Mostrando 37,381 - 37,400 Resultados de 45,231 Para Buscar '".do"', tiempo de consulta: 0.21s Limitar resultados
  1. 37381
    Publicado 2010
    “…SEE IT DONE. DO IT YOURSELF. It’s that Easy! Easy Microsoft Windows 7 teaches you the fundamentals of working with Microsoft’s latest operating system. …”
    Libro electrónico
  2. 37382
    Publicado 2013
    Tabla de Contenidos: “…Checking Appliance and Air Conditioner Voltage -- What to Do If You Smell Gas -- Chapter 3: Tools Needed for Installation and Repair -- Safety Precautions -- Individual Safety Precautions -- Safety Precautions When Handling Tools -- Screwdrivers -- Nut Drivers -- Wrenches -- Hammers -- Prying Tools -- Pliers -- Cutting Tools -- Power Tools -- Specialty Tools -- Test Meters -- Advantages of Digital Meters -- Chapter 4: Becoming a Professional Technician -- What Is Customer Satisfaction? …”
    Libro electrónico
  3. 37383
    Publicado 2021
    Tabla de Contenidos: “…Front Cover -- Title Page -- Copyright Page -- About the Authors -- Brief Contents -- Detailed Contents -- Applying Macroeconomics to the Real World -- Symbols Used in This Book -- Preface -- Part 1 Introduction -- Chapter 1 Introduction to Macroeconomics -- 1.1 What Macroeconomics Is About -- Long-Run Economic Growth -- Business Cycles -- Unemployment -- Inflation -- The International Economy -- Macroeconomic Policy -- Aggregation -- 1.2 What Macroeconomists Do -- Macroeconomic Forecasting -- Macroeconomic Analysis -- Macroeconomic Research -- Data Development -- In Touch with Data and Research: Developing and Testing an Economic Theory -- 1.3 Why Macroeconomists Disagree -- Classicals Versus Keynesians -- A Unified Approach to Macroeconomics -- Chapter 2 The Measurement and Structure of the National Economy -- 2.1 National Income Accounting: The Measurement of Production, Income, and Expenditure -- In Touch with Data and Research: The National Income and Product Accounts in Malaysia -- Why the Three Approaches Are Equivalent -- 2.2 Gross Domestic Product -- The Product Approach to Measuring GDP -- In Touch with Data and Research: Natural Resources, the Environment, and the National Income Accounts -- The Expenditure Approach to Measuring Gdp -- The Income Approach to Measuring GDP -- 2.3 Saving and Wealth -- Measures of Aggregate Saving -- The Uses of Private Saving -- Relating Saving and Wealth -- 2.4 Real GDP, Price Indexes, and Inflation -- Real GDP -- Price Indexes -- In Touch with Data and Research: The Computer Revolution and Chain-Weighted GDP -- In Touch with Data and Research: CPI Inflation Versus Core Inflation -- Application The Federal Reserve's Preferred Inflation Measures -- 2.5 Interest Rates -- Part 2 Long-Run Economic Performance -- Chapter 3 Productivity, Output, and Employment…”
    Libro electrónico
  4. 37384
    por Gavin, Lee
    Publicado 2004
    Tabla de Contenidos: “…-- 6.4 What are maps? -- 6.4.1 What do they do in the solution? -- 6.5 What are relationships? …”
    Libro electrónico
  5. 37385
    Publicado 2022
    Tabla de Contenidos: “…-- Pivotal Changes in Big Data Technology -- Optimized Big Data -- Cloud Data - What It Is, What You Can Do, Benefits, and Drawbacks -- Cloud Benefits and Drawbacks -- Cloud Storage -- "Other Big Data Promises", Data Lakes, Data Swamps, Reservoirs, Muddy Water, Analytic Sandboxes, and Whatever We Can Think to Call It Tomorrow -- Summary -- References -- Additional Resources -- Data Lakes and Architecture -- Some Terms to Consider Exploring -- 7 Data Virtualization -- Introduction -- The Typical Story of Data Growth, Data Complexity, and Data Needs -- DV - What Is It? …”
    Libro electrónico
  6. 37386
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Author -- About the Technical Editor -- Contents at a Glance -- Contents -- Introduction -- About This Book -- The SSCP Seven Domains -- Using This Book to Defeat the Cybersecurity Kill Chain -- Where Do You Go from Here? -- The SSCP CBK and Your Professional Growth Path -- Maintaining the SSCP Certification -- Join a Local Chapter -- Let's Get Started! …”
    Libro electrónico
  7. 37387
    Publicado 2023
    Tabla de Contenidos: “…Concern for Community -- How Do We Build Black Wealth?: Understanding the Limits ofBlack Capitalism -- The Enduring Appeal of Black Capitalism -- Black Capitalism's Shortfalls -- Capitalism and Inequality -- Can Racial Capitalism Be Reformed? …”
    Libro electrónico
  8. 37388
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  9. 37389
    por Shapiro, Alan N.
    Publicado 2024
    Tabla de Contenidos: “…Shapiro, April 12, 2024 -- Part One - Hyper‐Modernism: Digital Media Technologies and Science Fiction -- Overview of Part One -- Short Definitions of Modernity, Postmodernism, and Hyper‐Modernism -- The Three Essays of Part One -- Mobility and Science Fiction -- Introduction -- We Do Not Live in a Society Where Mobility is Encouraged -- The Dream of the Tomorrow‐Car -- Henri Matisse Paints "the Vision Machine" -- The New Vision Machine -- Close Encounters of the Third Kind: The Menace of Verticality -- The "Spinner" Flying Cars of Blade Runner: Simulation and Surveillance -- Blade Runner: We Are All Replicants -- Blade Runner 2049: Android Liberation Between Old and New Informatic Power -- Minority Report: The Utopia/Dystopia of Surveillance Technologies -- The Fifth Element: When Manhattan has no More Ways to Expand -- Back to the Future: A Speed So Fast that the Laws of Spacetime Get Shattered -- Total Recall: You're in a Johnny Cab -- Robots Versus Androids -- Self‐Owning Cars -- Enhance the Physical World -- The Simulacra, Do Androids Dream of Electric Sheep?…”
    Libro electrónico
  10. 37390
    Publicado 2024
    Tabla de Contenidos: “…Best practice 1 - Completely understanding the project goal -- Best practice 2 - Collecting all fields that are relevant -- Best practice 3 - Maintaining the consistency and normalization of field values -- Best practice 4 - Dealing with missing data -- Best practice 5 - Storing large-scale data -- Best practices in the training set generation stage -- Best practice 6 - Identifying categorical features with numerical values -- Best practice 7 - Deciding whether to encode categorical features -- Best practice 8 - Deciding whether to select features and, if so, how to do so -- Best practice 9 - Deciding whether to reduce dimensionality and, if so, how to do so -- Best practice 10 - Deciding whether to rescale features -- Best practice 11 - Performing feature engineering with domain expertise -- Best practice 12 - Performing feature engineering without domain expertise -- Binarization and discretization -- Interaction -- Polynomial transformation -- Best practice 13 - Documenting how each feature is generated -- Best practice 14 - Extracting features from text data -- tf and tf-idf -- Word embedding -- Word2Vec embedding -- Best practices in the model training, evaluation, and selection stage -- Best practice 15 - Choosing the right algorithm(s) to start with -- Naïve Bayes -- Logistic regression -- SVM -- Random forest (or decision tree) -- Neural networks -- Best practice 16 - Reducing overfitting -- Best practice 17 - Diagnosing overfitting and underfitting -- Best practice 18 - Modeling on large-scale datasets -- Best practices in the deployment and monitoring stage -- Best practice 19 - Saving, loading, and reusing models -- Saving and restoring models using pickle -- Saving and restoring models in TensorFlow -- Saving and restoring models in PyTorch -- Best practice 20 - Monitoring model performance -- Best practice 21 - Updating models regularly…”
    Libro electrónico
  11. 37391
    Publicado 2024
    Tabla de Contenidos: “…-- Elements of information security -- Why do intrusions and attacks happen? -- Motive -- Means -- Opportunity -- Types and profiles of attackers and defenders -- Black hat hackers -- Script kiddies -- Hacktivists -- Cyber terrorists/cyber warriors -- Cyber criminals -- White hat hackers -- Attack targets and types -- Network -- Application -- Host -- The anatomy of an attack -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and control -- Actions on objectives -- Ethical hacking and penetration testing -- Defensive technologies -- Lab - setting up the testing lab -- Setting up VirtualBox -- Setting up Kali Linux -- Setting up vulnerable hosts -- Configuring the vulnerable Windows host -- Setting up the vulnerable Linux host -- Final checks -- Summary -- Assessment -- Answers -- Chapter 2: Ethical Hacking Footprinting and Reconnaissance -- Technical requirements -- What is footprinting and reconnaissance? …”
    Libro electrónico
  12. 37392
    Publicado 2024
    Tabla de Contenidos: “…switch statements -- switch statements and arrays -- switch statements and files -- Wildcard and Regex parameters -- Script block cases -- switch statements and enums -- switch, break, and continue -- Loops -- foreach loop -- foreach keyword and foreach alias -- for loop -- do-until and do-while loops -- while loop -- Loops, break, and continue -- break and continue outside loops -- Loops and labels -- Loops, queues, and stacks -- Summary -- Chapter 7: Working with .NET -- Assemblies -- About the GAC -- Types -- Type descriptions are objects in PowerShell -- Enumerations -- Classes -- Namespaces -- The using keyword -- Using namespaces -- Using assemblies -- Type accelerators -- About PSCustomObject and Ordered -- Members -- Constructors -- Properties -- Methods -- Fluent interfaces -- Static methods -- About the new() method -- Static properties -- Reflection in PowerShell -- The TypeAccelerators type -- The ArgumentTypeConverterAttribute type -- About generics -- Generic classes -- Generic methods -- Summary -- Online Chapter -- Chapter 10: Files, Folders, and the Registry -- Working with providers -- Navigating -- Getting items -- Drives -- Items -- Paths and .NET -- Testing for existing items -- Testing filesystem paths -- Testing registry paths -- Testing path type -- Creating items -- Reading and writing content -- Reading and writing in a pipeline -- Reading all content -- Writing content -- About text file encoding -- Temporary files -- Removing items -- Invoking items -- Item properties -- Properties and the filesystem -- Adding and removing file attributes -- Registry values -- Registry values and environment variables -- Searching for items -- Windows permissions -- Access and audit -- Rule protection -- Inheritance and propagation flags -- Removing ACEs -- Copying lists and entries -- Adding ACEs -- Filesystem rights -- Registry rights…”
    Libro electrónico
  13. 37393
    por Capreolus, Joannes
    Publicado 1483
    Libro
  14. 37394
    Publicado 1997
    Tabla de Contenidos: “…Rider / Running bear / Runaway / Party doll / Rubber ball / Speedy Gonzalez / Jenny Jenny / Hats off to Larry / Hula love / The night has a thousand eyes / Pony time / Rocky road blues / Hello Josephine / Rip it up / Leader of the pack / Boys / It's my party / Ain't that a shame / Sweet Georgia Brown / The happy organ / Red river rock / Rebel rouser / Walk don't run / ABC Boogie / Under the boardwalk / Lawdy Miss Clawdy / Searching / Hello Mary Lou / I'm walking / Boogie woogie boy / Rock-a-billy rebel / Be-bop-a-lula / Midnight dynamos / Matchbox ; It's late / Stagger Lee / Hawaii five-O / Something else / Shake ratle and roll / Whole lotta loving (live) / I get around / Breaking up is hard to do (live) / Ooby dooby (live) / Rip it up / Ride the wild surf / I want to walk you home / Buzz buzz a diddle it / The sints rock and roll / Love will keep us together (live) / New girl in school / Just a dream / Be my guest / Hound dog (live)…”
    CDROM
  15. 37395
    Publicado 2023
    Tabla de Contenidos: “…Apuntes para un primer acercamiento / Alejandro García Morilla -- Consideraciones sobre los sellos eclesiásticos relacionados con la Corona de Aragón (siglos XIII-XV) de la Colección de piezas sigilares del Barón de Valdeolivos / Ernesto Fernández-Xesta y Vázquez -- La sigilografía como representación de la identidad: ejemplo de las Colecciones aretinas / Leonardo Magionami -- Sigillvm Potvgaliae: projecto para a criação de un corpus dos selos portugueses / Maria do Rosário Barbosa Morujao -- Una aproximación a la conquista omeya de al-Andalus a través de las fuentes históricas: el precinto de Écija/Istia / Teresa Campos-López, Fátima Martín Escudero…”
    Acceso restringido usuarios UPSA
    Libro electrónico
  16. 37396
    Publicado 2013
    Tabla de Contenidos: “…Machine generated contents note: INTRODUCTIONIntroduction : Archaeology after Interpretation - Andrew Meirion Jones and Benjamin Alberti(with contributions from Chris Fowler, Gavin Lucas, and Joshua Pollard)PART I Relational Ontologies - Benjamin AlbertiChapter 1 - Archaeology and ontologies of scale: the case of miniaturization in first millennium northwest Argentina - Benjamin AlbertiChapter 2 - Transmorphic Being, Corresponding Affect: An Ontological Safari in South-Central California - David RobinsonChapter 3 - Carnival times and the semiopraxis of the snake: Mining and politics of knowledge- Alejandro HaberChapter 4 - Unstable contexts: re-materialising the archaeological record of domestic settings in Andean Northwest Argentina Andre;s Gustavo LaguensPART II Working with Material - Andrew Meirion JonesChapter 5 - Deception and (mis)representation: Skeuomorphs, materials and form - Chantel ConnellerChapter 6 - Archaeological Complexity: Materials, Multiplicity and the transitions to agriculture in Britain - Andrew Meirion Jones and Emilie SibbessonChapter 7 - Material worlds: a contextual archaeology of dependent architecture - Lesley McFadyenChapter 8 - Object Agency and the Katsina cult- William WalkerPART III Assembling the Social- Joshua PollardChapter 9 - What Monuments Do: Construction, Effects and Ontologies - Joshua PollardChapter 10 - Fields of Movement in the Ancient Woodlands of North America- Sarah E. …”
    Enlace del recurso
    Libro electrónico
  17. 37397
    Publicado 2007
    Tabla de Contenidos: “…Derwing -- The SLIP technique as a window on the mental preparation of speech : some methodological considerations / Sieb Nooteboom, Hugo Quené -- Experimental methods in the study of Hindi geminate consonants / Manjari Ohala -- Morphophonemics and the lexicon : a case study from Turkish / Anne Pycha, Sharon Inkelas, Ronald Sprouse -- How do listeners compensate for phonology? / Eurie Shin…”
    Acceso con credenciales UPSA
    Libro electrónico
  18. 37398
    Publicado 2010
    Tabla de Contenidos: “…LA LAICIDAD; PÁGINA LEGAL; ÍNDICE; PRÓLOGO; PRIMERA PARTE ; ESPAÑA; Secularización y sistema concordatario histórico español de 1753 y 1851; Tolerancia, laicidad y diálogo intercultural; Símbolos religiosos en los espacios educativos españoles: la solución jurisprudencial; Contradicciones del modelo laico español de relaciones Estado-confesiones religiosas; BRASIL; Normas jurídicas e a exceção do religioso: a objeção de consciência na Constituição brasileira; Ética cívica e fundamentação das leis no Estado laico; Breves reflexões sobre política, democracia e religião no Brasil; ESTADOS-UNIDOS…”
    Libro electrónico
  19. 37399
    Publicado 2006
    Tabla de Contenidos: “…MEDIATIZAÇÃO / A REVISÃO PÓS-MODERNA DO CÂNONE BRASILEIRO: PERIFERIA VS. CENTRO / PANORAMA DA CRÍTICA CULTURAL BRASILEIRA / ANTIQUARIANISMO & MODERNIDADE NOS MUSEUS BRASILEIROS CONTEMPORÂNEOS / INTO THE MILLENNIUM: TOWARD A THEORY OF LATINO U.S. …”
    Libro electrónico
  20. 37400
    Tabla de Contenidos: “…Problemática de desarrollo autodeterminado y preservación de culturas indígenas -- Indio, modernidad y desarrollo o invertir en pueblos indígenas / O problema do espado vital dos povos indígenas e os conflitos de interesse na demarcado das Areas Indígenas na Amazonia Brasileira / Los indígenas y sus territorios. …”
    Libro electrónico