Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 350
- Application software 286
- History 232
- Management 198
- Engineering & Applied Sciences 180
- Economics 167
- Historia 159
- Social aspects 145
- Education 137
- Data processing 119
- Computer Science 117
- Microsoft .NET Framework 110
- Computer networks 109
- Security measures 102
- Computer security 97
- Design 96
- RELIGION 95
- Python (Computer program language) 93
- Programming 92
- Web sites 92
- Cross-cultural studies 89
- Web site development 83
- Cloud computing 78
- Computer programs 78
- Machine learning 78
- Computer programming 74
- JavaScript (Computer program language) 71
- History and criticism 66
- Research 65
- Computer software 64
-
6101por Altman, Russ B.Tabla de Contenidos: “…Positive classification rate -- 3.1.4. Cross entropy -- 3.2. Simulation Results -- 3.3. …”
Publicado 2018
Libro electrónico -
6102por Seemann, MarkTabla de Contenidos: “…14.1.4 Blindschreiben -- 14.2 Team-Rhythmus -- 14.2.1 Regelmäßige Aktualisierung der Abhängigkeiten -- 14.2.2 Andere Dinge planen -- 14.2.3 Gesetz von Conway -- 14.3 Fazit -- Kapitel 15: Die üblichen Verdächtigen -- 15.1 Performance -- 15.1.1 Altlast -- 15.1.2 Verständlichkeit -- 15.2 Security -- 15.2.1 STRIDE -- 15.2.2 Spoofing -- 15.2.3 Tampering -- 15.2.4 Repudiation -- 15.2.5 Information Disclosure -- 15.2.6 Denial of Service -- 15.2.7 Elevation of Privilege -- 15.3 Andere Verfahren -- 15.3.1 Eigenschaft-basiertes Testen -- 15.3.2 Verhaltensbezogene Codeanalyse -- 15.4 Fazit -- Kapitel 16: Tour -- 16.1 Navigation -- 16.1.1 Das Gesamtbild erkennen -- 16.1.2 Organisation der Dateien -- 16.1.3 Details aufspüren -- 16.2 Architektur -- 16.2.1 Monolith -- 16.2.2 Zyklen -- 16.3 Verwendung -- 16.3.1 Aus Tests lernen -- 16.3.2 Schenken Sie den Tests Beachtung -- 16.4 Fazit -- Anhang A: Liste der Verfahren -- A.1 50/72-Regel -- A.2 80/24-Regel -- A.3 Abhängigkeiten regelmäßig aktualisieren -- A.4 Advokat des Teufels -- A.5 Arrange, Act, Assert -- A.6 Ausnahmen von der Regel begründen -- A.7 Bedrohungsmodell -- A.8 Bisektion -- A.9 Checkliste für eine neue Codebasis -- A.10 Code-Reviews -- A.11 Decorators für Cross-Cutting Concerns -- A.12 Feature-Flag -- A.13 Fehler als Tests reproduzieren -- A.14 Functional Core, Imperative Shell -- A.15 Kommunikationshierarchie -- A.16 Namen ausixen -- A.17 Parsen, nicht überprüfen -- A.18 Robustheitsgrundsatz -- A.19 Rot-Grün-Refactor -- A.20 Refactoring von Test- und Produktionscode trennen -- A.21 Semantische Versionierung -- A.22 Slice -- A.23 Strangler -- A.24 Prämisse der Priorität der Transformation -- A.25 Trennung von Befehlen und Abfragen -- A.26 X-getriebene Entwicklung -- A.27 Zählen der Variablen -- A.28 Zyklomatische Komplexität -- Anhang B: Bibliografie…”
Publicado 2022
Libro electrónico -
6103Publicado 2016Tabla de Contenidos: “…3.3.8 Schleifen -- 3.3.9 Professionelle Übergabe von Argumenten -- 3.3.10 Einschränkungen bei Shellscripts -- 3.4 Weiterführende Literatur -- Kapitel 4: Cross-Toolchains -- 4.1 Cross-Toolchains für Raspberry Pi B+ -- 4.1.1 Toolchain und IDE für Windows -- 4.1.2 Toolchain und IDE für Linux (Mint) -- 4.1.3 Toolchain und IDE für Mac OS X -- 4.2 Die Bibliothek wiringPi -- 4.2.1 Herunterladen von wiringPi -- 4.2.2 wiringPi »bauen« -- 4.2.3 Funktionen in wiringPi -- 4.2.4 Weitere Informationen zu wiringPi -- 4.2.5 Anschlussbelegung des Raspberry Pi B+ -- 4.3 Konfiguration von Code::Blocks -- 4.3.1 Auswahl des Compilers -- 4.3.2 Einstellen der Compiler-Optionen -- 4.3.3 Bibliothek(en) hinzufügen -- 4.3.4 Erweitern des Suchpfades -- 4.3.5 Toolchain executables -- 4.3.6 Testen der Toolchain -- 4.4 crosstool-ng -- 4.4.1 Vorarbeiten -- 4.4.2 Erstellen und installieren von crosstool-ng -- 4.4.3 Toolchain konfigurieren -- 4.5 Weiterführende Literatur -- Teil II: Techniken zur Programmierung von Kernel und rootfs -- Kapitel 5: Raspbian - der Kernel -- 5.1 Überblick -- 5.1.1 Einmalig durchzuführende Schritte -- 5.1.2 Zu wiederholende Schritte -- 5.2 Kernel erzeugen - detaillierte Anleitung -- 5.2.1 Einmalig durchzuführende Schritte - Details -- 5.2.2 Zu wiederholende Schritte -- 5.3 Das Shellscript mkrpi -- 5.3.1 mkrpi - das Listing zum Shellscript -- 5.3.2 Funktion und Anwendung von mkrpi -- 5.4 Weiterführende Literatur -- Kapitel 6: Das root-Dateisystem - rootfs -- 6.1 rootfs erzeugen -- 6.1.1 Benötigte Software -- 6.1.2 Die nächsten Schritte -- 6.1.3 Imagedatei erzeugen -- 6.1.4 Schreiben der Boot-Partition -- 6.1.5 Schreiben des root-Dateisystems -- 6.1.6 Das Ende naht ... -- 6.2 Alternative Methode -- 6.2.1 Beschaffung und Anwendung von Buildroot -- 6.3 Weiterführende Literatur -- Kapitel 7: Der Bootprozess -- 7.1 Bare-Metal-Systeme…”
Libro electrónico -
6104Publicado 2018Tabla de Contenidos: “…9.2.2.1 Graphene -- 9.2.2.2 Fullerenes -- 9.2.2.3 Carbon Nanotubes -- 9.2.2.4 Carbon Nanofibers -- 9.2.3 Templated Carbons -- 9.2.3.1 Zeolite- and Silica-Derived Carbons -- 9.2.3.2 MOFs-Derived Carbons -- 9.2.4 Other Carbon Materials -- 9.2.4.1 Carbide-Derived Carbons -- 9.2.4.2 Hybrid Carbon-MOF Materials -- 9.2.4.3 Hyper-Cross-Linked Polymers-Derived Carbons -- 9.2.4.4 Carbon Nanorods, Nanohorns and Nanospheres -- 9.2.4.5 Carbon Nitrides -- 9.2.4.6 Carbon Aerogels -- 9.2.4.7 Other Exotic Carbon Materials -- 9.3 Conclusion -- Acknowledgments -- References -- Appendix -- Index -- EULA…”
Libro electrónico -
6105Publicado 2013Tabla de Contenidos: “…7.7 Stock indices and stock index futures -- 7.8 Definition of stock index futures contracts -- 7.9 Advantages of using stock index futures -- 7.10 Cash-and-carry pricing for stock index futures -- 7.11 Stock index futures prices in practice -- 7.12 Turning cash into share portfolios and share portfolios into cash -- 8 Swaps -- 8.1 Definition of interest rate and cross-currency swaps -- 8.2 Development of the swap market -- 8.3 Interest rate swaps -- 8.4 Non-standard interest rate swaps -- 8.5 Overnight indexed swaps -- 8.6 Cross-currency swaps -- 8.7 Basic applications for swaps -- 8.8 Asset swaps -- 8.9 CMS and CMT swaps -- 8.10 Inflation swaps -- 8.11 Equity and dividend swaps -- 8.12 Commodity swaps -- 8.13 Volatility and variance swaps -- 8.14 Exotic swaps -- 8.15 ISDA documentation -- 8.16 Changes in market infrastructure after the credit crisis -- 9 Pricing and valuing swaps -- 9.1 Principles of swap valuation and pricing -- 9.2 Discount factors and the discount function -- 9.3 Calculating discount factors from swap and forward rates -- 9.4 Generating the discount function -- 9.5 Relationship between zero, swap and forward rates -- 9.6 Valuation and pricing of interest rate swaps -- 9.7 Valuation and pricing of currency swaps -- 9.8 Cancelling a swap -- 9.9 Hedging swaps with futures -- 9.10 The convexity correction -- 9.11 Credit risk of swaps -- 9.12 Collateralised vs. non-collateralised swaps -- 9.13 LIBOR-OIS discounting -- 10 Options - basics and pricing -- 10.1 Why options are different -- 10.2 Definitions -- 10.3 Options terminology -- 10.4 Value and profit profiles at maturity -- 10.5 Pricing options -- 10.6 The behaviour of financial prices -- 10.7 The Black-Scholes model -- 10.8 The binomial approach -- 10.9 The Monte Carlo approach -- 10.10 Finite difference methods -- 11 Options - volatility and the Greeks -- 11.1 Volatility…”
Libro electrónico -
6106Publicado 2018Tabla de Contenidos: “…Intro -- Titlepage -- Copyright -- Dedication -- preface -- acknowledgments -- about this book -- How this book is organized -- Roadmap -- About the code -- Book forum -- about the author -- about the cover illustration -- Chapter 1: Securing DevOps -- 1.1 The DevOps approach -- 1.1.1 Continuous integration -- 1.1.2 Continuous delivery -- 1.1.3 Infrastructure as a service -- 1.1.4 Culture and trust -- 1.2 Security in DevOps -- 1.3 Continuous security -- 1.3.1 Test-driven security -- 1.3.2 Monitoring and responding to attacks -- 1.3.3 Assessing risks and maturing security -- Summary -- Part 1: Case study: applying layers of security to a simple DevOps pipeline -- Chapter 2: Building a barebones DevOps pipeline -- 2.1 Implementation roadmap -- 2.2 The code repository: GitHub -- 2.3 The CI platform: CircleCI -- 2.4 The container repository: Docker Hub -- 2.5 The production infrastructure: Amazon Web Services -- 2.5.1 Three-tier architecture -- 2.5.2 Configuring access to AWS -- 2.5.3 Virtual Private Cloud -- 2.5.4 Creating the database tier -- 2.5.5 Creating the first two tiers with Elastic Beanstalk -- 2.5.6 Deploying the container onto your systems -- 2.6 A rapid security audit -- Summary -- Chapter 3: Security layer 1: protecting web applications -- 3.1 Securing and testing web apps -- 3.2 Website attacks and content security -- 3.2.1 Cross-site scripting and Content Security Policy -- 3.2.2 Cross-site request forgery -- 3.2.3 Clickjacking and IFrames protection -- 3.3 Methods for authenticating users -- 3.3.1 HTTP basic authentication -- 3.3.2 Password management -- 3.3.3 Identity providers -- 3.3.4 Sessions and cookie security -- 3.3.5 Testing authentication -- 3.4 Managing dependencies -- 3.4.1 Golang vendoring -- 3.4.2 Node.js package management -- 3.4.3 Python requirements -- Summary…”
Libro electrónico -
6107Publicado 2024Tabla de Contenidos: “…-- 4 Aims of this Book -- 5 Structure of the Book -- Part 1 International Humanitarian Relief in Non-international Armed Conflicts -- Chapter 1 Actors Involved in Relief Actions -- 1 Affected State -- 2 Non-state Armed Groups -- 2.1 Characteristics -- 2.2 Definition -- 2.3 With and without Territorial Control -- 2.4 Responsible Organ or Functionary -- 3 Humanitarian Actors -- 3.1 In General -- 3.2 Types of Humanitarian Actors -- 3.2.1 Third States -- 3.2.2 International Relief Organisations -- 3.2.3 Non-governmental Relief Organisations -- 3.2.4 The International Committee of the Red Cross (ICRC) -- 4 Non-belligerent States -- 5 Civilians -- Chapter 2 Legal Framework -- 1 Overview -- 2 Relevant Laws and Principles -- 2.1 The Principles of State Sovereignty and Non-interference -- 2.2 International Humanitarian Law (IHL) -- 2.2.1 Geneva Conventions and Additional Protocols -- 2.2.2 Customary Law -- 2.2.3 Fundamental Principles of IHL -- 2.3 Humanitarian Principles -- 2.4 International Human Rights Law -- 2.4.1 Application of ihrl and ihl during Armed Conflicts -- 2.4.2 Relevant IHRL Provisions -- 2.5 International Criminal Law -- Chapter 3 The Concept of Humanitarian Relief -- 1 Historical Perspective -- 2 Defining Humanitarian Relief -- 2.1 Characteristics of Humanitarian Relief -- 2.2 Distinction from Other Forms of Aid during Armed Conflicts -- 2.2.1 Development Assistance -- 2.2.2 Peace-Keeping Missions -- 3 Implementation of International Humanitarian Relief -- 3.1 Negotiating Humanitarian Access -- 3.2 Crossline and Cross-Border Provision…”
Libro electrónico -
6108Publicado 2020Tabla de Contenidos: “…-- 10- HACKING WEB -- ESCÁNER DE VULNERABILIDADES -- NIKTO -- OWASP ZAP -- BURP SUITE -- WAPITI -- ACUNETIX -- CROSS SITE SCRIPTING (XSS) -- PRUEBAS DE CONCEPTO -- ¿CÓMO PODEMOS PROTEGERNOS? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
6109Publicado 2018Tabla de Contenidos: “…-- Elixir and Erlang -- Elixir's data types -- Integers -- Floats -- Atoms -- Booleans -- Tuples -- Lists -- Maps -- Binaries -- Strings and charlists -- Other types -- Keyword lists -- Ranges -- MapSets -- Pattern matching -- Pattern matching on tuples -- Pattern matching on lists -- Pattern matching on maps -- Pattern matching on binaries and strings -- Functions and Modules -- Anonymous functions -- Modules and Named Functions -- Module attributes, directives, and uses -- Working with collections -- Looping through recursion -- Eager processing with the Enum module -- Comprehensions -- Lazy processing with the stream module -- Control flow -- if and unless -- cond -- case -- with -- Exceptions -- Typespecs and behaviours -- Typespecs -- Dialyzer -- Behaviours -- Protocols -- Structs -- Bringing structs and protocols together -- Tooling and ecosystems -- IEx -- Mix -- ExUnit -- Erlang interoperability -- Summary -- Chapter 2: Innards of an Elixir Project -- Elixir applications -- Elixir project structure -- Project dependencies -- Umbrella projects -- ElixirDrip - our showcase application -- Using behaviours -- Viewing cross references with xref -- Adopting a consistent coding style -- Summary -- Chapter 3: Processes - The Bedrock of Concurrency and Fault Tolerance -- Inside the BEAM -- Working with processes -- Creating processes -- Message passing between processes -- Building a cache worker -- Detecting errors by linking and monitoring processes -- Using links -- Using monitors -- Recovering from errors with supervisors and supervision trees -- Defining and starting a supervisor -- Streamlined child specs…”
Libro electrónico -
6110Publicado 2021Tabla de Contenidos: “…-EU Safe Harbor and Privacy Shield -- Binding Corporate Rules -- Standard Contractual Clauses -- Other Approved Transfer Mechanisms -- APEC Privacy Framework -- Cross-Border Enforcement Issues -- Global Privacy Enforcement Network -- Resolving Multinational Compliance Conflicts -- Summary -- Exam Essentials -- Review Questions -- Appendix: Answers to Review Questions -- Chapter 1: Privacy in the Modern Era -- Chapter 2: Legal Environment -- Chapter 3: Regulatory Enforcement -- Chapter 4: Information Management…”
Libro electrónico -
6111Publicado 2018Tabla de Contenidos: “…Working with SQL injection and cross-site scripting conditions -- Automating WAF Web ACL deployments using CloudFormation -- Monitoring WAF using CloudWatch -- Planning your next steps -- Introduction to AWS Shield -- Summary -- Chapter 5: Governing Your Environments Using AWS CloudTrail and AWS Config -- Introducing AWS CloudTrail -- Working with AWS CloudTrail -- Creating your first CloudTrail Trail -- Viewing and filtering captured CloudTrail Logs and Events -- Modifying a CloudTrail Trail using the AWS CLI -- Monitoring CloudTrail Logs using CloudWatch -- Creating custom metric filters and alarms for monitoring CloudTrail Logs -- Automating deployment of CloudWatch alarms for AWS CloudTrail -- Analyzing CloudTrail Logs using Amazon Elasticsearch -- Introducing AWS Config -- Concepts and terminologies -- Getting started with AWS Config -- Creating custom config rules -- Tips and best practices -- Summary -- Chapter 6: Access Control Using AWS IAM and AWS Organizations -- What's new with AWS IAM -- Using the visual editor to create IAM policies -- Testing IAM policies using the IAM Policy Simulator -- Introducing AWS Organizations -- Getting started with AWS Organizations -- Planning your next steps -- Summary -- Chapter 7: Transforming Application Development Using the AWS Code Suite -- Understanding the AWS Code Suite -- Getting Started with AWS CodeCommit -- Working with branches, commits, and triggers -- Introducing AWS CodeDeploy -- Concepts and terminologies -- Installing and configuring the CodeDeploy agent -- Setting up the AppSpec file -- Creating a CodeDeploy application and deployment group -- Introducing AWS CodePipeline -- Creating your own continuous delivery pipeline -- Putting it all together -- Planning your next steps -- Summary -- Chapter 8: Messaging in the Cloud Using Amazon SNS and Amazon SQS…”
Libro electrónico -
6112Publicado 2021Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Section 1: Introduction to Machine Learning -- Chapter 1: Machine Learning Fundamentals -- Comparing AI, ML, and DL -- Examining ML -- Examining DL -- Classifying supervised, unsupervised, and reinforcement learning -- Introducing supervised learning -- The CRISP-DM modeling life cycle -- Data splitting -- Overfitting and underfitting -- Applying cross-validation and measuring overfitting -- Bootstrapping methods -- The variance versus bias trade-off -- Shuffling your training set -- Modeling expectations -- Introducing ML frameworks -- ML in the cloud -- Summary -- Questions -- Chapter 2: AWS Application Services for AI/ML -- Technical requirements -- Analyzing images and videos with Amazon Rekognition -- Exploring the benefits of Amazon Rekognition -- Getting hands-on with Amazon Rekognition -- Text to speech with Amazon Polly -- Exploring the benefits of Amazon Polly -- Getting hands-on with Amazon Polly -- Speech to text with Amazon Transcribe -- Exploring the benefits of Amazon Transcribe -- Getting hands-on with Amazon Transcribe -- Implementing natural language processing with Amazon Comprehend -- Exploring the benefits of Amazon Comprehend -- Getting hands-on with Amazon Comprehend -- Translating documents with Amazon Translate -- Exploring the benefits of Amazon Translate -- Getting hands-on with Amazon Translate -- Extracting text from documents with Amazon Textract -- Exploring the benefits of Amazon Textract -- Getting hands-on with Amazon Textract -- Creating chatbots on Amazon Lex -- Exploring the benefits of Amazon Lex -- Getting hands-on with Amazon Lex -- Summary -- Questions -- Answers -- Section 2: Data Engineering and Exploratory Data Analysis -- Chapter 3: Data Preparation and Transformation -- Identifying types of features…”
Libro electrónico -
6113por OECDTabla de Contenidos: “…Computing normalised indexes for each dimension of well-being -- 2 Innovation as a feature of policy making in cities -- How local public sector innovation improves residents' well-being -- Public sector innovation and its impacts take many forms -- Types of public sector innovation identified in the literature -- Impacts of public sector innovation -- Contextualising the OECD/Bloomberg Survey results -- Cross-cutting "meta-capacities" for innovation: Culture and leadership -- A robust innovation culture can bolster all five components, deepening their impact -- Leadership is the single most important factor in cities' innovation -- The five components of cities' innovation capacity…”
Publicado 2021
Libro electrónico -
6114por OECDTabla de Contenidos: “…Intro -- Foreword -- Acknowledgements -- Executive summary -- Redefining the role of public communication in an evolving information ecosystem -- Governance of public communication -- Evidence-based and data-driven public communication -- Evaluating public communication -- Communicating in an evolving and fast-paced digital age -- Public communication responses to the challenges of mis- and disinformation -- Communication applications for openness and improved public policies and services -- 1 Redefining the role of public communication in an evolving information ecosystem -- Introduction -- A key instrument for public policy and services -- Communication as a pillar of a more open government -- The implications of a rapidly changing information ecosystem on how governments communicate -- Addressing information disorders amid a crisis of public trust -- Public communication's potential for rebuilding trust in government -- Towards a more effective public communication function -- References -- Notes -- 2 Towards a more effective use of public communication: Key governance pillars -- The governance of the public communication function -- Mandates and objectives of public communication -- Policies and practices for ethics and to support a greater separation of political and public communication -- Ensuring ethics and integrity in public communication at all times -- Delivering on public communication's mandate through the use of strategies -- The institutional organisation and structures for executing public communication -- From cross-government co-ordination to a whole-of-government communication -- Ensuring adequate financial resources for public communication structures -- The professionalisation of the public communication function -- Ensuring communication structures are fit-for-purpose…”
Publicado 2022
Libro electrónico -
6115Publicado 2016Tabla de Contenidos: “…Part 5 Managing Instructional Design -- Chapter 17 Applying Business Skills to Managing the Instructional Design Function -- Where Instructional Design Fits into the Larger Organization -- Contributing to the Organizational Purpose and Strategy -- Implementing Standards -- Leveraging Internal and External Resources to Accomplish Project Goals and Objectives -- Managing Instructional Design Talent -- Marketing and Communicating about Instructional Design -- Navigating Organizational Culture, Structure, Politics, and Processes -- Chapter 18 Managing Partnerships and Collaborative Relationships -- Identifying and Engaging Stakeholders -- Building Relations between Instructional Designers and Individuals or Group Members -- Managing Cross-Functional Teams -- Securing Commitment -- Conducting Project Reviews -- Chapter 19 Planning and Managing Instructional Design Projects -- Unique Challenges Posed by Project Management -- Allocating Resources to Support the Project Plan -- Part 6 Predicting the Future of Instructional Design -- Chapter 20 Predicting the Future of Learning and Instructional Design -- Technological Advances to Improve Delivery and Design -- The Impact of Neuroscience Research on Instructional Systems Design -- A Final Word -- About the Authors -- References -- Index -- EULA…”
Libro electrónico -
6116Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1 - Introduction to Embedded Systems Development -- Chapter 1: Embedded Systems - A Pragmatic Approach -- Domain definition -- Embedded Linux systems -- Low-end 8-bit microcontrollers -- Hardware architecture -- Understanding the challenges -- Multithreading -- RAM -- Flash memory -- General-purpose input/output (GPIO) -- ADC and DAC -- Timers and PWM -- Interfaces and peripherals -- Asynchronous UART-based serial communication -- SPI -- I2C -- USB -- Connected systems -- Challenges of distributed systems -- Introduction to isolation mechanisms -- The reference platform -- ARM reference design -- The Cortex-M microprocessor -- Summary -- Chapter 2: Work Environment and Workflow Optimization -- Workflow overview -- The C compiler -- Linker -- Make: a build automation tool -- Debugger -- Embedded workflow -- Text editors versus integrated environments -- The GCC toolchain -- The cross compiler -- Compiling the compiler -- Linking the executable -- Binary format conversion -- Interacting with the target -- The GDB session -- Validation -- Functional tests -- Hardware tools -- Testing off-target -- Emulators -- Summary -- Part 2 - Core System Architecture -- Chapter 3: Architectural Patterns -- Configuration management -- Revision control -- Tracking activities -- Code reviews -- Continuous integration -- Source code organization -- Hardware abstraction -- Middleware -- Application code -- Security considerations -- Vulnerability management -- Software cryptography -- Hardware cryptography -- Running untrusted code -- The life cycle of an embedded project -- Defining project steps -- Prototyping -- Refactoring -- API and documentation -- Summary -- Chapter 4: The Boot-Up Procedure -- Technical requirements -- The interrupt vector table -- Startup code…”
Libro electrónico -
6117Publicado 2024Tabla de Contenidos: “…Business financials -- Cross Functional Teams (CFTs) -- Managing business relationships -- Vendors and suppliers -- Internal stakeholders -- Partners and clients -- Industry groups and associations -- Regulatory agencies -- Summary -- Chapter 5: The Mindset of the Network Architect - the Principles of Design -- Principles of network architecting -- Hierarchical -- Additional design patterns -- Scalability -- Modularity -- Resilience -- Performant -- Thinking like a CxO -- What other industries are doing -- Always thinking - innovating, exploring new trends -- Summary -- Part 3 - Constructing the Core: Building Blocks of a Network Architect -- Chapter 6: Foundations of Network Architecture - Part 1: Route/Switch -- Overview of the OSI model -- OSI model versus TCP/IP model -- Physical infrastructure -- Network cabling -- Switches and switching concepts -- Switching concepts -- Switches -- Key switching functions -- Routers and routing concepts -- Routing concepts -- Router types -- Supporting vendors -- Fiber optics -- Networking -- Security -- Virtualization -- Server -- Summary -- Further reading -- Chapter 7: The Foundation of Network Architecture, Part Two - Network Services -- Understanding load balancers -- Types of load balancers -- Network load balancer (NLB) -- Global server load balancer (GSLB) -- Load balancing algorithms -- Which load balancer should you choose? …”
Libro electrónico -
6118Publicado 2016Tabla de Contenidos: “…16.3 An overview Of Architecture Frameworks -- 16.4 The UPDM standard -- 16.5 What to do when we come in touch with architecture frameworks -- 16.6 Conclusion -- Chapter 17: Cross-Cutting Concerns -- 17.1 The Game-Winning Nonfunctional Aspects -- 17.2 Human System Interaction and Human Factors Engineering -- 17.3 Risk Management -- 17.4 Trade Studies -- 17.5 Budgets -- Chapter 18: Architecture Assessment -- Chapter 19: Making It Work in the Organization -- 19.1 Overview -- 19.2 Organizational Structure for Systems Architecting -- 19.3 Recipes from the Authors' Experience -- Chapter 20: Soft Skills -- 20.1 It's All about Communication -- 20.2 Personality Types -- 20.3 Intercultural Collaboration Skills -- Chapter 21: Outlook: The World after Product Line Engineering -- Appendix A: OMG SysML -- A.1 Diagram and Model -- A.2 Structure Diagrams -- A.3 Behavior Diagrams -- A.4 Requirements Diagram -- A.5 Extension of SysML with Profiles -- A.6 Architecture of the Language -- Appendix B: The V-Model -- B.1 A Brief History of the V-Model or the Systems Engineering Vee -- B.2 A Handy Illustration but No Comprehensive Process Description -- B.3 Critical Considerations -- B.4 Reading Instruction for a Modern Systems Engineering Vee -- Bibliography -- Index -- Wiley Series in Systems Engineering and Management -- End User License Agreement…”
Libro electrónico -
6119Publicado 2023Tabla de Contenidos: “…Algorithms for multi-class classification -- One-vs-all and one-vs-one strategies -- Metrics for multi-class classification problems -- Confusion matrix -- Precision -- Recall -- F1 score -- Macro- and micro-averaged metrics -- Area Under Curve (AUC-ROC) -- Log loss and its application in measuring calibration of multi-class models -- Brier score and its application in measuring the calibration of multi-class models -- How conformal prediction can be applied to multi-class classification problems -- Multi-class probabilistic classification using inductive and cross-Venn-ABERS predictors -- Summary -- Index -- Other Books You May Enjoy -- Blank Page…”
Libro electrónico -
6120Publicado 2023Tabla de Contenidos: “…-- Creating a Terraform template -- Managing the Terraform state file -- Validating a Terraform template -- Deploying a Terraform template -- Summary -- Part 3: CI/CD for Real-World Scenarios -- Chapter 9: Implementing CI/CD for Azure Services -- Technical requirements -- Getting started -- Importing the sample repository -- Introducing the solution architecture -- Building and packaging applications and IaC -- Understanding container image tags -- Understanding your pipeline build number -- Understanding Helm -- Verifying and packaging IaC -- Managing environments -- Configuring environments -- Deploying to environments -- Approving environment deployments -- Troubleshooting deployment issues -- Winding up -- Summary -- Chapter 10: Implementing CI/CD for AWS -- Technical requirements -- Explaining the solution architecture -- Building and packaging applications and IaC -- Creating ECR repositories -- Creating the build apps job -- Verifying and packaging IaC -- Managing environments -- Configuring environments -- Deploying to environments -- Adding the pipeline -- Wrapping up -- Summary -- Chapter 11: Automating CI/CD for Cross-Mobile Applications by Using Flutter -- Technical requirements -- Explaining the solution architecture -- Managing secure files -- Tasks required for Flutter applications on Google Firebase, Apple, and the Google Play Console -- Implementing Google Firebase for Flutter -- Creating a pipeline for Google Firebase on Android -- Creating a pipeline for Google Firebase on iOS -- Implementing an Apple environment for Flutter -- Implementing a Google Play Console for Flutter -- Navigating common challenges -- Summary…”
Libro electrónico