Mostrando 64,261 - 64,280 Resultados de 68,933 Para Buscar '".ad"', tiempo de consulta: 0.28s Limitar resultados
  1. 64261
    Publicado 2018
    Tabla de Contenidos: “…. -- How it works... -- Adding listeners to Anko views -- Getting ready -- How to do it... -- How it works... -- There's more...…”
    Libro electrónico
  2. 64262
    Publicado 2018
    Tabla de Contenidos: “…Keras advanced activation layers -- Keras normalization layers -- Keras noise layers -- Adding Layers to the Keras Model -- Sequential API to add layers to the Keras model -- Functional API to add layers to the Keras Model -- Compiling the Keras model -- Training the Keras model -- Predicting with the Keras model -- Additional modules in Keras -- Keras sequential model example for MNIST dataset -- Summary -- Chapter 4: Classical Machine Learning with TensorFlow -- Simple linear regression -- Data preparation -- Building a simple regression model -- Defining the inputs, parameters, and other variables -- Defining the model -- Defining the loss function -- Defining the optimizer function -- Training the model -- Using the trained model to predict -- Multi-regression -- Regularized regression -- Lasso regularization -- Ridge regularization -- ElasticNet regularization -- Classification using logistic regression -- Logistic regression for binary classification -- Logistic regression for multiclass classification -- Binary classification -- Multiclass classification -- Summary -- Chapter 5: Neural Networks and MLP with TensorFlow and Keras -- The perceptron -- MultiLayer Perceptron -- MLP for image classification -- TensorFlow-based MLP for MNIST classification -- Keras-based MLP for MNIST classification -- TFLearn-based MLP for MNIST classification -- Summary of MLP with TensorFlow, Keras, and TFLearn -- MLP for time series regression -- Summary -- Chapter 6: RNN with TensorFlow and Keras -- Simple Recurrent Neural Network -- RNN variants -- LSTM network -- GRU network -- TensorFlow for RNN -- TensorFlow RNN Cell Classes -- TensorFlow RNN Model Construction Classes -- TensorFlow RNN Cell Wrapper Classes -- Keras for RNN -- Application areas of RNNs -- RNN in Keras for MNIST data -- Summary -- Chapter 7: RNN for Time Series Data with TensorFlow and Keras…”
    Libro electrónico
  3. 64263
    Publicado 2018
    Tabla de Contenidos: “…-- Rooting an Android device -- Root access - adb shell -- Summary -- Chapter 9: Android Data Extraction Techniques -- Data extraction techniques -- Manual data extraction -- Logical data extraction -- ADB pull data extraction -- Using SQLite Browser to view the data -- Extracting device information -- Extracting call logs -- Extracting SMS/MMS -- Extracting browser history -- Analysis of social networking/IM chats -- ADB backup extraction -- ADB dumpsys extraction -- Using content providers -- Physical data extraction -- Imaging an Android phone -- Imaging a memory (SD) card -- Joint Test Action Group -- Chip-off -- Summary -- Chapter 10: Android Data Analysis and Recovery -- Analyzing an Android image -- Autopsy -- Adding an image to Autopsy -- Analyzing an image using Autopsy -- Android data recovery -- Recovering deleted data from an external SD card…”
    Libro electrónico
  4. 64264
    por Cohen, Martin
    Publicado 2024
    Tabla de Contenidos: “…Using maps and charts in the real world -- Appreciating the different styles of concept charts and mind maps -- Adding movement to your diagrams by drawing flowcharts -- Considering Other Thinking Tools -- Emptying your head with a dump list -- Sifting for gold: Summarizing -- Conjuring up ideas with brainstorming -- Ascending the heights: Meta-thinking -- Trying out triangulation -- Real-life triangles -- Denzin's three-sided methods -- Answers to Chapter 7's Exercises -- The plant problem -- Summarizing exercise -- Chapter 8 Constructing Knowledge: Information Hierarchies -- Building the Knowledge Pyramid -- Viewing the connections between data and information -- Joining the (data) dots to create information -- Social media sifting disinformation -- Birdwatch -- Watching for errors and biases -- Turning the Knowledge Hierarchy Upside Down -- Thinking critically with Benjamin Bloom -- Meeting Bloom's Taxonomy -- Making knowledge flow upwards -- Thinking creatively with Calvin Taylor -- Maintaining Motivation: Knowledge, Skills, and Mindsets -- Feeling your way to academic success! …”
    Libro electrónico
  5. 64265
    por Ayyadevara, V. Kishore
    Publicado 2023
    Tabla de Contenidos: “…Preparing our data for image classification -- Training a neural network -- Scaling a dataset to improve model accuracy -- Understanding the impact of varying the batch size -- Batch size of 32 -- Batch size of 10,000 -- Understanding the impact of varying the loss optimizer -- Building a deeper neural network -- Understanding the impact of batch normalization -- Very small input values without batch normalization -- Very small input values with batch normalization -- The concept of overfitting -- Impact of adding dropout -- Impact of regularization -- L1 regularization -- L2 regularization -- Summary -- Questions -- Section 2: Object Classification and Detection -- Chapter 4: Introducing Convolutional Neural Networks -- The problem with traditional deep neural networks -- Building blocks of a CNN -- Convolution -- Filters -- Strides and padding -- Strides -- Padding -- Pooling -- Putting them all together -- How convolution and pooling help in image translation -- Implementing a CNN -- Classifying images using deep CNNs -- Visualizing the outcome of feature learning -- Building a CNN for classifying real-world images -- Impact on the number of images used for training -- Summary -- Questions -- Chapter 5: Transfer Learning for Image Classification -- Introducing transfer learning -- Understanding the VGG16 architecture -- Implementing VGG16 -- Understanding the ResNet architecture -- Implementing ResNet18 -- Implementing facial keypoint detection -- 2D and 3D facial keypoint detection -- Implementing age estimation and gender classification -- Introducing the torch_snippets library -- Summary -- Questions -- Chapter 6: Practical Aspects of Image Classification -- Generating CAMs -- Understanding the impact of data augmentation and batch normalization -- Coding up road sign detection -- Practical aspects to take care of during model implementation…”
    Libro electrónico
  6. 64266
    Publicado 2005
    Tabla de Contenidos:
    Libro electrónico
  7. 64267
    Publicado 2014
    Tabla de Contenidos: “…Updatable -- CREATE MATERIALIZED VIEW Syntax -- Using Materialized Views to Alter Query Execution Paths -- Using DBMS_ADVISOR -- Refreshing Materialized Views -- CREATE MATERIALIZED VIEW Log Syntax -- Altering Materialized Views and Logs -- Dropping Materialized Views and Logs -- 27 Using Oracle Text for Text Searches -- Adding Text to the Database -- Text Queries and Text Indexes -- Index Sets -- 28 Using External Tables…”
    Libro electrónico
  8. 64268
    por Lam, James
    Publicado 2014
    Tabla de Contenidos: “…Section Two The Enterprise Risk Management Framework -- Chapter 5 Corporate Governance -- Codes of Conduct -- Best Practices -- Stakeholder Communication -- Board Independence -- Board Performance Assessment -- Executive and Board Compensation -- Linking Corporate Governance and ERM -- Risk Appetite and Policy -- Organizational Structure -- Risk Culture and Corporate Values -- Chapter 6 Line Management -- The Relationship between Line and Risk Functions -- Offense and Defense -- Policy and Policing -- Partnership Model -- Key Challenges -- Conflict Resolution -- Line Risk Management -- Incentive Alignment -- Nonfinancial Risk Measurement -- Best Practices -- Strategy and Planning -- Product and Business Development -- Product Pricing -- Business Performance Measurement -- Risk and Incentive Compensation -- Chapter 7 Portfolio Management -- The Theory of Active Portfolio Management -- Benefits of Active Portfolio Management -- Unbundling -- Risk Aggregation -- Risk Limits and Asset Allocation -- Influencing Transfer Pricing, Capital Allocation, and Investment Decisions -- Practical Applications of Portfolio Management -- Reinsurance -- Currency Hedging -- Chapter 8 Risk Transfer -- A Brief History of ART -- Advantages of ART -- Focus -- Customization -- Cost Reduction and Simplified Administration -- Earnings Stability -- Pitfalls of ART -- Understand the Product -- Know the Seller -- Regulatory and Accounting Standards -- A Look to the Future -- Case Study: Honeywell -- Case Study: Barclays -- Chapter 9 Risk Analytics -- Risk Control Analytics -- Scenario Analysis -- Economic Capital -- Risk Indicators -- Risk Optimization Analytics -- Risk-Adjusted Return on Capital -- Economic Income Created -- Shareholder Value and Shareholder Value-Added RAROC and EIC -- Market Risk Analytics -- Interest Rate Models -- Value-at-Risk Models…”
    Electrónico
  9. 64269
    Publicado 2014
    Tabla de Contenidos: “…. -- There's more... -- Adding custom controls in the notebook toolbar -- How to do it... -- There's more... -- See also -- Customizing the CSS style in the notebook -- Getting ready -- How to do it... -- There's more... -- See also -- Using interactive widgets - a piano in the notebook -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating a custom JavaScript widget in the notebook - a spreadsheet editor for pandas -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Processing webcam images in real time from the notebook -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- 4. …”
    Libro electrónico
  10. 64270
    por Grant, Rickford
    Publicado 2010
    Tabla de Contenidos:
    Libro electrónico
  11. 64271
    Publicado 2017
    Tabla de Contenidos: “…. -- There's more... -- Adding flair to your graphs -- See also -- Creating charts that facilitate comparisons -- Getting ready -- How to do it... -- Using base plotting system -- How it works... -- There's more... -- Creating&amp -- #160 -- beanplots with the beanplot package -- See also -- Creating charts that help to visualize possible causality -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 3: Where Does It Belong? …”
    Libro electrónico
  12. 64272
    por Pohit, Goutam
    Publicado 2004
    Tabla de Contenidos: “…Layer Properties Manager Dialog Box -- Creating an AutoCAD Drawing-Illustrative Example -- Exercise -- Chapter 4: Dimensioning in Autocad -- General Concepts and Standard Practices -- Components of Dimensions Label -- Types of Dimensions -- Standard Practice in Dimensioning -- Types of Dimensioning -- Dimensions in AutoCAD -- Toolbar and Commands -- Linear Dimensions-Dimlinear -- Aligned Dimension Dimaligned -- Radius Dimension-Dimradius -- To Mark the Center of an Arc or Circle-Dim center -- Baseline and Continued Dimensions-Dimbaseline and Dimcontinue -- Ordinate Dimension-Dimordinate -- Adding Dimensions/Text with Leaders -- Creating Multiple Leaders -- Editing Dimensions in AutoCAD -- Illustrative Example of Dimensioning -- Exercise -- Chapter 5: Section and Sectional views -- Cutting Plane Lines -- Full Section -- Half Section -- Special Section -- Local or Partial Section -- Removed Section -- Offset Section -- Omission of Section -- Hatching or Section Lines -- Sectional View and AutoCAD -- Bhatch Command in AutoCAD -- Illustrative Problems -- Example of Drawing Sectional View Using AutoCAD -- Exercise -- Chapter 6: Thread and Fasteners -- Thread Terminology -- Thread Forms -- Metric Thread -- Other Thread Forms -- Thread Representation -- External Threads -- Internal Threads -- Designing Screw Thread in Drawing -- Threaded Fasteners -- Bolted Joint -- Nuts -- Drawing a Nut -- Other Types of Nuts -- Types of Bolts -- Creation of Bolt -- Other Forms of Bolts -- Locking Arrangement -- Lock Nut -- Split Pin -- Slotted Nut and Castle Nut -- Washer -- Set Screw -- Creating Blocks for Repetitive Usage in AutoCAD -- AutoCAD Library -- Creating Blocks from Individual Objects -- Base Points and Insertion Points -- Creating a Block by Saving a Block within the Current Drawing -- Inserting Blocks -- Saving Block as Separate Drawing Files…”
    Libro electrónico
  13. 64273
    Publicado 2011
    Tabla de Contenidos: “…Determining File Length -- The InputStream Methods -- The OutputStream Class -- File Copy Utility -- The OutputStream Methods -- Character Streams -- File Viewer Utility -- Buffered Readers/Writers -- The BufferedReader Class -- The BufferedWriter Class -- Binary Versus Character Streams -- Chaining Streams -- The Line Count Program -- File Concatenation -- Accessing the Host File System -- The Directory Listing Program -- Filtering the Directory Listing -- Reading/Writing Objects -- Summary -- Chapter 10: Advanced I/O -- The Byte-Oriented Stream Classes -- The PushbackInputStream Class -- The SequenceInputStream Class -- The PrintStream Class -- The Character-Oriented Stream Classes -- The CharArray Reader/Writer Classes -- The Console Class -- The StreamTokenizer Class -- The Object-Oriented Streams -- The Externalizable Interface -- Nested Objects Serialization -- Versioning Objects -- Summary -- Chapter 11: Enums, Autoboxing, and Annotations -- Typesafe Enumerations -- Creating Integer Patterns for Enumerations -- The enum Type -- Listing Enumeration Constants -- Adding Properties to an Enumeration -- The ordinal and compareTo Methods -- Attaching Methods to Enumerations -- Serializing enum Types -- Autoboxing -- Wrapper Classes -- A Few Additions in J2SE 5.0 -- Additional Functionality -- Extended Support for Unicode Code Point -- The Void Wrapper -- Autoboxing/Unboxing -- Annotations -- Built-in Annotations -- The @Override Annotation -- The @SuppressWarnings Annotation -- Declaring Annotations -- Marker Annotations -- Multivalue Annotations -- Custom Annotation Program -- Rules for Defining Annotation Types -- Annotating an Annotation -- The Target Annotation -- The Retention Annotation -- Annotations at Runtime -- The Documented Annotation -- The Inherited Annotation -- Summary -- Chapter 12: Generics -- Generics -- What Are Generics?…”
    Libro electrónico
  14. 64274
    por Shaughnessy, Pat
    Publicado 2013
    Tabla de Contenidos: “…Method Lookup and Constant Lookup -- How Ruby Implements Modules -- Modules Are Classes -- Including a Module into a Class -- Ruby's Method Lookup Algorithm -- A Method Lookup Example -- The Method Lookup Algorithm in Action -- Multiple Inheritance in Ruby -- The Global Method Cache -- The Inline Method Cache -- Clearing Ruby's Method Caches -- Including Two Modules into One Class -- Including One Module into Another -- A Module#prepend Example -- How Ruby Implements Module#prepend -- Experiment 6-1: Modifying a Module After Including It -- Classes See Methods Added to a Module Later -- Classes Don't See Submodules Included Later -- Included Classes Share the Method Table with the Original Module -- Constant Lookup -- Finding a Constant in a Superclass -- How Does Ruby Find a Constant in the Parent Namespace? …”
    Libro electrónico
  15. 64275
    Reading financial reports for dummies
    Reading Financial Reports For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Sorting Out the Profit and Loss Types -- EBITDA -- Nonoperating income or expense -- Net profit or loss -- Calculating Earnings per Share -- Chapter 8 The Statement of Cash Flows -- Digging into the Statement of Cash Flows -- The parts -- The formats -- Checking Out Operating Activities -- Depreciation -- Inventory -- Accounts receivable -- Accounts payable -- The cash flow from activities section, summed up -- Investigating Investing Activities -- Understanding Financing Activities -- Issuing stock -- Buying back stock -- Paying dividends -- Incurring new debt -- Paying off debt -- Recognizing the Special Line Items -- Discontinued operations -- Foreign currency exchange -- Adding It All Up -- Chapter 9 Scouring the Notes to the Financial Statements -- Deciphering the Small Print -- Accounting Policies Note: Laying out the Rules of the Road -- Depreciation -- Revenue -- Expenses -- Figuring out Financial Borrowings and Other Commitments -- Long-term obligations -- Short-term debt -- Lease obligations -- Mergers and Acquisitions: Finding Noteworthy Information -- Pondering Pension and Retirement Benefits -- Breaking Down Business Breakdowns -- Reviewing Significant Events -- Finding the Red Flags -- Finding out about valuing assets and liabilities -- Considering changes in accounting policies -- Decoding obligations to retirees and future retirees -- Chapter 10 Considering Consolidated Financial Statements -- Getting a Grip on Consolidation -- Looking at Methods of Buying Up Companies -- Reading Consolidated Financial Statements -- Looking to the Notes -- Mergers and acquisitions -- Goodwill -- Liquidations or discontinued operations -- Part 3 Analyzing the Numbers -- Chapter 11 Testing the Profits and Market Value -- The Price/Earnings Ratio -- Figuring out earnings per share -- Calculating the P/E ratio -- Practicing the P/E ratio calculation…”
    Libro electrónico
  16. 64276
    Publicado 2022
    Tabla de Contenidos: “…-- Jakarta Security in Jakarta EE -- The HttpAuthenticationMechanism -- Example HttpAuthenticationMechanism -- Example IdentityStore -- Security Flow -- Default Authentication Mechanisms -- The Basic Authentication Mechanism -- The Form Authentication Mechanism -- The Custom Form Authentication Mechanism -- Providing Our Custom Jakarta Faces Code -- Caller-Initiated Authentication -- Default Identity Stores -- The Database Identity Store -- The LDAP Identity Store -- Identity Stores Using Application Services -- Authentication Mechanism Interceptors -- Auto Apply Session -- Remember Me -- Activating Remember-Me Service -- Logging Out -- Custom Principals -- Jakarta Security and Tomcat -- Simplified Custom Authorization Rules -- Dynamically Adding an Interceptor to a Built-in CDI Bean -- Chapter 6: Java SE Underpinnings -- Java Authentication and Authorization Service (JAAS) -- Common Classes -- Subject -- Key Features -- Retrieving a Subject -- Principals -- Retrieving Principals Associated with a Subject -- Credentials -- JAAS Authentication -- LoginContext -- Key Features -- Theory of Operation -- Parameters Explained -- LoginModule -- Key Features -- How to Implement a LoginModule -- initialize() -- login() -- commit() -- CallBackHandler -- Configuration -- Parameters Explained -- How to Run the JAAS Authentication Example -- JAAS Authorization -- JAAS Authorization in Three Steps…”
    Libro electrónico
  17. 64277
    por Barrett, Joan
    Publicado 2005
    Tabla de Contenidos: “…5.7.2 Setting up the Directory Server for iSeries -- 5.7.3 Directory server replication overview -- 5.7.4 Creating a master-replica topology -- 5.7.5 Creating a master-peer topology -- 5.7.6 Removing details of the previous configuration -- 5.7.7 Adding Load Balancer to the LDAP servers topology -- 5.8 Functional verification testing -- Part 3 Appendixes -- Appendix A. …”
    Libro electrónico
  18. 64278
    por Jordan, Ted
    Publicado 2023
    Tabla de Contenidos: “…How Shared Libraries Work -- Managing Shared Library Dependencies -- Exercise 10-4: Working with Shared Libraries -- Chapter Review -- Questions -- Answers -- Chapter 11 Managing the Linux Boot Process -- The BIOS POST Phase -- The Classic BIOS -- The Modern UEFI -- The GRUB2 Bootloader Phase -- Modify the GRUB2 Bootloader -- Change a Forgotten root Password -- Exercise 11-1: Working with GRUB2 -- The Kernel Initiation Phase -- System V Initialization -- The Linux Runlevels -- The inittab Startup File -- Shutting Down the System -- The systemd Initialization Phase -- systemd Unit Files -- Service Procedures -- Targets -- Kernel Panic -- Chapter Review -- Questions -- Answers -- Chapter 12 Managing Hardware Under Linux -- Discovering Devices -- Displaying the Kernel Ring Buffer with dmesg -- Detecting USB Devices with lsusb -- Detecting PCI Devices with lspci -- Managing Kernel Modules -- Exercise 12-1: Working with Kernel Modules -- Referencing Kernel and User Space -- /sys and sysfs -- udev -- Configuring Hardware Devices -- lsdev -- lshw -- Exercise 12-2: Discovering Devices -- Configuring Bluetooth -- Classes -- Bluetooth Commands -- Configuring Wi-Fi -- Scanning for Network Devices -- Configuring a Wi-Fi Network -- Configuring Storage Devices -- IDE -- SCSI -- SATA -- Optical Drives -- Solid State Drives -- USB -- hdparm -- lsscsi -- Printing in Linux -- Adding Printers -- Printing to a Printer -- Managing Printers and Print Queues -- Canceling Print Jobs -- lpmove -- Removing a Printer or Printer Class -- Exercise 12-3: Printing -- Chapter Review -- Questions -- Answers -- Chapter 13 Writing Shell Scripts -- Advanced Shell Concepts -- Globbing Wildcard Characters -- Sequencing Commands -- Command Substitution -- Understanding Shell Script Components -- Defining the Interpreter with #! …”
    Libro electrónico
  19. 64279
    por Tyson, Eric
    Publicado 2024
    Tabla de Contenidos: “…-- Understanding Why to Buy a Business -- To reduce start-up hassles and headaches -- To lessen your risk -- To increase profits by adding value -- To establish cash flow -- To capitalize on someone else's good idea -- To open locked doors -- To inherit an established customer base -- Knowing When You Shouldn't Buy -- You dislike inherited baggage -- You're going to skimp on inspections -- You lack capital -- You think you'll miss out on the satisfaction of creating a business -- Recognizing Prepurchase Prerequisites -- Business experience and training -- Down payment money -- Do You Have the Right Stuff? …”
    Libro electrónico
  20. 64280
    Publicado 2024
    Tabla de Contenidos: “…Deploying Metasploitable 2 as a vulnerable machine -- Part 1 - deploying Metasploitable 2 -- Part 2 - configuring network settings -- Building and deploying Metasploitable 3 -- Part 1 - building the Windows server version -- Part 2 - building the Linux server version -- Summary -- Further reading -- Chapter 3: Setting Up for Advanced Penetration Testing Techniques -- Technical requirements -- Building an Active Directory red team lab -- Part 1 - Setting up Windows Server -- Part 2 - Configuring virtual machine additional features -- Part 3 - Setting Active Directory Domain Services -- Part 4 - Creating domain users and administrator accounts -- Part 5 - Disabling antimalware protection and the domain firewall -- Part 6 - Setting up for service authentication attacks -- Part 7 - Installing Windows 10 Enterprise -- Part 8 - Adding the clients to the domain -- Part 9 - Setting up for account takeover and file sharing attacks -- Setting up a wireless penetration testing lab -- Brief overview of wireless network security -- Setting up a RADIUS server -- Part 1 - Install a Ubuntu server -- Part 2 - Setting up FreeRadius -- Part 3 - Setting the wireless router with RADIUS -- Summary -- Further reading -- Chapter 4: Passive Reconnaissance -- Technical requirements -- The importance of reconnaissance -- Exploring passive reconnaissance -- Open source intelligence -- How much data should be collected? …”
    Libro electrónico