Mostrando 29,861 - 29,880 Resultados de 41,870 Para Buscar '"Documental"', tiempo de consulta: 0.20s Limitar resultados
  1. 29861
    Publicado 2017
    Tabla de Contenidos: “…Know Your Material -- Understand the Question -- Ask Questions If None Has Been Asked -- Don't Discount or Discourage Questions -- Don't Rush to Fill in Those Moments of Silence -- Don't Worry about Questions without Answers -- Thank Trainees for Their Questions -- Summary -- Chapter 10: Using Visual Aids -- Flip Charts -- Video -- Objects for Demonstrations -- Pointers -- Dos and Don'ts -- Watch Your Shoulders -- Watch Your Body Position -- Watch Those Speakers -- Do Not Forget to Practice with That Remote -- Do Not Prepare Too Many Slides -- Do Not Forget to Show Up Early -- Some Final Thoughts -- Summary -- Chapter 11: Technology and Training -- The Technical Revolution -- Presentation Software -- Laptop Computers -- Projectors -- Additional Projector Technology -- Troubleshooting -- Other Considerations -- Music -- Electronic Whiteboards and Copy Boards -- Document Cameras -- Summary -- Chapter 12: Taking Your Training Online -- The Challenges of Online Training -- The Strengths of Online Training -- Natural Fits for Online Delivery -- Tips for Successful Online Delivery -- Tips for Successful Online Videos -- Letting Others Know about Your Online Presence -- Summary -- Chapter 13: Giving Feedback and Coaching -- Pitfalls to Avoid -- Giving Feedback without Intimidating Trainees -- Coaching Using the Three Ss -- Situation -- Support -- Solution -- Summary -- Chapter 14: Tricks of the Trade -- Summary -- Part III: Improving the Training Process -- Chapter 15: Inside the Mind of a Professional Speaker -- Always Present a Positive and Enthusiastic Attitude -- Don't Advertise Any Lack of Experience -- How to Handle Illness on the Job -- Surviving with a Split Personality -- Stay in Training Shape -- Be Confident, Not Arrogant -- Coping with Doubt -- Working with Anxiety -- Welcome to the Club -- They're Rooting for You -- Get Moving…”
    Libro electrónico
  2. 29862
    Publicado 2016
    Tabla de Contenidos: “…Correlating individual stocks with the broader market -- Exploring risk and return -- Examining the market with the non-parametric runs test -- Testing for random walks -- Determining market efficiency with autoregressive models -- Creating tables for a stock prices database -- Populating the stock prices database -- Optimizing an equal weights two-asset portfolio -- Chapter 8: Text Mining and Social Network Analysis -- Introduction -- Creating a categorized corpus -- Tokenizing news articles in sentences and words -- Stemming, lemmatizing, filtering, and TF-IDF scores -- Recognizing named entities -- Extracting topics with non-negative matrix factorization -- Implementing a basic terms database -- Computing social network density -- Calculating social network closeness centrality -- Determining the betweenness centrality -- Estimating the average clustering coefficient -- Calculating the assortativity coefficient of a graph -- Getting the clique number of a graph -- Creating a document graph with cosine similarity -- Chapter 9: Ensemble Learning and Dimensionality Reduction -- Introduction -- Recursively eliminating features -- Applying principal component analysis for dimension reduction -- Applying linear discriminant analysis for dimension reduction -- Stacking and majority voting for multiple models -- Learning with random forests -- Fitting noisy data with the RANSAC algorithm -- Bagging to improve results -- Boosting for better learning -- Nesting cross-validation -- Reusing models with joblib -- Hierarchically clustering data -- Taking a Theano tour -- Chapter 10: Evaluating Classifiers, Regressors, and Clusters -- Introduction -- Getting classification straight with the confusion matrix -- Computing precision, recall, and F1-score -- Examining a receiver operating characteristic and the area under a curve…”
    Libro electrónico
  3. 29863
    Publicado 2017
    Tabla de Contenidos: “…Putting it all together -- Summary -- Chapter 9: Authorship Attribution -- Attributing documents to authors -- Applications and use cases -- Authorship attribution -- Getting the data -- Using function words -- Counting function words -- Classifying with function words -- Support Vector Machines -- Classifying with SVMs -- Kernels -- Character n-grams -- Extracting character n-grams -- The Enron dataset -- Accessing the Enron dataset -- Creating a dataset loader -- Putting it all together -- Evaluation -- Summary -- Chapter 10: Clustering News Articles -- Trending topic discovery -- Using a web API to get data -- Reddit as a data source -- Getting the data -- Extracting text from arbitrary websites -- Finding the stories in arbitrary websites -- Extracting the content -- Grouping news articles -- The k-means algorithm -- Evaluating the results -- Extracting topic information from clusters -- Using clustering algorithms as transformers -- Clustering ensembles -- Evidence accumulation -- How it works -- Implementation -- Online learning -- Implementation -- Summary -- Chapter 11: Object Detection in Images using Deep Neural Networks -- Object classification -- Use cases -- Application scenario -- Deep neural networks -- Intuition -- Implementing deep neural networks -- An Introduction to TensorFlow -- Using Keras -- Convolutional Neural Networks -- GPU optimization -- When to use GPUs for computation -- Running our code on a GPU -- Setting up the environment -- Application -- Getting the data -- Creating the neural network -- Putting it all together -- Summary -- Chapter 12: Working with Big Data -- Big data -- Applications of big data -- MapReduce -- The intuition behind MapReduce -- A word count example -- Hadoop MapReduce -- Applying MapReduce -- Getting the data -- Naive Bayes prediction -- The mrjob package -- Extracting the blog posts…”
    Libro electrónico
  4. 29864
    Publicado 2020
    Tabla de Contenidos: “…What about Data Quantity?</p> <p>f. Documenting the Data Pedigree -- The Data's Story</p> <p>g. …”
    Libro electrónico
  5. 29865
    Publicado 2023
    Tabla de Contenidos: “…Recommendation systems -- Getting started with networks -- Example - K-pop implementation -- Summary -- Further reading -- Chapter 3: Useful Python Libraries -- Technical requirements -- Using notebooks -- Data analysis and processing -- pandas -- NumPy -- Data visualization -- Matplotlib -- Seaborn -- Plotly -- NLP -- Natural Language Toolkit -- Setup -- Starter functionality -- Documentation -- spaCy -- Network analysis and visualization -- NetworkX -- scikit-network -- ML -- scikit-learn -- Karate Club -- spaCy (revisited) -- Summary -- Part 2: Graph Construction and Cleanup -- Chapter 4: NLP and Network Synergy -- Technical requirements -- Why are we learning about NLP in a network book? …”
    Libro electrónico
  6. 29866
    Publicado 2023
    Tabla de Contenidos: “…Redundancy and enabling business continuity -- Event retries and continuity -- Local data redundancy -- Infrastructure continuity -- Graceful communication between services -- Common results -- Summary -- Questions -- Further reading -- Chapter 13: Telemetry Capture and Integration -- Technical requirements -- Application- versus service- versus component-level telemetry -- Implementing non-intrusive telemetry capture -- Implementing custom telemetry capture -- Bubbling up meaningful information -- Metric ingestion with the Prometheus exporter -- Distributed tracing using the Jaeger exporter -- Summary -- Questions -- Further reading -- Chapter 14: Observability Revisited -- Technical requirements -- Sharing API services -- Generating service information -- OpenAPI specification -- A brief history of Swagger -- Generating the Swagger documentation -- Service discovery -- It's not quite load balancing... -- Exploring Consul -- Service discovery/registration -- Service resolution -- Service publishing -- Azure API Management -- Service cataloging -- Summary -- Questions -- Further reading -- Assessments -- Chapter 1, The Sample Application -- Chapter 2, The Producer-Consumer Pattern -- Chapter 3, Message Brokers -- Chapter 4, Domain Model and Asynchronous Events -- Chapter 5, Containerization and Local Environment Setup -- Chapter 6, Localized Testing and Debugging of Microservices -- Chapter 7, Microservice Observability -- Chapter 8, CI/CD Pipelines and Integrated Testing -- Chapter 9, Fault Injection and Chaos Testing -- Chapter 10, Modern Design Patterns for Scalability -- Chapter 11, Minimizing Data Loss -- Chapter 12, Service and Application Resiliency -- Chapter 13, Telemetry Capture and Integration -- Chapter 14, Observability Revisited -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  7. 29867
    Publicado 2024
    Tabla de Contenidos: “…SOVD example, demo, and details -- Example of a diagnostic message using UDS and SOVD -- Example of an SOVD interface as part of applications on the server side -- SOVD documentation and demo -- SOVD and UDS comparison -- Summary -- References -- Part 3: Secure Development for Automotive IoT -- Chapter 6: Exploring Secure Development Processes for Automotive IoT -- An overview of security threats and the need for security and secure development processes -- New cybersecurity threats -- Examples of recent attacks -- Simplified threat model of automotive IoT ecosystem -- ISO/SAE 21434 and ASPICE for Cybersecurity -- ISO/SAE 21434 Overview -- ISO/SAE 21434 organizational-level requirements -- ISO/SAE 21434 project-level requirements -- ASPICE for Cybersecurity overview -- ASPICE for Cybersecurity - security activities -- NIST Cybersecurity Framework, ISO 27001, SOC 2, and OWASP -- NIST Cybersecurity Framework -- ISO 27001 -- SOC 2 -- OWASP -- DevSecOps and agile development -- V-model -- Agile -- Scrum -- DevSecOps -- Summary -- References -- Chapter 7: Establishing a Secure Software Development Platform -- Activities in the SSDLC -- TARA/threat model -- Requirements review -- Design review -- Code review -- Static application security testing -- Vulnerability scanning -- Fuzz testing -- Dynamic application security testing -- Interactive application security testing -- Penetration testing -- Project inventory -- Project information and risk level -- Cybersecurity assurance level and activities -- Example project inventory -- Practical steps for establishing a secure software development platform -- Purpose and need -- Overview of the secure software development platform -- Requirements, policies, and compliance -- Vulnerability management -- AppSec tooling -- Common AppSec tooling and test approaches -- SAST -- SCA -- DAST -- Fuzz testing…”
    Libro electrónico
  8. 29868
    Publicado 2024
    Tabla de Contenidos: “…-- Establishing a governance model -- Sandboxing micro frontends -- General security concerns and mitigations -- Summary -- Chapter 18: Impact of Micro Frontends on UX and Screen Design -- Technical requirements -- Always adding one -- Learning to start at zero -- Sharing designs efficiently -- Creating designs without designers -- Summary -- Chapter 19: Building a Great Developer Experience -- Technical requirements -- Providing a minimum developer experience -- Supporting development in standard IDEs -- Improving the scaffolding experience -- Establishing a decent developer experience -- Centralizing code documentation -- Using videos -- Assisting with code analysis -- Improving testability -- Achieving the best developer experience -- Integrating error codes -- Providing an offline-first development environment -- Customizing via browser extensions -- Implementing a developer portal -- Summary -- Chapter 20: Case Studies -- Technical requirements -- A user-facing portal solution -- Problem description -- Team setup -- Solution -- Impact -- An administration portal solution -- Problem description -- Team setup -- Solution -- Impact…”
    Libro electrónico
  9. 29869
    Publicado 2017
    Tabla de Contenidos: “…Questions -- Summary -- Chapter 4: Behaving Properly - Pure Functions -- Pure functions -- Referential Transparency -- Side effects -- Usual side effects -- Global state -- Inner state -- Argument mutation -- Troublesome functions -- Advantages of pure functions -- Order of execution -- Memoization -- Self-documentation -- Testing -- Impure functions -- Avoiding impure functions -- Avoiding the usage of state -- Injecting impure functions -- Is your function pure? …”
    Libro electrónico
  10. 29870
    por Ballew, Joli
    Publicado 2013
    Tabla de Contenidos: “…Contents note continued: Opening and closing desktop apps -- Using menus -- Using ribbons -- Formatting text -- Using the Clipboard -- Inserting objects -- Printing a document -- Saving a file -- Exploring other desktop apps -- Adding a device -- Troubleshooting device installations -- Connecting to a Bluetooth device -- Connecting to a private network -- Sharing with a homegroup -- Troubleshooting network connectivity -- Connecting to a public network -- Changing network settings -- Using Airplane Mode -- Enabling Windows Firewall -- Allowing apps to access your personal information or location -- Using Windows Defender -- Creating new users -- Creating a picture password -- Creating a PIN -- Switching among user accounts -- Managing User Account Control settings -- Turning on Family Safety -- Working with Family Safety settings -- Choosing settings to sync to SkyDrive -- Choosing files to save to SkyDrive -- Saving files to SkyDrive -- Creating a new folder in SkyDrive --…”
    Libro electrónico
  11. 29871
    Publicado 2022
    Tabla de Contenidos: “…. -- See also -- Implementing term frequency-inverse document frequency -- Getting ready -- How to do it... -- How it works... -- See also -- Cleaning and stemming text variables -- Getting ready -- How to do it... -- How it works... -- Index -- About Packt -- Other Books You May Enjoy…”
    Libro electrónico
  12. 29872
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- A Novel Asset Class with a Greenfield of Opportunities -- The Road from Laggard to Industry Leadership -- Technical Strategy as a New Top-Level Construct -- Playbook for the Enterprise -- Systems, Models, and Frameworks -- Introducing Data to the Enterprise -- Chapter 1 Overview of the Frameworks -- Continuous Transformation -- Three Sources of Business Debt -- Evolutionary Decision Culture -- The Disruptor's Mindset -- The Innovation Mix -- Meet the Business Where It Is -- The Technology Model -- The Core-Rim Model -- Transparency and Opacity -- The Maturity Models -- The Four Platforms -- Top-Down and Bottom-Up Opportunity Discovery -- Large Model Monetization -- The Business Assessment Framework -- The Data and AI Strategy Document -- Data Organizational Development Framework -- More to Come -- Chapter 2 There Is No Finish Line -- Where Do We Begin? …”
    Libro electrónico
  13. 29873
    Publicado 2023
    Tabla de Contenidos: “…Chapter 8: Security -- Introduction -- Practice Exam Questions -- 8.1 Summarize various security measures and their purposes -- 8.2 Compare and contrast wireless security protocols and authentication methods -- 8.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods -- 8.4 Explain common social-engineering attacks, threats, and vulnerabilities -- 8.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS -- 8.6 Given a scenario, configure a workstation to meet best practices for security -- 8.7 Explain common methods for securing mobile and embedded devices -- 8.8 Given a scenario, use common data destruction and disposal methods -- 8.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks -- 8.10 Given a scenario, install and configure browsers and relevant security settings -- Chapter 9: Software Troubleshooting -- Introduction -- Practice Exam Questions -- 9.1 Given a scenario, troubleshoot common Windows OS problems -- 9.2 Given a scenario, troubleshoot common personal computer (PC) security issues -- 9.3 Given a scenario, use best practice procedures for malware removal -- 9.4 Given a scenario, troubleshoot common mobile OS and application issues -- 9.5 Given a scenario, troubleshoot common mobile OS and application security issues -- Chapter 10: Operational Procedures -- Instructions to Unlock the Free Practice Resources -- Introduction -- Practice Exam Questions -- 10.1 Given a scenario, implement best practices associated with documentation and support systems information management -- 10.2 Explain basic change-management best practices -- 10.3 Given a scenario, implement workstation backup and recovery methods -- 10.4 Given a scenario, use common safety procedures…”
    Libro electrónico
  14. 29874
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Credits -- About the Authors -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Discovering Your Hidden Scripting Skills and Getting Your Environment Ready -- Prerequisite knowledge to use this book -- Dealing with scriptphobia -- Downloading Unity -- Obtaining a free license -- Teaching behavior to GameObjects -- Using Unity's documentation -- The Unity community - asking others for help -- Working with C# script files -- Creating a C# script file -- Introducing the MonoDevelop code editor -- Opening LearningScript in MonoDevelop -- The namespace - highlighted in blue -- Watching for possible gotchas while creating script files in Unity -- Fixing synchronization if it isn't working properly -- Adding our script to GameObject -- Lots of files can create a mess -- Why does my Project tab look different? …”
    Libro electrónico
  15. 29875
    Publicado 2010
    Tabla de Contenidos: “…important Declaration -- Selector Strategies -- Browser Support for Selectors -- Grouping Selectors -- Selector Speed -- Selector Readability -- Selector Reusability -- Chapter 4: Measurements, URLs, and Color Units -- Measurements -- Pixels (px) -- Ems (em) -- Points (pt) -- Percentages (%) -- Other Units of Note -- URLs -- Basic Colors -- #rrggbb or #rgb -- rgb(r,g,b) -- hsl(h,s,l) -- Color Keywords -- Color with Alpha Transparency -- rgba(r,g,b,a) -- hsla(h,s,l,a) -- transparent -- Creating and Maintaining Color Palettes -- Design -- Maintenance -- Chapter 5: The Box Model -- Properties -- width -- height -- margin -- padding -- border-width -- overflow -- Min and Max Dimensions -- Nesting Elements -- Using Negative Margins -- Horizontal Centering Blocks -- An Alternative Box Model -- box-sizing -- Chapter 6: Positioning and Floats -- The Document Flow -- display -- Position -- static -- relative -- absolute -- fixed -- Origins and Containing Blocks -- z-index -- visibility -- float -- clear -- Chapter 7: Page Layouts -- Building Blocks of CSS Layouts -- Creating Content Blocks -- Floating into Margins -- Creative Use of Backgrounds…”
    Libro electrónico
  16. 29876
    Publicado 2010
    Tabla de Contenidos: “…Iterations, Qualification, and Release to Product -- Summary: Addressing Schedule Risk -- Chapter 7 Gathering Voice of the Customer to Prioritize Tehnical Requirments -- Importance and Position within DFSS Flow -- VOC Purpose and Objectives -- The VOC Gathering (Interviewing) Team -- Customer Selection -- Voices and Images -- Customer Interview Guide -- Planning Customer Visits and Interviews -- Customer Interviews -- KJ Analysis: Grouping, Structuring and Filtering the VOC -- Identifying Challenging Customer Requirements (NUDs) -- Kano Analysis -- Validation and Prioritization of Customer Requirements -- Translating Customer Requirements to System Requirements: The System-Level House of Quality -- Constructing a House of Quality -- Summary: VOC Gathering-Tying It All Together -- Chapter 8 Concept Generation and Selection -- Position within DFSS Flow -- Concept Generation Approaches -- Brainstorming and Mind-Mapping -- TRIZ -- Alternative Architecture Generation: Hardware and Software -- Generation of Robust Design Concepts -- Consideration of Existing Solutions -- Feasibility Screening -- Developing Feasible Concepts to Consistent Levels -- Concept Selection -- Summary -- Appendix: Kansei Engineering -- Chapter 9 Identification of Critical Parameters and FMEA -- Position within DFSS Flow -- Definition of a Critical Parameter -- Considerations from VOB and Constraints -- Prioritization and Selection of Critical Parameters -- FMEA -- Software FMEA Process (Software Systems, Software Subsystems, and Software Components FMEA) -- Software FMEA Implementation Case Study -- Considerations of Reliability and Availability -- Examples of Critical Parameters -- Summary -- Appendix: Software FMEA Process Documentation -- Chapter 10 Requirements Flow-Down -- Position within DFSS Flow -- Flow-Down for Hardware and Software Systems…”
    Libro electrónico
  17. 29877
    Publicado 2004
    Tabla de Contenidos: “…Getting help -- Getting context-sensitive help -- Getting help from the product documentation -- Searching for information in the help system -- Narrowing the scope of the search -- Searching on more than one word -- Orienting yourself in the help system -- Updating the help system and infopops -- Getting help from other sources -- Serving the help system from a single location -- Useful links -- Appendix B. …”
    Libro electrónico
  18. 29878
    Publicado 2008
    Tabla de Contenidos: “…Information seeking behaviour and cognition - the advent of the Web -- 2.1 Consequences of the growth of online documents -- 2.2 The stake: Acquiring information from others and cognitive economy -- 2.3 Epistemic practices on the Web -- 2.4 The cognitive function of search engines -- 3. …”
    Libro electrónico
  19. 29879
    por Parasram, Shiva V. N.
    Publicado 2023
    Tabla de Contenidos: “…Configuring our WINE installation -- Testing our WINE installation -- Summary -- Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices -- Chapter 6: Understanding File Systems and Storage -- History and types of storage media -- IBM and the history of storage media -- Removable storage media -- Magnetic tape drives -- Floppy disks -- Optical storage media -- Blu-ray Disc -- Flash storage media -- USB ash drives -- Flash memory cards -- Hard disk drives -- Integrated Drive Electronics HDDs -- Serial Advanced Technology Attachment HDDs -- Solid-state drives -- File systems and operating systems -- Microsoft Windows -- Macintosh (macOS) -- Linux -- Data types and states -- Metadata -- Slack space -- Volatile and non-volatile data and the order of volatility -- The importance of RAM, the paging file, and cache in DFIR -- Summary -- Chapter 7: Incident Response, Data Acquisitions, and DFIR Frameworks -- Evidence acquisition procedures -- Incident response and first responders -- Evidence collection and documentation -- Physical acquisition tools -- Live versus post-mortem acquisition -- Order of volatility -- Powered-on versus powered-off device acquisition -- The CoC -- The importance of write blockers -- Data imaging and maintaining evidence integrity -- Message Digest (MD5) hash -- Secure Hashing Algorithm (SHA) -- Data acquisition best practices and DFIR frameworks -- DFIR frameworks -- Summary -- Part 3: Kali Linux Digital Forensics and Incident Response Tools -- Chapter 8: Evidence Acquisition Tools -- Using the fdisk command for partition recognition -- Device identification using the fdisk command -- Creating strong hashes for evidence integrity -- Drive acquisition using DC3DD -- Verifying the hash output of image files -- Erasing a drive using DC3DD -- Drive acquisition using DD -- Drive acquisition using Guymager…”
    Libro electrónico
  20. 29880
    Publicado 2024
    Tabla de Contenidos: “…-- VMware Cloud on AWS Outposts rack -- Underlying network connectivity -- Physical connectivity -- Service link BGP connectivity -- Local gateway BGP connectivity -- Service link infrastructure subnet -- Network readiness checklist -- AWS Outposts connectivity to AWS Region -- Public connectivity -- Private connectivity -- Service link disconnection -- VMC on AWS Outposts configuration -- Scalability -- Multi-rack network connectivity -- VMC on AWS Outposts support -- Summary -- Part 3: Leveraging Design Considerations and Best Practices -- Chapter 11: Knowing the Best Practices, FAQs, and Common Pitfalls -- Best practices -- Design and architecture -- Migration -- Workload optimization -- Day 2 operations -- Contract documentation -- Avoiding common pitfalls -- Compute -- Storage -- Networking -- FAQ -- Summary -- Chapter 12: Appendix: Preflight before Onboarding -- Purchasing and onboarding -- Purchasing and funding -- Consumption options -- Accessing and configuring the VMware Cloud Console -- SDDC deployment -- Hybrid cloud configuration -- Next steps -- Index -- Other Books You May Enjoy…”
    Libro electrónico