Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,400
- Application software 1,242
- History 1,178
- Management 741
- Artificial intelligence 628
- Python (Computer program language) 606
- Computer programs 597
- Data processing 580
- Cloud computing 535
- Social aspects 529
- Machine learning 514
- Computer networks 493
- Engineering & Applied Sciences 476
- Security measures 403
- Design 393
- Computer programming 364
- Computer security 360
- Computer software 360
- Programming 357
- Operating systems (Computers) 354
- Philosophy 345
- Web site development 341
- Computer Science 337
- Information technology 331
- History and criticism 326
- Education 323
- Technological innovations 313
- Data mining 311
- Database management 309
- Java (Computer program language) 299
-
27321Publicado 2022“…What You Will Learn Dive into full-stack exploitation of modern web applications Learn how hackers can bypass Content Security Policy (CSP) Discover how web applications can be hacked through PDFs, images, and links Explore how hackers can steal secrets from AngularJS applications Check if your web applications are vulnerable to race condition attacks Learn about HTTP parameter pollution, subdomain takeover, and clickjacking Audience This course is ideal for all penetration testers, ethical hackers, bug hunters, and security engineers/consultants who want to enhance and refresh their knowledge of pentesting and hacking. …”
Video -
27322por Camassa, Giorgio“…Mais dans la visée, il y a les hauts savoirs fléchés par l’écrit: la géométrie dessinant et écrivant, explorant les propriétés des figures et mettant la démonstration par écrit; la géographie avec la carte et ses contraintes de raisonnement imposées entre écrire le monde et dessiner la terre habitée; la médecine avec son projet d’écrire afin de décrire, d’inventer par le stylet et le style des Epidémies la maladie dans ses purs symptômes. …”
Publicado 2021
Electrónico -
27323Publicado 2022“…You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US. …”
Libro electrónico -
27324por National Academies (U.S.).“…Interdisciplinary Research (IDR) Teams at the 2012 National Academies Keck Futures Initiative Conference on The Informed Brain in the Digital World explored common rewards and dangers to Humans among various fields that are being greatly impacted by the Internet and the rapid evolution of digital technology. …”
Publicado 2013
Libro electrónico -
27325Publicado 2023“…What you'll learn and how you can apply it Understand the advantages of these new hardware technologies and the types of applications and systems they can power Learn about different AI chip architectures and what each brings to the tableExplore how to evaluate the options Discuss the role of software stacks in abstracting different AI chips or integrating them tightly in your applications Learn about the changing terrain of AI hardware vendors and service providers This recording of a live event is for you because... …”
Video -
27326Publicado 2022“…With Kafka, you can easily build features like operational data monitoring and large-scale event processing into both large and small-scale applications. about the book Kafka in Action introduces the core features of Kafka, along with relevant examples of how to use it in real applications. In it, you'll explore the most common use cases such as logging and managing streaming data. …”
Grabación no musical -
27327Publicado 2021“…There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. …”
Grabación no musical -
27328Publicado 2021“…You'll go beyond the algorithms and explore important techniques like deploying ML applications on serverless systems and serving models with Kubernetes and Kubeflow. …”
Grabación no musical -
27329Publicado 2024“…What you will learn Adapt to the evolving threat landscape by staying up to date with emerging trends Identify and assess vulnerabilities and weaknesses within your organization's enterprise network and cloud environment Discover metrics to measure the effectiveness of security controls Explore key elements of a successful cybersecurity strategy, including risk management, digital forensics, incident response, and security awareness programs Get acquainted with various threat intelligence sharing platforms and frameworks Who this book is for This book is for security professionals and decision makers tasked with evaluating and selecting cybersecurity solutions to protect their organization from evolving threats. …”
Libro electrónico -
27330Publicado 2019“…This video course uses the Cloud Run Google Cloud service for examples; Cloud Run is currently in an open beta, and you will be able to use it as part of your exploration. In addition to conventional tutorial, Martin employs "Story Mode," in which you follow a startup as it builds a system for letting apartment complex managers connect with their tenants. …”
Video -
27331Publicado 2023“…In it, you'll get no-nonsense guidance on generative AI fundamentals to help you understand what these models are (and aren't) capable of, and how you can use them to greatest advantage. about the book In Introduction to Generative AI: An ethical, societal, and legal overview, AI engineers Numa Dhamani and Maggie Engler reveal both the power and limitations of AI tools and explore their impact on society, the economy, and the law. …”
Grabación no musical -
27332por Béguelin, Wendy“…In spite of all the accumulating evidence suggesting a crosstalk between ErbB2 and Stat3, the molecular mechanisms underlying ErbB2 and Stat3 interaction in breast tumor remain poorly explored. In this work, we identified a new mechanism of ErbB2 and Stat3 interaction, which involves ErbB2 nuclear translocation and the assembly of a complex in which ErbB2 acts as a transcriptional coactivator of Stat3. …”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Tesis -
27333Publicado 2012“…Literary contributions focus on authors of the 20th century, although there is also an adaptation of a Shakespearian play to present-day London, and cover all literary genres, and explore new territories of the inter-disciplinary studies, such as the relationship of literature and cinema. …”
Enlace del recurso
Electrónico -
27334Publicado 2018“…What You Will Learn Get an introduction to Qt IDE and SDK Be introduced to OpenCV and see how to communicate between OpenCV and Qt Understand how to create UI using Qt Widgets Know to develop cross-platform applications using OpenCV 3 and Qt 5 Explore the multithreaded application development features of Qt5 Improve OpenCV 3 application development using Qt5 Build, test, and deploy Qt and OpenCV apps, either dynamically or statically See Computer Vision technologies such as filtering and transformation of images, detecting and matching objects, template matching, object tracking, video and motion analysis, and much more Be introduced to QML and Qt Quick for iOS and Android application development In Detail Developers have been using OpenCV library to develop computer vision applications for a long time. …”
Libro electrónico -
27335Publicado 2024“…Key Features Get familiar with the most important tools and concepts used in real scenarios to design GenAI apps Interact with GenAI models to tailor model behavior to minimize hallucinations Get acquainted with a variety of strategies and an easy to follow 4 step frameworks for integrating GenAI into applications Book Description Explore the transformative potential of GenAI in the application development lifecycle. …”
Libro electrónico -
27336Publicado 2017“…Attracted by Cajal's strong personality and scientific success, a number of medical students and doctors join him in the crusade to explore the nervous system. And the seed planted by the universal savant was really successful: Francisco Tello described interesting aspects of the regeneration of peripheral nerves which are very useful for neuroscientist currently working in this topic; Nicolás Achúcarro significantly contributed to study neuroglia and future microglia; Pío del Río-Hortega identified two out of the four main nervous cell types, the oligodendrocytes and microglia, and proposed an almost still valid classification for the CNS tumours; Fernando de Castro made was the first description of arterial chemoreceptors in the carotid body; Rafael Lorente de Nó was a dominant figure of Neuroscience for decades after the IInd World War, first describing the columnar organization of the cerebral cortex well before Mountcastle, Hubbel and Wiesel. …”
Libro electrónico -
27337Publicado 2022“…This keynote was shared with the ACM Web Science Conference, where the speaker questioned web scientists and hypertext researchers to explore the role of web science in general and hypertext in particular in helping to create the infrastructure of radical cultural shift towards health. …”
Libro electrónico -
27338por Ozan Oner, Vedat“…You'll also see how cloud platforms and third-party integrations enable endless possibilities for your end-users, such as insights with big data analytics and predictive maintenance to minimize costs.By the end of this book, you'll have developed the skills you need to start using ESP32 in your next wireless IoT project and meet the project's requirements by building effective, efficient, and secure solutions.What You Will Learn:Explore advanced use cases like UART communication, sound and camera features, low-energy scenarios, and scheduling with an RTOSAdd different types of displays in your projects where immediate output to users is requiredConnect to Wi-Fi and Bluetooth for local network communicationConnect cloud platforms through different IoT messaging protocolsIntegrate ESP32 with third-party services such as voice assistants and IFTTTDiscover best practices for implementing IoT security features in a production-grade solutionWho this book is for:If you are an embedded software developer, an IoT software architect or developer, a technologist, or anyone who wants to learn how to use ESP32 and its applications, this book is for you. …”
Publicado 2021
Enlace al texto completo en Ebscohost
Libro electrónico -
27339Publicado 2017“…First, techniques from various theoretical and experimental studies with applications to the immune response will be reviewed to determine how they can be adapted to explore the complexity of transplant rejection. Second, recent advances in the acquisition and mining of large data sets related to transplant genomics, proteomics, and metabolomics will be discussed in the context of their predictive power and potential for optimizing and personalizing patient treatment. …”
Libro electrónico -
27340Publicado 2017“…Crop improvement programs aiming for the development of cultivars with higher tolerance against stresses like drought, flooding, salinity and many biotic diseases, can explore and exploit the finely tuned AQP-regulated transport system. …”
Libro electrónico