Mostrando 292,041 - 292,060 Resultados de 299,134 Para Buscar '"C "', tiempo de consulta: 0.61s Limitar resultados
  1. 292041
    Publicado 2003
    Tabla de Contenidos: “…Using Rational Robot in the Tivoli Management Agent environment -- Rational Robot -- Tivoli Monitoring for Transaction Performance (TMTP) -- The ARM API -- Initial install -- Working with Java Applets -- Running the Java Enabler -- Using the ARM API in Robot scripts -- Rational Robot command line options -- Obfuscating embedded passwords in Rational Scripts -- Rational Robot screen locking solution -- Appendix C. Additional material -- Locating the Web material -- Using the Web material -- System requirements for downloading the Web material -- How to use the Web material -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Help from IBM -- Index -- Back cover…”
    Libro electrónico
  2. 292042
    Publicado 2004
    “…It contains a wide range of portal technologies that help you develop and maintain B2C, B2B, and B2E portals. WebSphere Portal provides considerable flexibility in addressing dynamic changes in marketplace conditions through advanced integration, Web services, and collaboration technology. …”
    Libro electrónico
  3. 292043
    por Gibbs, R. Dennis
    Publicado 2007
    Libro electrónico
  4. 292044
    Publicado 2022
    Libro electrónico
  5. 292045
    Publicado 2022
    Libro electrónico
  6. 292046
    Publicado 2022
    Libro electrónico
  7. 292047
    Adobe Photoshop Lightroom Classic for dummies
    Adobe Photoshop Lightroom Classic For Dummies
    Publicado 2022
    Libro electrónico
  8. 292048
    Publicado 2022
    Libro electrónico
  9. 292049
    por Wahli, Ueli
    Publicado 2005
    Libro electrónico
  10. 292050
    por Bordas, St¿phane P. A.
    Publicado 2023
    Libro electrónico
  11. 292051
    Publicado 2024
    Libro electrónico
  12. 292052
    Publicado 2024
    Tabla de Contenidos: “…Part 3: Attacks on Deployed AI -- Chapter 7: Evasion Attacks against Deployed AI -- Fundamentals of evasion attacks -- Importance of understanding evasion attacks -- Reconnaissance techniques for evasion attacks -- Perturbations and image evasion attack techniques -- Evasion attack scenarios -- One-step perturbation with FGSM -- Basic Iterative Method (BIM) -- Jacobian-based Saliency Map Attack (JSMA) -- Carlini and Wagner (C&amp -- W) attack -- Projected Gradient Descent (PGD) -- Adversarial patches - bridging digital and physical evasion techniques -- NLP evasion attacks with BERT using TextAttack -- Attack scenario - sentiment analysis -- Attack example -- Attack scenario - natural language inference -- Attack example -- Universal Adversarial Perturbations (UAPs) -- Attack scenario -- Attack example -- Black-box attacks with transferability -- Attack scenario -- Attack example -- Defending against evasion attacks -- Mitigation strategies overview -- Adversarial training -- Input preprocessing -- Model hardening techniques -- Model ensembles -- Certified defenses -- Summary -- Chapter 8: Privacy Attacks - Stealing Models -- Understanding privacy attacks -- Stealing models with model extraction attacks -- Functionally equivalent extraction -- Learning-based model extraction attacks -- Generative student-teacher extraction (distillation) attacks -- Attack example against our CIFAR-10 CNN -- Defenses and mitigations -- Prevention measures -- Detection measures -- Model ownership identification and recovery -- Summary -- Chapter 9: Privacy Attacks - Stealing Data -- Understanding model inversion attacks -- Types of model inversion attacks -- Exploitation of model confidence scores -- GAN-assisted model inversion -- Example model inversion attack -- Understanding inference attacks -- Attribute inference attacks -- Meta-classifiers…”
    Libro electrónico
  13. 292053
  14. 292054
  15. 292055
  16. 292056
  17. 292057
  18. 292058
  19. 292059
  20. 292060