the Enterprise AI Strategy
Part 2. Aligning Projects with Business Impact
3. Selecting High-Impact AI Projects
4. Beyond the Build. Gaining Leadership Support for AI Initiatives
5. Building an AI Proof of Concept and Measuring Your Solution
Part 3. Deploying and Proving ML Value
6. Beyond Accuracy. A Guide to Defining Metrics for Adoption
7. From Model to Market. Operationalizing ML Systems
8. From Metrics to Measurement. Experimentation and Causal Inference
Part 4. Emerging Topics. Generative AI and AI Agents
9. Generative AI in the Enterprise. Unlocking New Opportunities
10. Understanding GenAI Operations
11. AI Agents Explained
Part 5. Responsible AI and Governance
12. Introduction to Responsible AI
13. Implementing RAI Frameworks, Metrics, and Best Practices
14. Building Trustworthy LLMs and Generative AI
15. Regulatory and Legal Frameworks for Responsible AI
16. The Future of AI Optimization. Trends, Vision, and Responsible Implementation
17. Unlock Your Exclusive Benefits
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1. Foundations of Shading and Rendering in Unity
1. Using Post-Processing with URP
2. Creating Your First Shader with Shader Graph
3. Working with Surfaces
4. Working with Texture Mapping
5. Enhancing Realism. Unity Muse and Physically Based Rendering
Part 2. Advanced Shader Effects and Geometry Manipulation
6. Using Vertex Functions
7. Using Grab Passes
Part 3. Performance Optimization and Fullscreen Effects
8. Optimizing Shaders
9. Creating Screen Effects with Fullscreen Shaders
10. Gameplay and Screen Effects
Part 4. Section Custom Lighting and Advanced Shader Programming
11. Understanding Lighting Models
12. Developing Advanced Shading Techniques
13. Utilizing the HDRP
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3🔥1
—————
—————
▎Table of Contents
Part I: Fundamentals
1. Encryption
2. Randomness
3. Cryptographic Security
Part II: Symmetric Crypto
4. Block Ciphers
5. Stream Ciphers
6. Hash Functions
7. Keyed Hashing
8. Authenticated Encryption
Part III: Asymmetric Crypto
9. Hard Problems
10. RSA
11. Diffie–Hellman
12. Elliptic Curves
Part IV: Applications
13. TLS
14. Quantum and Post-Quantum
15. Cryptocurrency Cryptography
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1 WebAssembly for architects
1 Introducing Wasm on the server
2 Building server-side applications with Wasm modules
3 Enhancing portability and security with Wasm components
4 Interfacing Wasm with the underlying system
5 From machine learning to databases: Applications of Wasm
Part 2 WebAssembly for developers
6 Creating production-grade Wasm applications
7 Introduction to Wasm containers
8 Scalability for Wasm with Kubernetes
9 The future of Wasm
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM
—————
—————
▎Table of Contents
Part 1. Go Foundations - CLI, Monitoring, and APIs
1. Developing Command-Line Interfaces with Go
2. Packaging and Distributing Go CLIs
3. Integrating Go Applications with Prometheus
4. Writing Go Exporters for Prometheus
5. Building and Consuming RESTful APIs with Go
6. Working with gRPC and Microservices Architecture
Part 2. Build Custom Terraform Providers with Go
7. Using Go to Build Custom Terraform Providers
8. Writing Unit Tests and Integration Tests for Terraform Providers
9. Documenting and Publishing Terraform Providers
10. Automating Testing in Pipelines
Part 3. Go for Cloud Services
11. Integrating Go Applications with the AWS SDK
12. Integrating Go Applications with the Azure SDK
13. Serverless Computing Using AWS Lambda
14. Serverless Computing Using Azure Functions
15. Unlock Your Exclusive Benefits
~ کتابفروشی آی تی هلو
Please open Telegram to view this post
VIEW IN TELEGRAM