Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Python (Computer program language) 399
- Machine learning 162
- Society & social sciences 162
- Educación pedagogía 93
- Data mining 80
- Artificial intelligence 76
- Historia 51
- Humanities 50
- Computer programming 47
- Development 45
- Application software 44
- Historia / General 43
- Data processing 42
- Big data 39
- Neural networks (Computer science) 39
- Python 37
- Ciencias Políticas / General 33
- Natural language processing (Computer science) 33
- Computer programs 29
- Economics, finance, business & management 28
- Programming languages (Electronic computers) 25
- Cloud computing 22
- Deep learning (Machine learning) 22
- Open source software 22
- Mathematics 20
- Artificial Intelligence 19
- Electronic data processing 17
- Health & personal development 17
- Negocios y Economía / Gerencia 17
- Programming 17
-
1241
-
1242
-
1243
-
1244Publicado 2019Tabla de Contenidos: “…-- PART I: BASICS -- 1 GETTING STARTED -- Setting Up Your Programming Environment -- Python on Different Operating Systems -- Running a Hello World Program -- Troubleshooting -- Running Python Programs from a Terminal -- Summary -- 2 VARIABLES AND SIMPLE DATA TYPES -- What Really Happens When You Run hello_world.py -- Variables -- Strings -- Numbers -- Comments -- The Zen of Python -- Summary -- 3 INTRODUCING LISTS -- What Is a List? …”
Libro electrónico -
1245Publicado 2023Tabla de Contenidos: “…. -- There's more... -- NumPy and MXNet ND arrays -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 2: Working with MXNet and Visualizing Datasets - Gluon and DataLoader -- Technical requirements -- Understanding regression datasets - loading, managing, and visualizing the House Sales dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- Understanding classification datasets - loading, managing, and visualizing the Iris dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- Understanding image datasets - loading, managing, and visualizing the Fashion-MNIST dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- Understanding text datasets - loading, managing, and visualizing the Enron Email dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: Solving Regression Problems -- Technical requirements -- Understanding the math of regression models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Defining loss functions and evaluation metrics for regression -- Getting ready -- How to do it... -- How it works... -- There's more... -- Training regression models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Evaluating regression models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 4: Solving Classification Problems -- Technical requirements -- Understanding math for classification models -- Getting ready -- How to do it…”
Libro electrónico -
1246por Tsvetovat, Maksim“…You'll also learn how to use Python and other open source tools-such as NetworkX, NumPy, and Matplotlib-to gather, analyz…”
Publicado 2011
Libro electrónico -
1247Publicado 2021Tabla de Contenidos: “…B.7 Attributes and methods -- B.8 String methods -- B.9 Lists -- B.9.1 List iteration -- B.9.2 List comprehension -- B.9.3 Converting a string to a list and vice versa -- B.10 Tuples -- B.11 Dictionaries -- B.11.1 Dictionary Iteration -- B.12 Sets -- Appendix C. NumPy crash course -- C.1 Dimensions -- C.2 The ndarray object -- C.2.1 Generating a numeric range with the arange method -- C.2.2 Attributes on a ndarray object -- C.2.3 The reshape method -- C.2.4 The randint function -- C.2.5 The randn function -- C.3 The nan object -- Appendix D. …”
Libro electrónico -
1248Publicado 2017Tabla de Contenidos: “…Cover -- Titel -- Impressum -- Inhalt -- Einleitung -- Kapitel 1: Minecraft-Server -- 1.1 Java installieren -- 1.2 Installation -- 1.2.1 CraftBukkit -- 1.2.2 Spigot -- 1.3 Konfiguration -- 1.4 Befehle -- 1.5 Verbinden -- 1.6 Updates -- Kapitel 2: Python -- 2.1 Programmiersprachen -- 2.2 Besonderheiten von Python -- 2.3 Einrichtung -- 2.3.1 Jython -- 2.3.2 PPLoader -- 2.4 Editor -- Kapitel 3: Das erste Plugin -- 3.1 Ordner anlegen -- 3.2 plugin.py -- 3.3 plugin.yml -- 3.4 Testen -- 3.5 Fehler finden -- 3.6 Entdecken -- Kapitel 4: Chat-Kommandos -- 4.1 Eigene Befehle definieren -- 4.2 Chat-Nachrichten versenden -- Kapitel 5: Variablen -- 5.1 Namen -- 5.2 Werte -- 5.2.1 Operatoren -- 5.2.2 Umwandlung -- 5.2.3 Runden -- 5.3 +1-Plugin -- 5.4 Listen und Arrays -- 5.5 Konstanten -- Kapitel 6: Schleifen -- 6.1 Kürbis-Plugin -- 6.1.1 Positionierung -- 6.1.2 Blöcke platzieren -- 6.2 Die verschiedenen Schleifen -- 6.2.1 for-Schleife -- 6.2.2 while-Schleife -- 6.2.3 Verschachtelte Schleifen -- Kapitel 7: Verzweigungen -- 7.1 if -- 7.2 else -- 7.3 elif -- Kapitel 8: Funktionen -- 8.1 Deklaration von Funktionen -- 8.2 Rückgabewerte -- 8.3 Parameter -- 8.4 Anwendungsbeispiel -- Kapitel 9: Bauen -- 9.1 Notunterkunft -- 9.1.1 Decke und Wände -- 9.1.2 Tür -- 9.1.3 Bett -- 9.1.4 Fackel -- 9.2 Runde Objekte -- 9.2.1 Kreise -- 9.2.2 Kugeln -- Kapitel 10: Schilder -- 10.1 Hängende Schilder -- 10.2 Stehende Schilder -- 10.3 Text festlegen -- 10.3.1 Farbe -- 10.3.2 Formatierung -- 10.4 Schilder-Plugin -- 10.4.1 Wiederholung: Listen -- 10.4.2 Das Plugin -- Kapitel 11: Listener -- 11.1 Grundgerüst -- 11.2 Spieler-Events -- 11.3 Kreaturen-Events -- 11.4 Block-Events -- 11.5 Inventar-Events -- 11.6 Server-Events -- 11.7 Fahrzeug-Events -- 11.8 Wetter-Events -- 11.9 Welt-Events -- 11.10 Mehrere Listener in einem Plugin -- Kapitel 12: Klassen und Objekte…”
Libro electrónico -
1249Publicado 2023Tabla de Contenidos: “…Intro -- Impressum -- Einleitung -- Kapitel 1: Minecraft-Server -- 1.1 Java installieren -- 1.2 Installation -- 1.2.1 CraftBukkit -- 1.2.2 Spigot -- 1.3 Konfiguration -- 1.4 Befehle -- 1.5 Verbinden -- 1.6 Updates -- Kapitel 2: Python -- 2.1 Programmiersprachen -- 2.2 Besonderheiten von Python -- 2.3 Einrichtung -- 2.3.1 Jython -- 2.3.2 PPLoader -- 2.4 Editor -- Kapitel 3: Das erste Plugin -- 3.1 Ordner anlegen -- 3.2 plugin.py -- 3.3 plugin.yml -- 3.4 Testen -- 3.5 Fehler finden -- 3.6 Entdecken -- Kapitel 4: Chat-Kommandos -- 4.1 Eigene Befehle definieren -- 4.2 Chat-Nachrichten versenden -- Kapitel 5: Variablen -- 5.1 Namen -- 5.2 Werte -- 5.2.1 Operatoren -- 5.2.2 Umwandlung -- 5.2.3 Runden -- 5.3 +1-Plugin -- 5.4 Listen und Arrays -- 5.5 Konstanten -- Kapitel 6: Schleifen -- 6.1 Kürbis-Plugin -- 6.1.1 Positionierung -- 6.1.2 Blöcke platzieren -- 6.2 Die verschiedenen Schleifen -- 6.2.1 for-Schleife -- 6.2.2 while-Schleife -- 6.2.3 Verschachtelte Schleifen -- Kapitel 7: Verzweigungen -- 7.1 if -- 7.2 else -- 7.3 elif -- Kapitel 8: Funktionen -- 8.1 Deklaration von Funktionen -- 8.2 Rückgabewerte -- 8.3 Parameter -- 8.4 Anwendungsbeispiel -- Kapitel 9: Bauen -- 9.1 Notunterkunft -- 9.1.1 Decke und Wände -- 9.1.2 Tür -- 9.1.3 Bett -- 9.1.4 Fackel -- 9.2 Runde Objekte -- 9.2.1 Kreise -- 9.2.2 Kugeln -- Kapitel 10: Schilder -- 10.1 Hängende Schilder -- 10.2 Stehende Schilder -- 10.3 Text festlegen -- 10.3.1 Farbe -- 10.3.2 Formatierung -- 10.4 Schilder-Plugin -- 10.4.1 Wiederholung: Listen -- 10.4.2 Das Plugin -- Kapitel 11: Listener -- 11.1 Grundgerüst -- 11.2 Spieler-Events -- 11.3 Kreaturen-Events -- 11.4 Block-Events -- 11.5 Inventar-Events -- 11.6 Server-Events -- 11.7 Fahrzeug-Events -- 11.8 Wetter-Events -- 11.9 Welt-Events -- 11.10 Mehrere Listener in einem Plugin -- Kapitel 12: Klassen und Objekte -- 12.1 Die ganze Welt ist ein Objekt…”
Libro electrónico -
1250Publicado 2024Tabla de Contenidos: “…Attack trees -- Mitigations -- Microsoft Threat Modeling Tool -- Example of an enterprise threat model -- Summary -- Self-assessment questions -- Answers -- Part 2: Mitigating Risks in Implementation -- Chapter 7: Authentication and Authorization -- Authentication -- Authorization -- Security Models -- Single sign-on and open authorization -- Single sign-on (SSO) -- Open authorization (OAuth) -- Implementing SSO and OAuth with Google -- Example of enterprise implementation -- Summary -- Self-assessment questions -- Answers -- Chapter 8: Input Validation and Sanitization -- Input validation -- Input sanitization -- Language-specific defenses -- Buffer overflows -- Example of the enterprise input validation and sanitization -- Summary -- Self-assessment questions -- Answers -- Chapter 9: Standard Web Application Vulnerabilities -- Injection attacks -- Broken authentication and session management -- Request forgery -- Language-specific defenses -- Example of enterprise web defenses -- Summary -- Self-assessment questions -- Answers -- Chapter 10: Database Security -- Overview of SQL -- SQL injection -- Maintaining database correctness -- Managing activity concurrency -- Language-specific defenses -- RBAC security in DBMS -- Encryption in DBMS -- An example of enterprise DB security -- Summary -- Self-assessment questions -- Answers -- Part 3: Security Validation -- Chapter 11: Unit Testing -- The principles of unit testing -- The advantages of unit testing -- Unit testing frameworks -- An example of enterprise threat model -- PHPUnit -- JUnit -- PyUnit -- Summary -- Self-assessment questions -- Answers -- Chapter 12: Regression Testing -- Regression testing overview -- Key concepts -- Process -- Benefits -- Robotic process automation -- The intersection of RPA and regression testing -- Regression testing tools -- Load testing…”
Libro electrónico -
1251Publicado 2019Tabla de Contenidos: “…Understanding cells -- Adding documentation cells -- Using other cell types -- Understanding the Use of Indentation -- Adding Comments -- Understanding comments -- Using comments to leave yourself reminders -- Using comments to keep code from executing -- Getting Help with the Python Language -- Working in the Cloud -- Using the Kaggle datasets and kernels -- Using the Google Colaboratory -- Chapter 4 Leveraging a Deep Learning Framework -- Presenting Frameworks -- Defining the differences -- Explaining the popularity of frameworks -- Defining the deep learning framework -- Choosing a particular framework -- Working with Low-End Frameworks -- Caffe2 -- Chainer -- PyTorch -- MXNet -- Microsoft Cognitive Toolkit/CNTK -- Understanding TensorFlow -- Grasping why TensorFlow is so good -- Making TensorFlow easier by using TFLearn -- Using Keras as the best simplifier -- Getting your copy of TensorFlow and Keras -- Fixing the C++ build tools error in Windows -- Accessing your new environment in Notebook -- Part 2 Considering Deep Learning Basics -- Chapter 5 Reviewing Matrix Math and Optimization -- Revealing the Math You Really Need -- Working with data -- Creating and operating with a matrix -- Understanding Scalar, Vector, and Matrix Operations -- Creating a matrix -- Performing matrix multiplication -- Executing advanced matrix operations -- Extending analysis to tensors -- Using vectorization effectively -- Interpreting Learning as Optimization -- Exploring cost functions -- Descending the error curve -- Learning the right direction -- Updating -- Chapter 6 Laying Linear Regression Foundations -- Combining Variables -- Working through simple linear regression -- Advancing to multiple linear regression -- Including gradient descent -- Seeing linear regression in action -- Mixing Variable Types -- Modeling the responses -- Modeling the features…”
Libro electrónico -
1252Publicado 1999Tabla de Contenidos: “…Names have no type, but objects do -- Expression Statements -- Expression Statements and In-Place Changes -- print Statements -- The Python "Hello World" Program -- Redirecting the Output Stream -- The print > -- > -- file Extension -- Chapter Summary -- Quiz Answers -- if Tests -- if Statements -- General Format -- Basic Examples -- Multiway Branching -- Python Syntax Rules -- Block Delimiters -- Statement Delimiters -- A Few Special Cases -- Truth Tests -- The if/else Ternary Expression -- Chapter Summary -- Quiz Answers -- while and for Loops -- while Loops -- General Format -- Examples -- break, continue, pass, and the Loop else -- General Loop Format -- Examples -- pass -- continue -- break -- else -- More on the loop else clause -- for Loops -- General Format -- Examples -- Basic usage -- Other data types -- Tuple assignment in for -- Nested for loops -- Iterators: A First Look -- File Iterators -- Other Built-in Type Iterators -- Other Iteration Contexts -- User-Defined Iterators -- Loop Coding Techniques -- Counter Loops: while and range -- Nonexhaustive Traversals: range -- Changing Lists: range -- Parallel Traversals: zip and map -- Dictionary construction with zip -- Generating Both Offsets and Items: enumerate -- List Comprehensions: A First Look -- List Comprehension Basics -- Using List Comprehensions on Files -- Extended List Comprehension Syntax -- Chapter Summary -- Quiz Answers -- The Documentation Interlude -- Python Documentation Sources -- # Comments -- The dir Function -- Docstrings: _ _doc_ _ -- User-defined docstrings -- Docstring standards -- Built-in docstrings -- PyDoc: The help Function -- PyDoc: HTML Reports -- Standard Manual Set -- Web Resources -- Published Books -- Common Coding Gotchas -- Chapter Summary -- Quiz Answers -- Part IV -- Function Basics -- Why Use Functions? …”
Libro electrónico -
1253Publicado 2024Tabla de Contenidos: “…Types of poisoning attacks -- Poisoning attack examples -- Why it matters -- Staging a simple poisoning attack -- Creating poisoned samples -- Backdoor poisoning attacks -- Creating backdoor triggers with ART -- Poisoning data with ART -- Hidden-trigger backdoor attacks -- Clean-label attacks -- Advanced poisoning attacks -- Mitigations and defenses -- Cybercity defenses with MLOps -- Anomaly detection -- Robustness tests against poisoning -- Advanced poisoning defenses with ART -- Adversarial training -- Creating a defense strategy -- Summary -- Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming -- Injecting backdoors using pickle serialization -- Attack scenario -- Defenses and mitigations -- Injecting Trojan horses with Keras Lambda layers -- Attack scenario -- Defenses and mitigations -- Trojan horses with custom layers -- Attack scenario -- Defenses and mitigations -- Neural payload injection -- Attack scenario -- Defenses and mitigations -- Attacking edge AI -- Attack scenario -- Defenses and mitigations -- Model hijacking -- Trojan horse code injection -- Model reprogramming -- Summary -- Chapter 6: Supply Chain Attacks and Adversarial AI -- Traditional supply chain risks and AI -- Risks from outdated and vulnerable components -- Risks from AI's dependency on live data -- Securing AI from vulnerable components -- Enhanced security - allow approved-only packages -- Client configuration for private PyPI repositories -- Additional private PyPI security -- Use of SBOMs -- AI supply chain risks -- The double-edged sword of transfer learning -- Model poisoning -- Model tampering -- Secure model provenance and governance for pre-trained models -- MLOps and private model repositories -- Data poisoning -- Using data poisoning to affect sentiment analysis -- Defenses and mitigations -- AI/ML SBOMs -- Summary…”
Libro electrónico -
1254Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Learning the Flask 3.x Framework -- Chapter 1: A Deep Dive into the Flask Framework -- Technical requirements -- Setting up the project baseline -- Installing the latest Python version -- Installing the Visual Studio (VS) Code editor -- Creating the virtual environment -- Installing the Flask 3.x libraries -- Creating the Flask project -- Creating routes and navigations -- Creating static URLs -- Assigning multiple URLs -- Applying path variables -- Assigning URLs externally -- Implementing class-based views -- Managing request and response data -- Retrieving the request object -- Creating the response object -- Implementing page redirection -- Implementing view templates -- Creating web forms -- Building the data layer with PostgreSQL -- Setting up database connectivity -- Implementing the repository layer -- Creating the service layer -- Managing the project structure -- Building the directory structure -- Setting up a development environment -- Implementing the main.py module -- Creating environment variables -- Summary -- Chapter 2: Adding Advanced Core Features -- Technical requirements -- Structuring huge and scalable projects -- Using the application factory -- Using the Blueprint -- Utilizing both the application factory and the Blueprint -- Applying object-relational mapping (ORM) -- Setting up the database connectivity -- Building the model layer -- Implementing the repository layer -- Configuring the logging mechanism -- Creating user sessions -- Managing session data -- Clearing all session data -- Applying flash messages -- Utilizing some advanced Jinja2 features -- Applying with-blocks and macros -- Applying filters -- Adding comments -- Implementing error-handling solutions…”
Libro electrónico -
1255
-
1256
-
1257
-
1258
-
1259
-
1260