Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,081
- Biblia 1,868
- Derecho canónico 1,550
- Teología dogmática 1,436
- Teología 1,414
- Iglesia Católica 1,192
- Padres de la Iglesia 920
- Crítica e interpretación 881
- Moral cristiana 845
- Església Catòlica 790
- Filosofía 704
- Development 673
- Bíblia 623
- Application software 614
- Història 549
- Liturgia 528
- Teologia 489
- Engineering & Applied Sciences 484
- Pontificia Università Lateranense (Vaticano) 480
- Tomás de Aquino 462
- Patrística 422
- Computer programs 409
- Litúrgia 397
- Teología moral 389
- -Historia 385
- Obras anteriores a 1800 373
- Design 369
- History 352
- Obres anteriors al 1800 342
- Programming 321
-
64101
-
64102Publicado 2022Tabla de Contenidos: “…2.4 GHz (802.11g) -- 5 GHz (802.11a) -- 5 GHz (802.11h) -- 2.4 GHz/5 GHz (802.11n) -- 5 GHz (802.11ac) -- WiFi 6 (802.11ax) -- Comparing 802.11 Standards -- Range and Speed Comparisons -- Wireless Network Components -- Wireless Access Points -- Wireless Network Interface Card -- Wireless Antennas -- Installing a Wireless Network -- Ad Hoc Mode: Independent Basic Service Set -- Infrastructure Mode: Basic Service Set -- Wireless Controllers -- Mobile Hot Spots -- Signal Degradation -- Other Network Infrastructure Implementations -- Technologies That Facilitate the Internet of Things (IoT) -- Installing and Configuring WLAN Hardware -- Site Survey -- Providing Capacity -- Multiple Floors -- Location-Based WLAN -- Site Survey Tools -- Wireless Security -- Wireless Threats -- Open Access -- Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication -- Remote Authentication Dial-In User Service (802.1X) -- Temporal Key Integrity Protocol -- Wi-Fi Protected Access or WPA2 Pre-Shared Key -- Summary -- Exam Essentials -- Written Lab -- Review Questions -- Chapter 13 Using Statistics and Sensors to Ensure Network Availability -- Performance Metrics/Sensors -- Device/Chassis -- Network Metrics -- SNMP -- Traps -- Object Identifiers (OIDs) -- Management Information Bases (MIBs) -- Network Device Logs -- Log Reviews -- Logging Levels/Severity Levels -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants and Runts -- Encapsulation Errors -- Environmental Factors and Sensors -- Temperature -- Humidity -- Electrical -- Flooding -- Baselines -- NetFlow Data -- NetFlow Overview and Flows -- Uptime/Downtime -- Summary -- Exam Essentials -- Written Lab…”
Libro electrónico -
64103por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Capitolo 4 - Far crescere e sostenere gli insegnanti -- Introduzione -- Programmi di avvio alla professione e di tutoraggio/mentoring -- Disponibilità di programmi di avvio alla professione docente -- Tassi di partecipazione a programmi di avvio alla professione -- Disponibilità di programmi di tutoraggio/mentoring -- Tassi di partecipazione ai programmi di tutoraggio/mentoring -- Perché gli insegnanti partecipano ad attività di sviluppo professionale -- I tassi di partecipazione -- In quale maniera la partecipazione varia a seconda della caratteristiche degli insegnanti e della scuola? …”
Publicado 2016
Libro electrónico -
64104
-
64105Publicado 2010Tabla de Contenidos: “…Display Advertising -- Sponsorships and Affiliate Advertising -- Ad Exchanges -- Chapter 64 Email Marketing -- Chapter 65 Mobility Marketing -- Widgets, Gadgets, and Mobile Applications -- A Growing Tidal Wave of Opportunity -- How Companies Use Mobile Phones to Drive Business -- Chapter 66 Social Media: Build Your Brand and Connect with Customers -- A Shift of Power -- The Real Value of Social Media -- Social Media Principles -- Chapter 67 What We Know So Far: Surprising Statistics -- Business Results from Social Media -- Chapter 68 Measuring the Effectiveness of Social Media -- Operationalize Social Media -- Chapter 69 Social Media Networks -- LinkedIn -- Facebook -- Twitter -- Social Bookmarking Sites -- Chapter 70 The Blogosphere -- Getting Started -- Chapter 71 Social Media Strategy and Planning Guide -- Social Media Strategy -- Chapter 72 Word of Mouth: Viral Marketing and Buzz -- Stunts and Pranksters -- Historical Milestone -- Chapter 73 Public Relations -- What's New, Who Cares? …”
Libro electrónico -
64106Publicado 2020Tabla de Contenidos: “…12.5.8 Organisation im geprüften Bereich -- 12.5.9 Herausforderungen im Anwendungsbereich Data Governance -- 12.5.10 Fazit der Prüfung -- 12.6 Prüfungsansätze -- 12.6.1 Prüfungsstandards und Frameworks -- 12.6.2 Monothematischer Ansatz vs. ganzheitlicher Ansatz -- Monothematischer Ansatz -- Ganzheitlicher Ansatz -- 12.7 Fazit und Ausblick -- 13 Data Governance im Kontext von MaRisk AT 4.3.4: prototypische Umsetzung einer Audit-Anwendung zur Einschätzung des Erfüllungsgrades -- 13.1 Anforderungen an die Data Governance gemäß MaRisk AT 4.3.4 -- 13.1.1 Einführung -- 13.1.2 MaRisk AT 4.3.4 im Überblick -- Anforderung I - Aggregation von Risikodaten -- Anforderung II - Datenstruktur und Datenhierarchie -- Anforderung III - Auswertbarkeit nach verschiedenen Kategorien -- Anforderung IV - Andere im Institut vorhandene Informationen -- Anforderung V - Risikodaten in Stressphasen -- Anforderung VI - Ad-hoc-Informationen -- Anforderung VII - Überprüfung durch eine unabhängige Stelle -- 13.1.3 Abgeleitete Anforderungen aus Data-Governance-Sicht -- 13.2 Prototypische Umsetzung -- 13.2.1 Gesamtübersicht zu den Scoring-Ergebnissen -- 13.2.2 Bearbeitung von Prüfgegenständen -- 13.2.3 Ausgabe eines Gesamtberichts -- 13.3 Fazit -- Anhang -- A Autoren -- B Abkürzungen -- C Literatur -- Index…”
Libro electrónico -
64107Publicado 2011Tabla de Contenidos: “…Enabling TDE for SharePoint Content Databases -- Using Active Directory Rights Management Services (AD RMS) for SharePoint Document Libraries -- Summary -- Best Practices -- Part IV: Using SharePoint 2010 Technologies for Collaboration and Document Management -- 18 SharePoint Foundation Versus SharePoint Server 2010 -- Clarifying the Different SharePoint Products from a High Level -- Feature Comparison Between SharePoint Foundation 2010 and SharePoint Server 2010 for Farm Administrators -- Summary -- Best Practices -- 19 Using Libraries and Lists in SharePoint 2010 -- Empowering Users Through SharePoint 2010 Libraries -- Working with the Other Standard Tools in a Document Library -- Empowering Users Through SharePoint 2010 Lists -- Summary -- Best Practices -- 20 Customizing and Managing Libraries and Lists to Meet Business Requirements -- Planning the List and Library Ecosystem -- Creating Lists and Libraries -- Mastering the Library Tab from the Ribbon -- Document Library Settings Page Tools Reviewed -- Permissions and Management Tools for Lists and Libraries -- Document Sets Compared to Folders as Organizational Tools in Document Libraries -- Content Organizer as a Document Routing Tool -- Summary -- Best Practices -- 21 Designing and Managing Pages and Sites for Knowledge Workers -- Understanding Site Collection Options -- Creating a Site Collection -- Reviewing the Scope of an Existing Site Collection -- Controlling Who Can Create Sites -- Creating Pages and Sites -- Reviewing the Users and Permissions Tools -- Reviewing the Galleries Tools -- Reviewing the Site Administration Tools -- Reviewing the Look and Feel Tools -- Reviewing the Site Actions Tools -- An Overview of Site Collection Administration Tools -- Understanding and Using Site Variations -- Reviewing Site Features and Site Collection Features -- Summary -- Best Practices…”
Libro electrónico -
64108Publicado 2005Tabla de Contenidos: “…9.3.2 Converting from date fields to character or numeric representation -- 9.3.3 Checking for a valid date or time -- 9.3.4 Retrieving current date and time -- 9.3.5 Adding and subtracting date and time values -- 9.3.6 Calculating date and time differences -- 9.3.7 Extracting a portion of a date, time, or timestamp -- 9.3.8 Additional SQL scalar functions for date calculation -- Part 4 Tools -- Chapter 10. …”
Libro electrónico -
64109por Breeze, David J.Tabla de Contenidos: “…Map of the provinces and frontiers of the Roman Empire in the mid 2nd century AD (produced for the Frontiers of the Roman Empire EU Culture 2000 project) -- Figure 2. …”
Publicado 2022
Libro electrónico -
64110Publicado 2024Tabla de Contenidos: “…Accessing AWS Accounts Using Identity Federation with SAML 2.0 and Microsoft AD -- Using Web Identity Federation for Application Authentication -- Application Authentication and Authorization with Amazon Cognito -- Amazon Cognito User Pools -- Access Backend Resources with a User Pool -- Amazon Cognito Identity Pools -- How AWS STS Generates Temporary Tokens -- Amazon Cognito and the Todo List Application -- Overview of the AWS IAM Identity Center -- Exercise 2.1 - Creating an IAM User and an IAM Group within your Development Account -- Technical Requirements -- Project Task 2.1 - Creating an Amazon Cognito User Pool for the Todo List Application -- Step 1 - Configure Sign-In Experience -- Step 2 - Configure Security Requirements -- Step 3 - Configure Sign-Up Experience -- Step 4 - Configure Message Delivery -- Step 5 - Integrate Your App -- Step 6 - Review and Create -- Step 7 - Testing the Cognito User Pool -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 3: Understanding Object Storage with Amazon S3, Hybrid Storage, and Static Website Hosting -- An Introduction to Storage Options -- Block Storage -- File Storage -- Object Storage -- An Introduction to Object Storage with Amazon S3 -- Amazon S3 Buckets -- Amazon S3 Objects -- An Amazon S3 Object's Key -- Amazon S3 Region Choice -- Read-after-Write Consistency -- Eventual Consistency -- Managing Data Storage Costs with Amazon S3 Storage Classes -- The Amazon S3 Standard Storage Class -- Amazon S3-IA Storage -- Amazon S3 One Zone-IA -- Amazon S3 Intelligent-Tiering -- Amazon S3 Express One Zone -- Amazon S3 Glacier -- Protecting Data from Accidental Deletion in Amazon S3 -- Encryption Options for Amazon S3 -- Using Amazon S3 Versioning with S3 Lifecycle Management -- Implementing Data Protection with Resource-Based Policies -- Securing Access with Pre-Signed URLs…”
Libro electrónico -
64111por Carmona, Jairo GutiérrezTabla de Contenidos: “…8.3 Valoración por flujo de caja descontado -- 8.3.1 Horizonte de planeación (n) -- 8.3.2 Flujo de caja libre operacional (FCLO) -- 8.3.3 Costo de capital (WACC) -- 8.3.4 Valor terminal (VT) -- 8.3.5 Cálculo del valor de mercado de la empresa (VME) -- 8.3.6 Cálculo del valor de mercado del patrimonio (VMK) -- 8.4 Impacto de las variables en el VMK -- 8.4.1 Impacto del endeudamiento -- 8.4.2 Impacto del modelo de valor terminal -- 8.5 Otros métodos de valoración por descuento de flujos -- 8.5.1 Valoración por descuento de dividendos -- 8.5.2 Valoración por descuento de ingreso residual -- cuarta parte: -- Evaluar el valor creado -- Evaluación del valor creado -- 9.1.1 Impacto de las variables en la valorización del patrimonio -- 9.2 EVA -- 9.2.1 Usos del EVA -- 9.2.2 Impacto de las variables en el EVA -- 9.2.3 Valoración por EVA -- 9.3 Otras formas de evaluar la creación de valor -- 9.3.1 Market Value Added (MVA) -- 9.3.2 Comprobación por múltiplos -- 9.3.3 Rentabilidad del propietario -- Diagnóstico de la planeación financiera -- 10.1 Inductores de valor -- 10.1.1 Indicadores inductores -- 10.1.2 La pirámide del valor -- 10.1.3 Actividades inductoras -- 10.2 Análisis de sensibilidad -- 10.3 Tablero de control -- 10.4 Análisis de escenarios -- 10.5 Simulación -- Herramientas del Excel -- Modelaje financiero -- Tablas de datos -- Buscar objetivo -- Escenarios -- Bibliografía…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
64112Publicado 2021Tabla de Contenidos: “…LAS FORMAS METAFÓRICAS -- 2.3.1. ANALOGÍA DIRECTA (AD) -- 2.3.2. ANALOGÍA PERSONAL (AP)…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
64113Publicado 2015Tabla de Contenidos: “…Tad Piper's Support Team in His Crisis -- Building Support Teams -- The Power of Sharing Openly -- Mentoring: A Two-Way Street -- Mark Zuckerberg's Mentors Accelerated His Growth -- Coach Campbell: Silicon Valley's Leading Mentor -- Building True Friendships -- True North Groups -- Exercise: Building Your Support Team -- Chapter 8: Integrated Life -- John Donahoe: Choosing to Live Fully -- Blending Careers with Family Life -- Managing Dual Careers -- Hitting the Wall at Home -- An Integrated Life Makes You a Better Leader -- Making Choices and Trade-Offs -- Martha Goldberg Aronson: Taking on Added Responsibility -- The Buckets of Your Life -- Staying Grounded by Integrating Your Life -- Prioritizing Your Family -- Focusing on What Matters -- Staying True to Your Roots -- Finding Time for Yourself -- Spiritual and Religious Practices -- Community -- Measuring Your Success -- Integrating All Aspects of Your Life -- Exercise: The Integrated Leader -- Part Three: Your True North Meets the World -- Chapter 9: I to We -- Nelson Mandela: Seeking Reconciliation, Not Retribution -- Mandela Emerges as a Leader -- From Hero's Journey to Leader's Journey -- Challenges in Making the Transformation -- Gail McGovern: "It's Not Fair -- Doug Baker Jr.: A Call to the Heart -- Zach Clayton: It's Not about Your Resume -- Crucibles Help Make the Transformation -- Steve Jobs: Learning in the Wilderness -- John Mackey: Learning to Share Power -- My Defining Leadership Experience -- Taking the I to We Journey -- Exercise: Your Transformation from I to We -- Chapter 10: Purpose -- Ken Frazier: Medicine for the People -- Defending Merck Science -- A Mentor's Story -- What's the Purpose of Your Leadership? …”
Libro electrónico -
64114Tabla de Contenidos: “…Dynamic Linearity -- Summary -- References -- Chapter 3: Key Sensor Technology Components: Hardware and Software Overview -- Smart Sensors -- Sensor Systems -- Sensor Platforms -- The Arduino I/O Board -- Shimmer -- Smartphones and Tablets -- Microcontrollers for Smart Sensors -- CPUs -- Registers -- Memory -- Timers and Counters -- Debugging Interfaces -- Common Microcontrollers -- Interfaces and Embedded Communications -- Embedded Digital Interfaces and Protocols -- Serial Peripheral Interface (SPI) -- The I 2 C Bus -- Analog Interfacing -- Sensor Communications -- Standard Wired Interfaces -- RS-232 -- Virtual Serial Ports -- RS-485 -- Universal Serial Bus (USB) -- Short- and Medium-Range Standards for Wireless Communications -- Proprietary Wireless Protocols -- Power Management and Energy Harvesting -- Power Management -- Energy Harvesting -- Microcontroller Software and Debugging -- IDEs -- Development Languages -- Testing Code -- Summary -- References -- Chapter 4: Sensor Network Topolog ies and Design Considerations -- Sensor Network Components -- Sensor Nodes -- Aggregators, Base Stations, and Gateways -- Machine-to-Machine Devices -- Proprietary M2M solutions -- Smartphones -- Traditional M2M Platforms -- Sensor Network Topologies -- Sensor Network Applications -- Personal Area Networks -- Ambient/Pervasive Home Sensor Networks -- Wide Area Networks -- Sensor Network Features and Challenges -- Security -- Key Security Goals -- Attacks on Sensor Networks -- Security Approaches -- Biometrics -- Challenges for Sensor Networks -- Summary -- References -- Chapter 5: Processing and Adding Vibrancy to Sensor Data -- Data Literacy -- The Internet of Things -- Sensors and the Cloud -- Data Quality -- Addressing Data Quality Issues -- Outlier Detection -- Automated Data Cleaning -- Plausibility Testing -- Fusing Sensor Data -- Data Mining…”
Libro electrónico -
64115Publicado 2019Tabla de Contenidos: “…Note on the edition and translation -- Text -- Divergent readings of Jamkhedkar's edition -- Translation -- Annotation -- Analysis and interpretation -- Vākāṭaka Gupta relations -- 7 Throne and Temple: Political power and religious prestige in Vidarbha -- Introduction -- The Vākāṭaka period -- The Vākāṭaka inscriptions -- Policy of the Vākāṭaka kings -- The Yādava period -- Ramtek Hill: Theatre of Plenipotentiaries -- 8 Little Kṛṣṇa's Play with the Moon -- The literary evidence -- Baby Kṛṣṇa's play with the moon -- The archaeological evidence -- Conclusion -- 9 Some Methodological Considerations with Respect to the Critical Edition of Puranic Literature -- Introduction -- The theory of 'oral composition' -- Composition-in-transmission -- The critical edition of epic and puranic literature -- The critical edition of the Ayodhyāmāhātmya -- 10 Pārvatī's Svayaṃvara: Studies in the Skandapurāṇa I -- Introduction -- The wedding of Śiva and Parvatī -- Śiva's exclusion from the sacrifice -- Śiva as the cosmic child -- Pārvatī's Svayaṃvara -- The synoptic edition of the Svayaṃvara myth -- Conclusion -- Pārvatī's Svayaṃvara: A Textual Reconstruction -- 11 Mokṣadharma 187 and 239-241 Reconsidered (Together with Peter Bisschop) -- Preamble -- Three themes -- The five elements -- The intellectual apparatus -- Sattva and kṣetrajña -- The 'evolution theory' -- The Mokṣadharma: a plurality of views -- Appendix: Some parallels of Mokṣadharma 187 and 239-241 -- 12 Observations on the History and Culture of Dakṣiṇa Kosala (5th to 7th centuries ad) -- Introduction -- The Pāṇḍavas of Mekalā -- The family descending from Amara in Kosala -- The rulers of Śarabhapur -- The Pāṇḍuvaṃśa of Śrīpura -- The date of the Pāṇḍuvaṃśa dynasty of Śrīpura -- Tīvaradeva -- Mahāśivagupta Bālārjuna -- Tālā -- The Jiṭhānī Temple…”
Libro electrónico -
64116Publicado 2018Tabla de Contenidos: “…Application execution with the configured domain -- Daily quote API -- Random quote API -- Summary -- Questions -- Chapter 9: Asynchronous Task Execution on AWS Lambda -- Technical requirements -- Asynchronous execution -- Understanding asynchronous execution -- Asynchronous AWS Lambda execution using Boto3 -- AWS Lambda asynchronous invocation using Zappa -- Asynchronous AWS Lambda invocation using the task decorator -- Amazon SNS as the task source -- Direct invocation -- Remote invocation -- Configuring the Quote API application with async features -- SMS subscription with Amazon SNS for the daily quote -- Configuring Amazon SNS using Boto3 -- Implementing the SMS subscription functionality -- Deploying and executing the Quote API using Zappa -- Setting up the virtual environment -- Setting up environment variables -- Adding a custom domain with SSL -- Scheduling an event to publish an SMS -- Deployment -- Quote API execution -- The daily quote API -- Daily quote SMS subscription -- Daily quote SMS unsubscription -- Summary -- Questions -- Chapter 10: Advanced Zappa Settings -- Technical requirements -- Keeping the server warm -- Enabling CORS -- Handling larger projects -- Handling larger projects using the AWS Lambda console -- Handling larger projects using Zappa -- Enabling bash tab compilation -- Catching unhandled exceptions -- Summary -- Questions -- Chapter 11: Securing Serverless Applications with Zappa -- Technical requirements -- Implementing a random quote API -- Prerequisites -- Developing the random quote API -- Deploying with Zappa -- Executing the API -- Enabling secure endpoints on API Gateway -- Enabling the API Key -- Executing the API with the API key header -- IAM policy -- API Gateway Lambda authorizer -- Tracing AWS Lambda failure with dead letter queues -- Manual DLQ configuration -- Automating DLQ configuration with Zappa…”
Libro electrónico -
64117Publicado 2019Tabla de Contenidos: “…-- Disk Labeling -- GEOM Withering -- The gpart(8) Command -- Scheming Disks -- The GPT Partitioning Scheme -- The MBR Partitioning Scheme -- BSD Labels -- 11 THE UNIX FILE SYSTEM -- UFS Components -- Mounting and Unmounting Filesystems -- UFS Resiliency -- Creating and Tuning UFS Filesystems -- UFS Snapshots -- UFS Recovery and Repair -- UFS Space Reservations -- How Full Is a Partition? -- Adding New UFS storage -- 12 THE Z FILE SYSTEM -- Datasets -- ZFS Pools -- Virtual Devices -- Managing Pools -- Copy-On-Write -- Snapshots -- Compression -- Pool Integrity and Repair -- Boot Environments -- 13 FOREIGN FILESYSTEMS -- FreeBSD Mount Commands -- Using Removable Media -- Memory Filesystems -- devfs -- Miscellaneous Filesystems -- The Network File System -- The Common Internet File System -- Serving CIFS Shares -- 14 EXPLORING /ETC -- /etc Across Unix Species -- /etc/adduser.conf -- /etc/aliases -- /etc/amd.map -- /etc/auto_master -- /etc/blacklistd.conf -- /etc/bluetooth, /etc/bluetooth.device.conf, and /etc/defaults/bluetooth.device.conf -- /etc/casper -- /etc/crontab and /etc/cron.d -- /etc/csh.* -- /etc/ddb.conf -- /etc/devd.conf -- /etc/devfs.conf, /etc/devfs.rules, and /etc/defaults/devfs.rules -- /etc/dhclient.conf…”
Libro electrónico -
64118Publicado 2021Tabla de Contenidos: “…Initializing the linear doubly robust learner -- Fitting the causal model -- Understanding heterogeneous treatment effects -- Choosing policies -- Testing estimate robustness -- Adding random common cause -- Replacing treatment with a random variable -- Mission accomplished -- Summary -- Dataset sources -- Further reading -- Chapter 12: Monotonic Constraints and Model Tuning for Interpretability -- Technical requirements -- The mission -- The approach -- The preparations -- Loading the libraries -- Understanding and preparing the data -- Placing guardrails with feature engineering -- Ordinalization -- Discretization -- Interaction terms and non-linear transformations -- Categorical encoding -- Other preparations -- Tuning models for interpretability -- Tuning a Keras neural network -- Tuning other popular model classes -- Optimizing for fairness with Bayesian hyperparameter tuning and custom metrics -- Implementing model constraints -- Mission accomplished -- Summary -- Dataset sources -- Further reading -- Chapter 13: Adversarial Robustness -- Technical requirements -- The mission -- The approach -- The preparations -- Loading the libraries -- Understanding and preparing the data -- Loading the CNN base model -- Assessing the CNN base classifier -- Learning about evasion attacks -- Defending against targeted attacks with preprocessing -- Shielding against any evasion attack via adversarial training of a robust classifier -- Evaluating and certifying adversarial robustness -- Comparing model robustness with attack strength -- Certifying robustness with randomized smoothing -- Mission accomplished -- Summary -- Dataset sources -- Further reading -- Chapter 14: What's Next for Machine Learning Interpretability? …”
Libro electrónico -
64119Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introducing the Google Cloud Platform -- ML and the cloud -- The nature of the cloud -- Public cloud -- Managed cloud versus unmanaged cloud -- IaaS versus PaaS versus SaaS -- Costs and pricing -- ML -- Introducing the GCP -- Mapping the GCP -- Getting started with GCP -- Project-based organization -- Creating your first project -- Roles and permissions -- Further reading -- Summary -- Chapter 2: Google Compute Engine -- Google Compute Engine -- VMs, disks, images, and snapshots -- Creating a VM -- Google Shell -- Google Cloud Platform SDK -- Gcloud -- Gcloud config -- Accessing your instance with gcloud -- Transferring files with gcloud -- Managing the VM -- IPs -- Setting up a data science stack on the VM -- BOX the ipython console -- Troubleshooting -- Adding GPUs to instances -- Startup scripts and stop scripts -- Resources and further reading -- Summary -- Chapter 3: Google Cloud Storage -- Google Cloud Storage -- Box-storage versus drive -- Accessing control lists -- Access and management through the web console -- gsutil -- gsutil cheatsheet -- Advanced gsutil -- Signed URLs -- Creating a bucket in Google Cloud Storage -- Google Storage namespace -- Naming a bucket -- Naming an object -- Creating a bucket -- Google Cloud Storage console -- Google Cloud Storage gsutil -- Life cycle management -- Google Cloud SQL -- Databases supported -- Google Cloud SQL performance and scalability -- Google Cloud SQL security and architecture -- Creating Google Cloud SQL instances -- Summary -- Chapter 4: Querying Your Data with BigQuery -- Approaching big data -- Data structuring -- Querying the database -- SQL basics -- Google BigQuery -- BigQuery basics -- Using a graphical web UI -- Visualizing data with Google Data Studio…”
Libro electrónico -
64120Publicado 2017Tabla de Contenidos: “…. -- Running a container -- Starting the stopped container -- Assigning a Name to a container -- Creating daemonized containers -- Exposing ports of a container -- Managing persistent storage with Docker -- Adding a data volume -- Getting details of a container -- Containerize your application using Dockerfile -- Push the image to Dockerhub -- Setting up AWS ECR and pushing an image into it -- Getting ready -- How to do it…”
Libro electrónico