Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Society & social sciences 164
- Cloud computing 121
- Educación pedagogía 93
- Amazon Web Services (Firm) 86
- Descripción y viajes 72
- Historia 71
- Development 60
- Web services 58
- Humanities 51
- Application software 47
- Historia / General 43
- Computer networks 36
- Ciencias Políticas / General 33
- Derecho comunitario 31
- Examinations 31
- Certification 29
- Usos y costumbres 29
- Electronic data processing personnel 28
- Història 28
- Computer security 27
- Economics, finance, business & management 27
- Comunidad Económica Europea 25
- Governance 25
- Security measures 24
- Competencia económica 23
- Computer software 22
- Business & Economics 20
- Management 20
- Engineering & Applied Sciences 18
- Amazon.com (Firm) 17
-
2381por Mullennex, LaurenTabla de Contenidos: “…Moderating images -- Using the DetectModerationLabels API -- Using top-level categories -- Using secondary-level categories -- Putting it together -- Quick recap -- Moderating videos -- Creating the supporting resources -- Finding the resource ARNs -- Uploading the sample video to Amazon S3 -- Using the StartContentModeration API -- Examining the completion notification -- Using the GetContentModeration API -- Quick recap -- Using AWS Lambda to automate the workflow -- Implement the Start Analysis Handler -- Implementing the Get Results Handler -- Publishing function changes -- Experiment with the end-to-end -- Summary -- Part 3: CV at the edge -- Chapter 7: Introducing Amazon Lookout for Vision -- Technical requirements -- Introducing Amazon Lookout for Vision -- The benefits of Amazon Lookout for Vision -- Creating a model using Amazon Lookout for Vision -- Choosing the model type based on your business goals -- Creating a model -- Starting your model -- Analyzing an image -- Stopping your model -- Building a model to identify damaged pills -- Step 1 - collecting your images -- Step 2 - creating a project -- Step 3 - creating the training and test datasets -- Step 4 - verifying the dataset -- Step 5 - training your model -- Validating it works -- Step 1 - trial detection -- Step 2 - starting your model -- Step 3 - analyzing an image with your model -- Step 4 - stopping your model -- Summary -- Chapter 8: Detecting Manufacturing Defects Using CV at the Edge -- Technical requirements -- Understanding ML at the edge -- Deploying a model at the edge using Lookout for Vision and AWS IoT Greengrass -- Step 1 - Launch an Amazon EC2 instance -- Step 2 - Create an IAM role and attach it to an EC2 instance -- Step 3 - Install AWS IoT Greengrass V2 -- Step 4 - Upload training and test datasets to S3 -- Step 5 - Create a project…”
Publicado 2023
Libro electrónico -
2382Publicado 2013Tabla de Contenidos: “…Hurtado -- La percepción del arte español en Norteamérica / por Dolores Jiménez Blanco -- Pintando lo pintoresco : la imagen artística de España en los Estados Unidos (1820-1920) / por Richard Kagan -- El coleccionismo de Archer Milton Huntington / por Margaret E.C. McQuade -- Epílogo: La frontera entre el mundo anglosajón y el hispano : ¿es América Latina Occidente? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2383Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Beginner Level Projects -- Chapter 1: Deploying and Interacting with AWS Services -- Technical requirements -- Architecting on AWS -- Requirements gathering -- Choosing an architecture pattern -- Selecting a service -- Diagramming -- Exploring the Well-Architected Framework -- Getting started with AWS Console -- Using the Console -- Navigating AWS CLI and AWS SDK -- AWS CLI -- AWS SDK -- Understanding IaC -- Using CloudFormation -- Using Terraform -- Summary -- Chapter 2: Creating a Personal Website -- Technical requirements -- Scenario -- Requirements -- Architecture patterns -- Architecture -- AWS services -- Amazon Simple Storage Service (S3) -- Amazon CloudWatch metrics -- Coding the solution -- Editing the website -- Publishing the website -- Monitoring the website -- Cleaning up -- Future work -- Implementing custom DNS -- Taking security to the next level -- Having better observability -- Final architecture -- Summary -- Part 2: Intermediate Level Projects -- Chapter 3: Building a Recipe-Sharing Application -- Technical requirements -- Scenario -- Requirements -- Architecture patterns -- Architecture -- AWS services -- Amazon S3 -- Amazon CloudFront -- Amazon Virtual Private Cloud (VPC) -- Amazon EC2 -- Application Load Balancer (ALB) -- Amazon DynamoDB -- AWS CloudFormation -- Coding the solution -- Cloning the project -- Section 1 - DNS configuration and certificate issuing (option 1 only) -- Section 2 - Solution deployment -- Section 3 - Additional configurations (option 1 only) -- Section 4 - Frontend configuration and deployment -- Section 5 - Testing and exploring your application -- Section 6 - Cleaning up -- Future work -- Using secure protocols -- Infrastructure auto-scaling -- Managed hosting and CI/CD -- Authentication…”
Libro electrónico -
2384por Liyanage, MadhusankaTabla de Contenidos: “…Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto…”
Publicado 2020
Libro electrónico -
2385por Scaffardi, LuciaTabla de Contenidos: “…. -- 1 Introduction -- 2 A Preliminary Analysis of Two Key Concepts: Sustainable Development and Food (In)Security -- 3 How Novel Foods Regulation (EC) 258/97 Affected the Marketing of Traditional Foods Coming from Third Countries: Criticalitie…”
Publicado 2022
Libro electrónico -
2386Publicado 2024Tabla de Contenidos: “…-- Delving into infrastructure as a code -- Pseudocode -- Summary -- Chapter 2: Talking about Python -- Python 101 -- Beautiful-ugly/explicit-implicit -- Simple-complex-complicated -- Flat-nested/sparse-dense -- Readability-special cases-practicality-purity-errors -- Ambiguity/one way/Dutch -- Now or never -- Hard-bad/easy-good -- Namespaces -- What Python offers DevOps -- Operating systems -- Containerization -- Microservices -- A couple of simple DevOps tasks in Python -- Automated shutdown of a server -- Autopull a list of Docker images -- Summary -- Chapter 3: The Simplest Ways to Start Using DevOps in Python Immediately -- Technical requirements -- Introducing API calls -- Exercise 1 - calling a Hugging Face Transformer API -- Exercise 2 - creating and releasing an API for consumption -- Networking -- Exercise 1 - using Scapy to sniff packets and visualize packet size over time -- Exercise 2 - generating a routing table for your device -- Summary -- Chapter 4: Provisioning Resources -- Technical requirements -- Python SDKs (and why everyone uses them) -- Creating an AWS EC2 instance with Python's boto3 library -- Scaling and autoscaling…”
Libro electrónico -
2387
-
2388
-
2389
-
2390
-
2391
-
2392
-
2393
-
2394
-
2395
-
2396
-
2397
-
2398
-
2399
-
2400