Mostrando 29,821 - 29,840 Resultados de 41,870 Para Buscar '"Documental"', tiempo de consulta: 0.20s Limitar resultados
  1. 29821
    Publicado 2022
    Tabla de Contenidos: “…Acknowledgments -- List of Illustrations -- Table of Cases -- Table of Treaties and Legislations -- Table of Documents -- Abbreviations -- 1 Introduction -- 1 Vantage Points -- 2 The Untold Story of the Trade/Environment Nexus -- 2.1 Transcending the 'Trade and ...' …”
    Libro electrónico
  2. 29822
    Tabla de Contenidos: “…-- Busy readers' guide to this document -- 1. Sustainable Development and the Need for Strategic Responses -- Establishing national strategies for sustainable development: a Rio commitment and one of the seven international development -- Challenges to sustainable development -- Trends, major challenges, and responses -- Box 1. …”
    Libro electrónico
  3. 29823
    Publicado 2014
    Tabla de Contenidos: “…-- Combining geocoding and haversine -- Compressing data to make grid codes -- Creating GeoRef codes -- Decoding a GeoRef code -- Creating Maidenhead grid codes -- Decoding the Maidenhead grid codes -- Creating natural area codes -- Decoding natural area codes -- Solving problems - closest good restaurant -- Creating simple Python objects -- Working with HTML web services - tools -- Working with HTML web services - getting the page -- Working with HTML web services - parsing a table -- Making a simple Python object from columns of data -- Enriching Python objects with geocodes -- Enriching Python objects with health scores -- Combining the pieces and parts -- Working with clean data portals -- Making a simple Python object from a JSON document -- Combining different pieces and parts -- Final steps -- Understanding the data - schema and metadata -- Summary -- 5. …”
    Libro electrónico
  4. 29824
    Publicado 2017
    Tabla de Contenidos: “…The horizontal and vertical blank -- Refresh rate -- Double buffering -- The back buffer -- VSync -- Triple buffering -- LCD monitors -- Time-based movement and animation -- Frame-based movement -- Time-based movement -- Summary -- Chapter 12: Best Practices -- Chapter overview -- Your objectives -- Learning fundamental code quality techniques -- Avoid magic numbers -- White space -- Indentation -- Blank lines and spaces -- Comments and self-documenting code -- Commenting -- Learning and understand the uses of the const keyword -- Const function parameters -- Const classes as parameters -- Const member functions -- Problems with const -- Learning how iteration can improve your game and code design -- The game development cycle -- Production phase -- Prototyping -- Playtesting -- Conducting a playtest -- Iteration -- Meeting milestones -- Learning when to use scripting in a game -- Introduction to assembly -- Moving to higher-level programming languages -- Introducing the compiler -- Introduction to scripting languages -- Using interpreters -- Just in time compilation -- Why use a scripting language? …”
    Libro electrónico
  5. 29825
    Publicado 2017
    Tabla de Contenidos: “…-- Creating an RPC server -- Creating an RPC client -- JSON RPC using Gorilla RPC -- Summary -- Chapter 4: Simplifying RESTful Services with Popular Go Frameworks -- Getting the code -- go-restful, a framework for REST API creation -- CRUD operations and SQLite3 basics -- Building a Metro Rail API with go-restful -- Design specification -- Creating database models -- Building RESTful APIs with the Gin framework -- Building a RESTful API with Revel.go -- Summary -- Chapter 5: Working with MongoDB and Go to Create REST APIs -- Getting the code -- Introduction to MongoDB -- Installing MongoDB and using the shell -- Working with the Mongo shell -- Introducing mgo, a MongoDB driver for Go -- RESTful API with Gorilla Mux and MongoDB -- Boosting the querying performance with indexing -- Designing an e-commerce data document model -- Summary -- Chapter 6: Working with Protocol Buffers and GRPC -- Getting the code -- Introduction to protocol buffers -- Protocol buffer language -- Scalar values -- Enumerations and repeated fields -- Compiling a protocol buffer with protoc -- Introduction to GRPC -- Bidirectional streaming with GRPC -- Summary -- Chapter 7: Working with PostgreSQL, JSON, and Go -- Getting the code -- Installing the PostgreSQL database -- Adding users and databases in PostgreSQL -- pq, a pure PostgreSQL database driver for Go -- Implementing a URL shortening service using Postgres and pq -- Defining the Base62 algorithm -- Exploring the JSON store in PostgreSQL -- GORM, a powerful ORM for Go -- Implementing the e-commerce REST API -- Summary…”
    Libro electrónico
  6. 29826
    Publicado 2017
    Tabla de Contenidos: “…. -- There's more... -- Reading office document metadata -- Getting started -- How to do it... -- How it works... -- Integrating our metadata extractor with EnCase -- Getting started -- How to do it... -- How it works... -- There's more... -- Chapter 5: Networking and Indicators of Compromise Recipes -- Introduction -- Getting a jump start with IEF -- Getting started -- How to do it... -- How it works... -- Coming into contact with IEF -- Getting started -- How to do it... -- How it works... -- Beautiful Soup -- Getting started -- How to do it... -- How it works... -- There's more... -- Going hunting for viruses -- Getting started -- How to do it... -- How it works... -- Gathering intel -- Getting started -- How to do it... -- How it works... -- Totally passive -- Getting started -- How to do it... -- How it works... -- Chapter 6: Reading Emails and Taking Names Recipes -- Introduction -- Parsing EML files -- Getting started -- How to do it... -- How it works... -- Viewing MSG files -- Getting started -- How to do it…”
    Libro electrónico
  7. 29827
    por Leurs, Koen
    Publicado 2024
    Tabla de Contenidos: “…The slide is taken from the training documents for BAMF personnel. It provides an overview explaining in which cases voice biometrics are used and illustrates the procedu -- Figure 13.2. …”
    Libro electrónico
  8. 29828
    Publicado 2024
    Tabla de Contenidos: “…The quest for data quality -- Documentation and cataloging - the unsung heroes of governance -- Understanding the path of data -- Regulatory compliance and audit preparedness -- Change management and impact analysis -- Upholding data quality -- Troubleshooting and analysis -- Navigating the intricacy and the anatomy of ML governance -- ML governance pillars -- Model interpretability -- The many facets of ML development -- Beyond training - model deployment and monitoring -- A guide to architectural governance -- The five pillars of architectural governance -- Transformative architectural principles -- Zooming in on architectural dimensions -- Summary -- Chapter 15: Navigating Real-World Data Science Case Studies in Action -- Introduction to the COMPAS dataset case study -- Understanding the task/outlining success -- Preliminary data exploration -- Preparing the data for modeling -- Final thoughts -- Text embeddings using pretrainedmodels and OpenAI -- Setting up and importing necessary libraries -- Data collection - fetching the textbook data -- Converting text to embeddings -- Querying - searching for relevant information -- Concluding thoughts - the power of modern pre-trained models -- Summary -- Index -- About Packt -- Other Books You May Enjoy…”
    Libro electrónico
  9. 29829
    Publicado 2024
    Tabla de Contenidos: “…The characteristics of a mature OSS project -- How to nurture and assist projects you rely on -- Responses to projects that stray from their mission -- Common objections -- Recommendations for contributing code -- Let the cat out of the bag (Successfully open source your code and documentation) -- Five options for open sourcing -- What to open source -- Summary -- Chapter 11: Recommendations and Best Practices -- Suggested pre-reading material -- Edge-native best practices as an outgrowth of cloud native -- Pulling can be more secure than pushing -- Application dependency resolution approaches -- Deployment models for distributed edge applications compared -- Making antifragile applications -- Defining the terms -- What are your current areas of weakness or vulnerability? …”
    Libro electrónico
  10. 29830
    Publicado 2024
    Tabla de Contenidos: “…Analyzing additional data with Vue Devtools plugins -- The Pinia Vue Devtools plugin -- The vue-router Vue Devtools plugin -- Summary -- Chapter 14: Advanced Resources for Future Reading -- Available tools and resources -- Vue.js documentation -- Newsletter -- Community members -- Request For Comments - RFC -- What is left for Vue.js? …”
    Libro electrónico
  11. 29831
    Publicado 2017
    Tabla de Contenidos: “…Identifying the Players -- Smart(er) VBA Document Deployment -- Email and Saved Passwords -- Keyloggers and Cookies -- Bringing It All Together -- Summary -- Exercises -- Chapter 6: Criminal Intelligence -- Payload Delivery Part VI: Deploying with HTA -- Malware Detection -- Privilege Escalation in Microsoft Windows -- Escalating Privileges with Local Exploits -- Exploiting Automated OS Installations -- Exploiting the Task Scheduler -- Exploiting Vulnerable Services -- Hijacking DLLs -- Mining the Windows Registry -- Command and Control Part VI: The Creeper Box -- Creeper Box Specification -- Introducing the Raspberry Pi and Its Components -- GPIO -- Choosing an OS -- Configuring Full-Disk Encryption -- A Word on Stealth -- Configuring Out-of-Band Command and Control Using 3G/4G -- Creating a Transparent Bridge -- Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers -- The Attack -- Spoofing Caller ID and SMS Messages -- Summary -- Exercises -- Chapter 7: War Games -- Background and Mission Briefing -- Payload Delivery Part VII: USB Shotgun Attack -- USB Media -- A Little Social Engineering -- Command and Control Part VII: Advanced Autonomous Data Exfiltration -- What We Mean When We Talk About "Autonomy" -- Means of Egress -- The Attack -- Constructing a Payload to Attack a Classified Network -- Stealthy 3G/4G Software Install -- Attacking the Target and Deploying the Payload -- Efficient "Burst-Rate" Data Exfiltration -- Summary -- Exercises -- Chapter 8: Hack Journalists -- Briefing -- Advanced Concepts in Social Engineering -- Cold Reading -- C2 Part VIII: Experimental Concepts in Command and Control -- Scenario 1: C2 Server Guided Agent Management -- Scenario 2: Semi-Autonomous C2 Agent Management -- Payload Delivery Part VIII: Miscellaneous Rich Web Content -- Java Web Start -- Adobe AIR -- A Word on HTML5 -- The Attack…”
    Libro electrónico
  12. 29832
    Publicado 2024
    Tabla de Contenidos: “…LangChain prompt templates and chains -- Key Python libraries -- pandas -- PyMongoArrow -- PyTorch -- AI/ML APIs -- OpenAI API -- Hugging Face -- Summary -- Chapter 8: Implementing Vector Search in AI Applications -- Technical requirements -- Information retrieval with MongoDB Atlas Vector Search -- Vector search tutorial in Python -- Vector Search tutorial with LangChain -- Building RAG architecture systems -- Chunking or document-splitting strategies -- Simple RAG -- Advanced RAG -- Summary -- Part 3 -- Optimizing AI Applications: Scaling, Fine-Tuning, Troubleshooting, Monitoring, and Analytics -- Chapter 9: LLM Output Evaluation -- Technical requirements -- What is LLM evaluation? …”
    Libro electrónico
  13. 29833
    Publicado 2018
    Tabla de Contenidos: “…Fuzzing web requests using the Intruder tab -- Intruder attack types -- Practical examples -- Installing third-party apps using Burp Extender -- Summary -- Chapter 5: Understanding Web Application Vulnerabilities -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Scripting -- Reflected XSS -- Stored XSS -- Exploiting stored XSS using the header -- DOM XSS -- JavaScript validation -- Cross-Site Request Forgery -- Step 01 - victim -- Step 02 - attacker -- Results -- SQL Injection -- Authentication bypass -- Extracting the data from the database -- Error-based SQLi enumeration -- Blind SQLi -- Command Injection -- OWASP Top 10 -- 1 - Injection -- 2 - Broken Authentication -- 3 - Sensitive Data -- 4 - XML External Entities -- 5 - Broken Access Control -- 6 - Security Misconfiguration -- 7 - Cross-Site Scripting (XSS) -- 8 - Insecure Deserialization -- 9 - Using Components with Known Vulnerabilities -- 10 - Insufficient Logging &amp -- Monitoring -- Summary -- Chapter 6: Application Security Pre-Engagement -- Introduction -- The first meeting -- The day of the meeting with the client -- Non-Disclosure Agreement -- Kick-off meeting -- Time and cost estimation -- Statement of work -- Penetration Test Agreement -- External factors -- Summary -- Chapter 7: Application Threat Modeling -- Software development life cycle -- Application Threat Modeling at a glance -- Application Threat Modeling in real life -- Application Threat Modeling document parts -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Test strategies -- Security risks -- Practical example -- xBlog Threat Modeling -- Scope -- Threat Modeling -- Project information -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Threats list -- Spoofing - authentication -- Tampering - integrity…”
    Libro electrónico
  14. 29834
    Publicado 2012
    Tabla de Contenidos: “…Structural Engineering Analysis Application-Tension and Compression in Beams -- Transportation Engineering Analysis Application-Pavement Analysis -- Chapter 10: Design Fundamentals -- Introduction -- The Design Process -- Problem (Need) Identification -- Collection of Background Information -- Development of Alternative Designs -- Evaluation of Designs -- Selection of Best Design -- Documenting the Design -- Implementation of Solution -- Design Factors -- Design Constraints -- Regulations -- Standards -- Safety Factors -- Acceptable Risk -- Design Life -- Case Study: Chicago River Reversal -- Design Applications -- Construction Engineering Design Application-Cut and Fill -- Environmental Engineering Design Application-Septic Systems -- Geotechnical Engineering Design Application-Footings -- Municipal Engineering Design Application-Land Development -- Structural Engineering Design Application-Bridges -- Transportation Engineering Design Application-Inlet Spacing -- Chapter 11: Planning Considerations -- Introduction -- The Need for Planning -- Infrastructure Planning -- Transportation Planning -- Land Use Planning -- Regional Planning -- Emergency Planning -- Population Projections -- Chapter 12: Energy Considerations -- Introduction -- Background -- Energy Trends and Predicting Demand -- Sources of Energy -- Environmental Impacts -- Energy as an Infrastructure Consideration -- Transportation Sector Energy Use -- Buildings -- Wastewater Treatment -- Landfills -- Chapter 13: Sustainability Considerations -- Introduction -- The Needs of the World -- Resource Demand -- Measures of Sustainability -- The Role of Civil and Environmental Engineers in Promoting Sustainability -- Sustainable Design -- Green Buildings -- Sustainable Land Development -- Water Reuse -- Chapter 14: Economic Considerations -- Introduction…”
    Libro electrónico
  15. 29835
    Tabla de Contenidos: “…Mesures visant à améliorer l'efficacité énergétique des véhicules -- Gestion de la demande de circulation routière -- Technologies et carburants alternatifs -- Combinaisons de mesures -- Tableau 7. Documents programmatiques sur les stratégies de lutte contre le changement climatique -- Conclusions -- Référence -- Chapitre 4. …”
    Libro electrónico
  16. 29836
    Publicado 2023
    Tabla de Contenidos: “…Creating the training loop -- Sampling techniques for deep learning models -- Random oversampling -- Dynamic sampling -- Data augmentation techniques for vision -- Data-level techniques for text classification -- Dataset and baseline model -- Document-level augmentation -- Character and word-level augmentation -- Discussion of other data-level deep learning methods and their key ideas -- Two-phase learning -- Expansive Over-Sampling -- Using generative models for oversampling -- DeepSMOTE -- Neural style transfer -- Summary -- Questions -- References -- Chapter 8: Algorithm-Level Deep Learning Techniques -- Technical requirements -- Motivation for algorithm-level techniques -- Weighting techniques -- Using PyTorch's weight parameter -- Handling textual data -- Deferred re-weighting - a minor variant of the class weighting technique -- Explicit loss function modification -- Focal loss -- Class-balanced loss -- Class-dependent temperature Loss -- Class-wise difficulty-balanced loss -- Discussing other algorithm-based techniques -- Regularization techniques -- Siamese networks -- Deeper neural networks -- Threshold adjustment -- Summary -- Questions -- References -- Chapter 9: Hybrid Deep Learning Methods -- Technical requirements -- Using graph machine learning for imbalanced data -- Understanding graphs -- Graph machine learning -- Dealing with imbalanced data -- Case study - the performance of XGBoost, MLP, and a GCN on an imbalanced dataset -- Hard example mining -- Online Hard Example Mining -- Minority class incremental rectification -- Utilizing the hard sample mining technique in minority class incremental rectification -- Summary -- Questions -- References -- Chapter 10: Model Calibration -- Technical requirements -- Introduction to model calibration -- Why bother with model calibration -- Models with and without well-calibrated probabilities…”
    Libro electrónico
  17. 29837
    Publicado 2007
    Tabla de Contenidos: “…-- How to Use This Book -- Part I: Introduction to Windows Administrative Scripting -- Part II: VBScript Tutorial -- Part III: Windows Management Instrumentation and Active Directory Services Interface -- Part IV: Advanced Scripting Techniques -- Part V: Ready-to-Run Examples -- Appendix -- Preparing to Use This Book -- Typographical Elements -- Sample Scripts -- Sample Scripts-Explained -- Part I: Introduction to Windows Administrative Scripting -- 1 Scripting Concepts and Terminology -- Overview of Scripting -- Script Hosts -- ActiveX Scripting Languages -- The Component Object Model (COM) -- Critical Scripting Security Issues -- VBScript Versus Windows PowerShell -- Summary -- 2 Running Scripts -- Windows Script Host -- Command-Line Scripts -- Notepad and Script Editors -- Writing Your First Script -- Running Your First Script -- Debugging Your First Script -- Summary -- 3 The Components of a Script -- A Typical VBScript -- Functions -- Subroutines -- Main Script -- Comments and Documentation -- Summary -- 4 Designing a Script -- Creating a Task List -- Selecting the Appropriate Tools -- Creating Modules to Perform Tasks -- Validating User Input -- Planning for Errors -- Creating Script Libraries -- Summary -- Part II: VBScript Tutorial -- 5 Functions, Objects, Variables, and More -- Variables Defined -- Functions Defined -- Statements and Subroutines Defined -- Objects Defined -- Summary -- 6 Input and Output -- Displaying Messages -- Asking for Input -- Command-Line Parameters as Input -- Summary -- 7 Manipulating Numbers -- Numbers in VBScript -- Basic Arithmetic -- Advanced Arithmetic -- Boolean Math -- Converting Numeric Data Types -- Converting Other Data Types to Numeric Data -- Summary -- 8 Manipulating Strings -- Strings in VBScript -- Working with Substrings…”
    Libro electrónico
  18. 29838
    por MacLees, Natalie
    Publicado 2012
    Tabla de Contenidos: “…-- Time for action - opening a link in a new window -- Adding icons to links -- Time for action - creating a list of links -- Simple tabs -- Time for action - creating simple tabs -- Summary -- Chapter 3: Making a Better FAQ Page -- FAQ page markup -- Time for action - setting up the HTML -- Time for action - moving around an HTML document -- Sprucing up our FAQ page -- Time for action - making it fancy -- We're almost there! …”
    Libro electrónico
  19. 29839
    Publicado 2010
    Tabla de Contenidos: “…Chapter 15: Build a Team: Recruit and Manage People -- 10 Questions to Ask When Recruiting -- 10 Positive Ways to Deal With Employment Legislation -- 10 Things That Will Make You a Better Boss -- 10 Ways to Delegate and Share the Work -- Chapter 16: Be Motivating: Get the Best From Yourself and Others -- 10 Ways to Motivate Yourself -- 10 Things to Do That Will Make You More Motivating -- 10 Training Opportunities Most Overlooked -- 10 Common People Problems and How to Solve Them -- 10 Ways to Manage Stress in Yourself and Others -- Chapter 17: Avoid Surprises: Predict and Overcome Those Unexpected Hurdles -- 10 Staff Surprises -- 10 Customer Surprises -- 10 Supplier Surprises -- 10 Unlikely But Possible Surprises -- Chapter 18: Be Generous: How to Help Yourself By Helping Others -- 10 Ways to Build Your Business By Helping Others -- 10 Ways to Entertain Your Customers for Free -- 10 Lessons You Can Learn From Social Entrepreneurs -- 10 Benefits of Making a Philanthropic Gesture -- Chapter 19: Sell Your Business: How to Realise the Value -- 10 Ways to Decide That it's Time to Move on -- 10 Things That Add Value to Your Business -- 10 Ways to Find a Buyer -- 10 Reasons to Merge Your Business With Another -- 10 Things You'Ll Do Differently the Second Time Around -- Useful Document Templates: Shortcuts for You to Copy, Adapt and Use -- Sales Letters -- Follow-Up Letters -- Getting-Paid Letters -- The Business Plan -- Confidentiality and Intellectual Property…”
    Libro electrónico
  20. 29840
    Publicado 2018
    Tabla de Contenidos: “…-- A roadmap to becoming a successful full stack designer -- Summary -- Chapter 2: UX Design Process -- UX design process -- Discovery and planning -- The planning phase -- Project proposals -- Project objectives and methodologies -- The UX strategy -- Understanding the client's business -- Understanding our competitors -- Understanding our customers -- Discovering your own UX strategy framework -- UX research -- The discover stage -- Field study -- Diary study -- User interviews -- Stakeholder interviews -- The explore stage -- Competitive analysis -- Design review -- Persona-building -- Task analysis -- Journey-mapping -- Prototype feedback and testing -- Writing user stories -- Card-sorting -- The test stage -- Qualitative usability testing -- Benchmark testing -- Accessibility evaluation -- The listening stage -- Surveys -- Search-log analysis -- Usability-bug review -- UX analysis -- User analysis -- Design -- Concept, sketching, and flows -- Wireframes and prototyping -- Visual design and interactions -- Documentation -- Development -- Production -- Summary -- Chapter 3: User Behavior Basics and User Research -- User behavior basics -- The Gestalt theory -- The Proximity law -- The Similarity law -- The Closure law -- The Figure-Ground law -- The Common Region law -- Things you should know about psychology in UX -- Understanding the user's motivation -- Extrinsic motivation -- Intrinsic motivation -- Understanding the user's ability -- Understanding what triggers our users -- A quick summary of this section -- User research…”
    Libro electrónico