Mostrando 5,081 - 5,100 Resultados de 9,028 Para Buscar '"Agente"', tiempo de consulta: 0.10s Limitar resultados
  1. 5081
    por Sowell, Eric. author
    Publicado 2013
    Tabla de Contenidos: “…""Mobile Views""""Step 1: Create an Empty ASP.NET MVC 4 or 5 Site""; ""Step 2: Create the HomeController""; ""Step 3: Create the View""; ""Step 4: Create a Layout""; ""Step 5: Create the CSS and JavaScript""; ""Step 6: Create our Mobile Overrides""; ""DisplayModes""; ""Setting Up a Windows Phone 8 DisplayMode""; ""Custom View Engine""; ""Adding A/B Testing""; ""HtmlHelpers""; ""Summary""; ""Chapter 7: Device and Feature Detection""; ""Device Detection""; ""Parsing User Agent Strings with WURFL""; ""Abstracting WURFL""; ""Feature Detection""; ""Practical Feature Detection""…”
    Libro electrónico
  2. 5082
    por Couzin, Gradiva
    Publicado 2014
    Tabla de Contenidos: “…Shopping Comparison Sites and Online Travel Agents Reputation Management Services; Local Search; Fake Reviews; The Scale of Fake Reviews; Love for Sale; The Fight against Fake Reviews; Chapter 3: Understanding Reviewers and Reviews; Who Are the Reviewers?…”
    Libro electrónico
  3. 5083
    Publicado 2015
    Tabla de Contenidos: “…; Gender and the Negotiated Order; Second-Generation Gender Issues; Negotiating at Work: A Chapter Overview; What's Good for Alicia Is Good for the Company; About the Authors; PART ONE: PREPARING FOR n-NEGOTIATIONS; 1: You Can't Get What You Want If You Don't Know What You Want; Two Steps to Prep for Negotiating; Challenges in Figuring Out What You Want; Challenge 1: Negotiating for Yourself, Not as an Agent…”
    Libro electrónico
  4. 5084
    Publicado 2015
    Tabla de Contenidos: “…-- Background research -- Checking robots.txt -- Examining the Sitemap -- Estimating the size of a website -- Identifying the technology used by a website -- Finding the owner of a website -- Crawling your first website -- Downloading a web page -- Retrying downloads -- Setting a user agent -- Sitemap crawler -- ID iteration crawler -- Link crawler -- Advanced features -- Summary -- Chapter 2: Scraping the Data -- Analyzing a web page -- Three approaches to scrape a web page -- Regular expressions -- Beautiful Soup -- Lxml -- CSS selectors -- Comparing performance -- Scraping results -- Overview -- Adding a scrape callback to the link crawler -- Summary -- Chapter 3: Caching Downloads -- Adding cache support to the link crawler -- Disk cache -- Implementation -- Testing the cache -- Saving disk space -- Expiring stale data -- Drawbacks -- Database cache -- What is NoSQL? …”
    Libro electrónico
  5. 5085
    Publicado 2015
    Tabla de Contenidos: “…Configuring SELinux booleansConfiguring SELinux port definitions; Troubleshooting SELinux; Creating SELinux policies; Applying SELinux policies; Chapter 6: Orchestrating with Ansible; Introduction; Install Ansible; Configuring the Ansible inventory; Creating a template for a kickstart file; Creating a playbook to deploy a new VM with kickstart; Creating a playbook to perform system configuration tasks; Troubleshooting Ansible; Chapter 7: Puppet Configuration Management; Introduction; Installing and configuring Puppet Master; Installing and configuring the Puppet agent…”
    Libro electrónico
  6. 5086
    Publicado 2016
    Tabla de Contenidos: “…Texture Creativity ; Fifty-Fifty Mirrors (Beam-splitters) ; Ghost effects ; Depth of field ; Auto-focus ; Mirrored Effects; Extending the picture ; Changing direction ; Calculating reflecting angles ; Periscopes; Periscope ; Underwater periscope ; Underwater lighting ; Snorkel shots ; Polystyrene Fabrication and Modelling; Cutting and shaping ; Joining ; Finishing ; Plastic Forming Machines; Expanded-polystyrene cutter ; Vacuum-forming machine ; Plaster of Paris; Mixing the plaster ; Release agents ; Miscellaneous ; Plaster Turning; Horizontal method ; Vertical method ; Mould Making…”
    Libro electrónico
  7. 5087
    por Buchanan, Cameron
    Publicado 2015
    Tabla de Contenidos: “…Encoding payloadsChapter 5: Web Header Manipulation; Introduction; Testing HTTP methods; Fingerprinting servers through HTTP headers; Testing for insecure headers; Brute forcing login through Authorization header; Testing for clickjacking vulnerabilities; Identifying alternative sites by spoofing user agents; Testing for insecure cookie flags; Session fixation through cookie injection; Chapter 6: Image Analysis and Manipulation; Introduction; Hiding a message using LSB steganography; Extracting messages hidden in LSB; Hiding text in images; Extracting text from images…”
    Libro electrónico
  8. 5088
    Publicado 2023
    Tabla de Contenidos: “…About the Editor vii -- Preface to "Modelling, Monitoring, Control and Optimization for Complex Industrial Processes" ix -- Special Issue on "Modelling, Monitoring, Control and Optimization for Complex Industrial Processes" 1 -- Real-Time Parameter Identification for Forging Machine Using Reinforcement Learning 7 -- A Simple and Effective Modeling Method for 3D Porous Irregular Structures 27 -- Modelling Method and Application of Anti-Corrosion Pill Particles in Oil and Gas Field Wellbore Casing Annulus Based on the Discrete Element Method 39 -- Identification and Analysis of Factors Influencing Green Growth of Manufacturing Enterprises Based on DEMATEL Method-Wooden Flooring Manufacturing Companies as a Case 53 -- T-S Fuzzy Model-Based Fault Detection for Continuous Stirring Tank Reactor 65 -- TLSCA-SVM Fault Diagnosis Optimization Method Based on Transfer Learning 81 -- Data-Driven State Prediction and Sensor Fault Diagnosis for Multi-Agent Systems with Application to a Twin Rotational Inverted Pendulum 113 -- Dynamically Triggering Resilient Control for Networked Nonlinear Systems under Malicious Aperiodic DoS Attacks 129 -- Tracking Control of a Hyperchaotic Complex System and Its Fractional-Order Generalization 145 -- Performance Improvement of H8 Transformerless Grid-Tied Inverter Using Model Predictive Control Considering a Weak Grid 159 -- An Effective Temperature Control Method for Dividing-Wall Distillation Columns 175 -- Linear Golden Section Speed Adaptive Control of Permanent Magnet Synchronous Motor Based on Model Design 193 -- Analysis and Design of a Standalone Electric Vehicle Charging Station Supplied by Photovoltaic Energy 209 -- Performance Optimization of a Steam Generator Level Control System via a Revised Simplex Search-Based Data-Driven Optimization Methodology 225 -- Remote Wind Farm Path Planning for Patrol Robot Based on the Hybrid Optimization Algorithm 247 -- Material Removal Optimization Strategy of 3D Block Cutting Based on Geometric Computation Method 269 -- Successful Pass Schedule Design in Open-Die Forging Using Double Deep Q-Learning 287 -- Optimization of the Sustainable Distribution Supply Chain Using the Lean Value Stream Mapping 4.0 Tool: A Case Study of the Automotive Wiring Industry 319 -- A Real-Time Optimization Strategy for Small-Scale Facilities and Implementation in a Gas Processing Unit 339 -- The Effect of Changes in Settings from Multiple Filling Points to a Single Filling Point of an Industry 4.0-Based Yogurt Filling Machine 369 -- Dynamic Cooperation of the 020 Supply Chain Based on Time Delays and Bidirectional Free-Riding 391 -- Music Generation System for Adversarial Training Based on Deep Learning 413.…”
    Libro electrónico
  9. 5089
    Publicado 2023
    Tabla de Contenidos: “…David Wilson Thermodynamic Factors That Drive Sequence-Specific DNA Binding of Designed, Synthetic Minor Groove Binding Agents -- Jim-Marcel Knop, Sanjib K. Mukherjee, Stewart Gault, Charles S. …”
    Libro electrónico
  10. 5090
    Publicado 2017
    Tabla de Contenidos: “…4.2 Enterprise Architecture Evolution4.2.1 Technology Evolution; 4.2.2 Flexible, Near Real Time Software Development; 4.2.3 Machine Intelligence; 4.2.4 E4.0 Architecture; 4.3 Humans versus Machines; 4.4 Summary; Appendix: A Five-Step Approach to an Intelligent Enterprise; References; PART III Real World Case Studies; 5 Active Advising with Intelligent Agents; 5.1 Introduction; 5.2 The Investment Advisory Market; 5.3 What Do Investors Really Need and Want; 5.4 Challenges with High-Touch Advisory Services; 5.4.1 Questions of Value and Interest; 5.4.2 The Massive "Wealth Transfer" Phenomenon…”
    Libro electrónico
  11. 5091
    por Wilson, K. 1958-
    Publicado 2010
    Tabla de Contenidos: “…Irregular Form Adjectives A-Adjectives; Adjuncts, Disjuncts, and Conjuncts; Adverbial Clause; Adverbial Phrase; Adverbs; Prepositional Phrases Acting as Adverbs; Infinitive Phrases Acting as Adverbs; Adverbs in a Numbered List; Adverbs to Avoid; Positioning Adverbs in a Sentence; Order of Adverbs; Inappropriate Adverb Order; Viewpoint Adverbs; Focus Adverbs; Negative Adverbs; Advice, Advise; Affect, Effect; Affixes; African-American; Age; Agents; Agreement; Aid, Aide; Alike; A Little; Allegories; Alliteration; All Right, Alright; Allusion, Illusion; Alone, Lonely; A Lot, Alot, Allot…”
    Libro electrónico
  12. 5092
    por Schmutz, Guido
    Publicado 2010
    Tabla de Contenidos: “…Complex Event Processing (CEP)Grid computing/Extreme Transaction Processing (XTP); Grid computing; Data grids; Distribution topologies; Agents; Execution patterns; Uses; XTP (Extreme Transaction Processing); XTP and CEP; Solid State Disks and grids; Summary; Chapter 2: Base Technologies; Transactions; Transactional systems; Isolation levels; Serializable; Repeatable read; Read committed; Read uncommitted; Phantom reads; Two-Phase Commit protocol (2PC); XA transactions; OSGi; OSGi architecture; OSGi bundles; Collaborative model; Java Connector Architecture (JCA); Uses; JCA components…”
    Libro electrónico
  13. 5093
    por Kahan, Seth
    Publicado 2013
    Tabla de Contenidos: “…Format and Present Results for Maximum Impact; Use an External Provider for Intelligence; Six Guidelines for Working with an Intelligence Agent; The Eight Elements of an Intelligence Contract; Success Rules; Chapter 4 Shift Perspective; Working the Angles; Pivoting for Success; Change Your Assumptions; Four Techniques for Shifting Perspective; Isolate and Examine the Steps in Your Value Chain; Become Your Competition; Seek Out and Highlight Weak Spots; Look to Creative Deviants; A New Way of Seeing; Success Rules…”
    Libro electrónico
  14. 5094
    Publicado 2023
    Tabla de Contenidos: “…Las traducciones de literatura e historiografía de Richard Otto Spazier / José Luis Losada Palenzuela -- Mediadores na viagem de Spix e Martius pelo Brasil: uma experiência de travessia de culturas e transferência de saberes / Karen Macknow Lisboa -- Comunicaciones y límites de comunicaciones intelectuales en el margen del mundo atlántico: antropología americana en los Países Checos, comienzos del siglo XX / Markéta Křížová -- Agentes de la circulación y la coproducción de conocimientos: los científicos alemanes en el sur de América / Sandra Carreras -- Doctorandos chilenos en Alemania (1960-2015): contexto histórico y condiciones de los estudios, e integración a redes científicas internacionales / Enrique Fernández Darraz -- Cómo ser nacional? …”
    Libro electrónico
  15. 5095
    Publicado 2023
    Tabla de Contenidos: “…Las traducciones de literatura e historiografía de Richard Otto Spazier / José Luis Losada Palenzuela -- Mediadores na viagem de Spix e Martius pelo Brasil: uma experiência de travessia de culturas e transferência de saberes / Karen Macknow Lisboa -- Comunicaciones y límites de comunicaciones intelectuales en el margen del mundo atlántico: antropología americana en los Países Checos, comienzos del siglo XX / Markéta Křížová -- Agentes de la circulación y la coproducción de conocimientos: los científicos alemanes en el sur de América / Sandra Carreras -- Doctorandos chilenos en Alemania (1960-2015): contexto histórico y condiciones de los estudios, e integración a redes científicas internacionales / Enrique Fernández Darraz -- Cómo ser nacional? …”
    Libro electrónico
  16. 5096
    por Chowdhary, Ankush
    Publicado 2023
    Tabla de Contenidos: “…Deleting a service account -- Undeleting a service account -- Service account keys -- Key rotation -- Service account impersonation -- Cross-project service account access -- Configuring Workload Identity Federation with Okta -- Best practices for monitoring service account activity -- Service agents -- IAM policy bindings -- Policy structure -- Policy inheritance and resource hierarchy -- IAM Conditions -- Policy best practices -- Policy Intelligence for better permission management -- Tag-based access control -- Tag structure -- Best practices for tags -- Cloud Storage ACLs…”
    Libro electrónico
  17. 5097
    Publicado 2024
    Tabla de Contenidos: “…Chapter 26: LLMs and RAG Enable Hyper-Personalized Education for Healthcare Technicians -- Chapter 27: AI Personalization Increases Engagement in Nascent Tech Communities -- Chapter 28: AI-Powered Virtual Agent Augments Service Efficiency -- Chapter 29: Generative AI Creates a Paradigm Shift in Innovation Processes -- Chapter 30: Unlocking Profit Potential - Leveraging Enterprise Data for Customer Profitability -- Chapter 31: Minimizing Customer Churn with AI -- Chapter 32: Enhancing Marketing Strategies Through the Power of LLMs -- Chapter 33: Multimodal LLMs Redefine Software Development and Customer Innovation -- Chapter 34: Where We've Got To and What's Next…”
    Libro electrónico
  18. 5098
    por Gralla, Preston
    Publicado 2007
    Tabla de Contenidos: “…How FTP works -- 33. How agents work -- 34. How Java, ActiveX, and JavaScript work -- 35. …”
    Libro electrónico
  19. 5099
    Publicado 2008
    Tabla de Contenidos: “…Authentication and Authorization of Wireless Users -- Lightweight Access Point Protocol (LWAPP) -- Wireless Intrusion Prevention System Integration -- Management Frame Protection (MFP) -- Precise Location Tracking -- Network Admission Control (NAC) in Wireless Networks -- Summary -- Chapter 9 IP Telephony Security -- Protecting the IP Telephony Infrastructure -- Securing the IP Telephony Applications -- Protecting Against Eavesdropping Attacks -- Summary -- Chapter 10 Data Center Security -- Protecting the Data Center Against Denial of Service (DoS) Attacks and Worms -- Data Center Segmentation and Tiered Access Control -- Deploying Network Intrusion Detection and Prevention Systems -- Deploying the Cisco Security Agent (CSA) in the Data Center -- Summary -- Chapter 11 IPv6 Security -- Reconnaissance -- Filtering in IPv6 -- Spoofing -- Header Manipulation and Fragmentation -- Broadcast Amplification or Smurf Attacks -- IPv6 Routing Security -- IPsec and IPv6 -- Summary -- Part IV Case Studies -- Chapter 12 Case Studies -- Case Study of a Small Business -- Case Study of a Medium-Sized Enterprise -- Case Study of a Large Enterprise -- Summary -- Index…”
    Libro electrónico
  20. 5100
    Publicado 2002
    Tabla de Contenidos: “…Lightweight Directory Access ProtocolHost Administration; User Management; The Password File; System Accounts; Choosing Passwords; Superuser; User Cleanup Procedures; The Groups File; Software Package Management; Checking Installed Packages; Package Installation; Uninstalling Packages; Making New Packages; Printer Management; Printing Files; Configuring Printers; Printer Status; Supported Devices; GUI Installation; Quotas; Installing Sendmail; Simple Mail Transfer Protocol; Mail Transfer Agent; sendmail.cf; Transferring Mail; Message Headers; Commercial Support; File Serving; Samba…”
    Libro electrónico