Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 350
- Application software 286
- History 232
- Management 198
- Engineering & Applied Sciences 180
- Economics 167
- Historia 159
- Social aspects 145
- Education 137
- Data processing 119
- Computer Science 117
- Microsoft .NET Framework 110
- Computer networks 109
- Security measures 102
- Computer security 97
- Design 96
- RELIGION 95
- Python (Computer program language) 93
- Programming 92
- Web sites 92
- Cross-cultural studies 89
- Web site development 83
- Cloud computing 78
- Computer programs 78
- Machine learning 78
- Computer programming 74
- JavaScript (Computer program language) 71
- History and criticism 66
- Research 65
- Computer software 64
-
6201Publicado 2018Tabla de Contenidos: “…Navigating in the Welfare State: Gadejuristen as Mediators -- Working on a Societal Level -- The Street Lawyer Method -- Conclusion -- Bibliography -- 9: Ex-prisoners' Need for Legal Aid in Denmark -- Introduction -- Material and Methods -- Lack of Legal Support for Ex-prisoners -- Ex-prisoners' Multifaceted Problems -- Need for an Income Combined with Complex Legal and Non-legal Problems Post-prison -- Housing Need Combined with Complex Post-prison Legal and Non-legal Problems -- Debt and Criminal History Challenge Income and Housing -- Intertwined Legal Aid Approach -- Difficulties in Transforming Multifaceted Needs into Legal Issues, and Applying for Help -- Trust and Seeking Comfort Amid Distrust and Discomfort -- New Legal Aid Initiative: Cross-functional Mentors Pre- and Post-release -- Concluding Remarks -- References -- 10: Nordic Legal Aid and 'Access to Justice' in Human Rights. …”
Libro electrónico -
6202Publicado 2018Tabla de Contenidos: “…Analyzing current trends -- Extortion attacks -- Data manipulation attacks -- IoT device attacks -- Backdoors -- Mobile device attacks -- Hacking everyday devices -- Hacking the cloud -- Phishing -- Exploiting a vulnerability -- Zero-day -- Fuzzing -- Source code analysis -- Types of zero-day exploits -- Buffer overflows -- Structured exception handler overwrites -- Performing the steps to compromise a system -- Deploying payloads -- Installing and using a vulnerability scanner -- Using Metasploit -- Compromising operating systems -- Compromising systems using Kon-Boot or Hiren's BootCD -- Compromising systems using a Linux Live CD -- Compromising systems using preinstalled applications -- Compromising systems using Ophcrack -- Compromising a remote system -- Compromising web-based systems -- SQL injection -- Cross-site scripting -- Broken authentication -- DDoS attacks -- References -- Summary -- Chapter 6: Chasing a User's Identity -- Identity is the new perimeter -- Strategies for compromising a user's identity -- Gaining access to the network -- Harvesting credentials -- Hacking a user's identity -- Brute force -- Social engineering -- Pass the hash -- Other methods to hack identity -- References -- Summary -- Chapter 7: Lateral Movement -- Infiltration -- Network mapping -- Avoiding alerts -- Performing lateral movement -- Port scans -- Sysinternals -- File shares -- Remote Desktop -- PowerShell -- Windows Management Instrumentation -- Scheduled tasks -- Token stealing -- Pass-the-hash -- Active Directory -- Remote Registry -- Breached host analysis -- Central administrator consoles -- Email pillaging -- References -- Summary -- Chapter 8: Privilege Escalation -- Infiltration -- Horizontal privilege escalation -- Vertical privilege escalation -- Avoiding alerts -- Performing privilege escalation -- Exploiting unpatched operating systems…”
Libro electrónico -
6203Publicado 2021Tabla de Contenidos: “…Wireshark -- Berkeley Packet Filter -- Port Mirroring/Spanning -- Packet Analysis -- Spoofing Attacks -- ARP Spoofing -- DNS Spoofing -- sslstrip -- Spoofing Detection -- Summary -- Review Questions -- Chapter 10 Social Engineering -- Social Engineering -- Pretexting -- Social Engineering Vectors -- Physical Social Engineering -- Badge Access -- Man Traps -- Biometrics -- Phone Calls -- Baiting -- Phishing Attacks -- Website Attacks -- Cloning -- Rogue Attacks -- Wireless Social Engineering -- Automating Social Engineering -- Summary -- Review Questions -- Chapter 11 Wireless Security -- Wi-Fi -- Wi-Fi Network Types -- Wi-Fi Authentication -- Wi-Fi Encryption -- Bring Your Own Device -- Wi-Fi Attacks -- Bluetooth -- Scanning -- Bluejacking -- Bluesnarfing -- Bluebugging -- Mobile Devices -- Mobile Device Attacks -- Summary -- Review Questions -- Chapter 12 Attack and Defense -- Web Application Attacks -- XML External Entity Processing -- Cross-Site Scripting -- SQL Injection -- Command Injection -- File Traversal -- Web Application Protections -- Denial-of-Service Attacks -- Bandwidth Attacks -- Slow Attacks -- Legacy -- Application Exploitation -- Buffer Overflow -- Heap Spraying -- Application Protections and Evasions -- Lateral Movement -- Defense in Depth/Defense in Breadth -- Defensible Network Architecture -- Summary -- Review Questions -- Chapter 13 Cryptography -- Basic Encryption -- Substitution Ciphers -- Diffie-Hellman -- Symmetric Key Cryptography -- Data Encryption Standard -- Advanced Encryption Standard -- Asymmetric Key Cryptography -- Hybrid Cryptosystem -- Nonrepudiation -- Elliptic Curve Cryptography -- Certificate Authorities and Key Management -- Certificate Authority -- Trusted Third Party -- Self-Signed Certificates -- Cryptographic Hashing -- PGP and S/MIME -- Disk and File Encryption -- Summary -- Review Questions…”
Libro electrónico -
6204por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Increase the financial viability of shared on-demand services -- Targeting subsidies to vulnerable areas and groups -- Creating a cross-governmental programme -- Ensuring funding for further innovation -- 4.4.4. …”
Publicado 2022
Libro electrónico -
6205Publicado 2017Tabla de Contenidos: “…7.3.2 Proposals Summary -- 7.3.3 Discussion -- 7.4 Conclusions -- References -- 8 Gait Recognition: The Wearable Solution -- 8.1 Machine Vision Approach -- 8.2 Floor Sensor Approach -- 8.3 Wearable Sensor Approach -- 8.3.1 The Accelerometer Sensor -- 8.4 Datasets Available for Experiments -- 8.5 An Example of a Complete System for Gait Recognition -- 8.6 Conclusions -- References -- 9 Biometric Authentication to Access Controlled Areas Through Eye Tracking -- 9.1 Introduction -- 9.2 ATM-Like Solutions -- 9.3 Methods Based on Fixation and Scanpath Analysis -- 9.4 Methods Based on Eye/Gaze Velocity -- 9.5 Methods Based on Pupil Size -- 9.6 Methods Based on Oculomotor Features -- 9.7 Methods Based on Head Orientation -- 9.8 Conclusions -- References -- 10 Noncooperative Biometrics: Cross-Jurisdictional Concerns -- 10.1 Introduction -- 10.2 Biometrics for Implementing Biometric Surveillance -- 10.3 Reaction to Public Opinion -- 10.3.1 Geopolitical Context -- 10.3.2 Technological Skills -- 10.3.3 Proportionality -- 10.3.4 A Particular Operational Framework -- 10.4 The Early Days -- 10.4.1 Commercial Context -- 10.4.2 Historical Context -- 10.4.3 Social Context, the Newham and Ybor City Experiments -- 10.5 An Interesting Clue (2007) -- 10.6 Biometric Surveillance Today -- 10.6.1 Increased Perception of Insecurity -- 10.6.2 Getting Used to the Erosion of Privacy -- 10.6.3 Increase of Mobility -- 10.7 Conclusions -- References -- Index -- Back Cover…”
Libro electrónico -
6206Publicado 2016Tabla de Contenidos: “…Correlating individual stocks with the broader market -- Exploring risk and return -- Examining the market with the non-parametric runs test -- Testing for random walks -- Determining market efficiency with autoregressive models -- Creating tables for a stock prices database -- Populating the stock prices database -- Optimizing an equal weights two-asset portfolio -- Chapter 8: Text Mining and Social Network Analysis -- Introduction -- Creating a categorized corpus -- Tokenizing news articles in sentences and words -- Stemming, lemmatizing, filtering, and TF-IDF scores -- Recognizing named entities -- Extracting topics with non-negative matrix factorization -- Implementing a basic terms database -- Computing social network density -- Calculating social network closeness centrality -- Determining the betweenness centrality -- Estimating the average clustering coefficient -- Calculating the assortativity coefficient of a graph -- Getting the clique number of a graph -- Creating a document graph with cosine similarity -- Chapter 9: Ensemble Learning and Dimensionality Reduction -- Introduction -- Recursively eliminating features -- Applying principal component analysis for dimension reduction -- Applying linear discriminant analysis for dimension reduction -- Stacking and majority voting for multiple models -- Learning with random forests -- Fitting noisy data with the RANSAC algorithm -- Bagging to improve results -- Boosting for better learning -- Nesting cross-validation -- Reusing models with joblib -- Hierarchically clustering data -- Taking a Theano tour -- Chapter 10: Evaluating Classifiers, Regressors, and Clusters -- Introduction -- Getting classification straight with the confusion matrix -- Computing precision, recall, and F1-score -- Examining a receiver operating characteristic and the area under a curve…”
Libro electrónico -
6207Publicado 2018Tabla de Contenidos: “…-- Applications of POS tagging -- Training a POS tagger -- Training a sentiment classifier for movie reviews -- Training a bag-of-words classifier -- Summary -- Chapter 3: Deep Learning and TensorFlow -- Deep learning -- Perceptron -- Activation functions -- Sigmoid -- Hyperbolic tangent -- Rectified linear unit -- Neural network -- One-hot encoding -- Softmax -- Cross-entropy -- Training neural networks -- Backpropagation -- Gradient descent -- Stochastic gradient descent -- Regularization techniques -- Dropout -- Batch normalization -- L1 and L2 normalization -- Convolutional Neural Network -- Kernel -- Max pooling -- Recurrent neural network -- Long-Short Term Memory -- TensorFlow -- General Purpose - Graphics Processing Unit -- CUDA -- cuDNN -- Installation -- Hello world! …”
Libro electrónico -
6208Publicado 2017Tabla de Contenidos: “…. -- Chapter 4: Learning from Data - Part 1 -- Introduction -- Creating and saving an Attribute-Relation File Format (ARFF) file -- How to do it... -- Cross-validating a machine learning model -- How to do it... -- Classifying unseen test data -- Getting ready -- How to do it... -- Classifying unseen test data with a filtered classifier -- How to do it... -- Generating linear regression models -- How to do it... -- Generating logistic regression models -- How to do it... -- Clustering data points using the KMeans algorithm -- How to do it... -- Clustering data from classes -- How to do it... -- Learning association rules from data -- Getting ready -- How to do it... -- Selecting features/attributes using the low-level method, the filtering method, and the meta-classifier method -- Getting ready -- How to do it... -- Chapter 5: Learning from Data - Part 2 -- Introduction -- Applying machine learning on data using Java Machine Learning (Java-ML) library -- Getting ready -- How to do it... -- Classifying data points using the Stanford classifier -- Getting ready -- How to do it... -- How it works... -- Classifying data points using Massive Online Analysis (MOA)…”
Libro electrónico -
6209Publicado 2022Tabla de Contenidos: “…Compiled results on 300VW -- 2.4. Cross-dataset benchmark -- 2.4.1. Evaluation protocol -- 2.4.2. …”
Libro electrónico -
6210por Montagnino, Marian, authorTabla de Contenidos: “…Building a free version -- Building a pro version -- Building to enable pprof on the pro version -- Testing CLI commands -- Mocking the HTTP client -- Handling test configuration -- Creating a test for a command -- Running the tests -- Summary -- Questions -- Answers -- Further reading -- Chapter 12: Cross-Compilation across Different Platforms -- Technical requirements -- Manual compilation versus build automation tools -- Using GOOS and GOARCH -- Compiling for Linux, macOS, and Windows -- Building using tags -- Building using the GOOS environment variable -- Building using the GOARCH environment variable -- Installing using tags and GOOS env va -- Installing using tags and GOARCH env var -- Scripting to compile for multiple platforms -- Creating a bash script to compile in Darwin or Linux -- Creating a PowerShell script in Windows -- Summary -- Questions -- Answers -- Further reading -- Chapter 13: Using Containers for Distribution -- Technical requirement -- Why use containers? …”
Publicado 2023
Libro electrónico -
6211Publicado 2024Tabla de Contenidos: “…Updating micro frontends at runtime -- Summary -- Chapter 10: SPA Composition -- Technical requirements -- Basics of SPA composition -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages of SPA composition -- Building a core SPA shell -- Activating pages -- Sharing dependencies -- Integrating SPA micro frontends -- Declaring the lifecycle -- Using cross-framework components -- Exploring communication patterns -- Exchanging events -- Sharing data -- Extending components -- Optimizing hydration and progressive rendering -- Summary -- Chapter 11: Siteless UIs -- Technical requirements -- The basics of siteless UIs -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages of siteless UIs -- Comparing siteless UIs and serverless -- Developing locally -- Publishing modules -- Creating a siteless UI runtime -- Building a runtime with Piral -- Deploying a runtime with Piral -- Writing siteless UI modules -- Looking at a pilet's life cycle -- Implementing framework-agnostic components -- Implementing islands composition with Qwik -- Summary -- Part 3: Bee Brood - Implementation Details -- Chapter 12: Sharing Dependencies with Module Federation -- Technical requirements -- Sharing dependencies between micro frontends -- Utilizing Module Federation -- Understanding Native Federation -- Achieving independence with SystemJS -- Summary -- Chapter 13: Isolating CSS -- Technical requirements -- Understanding the consequences of open styling -- Implementation techniques to scope CSS -- Using the shadow DOM -- Using modern CSS features for isolation -- Summary -- Chapter 14: Securing the Application -- Technical requirements -- Using web standards to harden security -- Limiting script access -- Verifying authenticity -- Summary…”
Libro electrónico -
6212Publicado 2013Tabla de Contenidos: “…Swartz -- Visions in Hekhalot literature: reflections on terminology / Annelies Kuyt -- Physiognomy and somatomancy: the ways that never crossed / Michael Meerson -- "He was Thoth in everything": why and when King Solomon became both Magister omnium physicorum and Master of magic / Yaacov Shavit -- Babylonian astrology in the Cairo Genizah / Gideon Bohak, Mark Geller -- How to use the Hebrew Bible to harm your neighbor: the use of biblical quotations in curse texts found in the Cairo Genizah / Dorothea M. …”
991006553369706719 -
6213Publicado 2017Tabla de Contenidos: “…Chapter 3: Building a Web Application in Python -- Getting started with applications -- Creating application users -- Working with Observables and AJAX -- Binding data for the adduser template -- Creating tweets from users -- Working on Observables with AJAX for the addtweet template -- Data binding for the addtweet template -- CORS - Cross-Origin Resource Sharing -- Session management -- Cookies -- Summary -- Chapter 4: Interacting Data Services -- MongoDB - How it is advantageous, and why are we using it? …”
Libro electrónico -
6214Publicado 2007Tabla de Contenidos: “…16.7 Principles that Reduce the Overall Burden of IT -- PART IV: APPENDICES -- Appendix A: Case Study Conclusion -- Appendix B: Process Descriptions -- B.1 Delivery Processes -- B.2 Service-Oriented Analysis Process -- B.3 Service Modeling Process -- B.4 Service-Oriented Design Processes -- Appendix C: Principles and Patterns Cross-Reference -- Additional Resources -- About the Author -- About the Photos -- Index…”
Libro electrónico -
6215Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Journey from Statistics to Machine Learning -- Statistical terminology for model building and validation -- Machine learning -- Major differences between statistical modeling and machine learning -- Steps in machine learning model development and deployment -- Statistical fundamentals and terminology for model building and validation -- Bias versus variance trade-off -- Train and test data -- Machine learning terminology for model building and validation -- Linear regression versus gradient descent -- Machine learning losses -- When to stop tuning machine learning models -- Train, validation, and test data -- Cross-validation -- Grid search -- Machine learning model overview -- Summary -- Chapter 2: Parallelism of Statistics and Machine Learning -- Comparison between regression and machine learning models -- Compensating factors in machine learning models -- Assumptions of linear regression -- Steps applied in linear regression modeling -- Example of simple linear regression from first principles -- Example of simple linear regression using the wine quality data -- Example of multilinear regression - step-by-step methodology of model building -- Backward and forward selection -- Machine learning models - ridge and lasso regression -- Example of ridge regression machine learning -- Example of lasso regression machine learning model -- Regularization parameters in linear regression and ridge/lasso regression -- Summary -- Chapter 3: Logistic Regression Versus Random Forest -- Maximum likelihood estimation -- Logistic regression - introduction and advantages -- Terminology involved in logistic regression -- Applying steps in logistic regression modeling…”
Libro electrónico -
6216Publicado 2020Tabla de Contenidos: “…Ensuring That You Have a Good Hypothesis -- Examples of a good (and a bad) hypothesis -- Surveys and research are precursors to tests -- Seeing How the Pieces Fit Together -- Chapter 8 Prioritizing Your Ideas before You Test Them -- The Importance of Prioritization -- Methodologies for Prioritizing Ideas -- The ICE score -- The PIE framework -- The TIR score -- The RICE score -- General Criticisms of Simpler Frameworks -- Chapter 9 Testing Ideas and Learning from Them -- Working with Two Types of Tests -- Prepping tests -- Testing variants -- Common testing pitfalls and ways to work around them -- Analyzing Results -- Acting on What You've Learned -- Winning tests -- Losing tests -- Inconclusive tests -- Systemizing changes -- Chapter 10 Managing the Growth Process -- Establishing a Weekly Routine -- Setting the Ground Rules -- Moving to a Month-to-Month Schedule -- Reviewing objectives monthly -- Checking on the impact of individual tests -- Taking the Long-Term Perspective -- Chapter 11 Laying the Right Foundation for Company-Wide Growth -- Taking Baby Steps -- Making Your CEO the Growth Advocate -- Sharing Is Better than Hoarding -- Weekly updates -- Monthly deep dives -- Quarterly updates -- Part 4 The Part of Tens -- Chapter 12 Ten Key Benefits of the Growth Hacking Methodology -- A Focus on Process versus Tactics -- Cross-Functional Collaboration -- Organizational Alignment -- Data-Informed Decision-Making -- Improved Customer Focus -- A Better Understanding of Your Customers -- Improved Customer Experience -- A State of Constant Curiosity -- Better Product-Development Processes -- Greater Control because of Product-First Growth -- Chapter 13 Ten Things to Watch Out For -- Ignoring the Need to Constantly Evangelize Progress and Learning -- Not Sticking to the Growth Meeting Agenda -- Testing Things That Don't Need to Be Tested (Right Now)…”
Libro electrónico -
6217por Beaulieu, AlanTabla de Contenidos: “…Unterabfragen zum Erzeugen von Ausdrücken -- Zusammenfassung zu Unterabfragen -- Testen Sie Ihr Wissen -- Übung 9-1 -- Übung 9-2 -- Übung 9-3 -- Kapitel 10: Weitere Joins -- Outer Joins -- Left und Right Outer Joins -- Outer Joins mit drei Tabellen -- Cross Joins -- Natural Joins -- Testen Sie Ihr Wissen -- Übung 10-1 -- Übung 10-2 -- Übung 10-3 (für Tüftler) -- Kapitel 11: Bedingungslogik -- Was ist Bedingungslogik? …”
Publicado 2021
Libro electrónico -
6218Publicado 2010Tabla de Contenidos: “…page-break-before and page-break-after -- page-break-inside -- The @page Rule -- Print Considerations -- Hyperlinks and Generated Content -- Mobile Media -- Mobile Considerations -- Media Queries -- Media Features -- Responsive Design -- Browser Support -- Chapter 13: Resets and Frameworks -- CSS Resets -- Using Resets -- Why Not Reset? -- Cross-Browser CSS via JavaScript -- Common Bridge Libraries -- Why Not Use JavaScript? …”
Libro electrónico -
6219Publicado 2011Tabla de Contenidos: “…-- Multitouch Input For Windows Phones -- Reading the TouchPanel Device State -- Determine Number of Touch Points -- TouchPanel Width, Height, and Orientation -- Moving Sprite Based on Multitouch Input -- Reading Gestures from the TouchPanel -- Displaying GestureSample Data -- Windows Phone Sensors and Feedback -- Acceleration Data using the Accelerometer -- Locating a Windows Phone with the Location Service -- Providing User Feedback using Vibration -- Summary -- 13 Turn Up the Volume -- Playing Sound Effects -- Using SoundEffect for Audio Playback -- Microsoft Cross-Platform Audio Creations Tool (XACT) -- Dynamic Sound Effects -- Recording Audio with a Microphone -- Generating Dynamic Sound Effects -- Summary -- 14 Storage -- What Is Storage? …”
Libro electrónico -
6220Publicado 2014Tabla de Contenidos: “…Preparing School Mental Health Professionals: Competencies in Interdisciplinary and Cross-Systems Collaboration; Kurt D. Michael, Seth Bernstein, Julie Sarno Owens, Abby Albright, Dawn Anderson-Butcher -- Chapter 4. …”
Libro electrónico