Mostrando 1,241 - 1,260 Resultados de 1,649 Para Buscar '".py"', tiempo de consulta: 0.08s Limitar resultados
  1. 1241
    por Joris Luyendijk
    Publicado 2016
    Texto completo en Odilo
    Otros
  2. 1242
  3. 1243
    por Carlos Molano López
    Publicado 2017
    Texto completo en Odilo
    Otros
  4. 1244
    Publicado 2019
    Tabla de Contenidos: “…-- PART I: BASICS -- 1 GETTING STARTED -- Setting Up Your Programming Environment -- Python on Different Operating Systems -- Running a Hello World Program -- Troubleshooting -- Running Python Programs from a Terminal -- Summary -- 2 VARIABLES AND SIMPLE DATA TYPES -- What Really Happens When You Run hello_world.py -- Variables -- Strings -- Numbers -- Comments -- The Zen of Python -- Summary -- 3 INTRODUCING LISTS -- What Is a List? …”
    Libro electrónico
  5. 1245
    Publicado 2023
    Tabla de Contenidos: “…. -- There's more... -- NumPy and MXNet ND arrays -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 2: Working with MXNet and Visualizing Datasets - Gluon and DataLoader -- Technical requirements -- Understanding regression datasets - loading, managing, and visualizing the House Sales dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- Understanding classification datasets - loading, managing, and visualizing the Iris dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- Understanding image datasets - loading, managing, and visualizing the Fashion-MNIST dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- Understanding text datasets - loading, managing, and visualizing the Enron Email dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: Solving Regression Problems -- Technical requirements -- Understanding the math of regression models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Defining loss functions and evaluation metrics for regression -- Getting ready -- How to do it... -- How it works... -- There's more... -- Training regression models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Evaluating regression models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 4: Solving Classification Problems -- Technical requirements -- Understanding math for classification models -- Getting ready -- How to do it…”
    Libro electrónico
  6. 1246
    por Tsvetovat, Maksim
    Publicado 2011
    “…You'll also learn how to use Python and other open source tools-such as NetworkX, NumPy, and Matplotlib-to gather, analyz…”
    Libro electrónico
  7. 1247
    Publicado 2021
    Tabla de Contenidos: “…B.7 Attributes and methods -- B.8 String methods -- B.9 Lists -- B.9.1 List iteration -- B.9.2 List comprehension -- B.9.3 Converting a string to a list and vice versa -- B.10 Tuples -- B.11 Dictionaries -- B.11.1 Dictionary Iteration -- B.12 Sets -- Appendix C. NumPy crash course -- C.1 Dimensions -- C.2 The ndarray object -- C.2.1 Generating a numeric range with the arange method -- C.2.2 Attributes on a ndarray object -- C.2.3 The reshape method -- C.2.4 The randint function -- C.2.5 The randn function -- C.3 The nan object -- Appendix D. …”
    Libro electrónico
  8. 1248
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Titel -- Impressum -- Inhalt -- Einleitung -- Kapitel 1: Minecraft-Server -- 1.1 Java installieren -- 1.2 Installation -- 1.2.1 CraftBukkit -- 1.2.2 Spigot -- 1.3 Konfiguration -- 1.4 Befehle -- 1.5 Verbinden -- 1.6 Updates -- Kapitel 2: Python -- 2.1 Programmiersprachen -- 2.2 Besonderheiten von Python -- 2.3 Einrichtung -- 2.3.1 Jython -- 2.3.2 PPLoader -- 2.4 Editor -- Kapitel 3: Das erste Plugin -- 3.1 Ordner anlegen -- 3.2 plugin.py -- 3.3 plugin.yml -- 3.4 Testen -- 3.5 Fehler finden -- 3.6 Entdecken -- Kapitel 4: Chat-Kommandos -- 4.1 Eigene Befehle definieren -- 4.2 Chat-Nachrichten versenden -- Kapitel 5: Variablen -- 5.1 Namen -- 5.2 Werte -- 5.2.1 Operatoren -- 5.2.2 Umwandlung -- 5.2.3 Runden -- 5.3 +1-Plugin -- 5.4 Listen und Arrays -- 5.5 Konstanten -- Kapitel 6: Schleifen -- 6.1 Kürbis-Plugin -- 6.1.1 Positionierung -- 6.1.2 Blöcke platzieren -- 6.2 Die verschiedenen Schleifen -- 6.2.1 for-Schleife -- 6.2.2 while-Schleife -- 6.2.3 Verschachtelte Schleifen -- Kapitel 7: Verzweigungen -- 7.1 if -- 7.2 else -- 7.3 elif -- Kapitel 8: Funktionen -- 8.1 Deklaration von Funktionen -- 8.2 Rückgabewerte -- 8.3 Parameter -- 8.4 Anwendungsbeispiel -- Kapitel 9: Bauen -- 9.1 Notunterkunft -- 9.1.1 Decke und Wände -- 9.1.2 Tür -- 9.1.3 Bett -- 9.1.4 Fackel -- 9.2 Runde Objekte -- 9.2.1 Kreise -- 9.2.2 Kugeln -- Kapitel 10: Schilder -- 10.1 Hängende Schilder -- 10.2 Stehende Schilder -- 10.3 Text festlegen -- 10.3.1 Farbe -- 10.3.2 Formatierung -- 10.4 Schilder-Plugin -- 10.4.1 Wiederholung: Listen -- 10.4.2 Das Plugin -- Kapitel 11: Listener -- 11.1 Grundgerüst -- 11.2 Spieler-Events -- 11.3 Kreaturen-Events -- 11.4 Block-Events -- 11.5 Inventar-Events -- 11.6 Server-Events -- 11.7 Fahrzeug-Events -- 11.8 Wetter-Events -- 11.9 Welt-Events -- 11.10 Mehrere Listener in einem Plugin -- Kapitel 12: Klassen und Objekte…”
    Libro electrónico
  9. 1249
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Impressum -- Einleitung -- Kapitel 1: Minecraft-Server -- 1.1 Java installieren -- 1.2 Installation -- 1.2.1 CraftBukkit -- 1.2.2 Spigot -- 1.3 Konfiguration -- 1.4 Befehle -- 1.5 Verbinden -- 1.6 Updates -- Kapitel 2: Python -- 2.1 Programmiersprachen -- 2.2 Besonderheiten von Python -- 2.3 Einrichtung -- 2.3.1 Jython -- 2.3.2 PPLoader -- 2.4 Editor -- Kapitel 3: Das erste Plugin -- 3.1 Ordner anlegen -- 3.2 plugin.py -- 3.3 plugin.yml -- 3.4 Testen -- 3.5 Fehler finden -- 3.6 Entdecken -- Kapitel 4: Chat-Kommandos -- 4.1 Eigene Befehle definieren -- 4.2 Chat-Nachrichten versenden -- Kapitel 5: Variablen -- 5.1 Namen -- 5.2 Werte -- 5.2.1 Operatoren -- 5.2.2 Umwandlung -- 5.2.3 Runden -- 5.3 +1-Plugin -- 5.4 Listen und Arrays -- 5.5 Konstanten -- Kapitel 6: Schleifen -- 6.1 Kürbis-Plugin -- 6.1.1 Positionierung -- 6.1.2 Blöcke platzieren -- 6.2 Die verschiedenen Schleifen -- 6.2.1 for-Schleife -- 6.2.2 while-Schleife -- 6.2.3 Verschachtelte Schleifen -- Kapitel 7: Verzweigungen -- 7.1 if -- 7.2 else -- 7.3 elif -- Kapitel 8: Funktionen -- 8.1 Deklaration von Funktionen -- 8.2 Rückgabewerte -- 8.3 Parameter -- 8.4 Anwendungsbeispiel -- Kapitel 9: Bauen -- 9.1 Notunterkunft -- 9.1.1 Decke und Wände -- 9.1.2 Tür -- 9.1.3 Bett -- 9.1.4 Fackel -- 9.2 Runde Objekte -- 9.2.1 Kreise -- 9.2.2 Kugeln -- Kapitel 10: Schilder -- 10.1 Hängende Schilder -- 10.2 Stehende Schilder -- 10.3 Text festlegen -- 10.3.1 Farbe -- 10.3.2 Formatierung -- 10.4 Schilder-Plugin -- 10.4.1 Wiederholung: Listen -- 10.4.2 Das Plugin -- Kapitel 11: Listener -- 11.1 Grundgerüst -- 11.2 Spieler-Events -- 11.3 Kreaturen-Events -- 11.4 Block-Events -- 11.5 Inventar-Events -- 11.6 Server-Events -- 11.7 Fahrzeug-Events -- 11.8 Wetter-Events -- 11.9 Welt-Events -- 11.10 Mehrere Listener in einem Plugin -- Kapitel 12: Klassen und Objekte -- 12.1 Die ganze Welt ist ein Objekt…”
    Libro electrónico
  10. 1250
    Publicado 2024
    Tabla de Contenidos: “…Attack trees -- Mitigations -- Microsoft Threat Modeling Tool -- Example of an enterprise threat model -- Summary -- Self-assessment questions -- Answers -- Part 2: Mitigating Risks in Implementation -- Chapter 7: Authentication and Authorization -- Authentication -- Authorization -- Security Models -- Single sign-on and open authorization -- Single sign-on (SSO) -- Open authorization (OAuth) -- Implementing SSO and OAuth with Google -- Example of enterprise implementation -- Summary -- Self-assessment questions -- Answers -- Chapter 8: Input Validation and Sanitization -- Input validation -- Input sanitization -- Language-specific defenses -- Buffer overflows -- Example of the enterprise input validation and sanitization -- Summary -- Self-assessment questions -- Answers -- Chapter 9: Standard Web Application Vulnerabilities -- Injection attacks -- Broken authentication and session management -- Request forgery -- Language-specific defenses -- Example of enterprise web defenses -- Summary -- Self-assessment questions -- Answers -- Chapter 10: Database Security -- Overview of SQL -- SQL injection -- Maintaining database correctness -- Managing activity concurrency -- Language-specific defenses -- RBAC security in DBMS -- Encryption in DBMS -- An example of enterprise DB security -- Summary -- Self-assessment questions -- Answers -- Part 3: Security Validation -- Chapter 11: Unit Testing -- The principles of unit testing -- The advantages of unit testing -- Unit testing frameworks -- An example of enterprise threat model -- PHPUnit -- JUnit -- PyUnit -- Summary -- Self-assessment questions -- Answers -- Chapter 12: Regression Testing -- Regression testing overview -- Key concepts -- Process -- Benefits -- Robotic process automation -- The intersection of RPA and regression testing -- Regression testing tools -- Load testing…”
    Libro electrónico
  11. 1251
    Publicado 2019
    Tabla de Contenidos: “…Understanding cells -- Adding documentation cells -- Using other cell types -- Understanding the Use of Indentation -- Adding Comments -- Understanding comments -- Using comments to leave yourself reminders -- Using comments to keep code from executing -- Getting Help with the Python Language -- Working in the Cloud -- Using the Kaggle datasets and kernels -- Using the Google Colaboratory -- Chapter 4 Leveraging a Deep Learning Framework -- Presenting Frameworks -- Defining the differences -- Explaining the popularity of frameworks -- Defining the deep learning framework -- Choosing a particular framework -- Working with Low-End Frameworks -- Caffe2 -- Chainer -- PyTorch -- MXNet -- Microsoft Cognitive Toolkit/CNTK -- Understanding TensorFlow -- Grasping why TensorFlow is so good -- Making TensorFlow easier by using TFLearn -- Using Keras as the best simplifier -- Getting your copy of TensorFlow and Keras -- Fixing the C++ build tools error in Windows -- Accessing your new environment in Notebook -- Part 2 Considering Deep Learning Basics -- Chapter 5 Reviewing Matrix Math and Optimization -- Revealing the Math You Really Need -- Working with data -- Creating and operating with a matrix -- Understanding Scalar, Vector, and Matrix Operations -- Creating a matrix -- Performing matrix multiplication -- Executing advanced matrix operations -- Extending analysis to tensors -- Using vectorization effectively -- Interpreting Learning as Optimization -- Exploring cost functions -- Descending the error curve -- Learning the right direction -- Updating -- Chapter 6 Laying Linear Regression Foundations -- Combining Variables -- Working through simple linear regression -- Advancing to multiple linear regression -- Including gradient descent -- Seeing linear regression in action -- Mixing Variable Types -- Modeling the responses -- Modeling the features…”
    Libro electrónico
  12. 1252
    Publicado 1999
    Tabla de Contenidos: “…Names have no type, but objects do -- Expression Statements -- Expression Statements and In-Place Changes -- print Statements -- The Python "Hello World" Program -- Redirecting the Output Stream -- The print &gt -- &gt -- file Extension -- Chapter Summary -- Quiz Answers -- if Tests -- if Statements -- General Format -- Basic Examples -- Multiway Branching -- Python Syntax Rules -- Block Delimiters -- Statement Delimiters -- A Few Special Cases -- Truth Tests -- The if/else Ternary Expression -- Chapter Summary -- Quiz Answers -- while and for Loops -- while Loops -- General Format -- Examples -- break, continue, pass, and the Loop else -- General Loop Format -- Examples -- pass -- continue -- break -- else -- More on the loop else clause -- for Loops -- General Format -- Examples -- Basic usage -- Other data types -- Tuple assignment in for -- Nested for loops -- Iterators: A First Look -- File Iterators -- Other Built-in Type Iterators -- Other Iteration Contexts -- User-Defined Iterators -- Loop Coding Techniques -- Counter Loops: while and range -- Nonexhaustive Traversals: range -- Changing Lists: range -- Parallel Traversals: zip and map -- Dictionary construction with zip -- Generating Both Offsets and Items: enumerate -- List Comprehensions: A First Look -- List Comprehension Basics -- Using List Comprehensions on Files -- Extended List Comprehension Syntax -- Chapter Summary -- Quiz Answers -- The Documentation Interlude -- Python Documentation Sources -- # Comments -- The dir Function -- Docstrings: _ _doc_ _ -- User-defined docstrings -- Docstring standards -- Built-in docstrings -- PyDoc: The help Function -- PyDoc: HTML Reports -- Standard Manual Set -- Web Resources -- Published Books -- Common Coding Gotchas -- Chapter Summary -- Quiz Answers -- Part IV -- Function Basics -- Why Use Functions? …”
    Libro electrónico
  13. 1253
    Publicado 2024
    Tabla de Contenidos: “…Types of poisoning attacks -- Poisoning attack examples -- Why it matters -- Staging a simple poisoning attack -- Creating poisoned samples -- Backdoor poisoning attacks -- Creating backdoor triggers with ART -- Poisoning data with ART -- Hidden-trigger backdoor attacks -- Clean-label attacks -- Advanced poisoning attacks -- Mitigations and defenses -- Cybercity defenses with MLOps -- Anomaly detection -- Robustness tests against poisoning -- Advanced poisoning defenses with ART -- Adversarial training -- Creating a defense strategy -- Summary -- Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming -- Injecting backdoors using pickle serialization -- Attack scenario -- Defenses and mitigations -- Injecting Trojan horses with Keras Lambda layers -- Attack scenario -- Defenses and mitigations -- Trojan horses with custom layers -- Attack scenario -- Defenses and mitigations -- Neural payload injection -- Attack scenario -- Defenses and mitigations -- Attacking edge AI -- Attack scenario -- Defenses and mitigations -- Model hijacking -- Trojan horse code injection -- Model reprogramming -- Summary -- Chapter 6: Supply Chain Attacks and Adversarial AI -- Traditional supply chain risks and AI -- Risks from outdated and vulnerable components -- Risks from AI's dependency on live data -- Securing AI from vulnerable components -- Enhanced security - allow approved-only packages -- Client configuration for private PyPI repositories -- Additional private PyPI security -- Use of SBOMs -- AI supply chain risks -- The double-edged sword of transfer learning -- Model poisoning -- Model tampering -- Secure model provenance and governance for pre-trained models -- MLOps and private model repositories -- Data poisoning -- Using data poisoning to affect sentiment analysis -- Defenses and mitigations -- AI/ML SBOMs -- Summary…”
    Libro electrónico
  14. 1254
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Learning the Flask 3.x Framework -- Chapter 1: A Deep Dive into the Flask Framework -- Technical requirements -- Setting up the project baseline -- Installing the latest Python version -- Installing the Visual Studio (VS) Code editor -- Creating the virtual environment -- Installing the Flask 3.x libraries -- Creating the Flask project -- Creating routes and navigations -- Creating static URLs -- Assigning multiple URLs -- Applying path variables -- Assigning URLs externally -- Implementing class-based views -- Managing request and response data -- Retrieving the request object -- Creating the response object -- Implementing page redirection -- Implementing view templates -- Creating web forms -- Building the data layer with PostgreSQL -- Setting up database connectivity -- Implementing the repository layer -- Creating the service layer -- Managing the project structure -- Building the directory structure -- Setting up a development environment -- Implementing the main.py module -- Creating environment variables -- Summary -- Chapter 2: Adding Advanced Core Features -- Technical requirements -- Structuring huge and scalable projects -- Using the application factory -- Using the Blueprint -- Utilizing both the application factory and the Blueprint -- Applying object-relational mapping (ORM) -- Setting up the database connectivity -- Building the model layer -- Implementing the repository layer -- Configuring the logging mechanism -- Creating user sessions -- Managing session data -- Clearing all session data -- Applying flash messages -- Utilizing some advanced Jinja2 features -- Applying with-blocks and macros -- Applying filters -- Adding comments -- Implementing error-handling solutions…”
    Libro electrónico
  15. 1255
    por Robert D. Kaplan
    Publicado 2017
    Texto completo en Odilo
    Otros
  16. 1256
    por Antonio Valdés Palacio
    Publicado 2016
    Texto completo en Odilo
    Otros
  17. 1257
  18. 1258
    por Juan Prego
    Publicado 2012
    Texto completo en Odilo
    Otros
  19. 1259
    por Javier Scherk
    Publicado 2012
    Texto completo en Odilo
    Otros
  20. 1260
    por Javier Scherk
    Publicado 2015
    Texto completo en Odilo
    Otros