Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,647
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 351
- Música 343
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
36521por Shapiro, Alan N.Tabla de Contenidos: “…Shapiro, April 12, 2024 -- Part One - Hyper‐Modernism: Digital Media Technologies and Science Fiction -- Overview of Part One -- Short Definitions of Modernity, Postmodernism, and Hyper‐Modernism -- The Three Essays of Part One -- Mobility and Science Fiction -- Introduction -- We Do Not Live in a Society Where Mobility is Encouraged -- The Dream of the Tomorrow‐Car -- Henri Matisse Paints "the Vision Machine" -- The New Vision Machine -- Close Encounters of the Third Kind: The Menace of Verticality -- The "Spinner" Flying Cars of Blade Runner: Simulation and Surveillance -- Blade Runner: We Are All Replicants -- Blade Runner 2049: Android Liberation Between Old and New Informatic Power -- Minority Report: The Utopia/Dystopia of Surveillance Technologies -- The Fifth Element: When Manhattan has no More Ways to Expand -- Back to the Future: A Speed So Fast that the Laws of Spacetime Get Shattered -- Total Recall: You're in a Johnny Cab -- Robots Versus Androids -- Self‐Owning Cars -- Enhance the Physical World -- The Simulacra, Do Androids Dream of Electric Sheep?…”
Publicado 2024
Libro electrónico -
36522Publicado 2024Tabla de Contenidos: “…Best practice 1 - Completely understanding the project goal -- Best practice 2 - Collecting all fields that are relevant -- Best practice 3 - Maintaining the consistency and normalization of field values -- Best practice 4 - Dealing with missing data -- Best practice 5 - Storing large-scale data -- Best practices in the training set generation stage -- Best practice 6 - Identifying categorical features with numerical values -- Best practice 7 - Deciding whether to encode categorical features -- Best practice 8 - Deciding whether to select features and, if so, how to do so -- Best practice 9 - Deciding whether to reduce dimensionality and, if so, how to do so -- Best practice 10 - Deciding whether to rescale features -- Best practice 11 - Performing feature engineering with domain expertise -- Best practice 12 - Performing feature engineering without domain expertise -- Binarization and discretization -- Interaction -- Polynomial transformation -- Best practice 13 - Documenting how each feature is generated -- Best practice 14 - Extracting features from text data -- tf and tf-idf -- Word embedding -- Word2Vec embedding -- Best practices in the model training, evaluation, and selection stage -- Best practice 15 - Choosing the right algorithm(s) to start with -- Naïve Bayes -- Logistic regression -- SVM -- Random forest (or decision tree) -- Neural networks -- Best practice 16 - Reducing overfitting -- Best practice 17 - Diagnosing overfitting and underfitting -- Best practice 18 - Modeling on large-scale datasets -- Best practices in the deployment and monitoring stage -- Best practice 19 - Saving, loading, and reusing models -- Saving and restoring models using pickle -- Saving and restoring models in TensorFlow -- Saving and restoring models in PyTorch -- Best practice 20 - Monitoring model performance -- Best practice 21 - Updating models regularly…”
Libro electrónico -
36523Publicado 2024Tabla de Contenidos: “…-- Elements of information security -- Why do intrusions and attacks happen? -- Motive -- Means -- Opportunity -- Types and profiles of attackers and defenders -- Black hat hackers -- Script kiddies -- Hacktivists -- Cyber terrorists/cyber warriors -- Cyber criminals -- White hat hackers -- Attack targets and types -- Network -- Application -- Host -- The anatomy of an attack -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and control -- Actions on objectives -- Ethical hacking and penetration testing -- Defensive technologies -- Lab - setting up the testing lab -- Setting up VirtualBox -- Setting up Kali Linux -- Setting up vulnerable hosts -- Configuring the vulnerable Windows host -- Setting up the vulnerable Linux host -- Final checks -- Summary -- Assessment -- Answers -- Chapter 2: Ethical Hacking Footprinting and Reconnaissance -- Technical requirements -- What is footprinting and reconnaissance? …”
Libro electrónico -
36524Publicado 2024Tabla de Contenidos: “…switch statements -- switch statements and arrays -- switch statements and files -- Wildcard and Regex parameters -- Script block cases -- switch statements and enums -- switch, break, and continue -- Loops -- foreach loop -- foreach keyword and foreach alias -- for loop -- do-until and do-while loops -- while loop -- Loops, break, and continue -- break and continue outside loops -- Loops and labels -- Loops, queues, and stacks -- Summary -- Chapter 7: Working with .NET -- Assemblies -- About the GAC -- Types -- Type descriptions are objects in PowerShell -- Enumerations -- Classes -- Namespaces -- The using keyword -- Using namespaces -- Using assemblies -- Type accelerators -- About PSCustomObject and Ordered -- Members -- Constructors -- Properties -- Methods -- Fluent interfaces -- Static methods -- About the new() method -- Static properties -- Reflection in PowerShell -- The TypeAccelerators type -- The ArgumentTypeConverterAttribute type -- About generics -- Generic classes -- Generic methods -- Summary -- Online Chapter -- Chapter 10: Files, Folders, and the Registry -- Working with providers -- Navigating -- Getting items -- Drives -- Items -- Paths and .NET -- Testing for existing items -- Testing filesystem paths -- Testing registry paths -- Testing path type -- Creating items -- Reading and writing content -- Reading and writing in a pipeline -- Reading all content -- Writing content -- About text file encoding -- Temporary files -- Removing items -- Invoking items -- Item properties -- Properties and the filesystem -- Adding and removing file attributes -- Registry values -- Registry values and environment variables -- Searching for items -- Windows permissions -- Access and audit -- Rule protection -- Inheritance and propagation flags -- Removing ACEs -- Copying lists and entries -- Adding ACEs -- Filesystem rights -- Registry rights…”
Libro electrónico -
36525
-
36526Publicado 1997Tabla de Contenidos: “…Rider / Running bear / Runaway / Party doll / Rubber ball / Speedy Gonzalez / Jenny Jenny / Hats off to Larry / Hula love / The night has a thousand eyes / Pony time / Rocky road blues / Hello Josephine / Rip it up / Leader of the pack / Boys / It's my party / Ain't that a shame / Sweet Georgia Brown / The happy organ / Red river rock / Rebel rouser / Walk don't run / ABC Boogie / Under the boardwalk / Lawdy Miss Clawdy / Searching / Hello Mary Lou / I'm walking / Boogie woogie boy / Rock-a-billy rebel / Be-bop-a-lula / Midnight dynamos / Matchbox ; It's late / Stagger Lee / Hawaii five-O / Something else / Shake ratle and roll / Whole lotta loving (live) / I get around / Breaking up is hard to do (live) / Ooby dooby (live) / Rip it up / Ride the wild surf / I want to walk you home / Buzz buzz a diddle it / The sints rock and roll / Love will keep us together (live) / New girl in school / Just a dream / Be my guest / Hound dog (live)…”
CDROM -
36527Publicado 2023Tabla de Contenidos: “…Apuntes para un primer acercamiento / Alejandro García Morilla -- Consideraciones sobre los sellos eclesiásticos relacionados con la Corona de Aragón (siglos XIII-XV) de la Colección de piezas sigilares del Barón de Valdeolivos / Ernesto Fernández-Xesta y Vázquez -- La sigilografía como representación de la identidad: ejemplo de las Colecciones aretinas / Leonardo Magionami -- Sigillvm Potvgaliae: projecto para a criação de un corpus dos selos portugueses / Maria do Rosário Barbosa Morujao -- Una aproximación a la conquista omeya de al-Andalus a través de las fuentes históricas: el precinto de Écija/Istia / Teresa Campos-López, Fátima Martín Escudero…”
Acceso restringido usuarios UPSA
Libro electrónico -
36528Publicado 2013Tabla de Contenidos: “…Machine generated contents note: INTRODUCTIONIntroduction : Archaeology after Interpretation - Andrew Meirion Jones and Benjamin Alberti(with contributions from Chris Fowler, Gavin Lucas, and Joshua Pollard)PART I Relational Ontologies - Benjamin AlbertiChapter 1 - Archaeology and ontologies of scale: the case of miniaturization in first millennium northwest Argentina - Benjamin AlbertiChapter 2 - Transmorphic Being, Corresponding Affect: An Ontological Safari in South-Central California - David RobinsonChapter 3 - Carnival times and the semiopraxis of the snake: Mining and politics of knowledge- Alejandro HaberChapter 4 - Unstable contexts: re-materialising the archaeological record of domestic settings in Andean Northwest Argentina Andre;s Gustavo LaguensPART II Working with Material - Andrew Meirion JonesChapter 5 - Deception and (mis)representation: Skeuomorphs, materials and form - Chantel ConnellerChapter 6 - Archaeological Complexity: Materials, Multiplicity and the transitions to agriculture in Britain - Andrew Meirion Jones and Emilie SibbessonChapter 7 - Material worlds: a contextual archaeology of dependent architecture - Lesley McFadyenChapter 8 - Object Agency and the Katsina cult- William WalkerPART III Assembling the Social- Joshua PollardChapter 9 - What Monuments Do: Construction, Effects and Ontologies - Joshua PollardChapter 10 - Fields of Movement in the Ancient Woodlands of North America- Sarah E. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
36529Publicado 2007Tabla de Contenidos: “…Derwing -- The SLIP technique as a window on the mental preparation of speech : some methodological considerations / Sieb Nooteboom, Hugo Quené -- Experimental methods in the study of Hindi geminate consonants / Manjari Ohala -- Morphophonemics and the lexicon : a case study from Turkish / Anne Pycha, Sharon Inkelas, Ronald Sprouse -- How do listeners compensate for phonology? / Eurie Shin…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Acceso con credenciales UPSA
Libro electrónico -
36530Publicado 2010Tabla de Contenidos: “…LA LAICIDAD; PÁGINA LEGAL; ÍNDICE; PRÓLOGO; PRIMERA PARTE ; ESPAÑA; Secularización y sistema concordatario histórico español de 1753 y 1851; Tolerancia, laicidad y diálogo intercultural; Símbolos religiosos en los espacios educativos españoles: la solución jurisprudencial; Contradicciones del modelo laico español de relaciones Estado-confesiones religiosas; BRASIL; Normas jurídicas e a exceção do religioso: a objeção de consciência na Constituição brasileira; Ética cívica e fundamentação das leis no Estado laico; Breves reflexões sobre política, democracia e religião no Brasil; ESTADOS-UNIDOS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
36531Publicado 2006Tabla de Contenidos: “…MEDIATIZAÇÃO / A REVISÃO PÓS-MODERNA DO CÂNONE BRASILEIRO: PERIFERIA VS. CENTRO / PANORAMA DA CRÍTICA CULTURAL BRASILEIRA / ANTIQUARIANISMO & MODERNIDADE NOS MUSEUS BRASILEIROS CONTEMPORÂNEOS / INTO THE MILLENNIUM: TOWARD A THEORY OF LATINO U.S. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
36532por Asociación Alemana de Investigación sobre América Latina.Tabla de Contenidos: “…Problemática de desarrollo autodeterminado y preservación de culturas indígenas -- Indio, modernidad y desarrollo o invertir en pueblos indígenas / O problema do espado vital dos povos indígenas e os conflitos de interesse na demarcado das Areas Indígenas na Amazonia Brasileira / Los indígenas y sus territorios. …”
Publicado 1998
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
36533Publicado 2022Tabla de Contenidos: “…En las profundidades del bosque -- 39. Monte do Gozo -- 40. Esperada noticia -- 41. Las altas torres -- 42. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull)Acceso con credenciales UPSA
Libro electrónico -
36534Publicado 2011Tabla de Contenidos: “…Ornatowski -- Symbolic power: political rhetoric in a state of exception / Bart van Klink, Olivier Lembcke and Pablo Leandro Ciocchini -- Do new parties bring personalization, a narrow issue agenda and populist rhetoric? …”
Libro electrónico -
36535Publicado 2018Tabla de Contenidos: “…CHAPTER FOURTEEN First Steps: an integration project for infants with an immigrant background- conceptualisation and first impressionsCHAPTER FIFTEEN Cognitive stimulation and parental sensitivity in toddlers' homes: how do children and parents interact and how effective are trainings for parents?…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
36536por Paul, ChristopherTabla de Contenidos: “…CHAPTER FIVE - Conclusions and Recommendations Key Findings; Effective COIN Practices Tend to Run in Packs; The Balance of Good Versus Bad Practices Perfectly Predicts Outcomes; Poor Beginnings Do Not Necessarily Lead to Poor Ends; Repression Wins Phases, but Usually Not Cases; Tangible Support Trumps Popular Support; APPENDIXES; A. …”
Publicado 2010
Libro electrónico -
36537Publicado 2016Tabla de Contenidos: “…Section 1 Girls in Latitude and Longitude -- ch. 1 Under the Shadow of Empire: Indigenous Girls' Presencing as Decolonizing Force / Sandrina de Finney -- ch. 2 Voices in Longitude and Latitude: Girlhood at the Intersection of Art and Ethnography / Marnina Gonick -- ch. 3 Nowhere to Go, Nothing to Do: Place, Desire, and Country Girlhood / Catherine Driscoll -- ch. 4 Landscapes of Academic Success: Smart Girls and School Culture / Shauna Pomerantz --…”
Libro electrónico -
36538Publicado 2013Tabla de Contenidos: “…Money Laundering: Motives, Methods, Impact, and Countermeasures 17 2. What Do a Tax Evader and a Money Launderer have in Common? …”
Libro electrónico -
36539Publicado 2012Tabla de Contenidos: “…-- Comparing educational pathways in the life stories -- Young mothers becoming 'can-do' girls? -- 'Intimate' citizenship? -- Playing at politics -- Celanthropy: Money buys love -- Planet earth needs our love and protection -- Beyond 'yeah, whatever': The potential for individualised citizenship -- Gender relations: 'my feminism' -- Refugees: Good neighbours -- Reconciliation: Us and them and its quotidian expression -- Lacking sociological literacy in an age of individualism -- Equality in the rhetoric, difference in reality -- The questionnaires -- The sample -- Survey statistics…”
Libro electrónico -
36540Publicado 1993Tabla de Contenidos: “…225 -- Chapter 12-There is everywhere a void which nothing can fill, but the presence of my darling husband. 251 -- Chapter 13-Do you know I am more in love with you than I ever was in my life? …”
Libro electrónico