Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Crítica i interpretació 290
- Python (Computer program language) 180
- Data mining 159
- Història de les doctrines 150
- Data processing 137
- Revistes 136
- Machine learning 134
- Crítica, interpretació, etc 124
- Història 121
- Artificial intelligence 117
- Research & information: general 117
- Application software 107
- Development 107
- Database management 105
- Bíblia 93
- Església Catòlica 91
- Big data 90
- Technology: general issues 87
- Computer programs 81
- Aspectes religiosos 66
- History of engineering & technology 64
- Engineering & Applied Sciences 57
- Management 57
- Computer programming 54
- Natural language processing (Computer science) 50
- Cristianisme 48
- deep learning 48
- Business 47
- machine learning 47
- Security measures 45
-
2321Publicado 2018Tabla de Contenidos: “…Controlling memory size -- Heterogeneous lists -- From lists to multidimensional arrays -- Resizing arrays -- Arrays derived from NumPy functions -- Getting an array directly from a file -- Extracting data from pandas -- NumPy fast operation and computations -- Matrix operations -- Slicing and indexing with NumPy arrays -- Stacking NumPy arrays -- Working with sparse arrays -- Summary -- Chapter 3: The Data Pipeline -- Introducing EDA -- Building new features -- Dimensionality reduction -- The covariance matrix -- Principal component analysis -- PCA for big data - RandomizedPCA -- Latent factor analysis -- Linear discriminant analysis -- Latent semantical analysis -- Independent component analysis -- Kernel PCA -- T-SNE -- Restricted Boltzmann Machine -- The detection and treatment of outliers -- Univariate outlier detection -- EllipticEnvelope -- OneClassSVM -- Validation metrics -- Multilabel classification -- Binary classification -- Regression -- Testing and validating -- Cross-validation -- Using cross-validation iterators -- Sampling and bootstrapping -- Hyperparameter optimization -- Building custom scoring functions -- Reducing the grid search runtime -- Feature selection -- Selection based on feature variance -- Univariate selection -- Recursive elimination -- Stability and L1-based selection -- Wrapping everything in a pipeline -- Combining features together and chaining transformations -- Building custom transformation functions -- Summary -- Chapter 4: Machine Learning -- Preparing tools and datasets -- Linear and logistic regression -- Naive Bayes -- K-Nearest Neighbors -- Nonlinear algorithms -- SVM for classification -- SVM for regression -- Tuning SVM -- Ensemble strategies -- Pasting by random samples -- Bagging with weak classifiers -- Random Subspaces and Random Patches -- Random Forests and Extra-Trees…”
Libro electrónico -
2322Publicado 2017Tabla de Contenidos: “…. -- Text mining with term extraction and term lookup transformations -- Getting ready -- How to do it... -- Chapter 9: On-Premises and Azure Big Data Integration -- Introduction -- Azure Blob storage data management -- Getting ready -- How to do it... -- Installing a Hortonworks cluster -- Getting ready -- How to do it... -- Copying data to an on-premises cluster -- Getting ready -- How to do it... -- Using Hive - creating a database -- Getting ready…”
Libro electrónico -
2323Publicado 2017Tabla de Contenidos: “…-- Testing - pure versus impure -- Testing pure functions -- Testing purified functions -- Testing impure functions -- Questions -- Summary -- Chapter 5: Programming Declaratively - A Better Style -- Transformations -- Reducing an array to a value -- Summing an array -- Calculating an average -- Calculating several values at once -- Folding left and right -- Applying an operation - map -- Extracting data from objects -- Parsing numbers tacitly -- Working with ranges -- Emulating map() with reduce() -- More general looping -- Logical higher-order functions -- Filtering an array -- A reduce() example -- Emulating filter() with reduce() -- Searching an array -- A special search case -- Emulating find() and findIndex() with reduce() -- Higher level predicates - some, every -- Checking negatives - none -- Questions -- Summary -- Chapter 6: Producing Functions - Higher-Order Functions -- Wrapping functions -- Logging -- Logging in a functional way -- Taking exceptions into account -- Working in a more pure way -- Timing -- Memoizing -- Simple memoization -- More complex memoization -- Memoization testing -- Altering functions -- Doing things once, revisited -- Logically negating a function -- Inverting results -- Arity changing -- Other higher-order functions -- Turning operations into functions -- Implementing operations -- A handier implementation -- Turning functions into promises…”
Libro electrónico -
2324por Ballew, JoliTabla de Contenidos: “…Contents note continued: Adding files to a folder -- Sharing a folder -- Managing SkyDrive storage -- Creating a folder and adding data to it from the SkyDrive app -- Using the File Explorer ribbon -- Navigating File Explorer -- Locating files with File Explorer -- Changing views in File Explorer -- Creating folders -- Renaming files and folders -- Moving and copying files -- Creating and extracting compressed files -- Sharing content -- Using File History -- Backing up data manually -- Deleting files and folders -- Working with the Recycle Bin -- Switching from a right-handed to left-handed mouse -- Adjusting double-click speed and indicator motion -- Adjusting keyboard settings -- Enabling High Contrast -- Letting Windows suggest Ease Of Access settings -- Using Magnifier -- Using Narrator -- Working with speech recognition -- Creating a recovery drive -- Using ReadyBoost -- Configuring Windows Update -- Exploring the Action Center -- Running Disk Cleanup --…”
Publicado 2013
Libro electrónico -
2325por Jacob, BartTabla de Contenidos: “…7.2.2 META-INF sub-directory -- 7.2.3 FILES sub-directory -- 7.3 Types of package bundles -- 7.3.1 Fixed-size removable media -- 7.3.2 Single zip file -- 7.3.3 Self-extractable single executable -- 7.3.4 Network download -- 7.3.5 Combination of formats -- 7.4 Summary -- Chapter 8. …”
Publicado 2004
Libro electrónico -
2326Publicado 2012Tabla de Contenidos: “…Intro -- Effective MySQL -- About the Author -- About the Technical Editors -- Contents -- Acknowledgments -- Introduction -- Conventions -- About MySQL -- Code Examples -- References -- Chapter 1: The Five Minute DBA -- Approaching a MySQL Backup -- Determining Your Database Size -- Choosing a Locking Strategy -- Execution Time -- Combining Information -- Performing a MySQL Backup -- Running mysqldump -- Securing Your Backup -- Benefits with mysqldump -- More Information -- Other Options -- Conclusion -- Chapter 2: Understanding Backup Options -- Terminology -- Choosing a Backup Strategy -- Database Availability -- Storage Engines -- Locking Strategies -- Lock Tables -- Flush Tables -- MySQL Topology -- Static Backup Options -- Filesystem Backup -- Disadvantages -- Advantages -- SQL Dump -- MySQL Replication Specific Options -- Additional Options -- Benefits -- Recovery Considerations -- Recommended Practices for Database Objects -- Using Compression -- Leveraging Network Devices -- Disadvantages -- Table Extract -- Filesystem Snapshot -- Using mylvmbackup -- Designing Appropriate LVM Volumes -- Other Considerations -- InnoDB Hot Backup -- MySQL Enterprise Backup (MEB) -- XtraBackup -- Options Not Discussed -- Point in Time Requirements -- Binary Logs -- Binary Log Position -- Binary Log Backup Options -- File Copy -- Replication -- DRBD -- Hardware Considerations -- Data Source Consistency -- Backup Security -- Conclusion -- Chapter 3: Understanding Business Requirements for Disaster Recovery -- Defining Requirements -- Determining Responsibilities -- Terminology -- Technical Resource Responsibilities -- Decision Maker Responsibilities -- Identifying Dependencies -- Case Study -- The MySQL Topology -- Your Backup and Recovery Strategy -- A Real Life Disaster -- Technical Outcomes -- The Decision Process -- Essential External Communication…”
Libro electrónico -
2327Publicado 2013Tabla de Contenidos: “…Change Column and Bar Shapes -- Use Charts -- Work with Charts -- Add Charts Elsewhere -- Analyze Charts -- Print a Chart -- Create Sparklines -- Work with Sparklines -- Chapter 7: Working with Illustrations -- Understanding Illustrations -- Add Illustrations -- Add Shapes -- Work with Curves -- Add Text -- Use SmartArt -- Changing SmartArt -- Insert Pictures -- Using Pictures -- Take Screenshots -- Work with Illustrations -- Select, View, and Delete Illustrations -- Use Handles and Borders to Change Illustrations -- Crop Pictures -- Position Illustrations -- Combine Illustrations by Grouping -- Format Illustrations and Text -- Use Styles -- Apply Styling Elements to Pictures -- Change a Picture's Attributes -- Change a Shape's Fill -- Add WordArt Styling to Text -- Make Detailed Formatting Changes -- Chapter 8: Managing Data -- Understanding Excel Tables -- Build Tables -- Create a Table -- Change Rows and Columns in a Table -- Add a Total Row -- Apply Styles to a Table -- Work with Tables -- Validate Data -- Locate Validation Data -- Organize Data -- Sort Data by Columns and Rows -- Create an AutoFilter -- Remove Filters -- Use Advanced Filtering -- Setting Up Criteria and Extract Ranges -- Outline Data Automatically -- Use Outlines -- Outline Data by Manually Grouping -- Add Subtotals -- Chapter 9: Analyzing and Sharing Data -- Get the Results You Want -- Use Goal Seek -- Compare Alternatives Using Scenarios -- Use a One-Variable Columnar Data Table -- Use Multiple Variables to Provide a Result -- Explaining the Solver Example -- Save Solver Results and Settings -- Change Solver Settings -- Work with PivotTables -- Create a PivotTable -- Understanding PivotTable Terms -- Create the PivotTable Layout -- Use PivotTables -- Use Slicers -- Style a PivotTable -- Create a PivotTable Chart -- Work with Other Users -- Preparing to Share Workbooks…”
Libro electrónico -
2328Publicado 2024Tabla de Contenidos: “…-- A supermarket analogy -- The shift from ETL to ELT -- The difference between analytics engineers, data analysts, and data engineers -- Summary -- Chapter 2: The Modern Data Stack -- Understanding a Modern Data Stack -- Explaining three key differentiators versus legacy stacks -- Lowering technical barriers with a SQL-first approach -- Improving infrastructure efficiency with cloud-native systems -- Simplifying implementation and maintenance with managed and modular solutions -- Discussing the advantages and disadvantages of the MDS -- Summary -- Part 2: Building Data Pipelines -- Chapter 3: Data Ingestion -- Digging into the problem of moving data between two systems -- The source of all problems -- Understanding the eight essential steps of a data ingestion pipeline -- Trigger -- Connection -- State management -- Data extraction -- Transformations -- Validation and data quality -- Loading -- Archiving and retention -- Managing the quality and scalability of data ingestion pipelines - the three key topics -- Scalability and resilience -- Monitoring, logging, and alerting -- Governance -- Working with data ingestion - an example pipeline -- Summary -- Chapter 4: Data Warehousing -- Uncovering the evolution of data warehousing -- The problem with transactional databases -- The history of data warehouses -- Moving to the cloud -- Benefits of cloud versus on-premises data warehouses -- Cloud data warehouse users - no one-size fits all -- Building blocks of a cloud data warehouse -- Compute…”
Libro electrónico -
2329por Kumar, DeepakTabla de Contenidos: “…5.1 Background -- 5.2 Introduction -- 5.3 Energy Outlook for India -- 5.4 Power Demand and Resources in India -- 5.5 Energy and Environment -- 5.6 Sustainable Development Goals (SDGs) for Indian Electricity Sector -- 5.7 Results -- 5.8 Conclusions -- References -- Chapter 6 Solar Energy from the Urban Areas: A New Direction Towards Indian Power Sector -- 6.1 Introduction -- 6.2 Renewable Energy Chain in India -- 6.3 Development of Solar Photovoltaic and Solar Thermal Plants -- 6.4 Solar Photovoltaic Market in India -- 6.5 Need for Solar Energy -- 6.6 Government Initiatives -- 6.7 Challenges for Solar Thermal Systems -- 6.8 Benefits of Solar PV -- 6.9 Causes of Delay in Solar PV Implementation and Ways to Quicken the Rate of Installation -- 6.10 Future Trends of Solar PV -- 6.11 Conclusion -- References -- Other Works Consulted -- Chapter 7 Energy Management Strategies of a Microgrid: Review, Challenges, Opportunities, Future Scope -- 7.1 Introduction -- 7.2 Methodology -- 7.2.1 Research Studies Selection Criteria -- 7.2.2 Section of Literature -- 7.2.3 Testing Criteria -- 7.2.4 Extraction of Data -- 7.2.5 Findings -- 7.3 Preliminary -- 7.3.1 Fuzzy Logic-Based Management Strategies -- 7.3.2 AI-Based Management Strategies -- 7.3.3 Other Management Strategies -- 7.4 Challenges of Energy Management in Microgrids -- 7.5 Opportunities -- 7.6 Future Research Direction -- 7.7 Conclusion -- References -- Chapter 8 Urban Solid Waste Management for Energy Generation -- 8.1 Introduction -- 8.1.1 Background -- 8.1.2 Study Focus -- 8.2 Literature Review -- 8.3 Methodology -- 8.3.1 Formulating Research Background -- 8.3.2 Literature Review -- 8.3.3 Analysis -- 8.4 Case Study -- 8.4.1 Precedent Success -- 8.4.2 Precedent Failure -- 8.4.3 The Takeaway from Case Studies -- 8.5 Research Findings: Challenges of Waste-to-Energy Conversion…”
Publicado 2023
Libro electrónico -
2330Publicado 2021Tabla de Contenidos: “…5.3.3.2 Case Study 1: Free Spoken Digit (FSD) Recognition -- 5.3.3.3 Case Study 2: Handwritten Digit (MNIST) Recognition -- 5.3.3.4 Case Study 3: American Sign Language (ASL) Recognition -- 5.3.3.5 Implementation and Benchmark -- 5.4 Conclusion -- References -- Chapter 6 Clock Synchronization for Wide‐area Applications1 -- 6.1 Introduction -- 6.2 System Model and Problem Formulation -- 6.2.1 Natural Timestamping for Wireless IoT Devices -- 6.2.2 Clock Synchronization for Wearable IoT Devices -- 6.3 Natural Timestamps in Powerline Electromagnetic Radiation -- 6.3.1 Electrical Network Frequency Fluctuations and Powerline Electromagnetic Radiation -- 6.3.2 Electromagnetic Radiation‐based Natural Timestamping -- 6.3.2.1 Hardware -- 6.3.2.2 ENF Extraction -- 6.3.2.3 Natural Timestamp and Decoding -- 6.3.3 Implementation and Benchmark -- 6.3.3.1 Timestamping Parameter Settings -- 6.3.3.2 Z1 Implementation and Benchmark -- 6.3.4 Evaluation in Office and Residential Environments -- 6.3.4.1 Deployment and Settings -- 6.3.4.2 Evaluation Results -- 6.3.5 Evaluation in a Factory Environment -- 6.3.6 Applications -- 6.3.6.1 Time Recovery -- 6.3.6.2 Run‐time Clock Verification -- 6.3.6.3 Secure Clock Synchronization -- 6.4 Wearables Clock Synchronization Using Skin Electric Potentials -- 6.4.1 Motivation -- 6.4.2 Measurement Study -- 6.4.2.1 Measurement Setup -- 6.4.2.2 iSEP Sensing under Various Settings -- 6.4.3 TouchSync System Design -- 6.4.3.1 TouchSync Workflow -- 6.4.3.2 iSEP Signal Processing -- 6.4.3.3 NTP Assisted with Dirac Combs -- 6.4.4 TouchSync with Internal Periodic Signal -- 6.4.4.1 Extended Design -- 6.4.4.2 Numeric Experiments -- 6.4.4.3 Impact of Clock Skews -- 6.4.5 Implementation -- 6.4.6 Evaluation -- 6.4.6.1 Signal Strength and Wearing Position -- 6.4.6.2 Impact of High‐Power Appliances on TouchSync…”
Libro electrónico -
2331Building the hyperconnected society IoT research and innovation value chains, ecosystems and marketsPublicado 2015Tabla de Contenidos: “…5.9.4 Study Conclusions and EC Policy Recommendations -- Bibliography -- Chapter 6 - Securing the Internet of Things - Security and Privacy in a HyperconnectedWorld -- 6.1 Introduction -- 6.2 End-to-End Security and Privacy by Design -- 6.3 Physical IoT Security -- 6.3.1 Selected Low-Cost Attacks -- 6.3.2 Key Extraction Attacks and Countermeasures -- 6.4 On Device Security and Privacy -- 6.4.1 Mediated Device Access for Security and Privacy -- 6.4.2 Encryption -- 6.4.3 Integrity -- 6.4.4 Data Minimisation -- 6.5 Unobservable Communication -- 6.5.1 Resisting Network Traffic Analysis -- 6.6 Access Control Based on Policy Management -- 6.7 Security and Privacy in the IoT Cloud -- 6.7.1 Verifiable and Authenticity Preserving Data Processing -- 6.7.2 Structural Integrity and Certification of Virtualized Infrastructure -- 6.7.3 Privacy Preserving Service Usage and Data Handling -- 6.7.4 Confidentiality of (Un-)structured Data -- 6.7.5 Long Term Security and Everlasting Privacy -- 6.7.6 Conclusion -- 6.8 Outlook -- Acknowledgment -- Bibliography -- Chapter 7 - IoT Analytics: Collect, Process, Analyze, and Present Massive Amounts of Operational Data - Research and Innovation Challenges -- 7.1 Introduction -- 7.2 Deep Internet of Things Data Analytics -- 7.2.1 Introduction -- 7.2.2 Designing for Real World Problems -- 7.2.3 Real World Data -- 7.2.4 Data Interoperability -- 7.2.5 Deep Data Analytics Methods -- 7.2.6 Conclusions -- 7.3 Cloud-Based IoT Big Data Platform -- 7.3.1 Introduction -- 7.3.2 Big Data in the Context of IoT -- 7.3.3 Applications of IoT Big Data Analytics -- 7.3.4 Requirements of IoT Big Data Analytic Platform -- 7.3.4.1 Intelligent and dynamic -- 7.3.4.2 Distributed -- 7.3.4.3 Scalable and elastic -- 7.3.4.4 Real-time -- 7.3.4.5 Heterogeneous (unified) -- 7.3.4.6 Security and privacy -- 7.3.5 Cloud-Based IoT Analytic Platform…”
Libro electrónico -
2332por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Les politiques gouvernementales laissent les forces du marché déterminer le rythme d'extraction du pétrole et du gaz -- Le gouvernement transforme de plus en plus le patrimoine pétrolier et gazier en actifs financiers -- Graphique 18. …”
Publicado 1999
Libro electrónico -
2333Publicado 2022“…The book explores various practical aspects of these systems, including the power extraction control of renewable resources and size selection of short-term storage components. …”
Libro electrónico -
2334por Ballard, ChuckTabla de Contenidos: “…9.5.2 Database statistics -- 9.5.3 Schema extraction -- 9.5.4 Maintaining database integrity -- 9.5.5 Throttling utilities -- 9.5.6 Validating a backup -- 9.6 Other administrative operations -- 9.6.1 Configuring automatic maintenance -- 9.7 Monitoring tools and advisors -- 9.7.1 Health check tools -- 9.7.2 Memory Visualizer -- 9.7.3 Storage Manager -- 9.7.4 Event monitor -- 9.7.5 Snapshots -- 9.7.6 Activity Monitor -- 9.7.7 DB2 Performance Expert -- 9.7.8 The db2pd utility, an onstat equivalent -- 9.7.9 Diagnostic files -- 9.7.10 Error message and command help -- Chapter 10. …”
Publicado 2005
Libro electrónico -
2335Publicado 2017Tabla de Contenidos: “…8.3.1.1.7 Bahadori and Vuthaluru (2009) -- 8.3.1.2 Equation of States -- 8.3.1.2.1 The Cubic-Plus-Association Equation of State -- 8.3.1.2.2 Peng-Robinson Equation of State -- 8.3.1.2.3 Perturbed Chain-Statistical Associating Fluid Theory -- 8.3.1.2.3.1 Mathematical Formulation of PC-SAFT -- 8.3.1.2.3.1.1 Hard-chain Reference Fluid -- 8.3.1.2.3.1.2 Dispersion Interactions -- 8.3.1.2.3.1.3 Association Interactions -- 8.3.1.3 Iterative Method (K-value Method) -- 8.4 HYDRATE DEPOSITION -- 8.5 HYDRATE INHIBITIONS -- 8.5.1 Calculating the Amount of Hydrate Inhibitors -- 8.5.1.1 The Hammerschmidt Method -- 8.5.1.2 The Nielsen-Bucklin Method -- 8.5.1.3 McCain Method -- 8.5.1.4 Østergaard et al. (2005) -- 8.5.2 Calculating Inhibitor Loss in Hydrocarbon Phase -- 8.5.3 Inhibitor Injection Rates -- Problems -- REFERENCES -- Nine - Characterization of Shale Gas -- 9.1 INTRODUCTION -- 9.2 SHALE GAS RESERVOIR CHARACTERISTICS -- 9.3 BASIC SCIENCE BEHIND CONFINEMENT -- 9.3.1 Impact of Confinement on Critical Properties -- 9.3.2 Diffusion Effect Due to Confinement -- 9.3.3 Capillary Pressure -- 9.3.4 Adsorption Phenomenon in Shale Reservoirs -- 9.4 EFFECT OF CONFINEMENT ON PHASE ENVELOPE -- Problems -- REFERENCES -- Ten - Characterization of Shale Oil -- 10.1 INTRODUCTION -- 10.2 TYPES OF FLUIDS IN SHALE RESERVOIRS AND GENESIS OF LIQUID IN SHALE PORES -- 10.3 SHALE PORE STRUCTURE AND HETEROGENEITY -- 10.4 SHALE OIL EXTRACTION -- 10.4.1 History -- 10.4.2 Processing Principles -- 10.4.3 Extraction Technologies -- 10.5 INCLUDING CONFINEMENT IN THERMODYNAMICS -- 10.5.1 Classical Thermodynamics -- 10.5.1.1 Equation of State -- 10.5.1.2 Condition of Equilibrium -- 10.5.1.3 Vapor-Liquid Equilibrium/Flash Computation -- 10.5.2 Modification of Flash to Incorporate Capillary Pressure in Tight Pores -- 10.5.3 Stability Test Using Gibbs Free Energy Approach…”
Libro electrónico -
2336Publicado 2021Tabla de Contenidos: “…Defining functions with multiple parameters -- Passing arguments by value and by pointer -- Returning values from functions -- Naming return values -- Working with variadic functions -- Using Anonymous Functions -- Declaring an anonymous function -- Implementing closure using anonymous functions -- Implementing the filter() function using closure -- Part 2 Working with Data Structures -- Chapter 6 Slicing and Dicing Using Arrays and Slices -- Arming Yourself to Use Arrays -- Declaring an array -- Initializing an array -- Working with multidimensional arrays -- Sleuthing Out the Secrets of Slices -- Creating an empty slice -- Creating and initializing a slice -- Appending to a slice -- Slicing and Ranging -- Extracting part of an array or slice -- Iterating through a slice -- Making copies of an array or slice -- Inserting an item into a slice -- Removing an item from a slice -- Chapter 7 Defining the Blueprints of Your Data Using Structs -- Defining Structs for a Collection of Items -- Creating a Go Struct -- Making a Copy of a Struct -- Defining Methods in Structs -- Comparing Structs -- Chapter 8 Establishing Relationships Using Maps -- Creating Maps in Go -- Initializing a map with a map literal -- Checking the existence of a key -- Deleting a key -- Getting the number of items in a map -- Iterating over a map -- Getting all the keys in a map -- Setting the iteration order in a map -- Sorting the items in a map by values -- Using Structs and Maps in Go -- Creating a map of structs -- Sorting a map of structs -- Chapter 9 Encoding and Decoding Data Using JSON -- Getting Acquainted with JSON -- Object -- String -- Boolean -- Number -- Object -- Array -- null -- Decoding JSON -- Decoding JSON to a struct -- Decoding JSON to arrays -- Decoding embedded objects -- Mapping custom attribute names -- Mapping unstructured data -- Encoding JSON…”
Libro electrónico -
2337Publicado 2021Tabla de Contenidos: “…Fixed Window Aggregation over an Event Time -- Sliding Window Aggregation over Event Time -- Aggregation State -- Watermarking: Limit State and Handle Late Data -- Arbitrary Stateful Processing -- Arbitrary Stateful Processing with Structured Streaming -- Handling State Timeouts -- Arbitrary State Processing in Action -- Extracting Patterns with mapGroupsWithState -- User Sessionization with flatMapGroupsWithState -- Handling Duplicate Data -- Fault Tolerance -- Streaming Application Code Change -- Spark Runtime Change -- Streaming Query Metrics and Monitoring -- Streaming Query Metrics -- Monitoring Streaming Queries via Callback -- Monitoring Streaming Queries via Visualization UI -- Streaming Query Summary Information -- Streaming Query Detailed Statistics Information -- Troubleshooting Streaming Query -- Summary -- Chapter 8: Machine Learning with Spark -- Machine Learning Overview -- Machine Learning Terminologies -- Machine Learning Types -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Machine Learning Development Process -- Spark Machine Learning Library -- Machine Learning Pipelines -- Transformers -- Estimators -- Pipeline -- Pipeline Persistence: Saving and Loading -- Model Tuning -- Speeding Up Model Tuning -- Model Evaluators -- Machine Learning Tasks in Action -- Classification -- Model Hyperparameters -- Example -- Regression -- Model Hyperparameters -- Example -- Recommendation -- Model Hyperparameters -- Example -- Deep Learning Pipeline -- Summary -- Chapter 9: Managing the Machine Learning Life Cycle -- The Rise of MLOps -- MLOps Overview -- MLflow Overview -- MLflow Components -- MLflow in Action -- MLflow Tracking -- MLflow Projects -- MLflow Models -- MLflow Model Registry -- Model Deployment and Prediction -- Summary -- Index…”
Libro electrónico -
2338Publicado 2017Tabla de Contenidos: “…Examples of SQL injection attacks -- Ways to defend against SQL injection attacks -- Attack vectors for web applications -- Bypassing authentication -- Bypass blocked and filtered websites -- Finding vulnerabilities from a targeted sites -- Extracting data with SQLmap -- Hunting for web app vulnerabilities with Open Web Application Security Project (OWASP) ZAP -- Summary -- Chapter 10: Scapy -- Scapy -- Creating our first packet -- Sending and receiving -- Layering -- Viewing the packet -- Handling files -- The TCP three way handshake -- SYN scan -- A DNS query -- Malformed packets -- Ping of death -- Teardrop attack (aka Nestea) -- ARP cache poisoning -- ARP poisoning commands -- ACK scan -- TCP port scanning -- VLAN hopping -- Wireless sniffing -- OS fingerprinting ISN -- Sniffing -- Passive OS detection -- Summary -- Chapter 11: Web Application Exploits -- Web application exploits -- What tools are used for web application penetration testing? …”
Libro electrónico -
2339Publicado 2018Tabla de Contenidos: “…Push configuration using telnetlib -- Handling IP addresses and networks with netaddr -- Netaddr installation -- Exploring netaddr methods -- Sample use cases -- Backup device configuration -- Building the python script -- Creating your own access terminal -- Reading data from an Excel sheet -- More use cases -- Summary -- Chapter 5: Extracting Useful Data from Network Devices -- Technical requirements -- Understanding parsers -- Introduction to regular expressions -- Creating a regular expression in Python -- Configuration auditing using CiscoConfParse -- CiscoConfParse library -- Supported vendors -- CiscoConfParse installation -- Working with CiscoConfParse -- Visualizing returned data with matplotLib -- Matplotlib installation -- Hands-on with matplotlib -- Visualizing SNMP using matplotlib -- Summary -- Chapter 6: Configuration Generator with Python and Jinja2 -- What is YAML? …”
Libro electrónico -
2340Publicado 2019Tabla de Contenidos: “…-- Pandas Series -- Creating a Series Using a Specified Index -- Accessing Elements in a Series -- Specifying a Datetime Range as the Index of a Series -- Date Ranges -- Pandas DataFrame -- Creating a DataFrame -- Specifying the Index in a DataFrame -- Generating Descriptive Statistics on the DataFrame -- Extracting from DataFrames -- Selecting the First and Last Five Rows -- Selecting a Specific Column in a DataFrame -- Slicing Based on Row Number -- Slicing Based on Row and Column Numbers -- Slicing Based on Labels -- Selecting a Single Cell in a DataFrame -- Selecting Based on Cell Value -- Transforming DataFrames…”
Libro electrónico