Mostrando 2,321 - 2,340 Resultados de 4,853 Para Buscar '"Extraction"', tiempo de consulta: 0.13s Limitar resultados
  1. 2321
    Publicado 2018
    Tabla de Contenidos: “…Controlling memory size -- Heterogeneous lists -- From lists to multidimensional arrays -- Resizing arrays -- Arrays derived from NumPy functions -- Getting an array directly from a file -- Extracting data from pandas -- NumPy fast operation and computations -- Matrix operations -- Slicing and indexing with NumPy arrays -- Stacking NumPy arrays -- Working with sparse arrays -- Summary -- Chapter 3: The Data Pipeline -- Introducing EDA -- Building new features -- Dimensionality reduction -- The covariance matrix -- Principal component analysis -- PCA for big data - RandomizedPCA -- Latent factor analysis -- Linear discriminant analysis -- Latent semantical analysis -- Independent component analysis -- Kernel PCA -- T-SNE -- Restricted Boltzmann Machine -- The detection and treatment of outliers -- Univariate outlier detection -- EllipticEnvelope -- OneClassSVM -- Validation metrics -- Multilabel classification -- Binary classification -- Regression -- Testing and validating -- Cross-validation -- Using cross-validation iterators -- Sampling and bootstrapping -- Hyperparameter optimization -- Building custom scoring functions -- Reducing the grid search runtime -- Feature selection -- Selection based on feature variance -- Univariate selection -- Recursive elimination -- Stability and L1-based selection -- Wrapping everything in a pipeline -- Combining features together and chaining transformations -- Building custom transformation functions -- Summary -- Chapter 4: Machine Learning -- Preparing tools and datasets -- Linear and logistic regression -- Naive Bayes -- K-Nearest Neighbors -- Nonlinear algorithms -- SVM for classification -- SVM for regression -- Tuning SVM -- Ensemble strategies -- Pasting by random samples -- Bagging with weak classifiers -- Random Subspaces and Random Patches -- Random Forests and Extra-Trees…”
    Libro electrónico
  2. 2322
    Publicado 2017
    Tabla de Contenidos: “…. -- Text mining with term extraction and term lookup transformations -- Getting ready -- How to do it... -- Chapter 9: On-Premises and Azure Big Data Integration -- Introduction -- Azure Blob storage data management -- Getting ready -- How to do it... -- Installing a Hortonworks cluster -- Getting ready -- How to do it... -- Copying data to an on-premises cluster -- Getting ready -- How to do it... -- Using Hive - creating a database -- Getting ready…”
    Libro electrónico
  3. 2323
    Publicado 2017
    Tabla de Contenidos: “…-- Testing - pure versus impure -- Testing pure functions -- Testing purified functions -- Testing impure functions -- Questions -- Summary -- Chapter 5: Programming Declaratively - A Better Style -- Transformations -- Reducing an array to a value -- Summing an array -- Calculating an average -- Calculating several values at once -- Folding left and right -- Applying an operation - map -- Extracting data from objects -- Parsing numbers tacitly -- Working with ranges -- Emulating map() with reduce() -- More general looping -- Logical higher-order functions -- Filtering an array -- A reduce() example -- Emulating filter() with reduce() -- Searching an array -- A special search case -- Emulating find() and findIndex() with reduce() -- Higher level predicates - some, every -- Checking negatives - none -- Questions -- Summary -- Chapter 6: Producing Functions - Higher-Order Functions -- Wrapping functions -- Logging -- Logging in a functional way -- Taking exceptions into account -- Working in a more pure way -- Timing -- Memoizing -- Simple memoization -- More complex memoization -- Memoization testing -- Altering functions -- Doing things once, revisited -- Logically negating a function -- Inverting results -- Arity changing -- Other higher-order functions -- Turning operations into functions -- Implementing operations -- A handier implementation -- Turning functions into promises…”
    Libro electrónico
  4. 2324
    por Ballew, Joli
    Publicado 2013
    Tabla de Contenidos: “…Contents note continued: Adding files to a folder -- Sharing a folder -- Managing SkyDrive storage -- Creating a folder and adding data to it from the SkyDrive app -- Using the File Explorer ribbon -- Navigating File Explorer -- Locating files with File Explorer -- Changing views in File Explorer -- Creating folders -- Renaming files and folders -- Moving and copying files -- Creating and extracting compressed files -- Sharing content -- Using File History -- Backing up data manually -- Deleting files and folders -- Working with the Recycle Bin -- Switching from a right-handed to left-handed mouse -- Adjusting double-click speed and indicator motion -- Adjusting keyboard settings -- Enabling High Contrast -- Letting Windows suggest Ease Of Access settings -- Using Magnifier -- Using Narrator -- Working with speech recognition -- Creating a recovery drive -- Using ReadyBoost -- Configuring Windows Update -- Exploring the Action Center -- Running Disk Cleanup --…”
    Libro electrónico
  5. 2325
    por Jacob, Bart
    Publicado 2004
    Tabla de Contenidos: “…7.2.2 META-INF sub-directory -- 7.2.3 FILES sub-directory -- 7.3 Types of package bundles -- 7.3.1 Fixed-size removable media -- 7.3.2 Single zip file -- 7.3.3 Self-extractable single executable -- 7.3.4 Network download -- 7.3.5 Combination of formats -- 7.4 Summary -- Chapter 8. …”
    Libro electrónico
  6. 2326
    Publicado 2012
    Tabla de Contenidos: “…Intro -- Effective MySQL -- About the Author -- About the Technical Editors -- Contents -- Acknowledgments -- Introduction -- Conventions -- About MySQL -- Code Examples -- References -- Chapter 1: The Five Minute DBA -- Approaching a MySQL Backup -- Determining Your Database Size -- Choosing a Locking Strategy -- Execution Time -- Combining Information -- Performing a MySQL Backup -- Running mysqldump -- Securing Your Backup -- Benefits with mysqldump -- More Information -- Other Options -- Conclusion -- Chapter 2: Understanding Backup Options -- Terminology -- Choosing a Backup Strategy -- Database Availability -- Storage Engines -- Locking Strategies -- Lock Tables -- Flush Tables -- MySQL Topology -- Static Backup Options -- Filesystem Backup -- Disadvantages -- Advantages -- SQL Dump -- MySQL Replication Specific Options -- Additional Options -- Benefits -- Recovery Considerations -- Recommended Practices for Database Objects -- Using Compression -- Leveraging Network Devices -- Disadvantages -- Table Extract -- Filesystem Snapshot -- Using mylvmbackup -- Designing Appropriate LVM Volumes -- Other Considerations -- InnoDB Hot Backup -- MySQL Enterprise Backup (MEB) -- XtraBackup -- Options Not Discussed -- Point in Time Requirements -- Binary Logs -- Binary Log Position -- Binary Log Backup Options -- File Copy -- Replication -- DRBD -- Hardware Considerations -- Data Source Consistency -- Backup Security -- Conclusion -- Chapter 3: Understanding Business Requirements for Disaster Recovery -- Defining Requirements -- Determining Responsibilities -- Terminology -- Technical Resource Responsibilities -- Decision Maker Responsibilities -- Identifying Dependencies -- Case Study -- The MySQL Topology -- Your Backup and Recovery Strategy -- A Real Life Disaster -- Technical Outcomes -- The Decision Process -- Essential External Communication…”
    Libro electrónico
  7. 2327
    Publicado 2013
    Tabla de Contenidos: “…Change Column and Bar Shapes -- Use Charts -- Work with Charts -- Add Charts Elsewhere -- Analyze Charts -- Print a Chart -- Create Sparklines -- Work with Sparklines -- Chapter 7: Working with Illustrations -- Understanding Illustrations -- Add Illustrations -- Add Shapes -- Work with Curves -- Add Text -- Use SmartArt -- Changing SmartArt -- Insert Pictures -- Using Pictures -- Take Screenshots -- Work with Illustrations -- Select, View, and Delete Illustrations -- Use Handles and Borders to Change Illustrations -- Crop Pictures -- Position Illustrations -- Combine Illustrations by Grouping -- Format Illustrations and Text -- Use Styles -- Apply Styling Elements to Pictures -- Change a Picture's Attributes -- Change a Shape's Fill -- Add WordArt Styling to Text -- Make Detailed Formatting Changes -- Chapter 8: Managing Data -- Understanding Excel Tables -- Build Tables -- Create a Table -- Change Rows and Columns in a Table -- Add a Total Row -- Apply Styles to a Table -- Work with Tables -- Validate Data -- Locate Validation Data -- Organize Data -- Sort Data by Columns and Rows -- Create an AutoFilter -- Remove Filters -- Use Advanced Filtering -- Setting Up Criteria and Extract Ranges -- Outline Data Automatically -- Use Outlines -- Outline Data by Manually Grouping -- Add Subtotals -- Chapter 9: Analyzing and Sharing Data -- Get the Results You Want -- Use Goal Seek -- Compare Alternatives Using Scenarios -- Use a One-Variable Columnar Data Table -- Use Multiple Variables to Provide a Result -- Explaining the Solver Example -- Save Solver Results and Settings -- Change Solver Settings -- Work with PivotTables -- Create a PivotTable -- Understanding PivotTable Terms -- Create the PivotTable Layout -- Use PivotTables -- Use Slicers -- Style a PivotTable -- Create a PivotTable Chart -- Work with Other Users -- Preparing to Share Workbooks…”
    Libro electrónico
  8. 2328
    Publicado 2024
    Tabla de Contenidos: “…-- A supermarket analogy -- The shift from ETL to ELT -- The difference between analytics engineers, data analysts, and data engineers -- Summary -- Chapter 2: The Modern Data Stack -- Understanding a Modern Data Stack -- Explaining three key differentiators versus legacy stacks -- Lowering technical barriers with a SQL-first approach -- Improving infrastructure efficiency with cloud-native systems -- Simplifying implementation and maintenance with managed and modular solutions -- Discussing the advantages and disadvantages of the MDS -- Summary -- Part 2: Building Data Pipelines -- Chapter 3: Data Ingestion -- Digging into the problem of moving data between two systems -- The source of all problems -- Understanding the eight essential steps of a data ingestion pipeline -- Trigger -- Connection -- State management -- Data extraction -- Transformations -- Validation and data quality -- Loading -- Archiving and retention -- Managing the quality and scalability of data ingestion pipelines - the three key topics -- Scalability and resilience -- Monitoring, logging, and alerting -- Governance -- Working with data ingestion - an example pipeline -- Summary -- Chapter 4: Data Warehousing -- Uncovering the evolution of data warehousing -- The problem with transactional databases -- The history of data warehouses -- Moving to the cloud -- Benefits of cloud versus on-premises data warehouses -- Cloud data warehouse users - no one-size fits all -- Building blocks of a cloud data warehouse -- Compute…”
    Libro electrónico
  9. 2329
    por Kumar, Deepak
    Publicado 2023
    Tabla de Contenidos: “…5.1 Background -- 5.2 Introduction -- 5.3 Energy Outlook for India -- 5.4 Power Demand and Resources in India -- 5.5 Energy and Environment -- 5.6 Sustainable Development Goals (SDGs) for Indian Electricity Sector -- 5.7 Results -- 5.8 Conclusions -- References -- Chapter 6 Solar Energy from the Urban Areas: A New Direction Towards Indian Power Sector -- 6.1 Introduction -- 6.2 Renewable Energy Chain in India -- 6.3 Development of Solar Photovoltaic and Solar Thermal Plants -- 6.4 Solar Photovoltaic Market in India -- 6.5 Need for Solar Energy -- 6.6 Government Initiatives -- 6.7 Challenges for Solar Thermal Systems -- 6.8 Benefits of Solar PV -- 6.9 Causes of Delay in Solar PV Implementation and Ways to Quicken the Rate of Installation -- 6.10 Future Trends of Solar PV -- 6.11 Conclusion -- References -- Other Works Consulted -- Chapter 7 Energy Management Strategies of a Microgrid: Review, Challenges, Opportunities, Future Scope -- 7.1 Introduction -- 7.2 Methodology -- 7.2.1 Research Studies Selection Criteria -- 7.2.2 Section of Literature -- 7.2.3 Testing Criteria -- 7.2.4 Extraction of Data -- 7.2.5 Findings -- 7.3 Preliminary -- 7.3.1 Fuzzy Logic-Based Management Strategies -- 7.3.2 AI-Based Management Strategies -- 7.3.3 Other Management Strategies -- 7.4 Challenges of Energy Management in Microgrids -- 7.5 Opportunities -- 7.6 Future Research Direction -- 7.7 Conclusion -- References -- Chapter 8 Urban Solid Waste Management for Energy Generation -- 8.1 Introduction -- 8.1.1 Background -- 8.1.2 Study Focus -- 8.2 Literature Review -- 8.3 Methodology -- 8.3.1 Formulating Research Background -- 8.3.2 Literature Review -- 8.3.3 Analysis -- 8.4 Case Study -- 8.4.1 Precedent Success -- 8.4.2 Precedent Failure -- 8.4.3 The Takeaway from Case Studies -- 8.5 Research Findings: Challenges of Waste-to-Energy Conversion…”
    Libro electrónico
  10. 2330
    Publicado 2021
    Tabla de Contenidos: “…5.3.3.2 Case Study 1: Free Spoken Digit (FSD) Recognition -- 5.3.3.3 Case Study 2: Handwritten Digit (MNIST) Recognition -- 5.3.3.4 Case Study 3: American Sign Language (ASL) Recognition -- 5.3.3.5 Implementation and Benchmark -- 5.4 Conclusion -- References -- Chapter 6 Clock Synchronization for Wide‐area Applications1 -- 6.1 Introduction -- 6.2 System Model and Problem Formulation -- 6.2.1 Natural Timestamping for Wireless IoT Devices -- 6.2.2 Clock Synchronization for Wearable IoT Devices -- 6.3 Natural Timestamps in Powerline Electromagnetic Radiation -- 6.3.1 Electrical Network Frequency Fluctuations and Powerline Electromagnetic Radiation -- 6.3.2 Electromagnetic Radiation‐based Natural Timestamping -- 6.3.2.1 Hardware -- 6.3.2.2 ENF Extraction -- 6.3.2.3 Natural Timestamp and Decoding -- 6.3.3 Implementation and Benchmark -- 6.3.3.1 Timestamping Parameter Settings -- 6.3.3.2 Z1 Implementation and Benchmark -- 6.3.4 Evaluation in Office and Residential Environments -- 6.3.4.1 Deployment and Settings -- 6.3.4.2 Evaluation Results -- 6.3.5 Evaluation in a Factory Environment -- 6.3.6 Applications -- 6.3.6.1 Time Recovery -- 6.3.6.2 Run‐time Clock Verification -- 6.3.6.3 Secure Clock Synchronization -- 6.4 Wearables Clock Synchronization Using Skin Electric Potentials -- 6.4.1 Motivation -- 6.4.2 Measurement Study -- 6.4.2.1 Measurement Setup -- 6.4.2.2 iSEP Sensing under Various Settings -- 6.4.3 TouchSync System Design -- 6.4.3.1 TouchSync Workflow -- 6.4.3.2 iSEP Signal Processing -- 6.4.3.3 NTP Assisted with Dirac Combs -- 6.4.4 TouchSync with Internal Periodic Signal -- 6.4.4.1 Extended Design -- 6.4.4.2 Numeric Experiments -- 6.4.4.3 Impact of Clock Skews -- 6.4.5 Implementation -- 6.4.6 Evaluation -- 6.4.6.1 Signal Strength and Wearing Position -- 6.4.6.2 Impact of High‐Power Appliances on TouchSync…”
    Libro electrónico
  11. 2331
    Publicado 2015
    Tabla de Contenidos: “…5.9.4 Study Conclusions and EC Policy Recommendations -- Bibliography -- Chapter 6 - Securing the Internet of Things - Security and Privacy in a HyperconnectedWorld -- 6.1 Introduction -- 6.2 End-to-End Security and Privacy by Design -- 6.3 Physical IoT Security -- 6.3.1 Selected Low-Cost Attacks -- 6.3.2 Key Extraction Attacks and Countermeasures -- 6.4 On Device Security and Privacy -- 6.4.1 Mediated Device Access for Security and Privacy -- 6.4.2 Encryption -- 6.4.3 Integrity -- 6.4.4 Data Minimisation -- 6.5 Unobservable Communication -- 6.5.1 Resisting Network Traffic Analysis -- 6.6 Access Control Based on Policy Management -- 6.7 Security and Privacy in the IoT Cloud -- 6.7.1 Verifiable and Authenticity Preserving Data Processing -- 6.7.2 Structural Integrity and Certification of Virtualized Infrastructure -- 6.7.3 Privacy Preserving Service Usage and Data Handling -- 6.7.4 Confidentiality of (Un-)structured Data -- 6.7.5 Long Term Security and Everlasting Privacy -- 6.7.6 Conclusion -- 6.8 Outlook -- Acknowledgment -- Bibliography -- Chapter 7 - IoT Analytics: Collect, Process, Analyze, and Present Massive Amounts of Operational Data - Research and Innovation Challenges -- 7.1 Introduction -- 7.2 Deep Internet of Things Data Analytics -- 7.2.1 Introduction -- 7.2.2 Designing for Real World Problems -- 7.2.3 Real World Data -- 7.2.4 Data Interoperability -- 7.2.5 Deep Data Analytics Methods -- 7.2.6 Conclusions -- 7.3 Cloud-Based IoT Big Data Platform -- 7.3.1 Introduction -- 7.3.2 Big Data in the Context of IoT -- 7.3.3 Applications of IoT Big Data Analytics -- 7.3.4 Requirements of IoT Big Data Analytic Platform -- 7.3.4.1 Intelligent and dynamic -- 7.3.4.2 Distributed -- 7.3.4.3 Scalable and elastic -- 7.3.4.4 Real-time -- 7.3.4.5 Heterogeneous (unified) -- 7.3.4.6 Security and privacy -- 7.3.5 Cloud-Based IoT Analytic Platform…”
    Libro electrónico
  12. 2332
    Tabla de Contenidos: “…Les politiques gouvernementales laissent les forces du marché déterminer le rythme d'extraction du pétrole et du gaz -- Le gouvernement transforme de plus en plus le patrimoine pétrolier et gazier en actifs financiers -- Graphique 18. …”
    Libro electrónico
  13. 2333
    Publicado 2022
    “…The book explores various practical aspects of these systems, including the power extraction control of renewable resources and size selection of short-term storage components. …”
    Libro electrónico
  14. 2334
    por Ballard, Chuck
    Publicado 2005
    Tabla de Contenidos: “…9.5.2 Database statistics -- 9.5.3 Schema extraction -- 9.5.4 Maintaining database integrity -- 9.5.5 Throttling utilities -- 9.5.6 Validating a backup -- 9.6 Other administrative operations -- 9.6.1 Configuring automatic maintenance -- 9.7 Monitoring tools and advisors -- 9.7.1 Health check tools -- 9.7.2 Memory Visualizer -- 9.7.3 Storage Manager -- 9.7.4 Event monitor -- 9.7.5 Snapshots -- 9.7.6 Activity Monitor -- 9.7.7 DB2 Performance Expert -- 9.7.8 The db2pd utility, an onstat equivalent -- 9.7.9 Diagnostic files -- 9.7.10 Error message and command help -- Chapter 10. …”
    Libro electrónico
  15. 2335
    Publicado 2017
    Tabla de Contenidos: “…8.3.1.1.7 Bahadori and Vuthaluru (2009) -- 8.3.1.2 Equation of States -- 8.3.1.2.1 The Cubic-Plus-Association Equation of State -- 8.3.1.2.2 Peng-Robinson Equation of State -- 8.3.1.2.3 Perturbed Chain-Statistical Associating Fluid Theory -- 8.3.1.2.3.1 Mathematical Formulation of PC-SAFT -- 8.3.1.2.3.1.1 Hard-chain Reference Fluid -- 8.3.1.2.3.1.2 Dispersion Interactions -- 8.3.1.2.3.1.3 Association Interactions -- 8.3.1.3 Iterative Method (K-value Method) -- 8.4 HYDRATE DEPOSITION -- 8.5 HYDRATE INHIBITIONS -- 8.5.1 Calculating the Amount of Hydrate Inhibitors -- 8.5.1.1 The Hammerschmidt Method -- 8.5.1.2 The Nielsen-Bucklin Method -- 8.5.1.3 McCain Method -- 8.5.1.4 Østergaard et al. (2005) -- 8.5.2 Calculating Inhibitor Loss in Hydrocarbon Phase -- 8.5.3 Inhibitor Injection Rates -- Problems -- REFERENCES -- Nine - Characterization of Shale Gas -- 9.1 INTRODUCTION -- 9.2 SHALE GAS RESERVOIR CHARACTERISTICS -- 9.3 BASIC SCIENCE BEHIND CONFINEMENT -- 9.3.1 Impact of Confinement on Critical Properties -- 9.3.2 Diffusion Effect Due to Confinement -- 9.3.3 Capillary Pressure -- 9.3.4 Adsorption Phenomenon in Shale Reservoirs -- 9.4 EFFECT OF CONFINEMENT ON PHASE ENVELOPE -- Problems -- REFERENCES -- Ten - Characterization of Shale Oil -- 10.1 INTRODUCTION -- 10.2 TYPES OF FLUIDS IN SHALE RESERVOIRS AND GENESIS OF LIQUID IN SHALE PORES -- 10.3 SHALE PORE STRUCTURE AND HETEROGENEITY -- 10.4 SHALE OIL EXTRACTION -- 10.4.1 History -- 10.4.2 Processing Principles -- 10.4.3 Extraction Technologies -- 10.5 INCLUDING CONFINEMENT IN THERMODYNAMICS -- 10.5.1 Classical Thermodynamics -- 10.5.1.1 Equation of State -- 10.5.1.2 Condition of Equilibrium -- 10.5.1.3 Vapor-Liquid Equilibrium/Flash Computation -- 10.5.2 Modification of Flash to Incorporate Capillary Pressure in Tight Pores -- 10.5.3 Stability Test Using Gibbs Free Energy Approach…”
    Libro electrónico
  16. 2336
    Publicado 2021
    Tabla de Contenidos: “…Defining functions with multiple parameters -- Passing arguments by value and by pointer -- Returning values from functions -- Naming return values -- Working with variadic functions -- Using Anonymous Functions -- Declaring an anonymous function -- Implementing closure using anonymous functions -- Implementing the filter() function using closure -- Part 2 Working with Data Structures -- Chapter 6 Slicing and Dicing Using Arrays and Slices -- Arming Yourself to Use Arrays -- Declaring an array -- Initializing an array -- Working with multidimensional arrays -- Sleuthing Out the Secrets of Slices -- Creating an empty slice -- Creating and initializing a slice -- Appending to a slice -- Slicing and Ranging -- Extracting part of an array or slice -- Iterating through a slice -- Making copies of an array or slice -- Inserting an item into a slice -- Removing an item from a slice -- Chapter 7 Defining the Blueprints of Your Data Using Structs -- Defining Structs for a Collection of Items -- Creating a Go Struct -- Making a Copy of a Struct -- Defining Methods in Structs -- Comparing Structs -- Chapter 8 Establishing Relationships Using Maps -- Creating Maps in Go -- Initializing a map with a map literal -- Checking the existence of a key -- Deleting a key -- Getting the number of items in a map -- Iterating over a map -- Getting all the keys in a map -- Setting the iteration order in a map -- Sorting the items in a map by values -- Using Structs and Maps in Go -- Creating a map of structs -- Sorting a map of structs -- Chapter 9 Encoding and Decoding Data Using JSON -- Getting Acquainted with JSON -- Object -- String -- Boolean -- Number -- Object -- Array -- null -- Decoding JSON -- Decoding JSON to a struct -- Decoding JSON to arrays -- Decoding embedded objects -- Mapping custom attribute names -- Mapping unstructured data -- Encoding JSON…”
    Libro electrónico
  17. 2337
    Publicado 2021
    Tabla de Contenidos: “…Fixed Window Aggregation over an Event Time -- Sliding Window Aggregation over Event Time -- Aggregation State -- Watermarking: Limit State and Handle Late Data -- Arbitrary Stateful Processing -- Arbitrary Stateful Processing with Structured Streaming -- Handling State Timeouts -- Arbitrary State Processing in Action -- Extracting Patterns with mapGroupsWithState -- User Sessionization with flatMapGroupsWithState -- Handling Duplicate Data -- Fault Tolerance -- Streaming Application Code Change -- Spark Runtime Change -- Streaming Query Metrics and Monitoring -- Streaming Query Metrics -- Monitoring Streaming Queries via Callback -- Monitoring Streaming Queries via Visualization UI -- Streaming Query Summary Information -- Streaming Query Detailed Statistics Information -- Troubleshooting Streaming Query -- Summary -- Chapter 8: Machine Learning with Spark -- Machine Learning Overview -- Machine Learning Terminologies -- Machine Learning Types -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Machine Learning Development Process -- Spark Machine Learning Library -- Machine Learning Pipelines -- Transformers -- Estimators -- Pipeline -- Pipeline Persistence: Saving and Loading -- Model Tuning -- Speeding Up Model Tuning -- Model Evaluators -- Machine Learning Tasks in Action -- Classification -- Model Hyperparameters -- Example -- Regression -- Model Hyperparameters -- Example -- Recommendation -- Model Hyperparameters -- Example -- Deep Learning Pipeline -- Summary -- Chapter 9: Managing the Machine Learning Life Cycle -- The Rise of MLOps -- MLOps Overview -- MLflow Overview -- MLflow Components -- MLflow in Action -- MLflow Tracking -- MLflow Projects -- MLflow Models -- MLflow Model Registry -- Model Deployment and Prediction -- Summary -- Index…”
    Libro electrónico
  18. 2338
    Publicado 2017
    Tabla de Contenidos: “…Examples of SQL injection attacks -- Ways to defend against SQL injection attacks -- Attack vectors for web applications -- Bypassing authentication -- Bypass blocked and filtered websites -- Finding vulnerabilities from a targeted sites -- Extracting data with SQLmap -- Hunting for web app vulnerabilities with Open Web Application Security Project (OWASP) ZAP -- Summary -- Chapter 10: Scapy -- Scapy -- Creating our first packet -- Sending and receiving -- Layering -- Viewing the packet -- Handling files -- The TCP three way handshake -- SYN scan -- A DNS query -- Malformed packets -- Ping of death -- Teardrop attack (aka Nestea) -- ARP cache poisoning -- ARP poisoning commands -- ACK scan -- TCP port scanning -- VLAN hopping -- Wireless sniffing -- OS fingerprinting ISN -- Sniffing -- Passive OS detection -- Summary -- Chapter 11: Web Application Exploits -- Web application exploits -- What tools are used for web application penetration testing? …”
    Libro electrónico
  19. 2339
    Publicado 2018
    Tabla de Contenidos: “…Push configuration using telnetlib -- Handling IP addresses and networks with netaddr -- Netaddr installation -- Exploring netaddr methods -- Sample use cases -- Backup device configuration -- Building the python script -- Creating your own access terminal -- Reading data from an Excel sheet -- More use cases -- Summary -- Chapter 5: Extracting Useful Data from Network Devices -- Technical requirements -- Understanding parsers -- Introduction to regular expressions -- Creating a regular expression in Python -- Configuration auditing using CiscoConfParse -- CiscoConfParse library -- Supported vendors -- CiscoConfParse installation -- Working with CiscoConfParse -- Visualizing returned data with matplotLib -- Matplotlib installation -- Hands-on with matplotlib -- Visualizing SNMP using matplotlib -- Summary -- Chapter 6: Configuration Generator with Python and Jinja2 -- What is YAML? …”
    Libro electrónico
  20. 2340
    Publicado 2019
    Tabla de Contenidos: “…-- Pandas Series -- Creating a Series Using a Specified Index -- Accessing Elements in a Series -- Specifying a Datetime Range as the Index of a Series -- Date Ranges -- Pandas DataFrame -- Creating a DataFrame -- Specifying the Index in a DataFrame -- Generating Descriptive Statistics on the DataFrame -- Extracting from DataFrames -- Selecting the First and Last Five Rows -- Selecting a Specific Column in a DataFrame -- Slicing Based on Row Number -- Slicing Based on Row and Column Numbers -- Slicing Based on Labels -- Selecting a Single Cell in a DataFrame -- Selecting Based on Cell Value -- Transforming DataFrames…”
    Libro electrónico