Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 350
- Application software 286
- History 232
- Management 198
- Engineering & Applied Sciences 180
- Economics 167
- Historia 159
- Social aspects 145
- Education 137
- Data processing 119
- Computer Science 117
- Microsoft .NET Framework 110
- Computer networks 109
- Security measures 102
- Computer security 97
- Design 96
- RELIGION 95
- Python (Computer program language) 93
- Programming 92
- Web sites 92
- Cross-cultural studies 89
- Web site development 83
- Cloud computing 78
- Computer programs 78
- Machine learning 78
- Computer programming 74
- JavaScript (Computer program language) 71
- History and criticism 66
- Research 65
- Computer software 64
-
5181Publicado 2023Tabla de Contenidos: “…Title description -- About this title - Geological Disposal of Radioactive Waste in Deep Clay Formations: 40 Years of RD&D in the Belgian URL HADES -- Introduction -- Geological disposal of radioactive waste in deep clay formations: celebrating 40 years of RD&D in the Belgian URL HADES -- Supporting ONDRAF/NIRAS' safety statements -- The role of the HADES URL in better understanding of the Boom Clay pore water geochemistry -- Forty years of investigation into the thermo-hydromechanical behaviour of Boom Clay in the HADES URL -- Characterization of Boom Clay anisotropic THM behaviour based on two heating tests at different scales in the HADES URL -- Gas transport in Boom Clay: the role of the HADES URL in process understanding -- Lessons learned from in situ corrosion experiments in the HADES URL -- CP1 and Tribicarb-3D: unique long-term and large-scale in situ migration tests in Boom Clay at the HADES Underground Research Laboratory -- Coupled flow and transport modelling of a large-scale in situ migration experiment with 14C-labelled natural organic matter colloids in Boom Clay -- Supporting ONDRAF/NIRAS' feasibility statements -- The construction of the HADES underground research laboratory and its role in the development of the Belgian concept of a deep geological repository -- Stability analysis and long-term behaviour of deep tunnels in clay formations -- Assessment of long-term sensor performance based on a large THM experiment in the HADES URL -- Supporting international RD&D programmes -- Forty-five years of joint research programmes on geological disposal of radioactive waste and the pioneering role of the HADES Underground Research Laboratory -- Contribution of HADES URL to the development of the Cigéo project, the French industrial centre for geological disposal of high-level and long-lived intermediate-level radioactive waste in a deep clay formation -- 25 years of cross-fertilization between HADES and Mont Terri rock laboratory -- Underground research laboratories, an important support to the Belgian Regulatory Body's Research and Development programme and the management of uncertainties -- Important roles of underground research laboratories for the geological disposal of radioactive wastes: an international perspective -- Perspectives -- Making the future in the present: using Science and Technology Studies to reflect on 40 years of research in the HADES Underground Research Laboratory…”
Libro electrónico -
5182
-
5183Publicado 2014Tabla de Contenidos: “…Introduction -- audience/society transformations / Nico Carpentier, Kim Schrøder and Lawrie Hallett -- Using the media. Cross-media use: Unfolding complexities in contemporary audiencehood / Jakob Bjur, Kim Schrøder, Uwe Hasebrink, Ceric Courtois, Hanna Adoni and Hillel Nossek -- New genres: new roles for the audience? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
5184por International Society for Empirical Research in Theology.Tabla de Contenidos: “…Hermans ... [et al.] -- Cross-religious participation in rituals and interpretation of religious pluralism : a comparative study among Christian, Muslim and Hindu students in Tamil Nadu, India / Francis-Vincent Anthony, Christ A.M. …”
Publicado 2011
Libro -
5185Publicado 2007Tabla de Contenidos: “…Brozgold and José G. Centeno -- Cross-linguistic research: the convergence of monolingual and bilingual data / Raquel T. …”
Libro -
5186Publicado 2011Tabla de Contenidos: “…A great experience to be a part of nature that we have only read about in books. DVD 2: Jungles Cross the globe to some of the most dense rainforests and jungles where wildlife lives within all its glory. …”
Ver más información
DVD -
5187Publicado 2007Tabla de Contenidos: “…Sibling relations in early American childhoods: a cross-cultural analysis / C. Dallett Hemphill -- 5. …”
Libro -
5188Publicado 2024Tabla de Contenidos: “…Bureaucratizing the Battle Name: The Battles Nomenclature Committee -- Transferring the Name: Battle Names beyond the Battlefield -- Conclusion: Battle Names, Remembering, and the Invention of Memory -- Part II: Chronological Change -- 4: Burial and the Battlefield War Memorial in the Late Middle Ages -- Burial as a Post-Bellum Ritual -- Battlefield Chapels -- The Memoryscape of a Battlefield: Neville's Cross -- Conclusion -- 5: The Reformation of the Battlefield in Early Modern Britain -- The End of a Custom -- The Reformation of Memory -- Battlefield Burial…”
Libro -
5189Publicado 1995Tabla de Contenidos: “…Images and the Crisis of Political Legitimacy / Hamid Mowlana. 2. Elements of Cross-Cultural Communication and the Middle East / Mazharul Haque. 3. …”
Libro -
5190por OECDTabla de Contenidos: “…Centralised Systems -- Sub-Dimension 1.1.2 Geopolitical Situation and International/Cross-Border Relations -- Sub-Dimension 1.1.3 Political Continuity, Stability and Support for the Digital Transformation Agenda -- Sub-Dimension 1.1.4 Degree of Legalism and Form of Democratic Governance -- Sub-Dimension 1.1.5 Current Legislations and Regulations on Digital Rights Maturity -- Sub-Dimension 1.1.6 Concentration vs. …”
Publicado 2022
Libro electrónico -
5191Publicado 2017Tabla de Contenidos: “…-- A very high level overview of machine learning -- A brief history of the development of machine learning algorithms -- Generalizing with data -- Overfitting, underfitting and the bias-variance tradeoff -- Avoid overfitting with cross-validation -- Avoid overfitting with regularization -- Avoid overfitting with feature selection and dimensionality reduction -- Preprocessing, exploration, and feature engineering -- Missing values -- Label encoding -- One-hot-encoding -- Scaling -- Polynomial features -- Power transformations -- Binning -- Combining models -- Bagging -- Boosting -- Stacking -- Blending -- Voting and averaging -- Installing software and setting up -- Troubleshooting and asking for help -- Summary -- Chapter 2: Exploring the 20 Newsgroups Dataset with Text Analysis Algorithms -- What is NLP? …”
Libro electrónico -
5192Publicado 2017Tabla de Contenidos: “…Alternating least squares with Apache Spark MLlib -- References -- Summary -- Chapter 12: Introduction to Natural Language Processing -- NLTK and built-in corpora -- Corpora examples -- The bag-of-words strategy -- Tokenizing -- Sentence tokenizing -- Word tokenizing -- Stopword removal -- Language detection -- Stemming -- Vectorizing -- Count vectorizing -- N-grams -- Tf-idf vectorizing -- A sample text classifier based on the Reuters corpus -- References -- Summary -- Chapter 13: Topic Modeling and Sentiment Analysis in NLP -- Topic modeling -- Latent semantic analysis -- Probabilistic latent semantic analysis -- Latent Dirichlet Allocation -- Sentiment analysis -- VADER sentiment analysis with NLTK -- References -- Summary -- Chapter 14: A Brief Introduction to Deep Learning and TensorFlow -- Deep learning at a glance -- Artificial neural networks -- Deep architectures -- Fully connected layers -- Convolutional layers -- Dropout layers -- Recurrent neural networks -- A brief introduction to TensorFlow -- Computing gradients -- Logistic regression -- Classification with a multi-layer perceptron -- Image convolution -- A quick glimpse inside Keras -- References -- Summary -- Chapter 15: Creating a Machine Learning Architecture -- Machine learning architectures -- Data collection -- Normalization -- Dimensionality reduction -- Data augmentation -- Data conversion -- Modeling/Grid search/Cross-validation -- Visualization -- scikit-learn tools for machine learning architectures -- Pipelines -- Feature unions -- References -- Summary -- Index…”
Libro electrónico -
5193Publicado 2023Tabla de Contenidos: “…-- Vulnerabilities on SAML -- Other authentication methods used with HTTP -- How to discover and exploit vulnerabilities in SAML -- Installing SAML Raider -- Verifying the typical flow - the happy case -- Verifying whether it is possible to send information without signature -- Verifying whether it is possible to use a self-signed certificate -- Verifying whether it is possible to use XML Signature Wrapping (XSW) -- Other attacks and vulnerabilities on SAML -- Summary -- Further reading -- Chapter 4: Attacking Internet-Facing Web Applications - SQL Injection and Cross-Site Scripting (XSS) on WordPress -- Technical requirements -- Scenario files -- WordPress scenario introduction -- How does SQL injection work? …”
Libro electrónico -
5194por Wells, ChristopherTabla de Contenidos: “…Don&t let an old caller back in; 2.3.5. Cross-Site Scripting (XSS); 2.3.6. Buffer Overflow; 2.3.7. …”
Publicado 2007
Libro electrónico -
5195Publicado 2018Tabla de Contenidos: “…-- Navigating the Platform -- Introducing Jupyter Notebooks -- Jupyter Features -- Exploring some of Jupyter's most useful features -- Converting a Jupyter Notebook to a Python Script -- Python Libraries -- Import the external libraries and set up the plotting environment -- Our First Analysis - The Boston Housing Dataset -- Loading the Data into Jupyter Using a Pandas DataFrame -- Load the Boston housing dataset -- Data Exploration -- Explore the Boston housing dataset -- Introduction to Predictive Analytics with Jupyter Notebooks -- Linear models with Seaborn and scikit-learn -- Activity: Building a Third-Order Polynomial Model -- Linear models with Seaborn and scikit-learn -- Using Categorical Features for Segmentation Analysis -- Create categorical fields from continuous variables and make segmented visualizations -- Summary -- Chapter 2: Data Cleaning and Advanced Machine Learning -- Preparing to Train a Predictive Model -- Determining a Plan for Predictive Analytics -- Preprocessing Data for Machine Learning -- Exploring data preprocessing tools and methods -- Activity: Preparing to Train a Predictive Model for the Employee-Retention Problem -- Training Classification Models -- Introduction to Classification Algorithms -- Training two-feature classification models with scikit-learn -- The plot_decision_regions Function -- Training k-nearest neighbors for our model -- Training a Random Forest -- Assessing Models with k-Fold Cross-Validation and Validation Curves -- Using k-fold cross-validation and validation curves in Python with scikit-learn -- Dimensionality Reduction Techniques…”
Libro electrónico -
5196Publicado 2019Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- About the Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Foreword by Michiel Prins and Jobert Abma -- Acknowledgments -- Introduction -- Who Should Read This Book -- How to Read This Book -- What's in This Book -- A Disclaimer About Hacking -- 1 Bug Bounty Basics -- Vulnerabilities and Bug Bounties -- Client and Server -- What Happens When You Visit a Website -- HTTP Requests -- Summary -- 2 Open Redirect -- How Open Redirects Work -- Shopify Theme Install Open Redirect -- Shopify Login Open Redirect -- HackerOne Interstitial Redirect -- Summary -- 3 HTTP Parameter Pollution -- Server-Side HPP -- Client-Side HPP -- HackerOne Social Sharing Buttons -- Twitter Unsubscribe Notifications -- Twitter Web Intents -- Summary -- 4 Cross-Site Request Forgery -- Authentication -- CSRF with GET Requests -- CSRF with POST Requests -- Defenses Against CSRF Attacks -- Shopify Twitter Disconnect -- Change Users Instacart Zones -- Badoo Full Account Takeover -- Summary -- 5 HTML Injection and Content Spoofing -- Coinbase Comment Injection Through Character Encoding -- HackerOne Unintended HTML Inclusion -- HackerOne Unintended HTML Include Fix Bypass -- Within Security Content Spoofing -- Summary -- 6 Carriage Return Line Feed Injection -- HTTP Request Smuggling -- v.shopify.com Response Splitting -- Twitter HTTP Response Splitting -- Summary -- 7 Cross-Site Scripting -- Types of XSS -- Shopify Wholesale -- Shopify Currency Formatting -- Yahoo! …”
Libro electrónico -
5197Publicado 2019Tabla de Contenidos: “…CA Decisions before Courts in Cross-border Situations -- VIII. Commission Decisions in Subsequent Proceedings before Courts -- IX. …”
Libro electrónico -
5198por Lewinson, ErykTabla de Contenidos: “…Backtesting a moving average crossover strategy using crypto data -- Backtesting a mean-variance portfolio optimization -- Summary -- Chapter 13: Applied Machine Learning: Identifying Credit Default -- Loading data and managing data types -- Exploratory data analysis -- Splitting data into training and test sets -- Identifying and dealing with missing values -- Encoding categorical variables -- Fitting a decision tree classifier -- Organizing the project with pipelines -- Tuning hyperparameters using grid searches and cross-validation -- Summary -- Chapter 14: Advanced Concepts for Machine Learning Projects -- Exploring ensemble classifiers -- Exploring alternative approaches to encoding categorical features -- Investigating different approaches to handling imbalanced data -- Leveraging the wisdom of the crowds with stacked ensembles -- Bayesian hyperparameter optimization -- Investigating feature importance -- Exploring feature selection techniques -- Exploring explainable AI techniques -- Summary -- Chapter 15: Deep Learning in Finance -- Exploring fastai's Tabular Learner -- Exploring Google's TabNet -- Time series forecasting with Amazon's DeepAR -- Time series forecasting with NeuralProphet -- Summary -- Packtpage -- Other Books You May Enjoy -- Index…”
Publicado 2022
Libro electrónico -
5199por Institute of Medicine (U.S.).Tabla de Contenidos: “…Health Promotion and Disease Prevention in Old Age -- Studies of Geriatric Syndromes -- Failure to Thrive (Inanition) -- Impaired Postural Stability, Strength, and Mobility -- Mismanagement of Medications -- Urinary Incontinence -- Delirium -- Cardiovascular Disease -- Dementia, Pseudodementia, and Psychiatric Disorders -- Musculoskeletal Disorders -- Infectious Disease and Immunosenescence -- Neoplasia -- Disorders of Metabolism and Homeostasis -- ADDITIONAL RESEARCH OPPORTUNITIES -- RESOURCE RECOMMENDATIONS -- CROSSCUTTING ISSUES -- REFERENCES -- 4 Behavioral and Social Sciences -- JUSTIFICATION AND MAJOR THEMES -- The Dynamic Interaction of Individuals and Sociocultural Contexts -- Differentiation -- Modifiability -- RESEARCH PRIORITIES -- ADDITIONAL RESEARCH OPPORTUNITIES -- METHODOLOGICAL NEEDS -- Tests and Instruments -- Coordination of Large-Scale Research -- Field Intervention Studies -- RESOURCE RECOMMENDATIONS -- CROSS-DISCIPLINARY AND CROSSCUTTING ISSUES -- Gender -- Race and Ethnicity, Socioeconomic Status, and Other Cultural Factors -- Population Dynamics -- Brain, Environment, Society, and Behavior -- REFERENCES -- 5 Health Services Delivery Research -- LONG-TERM CARE AND CONTINUITY OF CARE FOR OLDER PERSONS -- Characteristics of Older Persons Requiring Long-Term Care -- Informal Providers of Long-Term Care -- Formal Long-Term Care -- Supply of Personnel for Long-Term Care -- Locus of Long-Term Care -- Quality Assurance -- Technologies -- FINANCING OF HEALTH CARE FOR OLDER PERSONS -- DRUG USE -- Inappropriate Prescribing -- Noncompliance -- Drug Costs and Older Persons -- MENTAL HEALTH SERVICES -- DISABILITY/DISEASE PREVENTION AND HEALTH PROMOTION SERVICES -- RESEARCH PRIORITIES -- ADDITIONAL RESEARCH OPPORTUNITIES -- RESOURCES REQUIRED -- CROSS-DISCIPLINARY AND CROSSCUTTING ISSUES -- REFERENCES -- 6 Research in Biomedical Ethics…”
Publicado 1991
Libro electrónico -
5200Publicado 2012Tabla de Contenidos: “…La literatura chicana hoy (Ateneo de Madrid, 31 de enero, 1976) / Miguel Mâendez ; IV. On crossing borders and stealing flags : confessions of a language thief / Erlinda Gonzales-Berry ; V. …”
Acceso restringido con credenciales UPSA
Libro electrónico