Mostrando 941 - 960 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.11s Limitar resultados
  1. 941
    por Mata, Juan
    Publicado 1995
    Libro
  2. 942
    Publicado 2017
    Tabla de Contenidos: “…-- Retaining a Relationship with Your Employer Inretirement: An Innovative and Caring Plan Sponsor -- Mutual Benefits: Retaining Retiree Assets May Help Both Retirees and Plan Sponsors -- Turning DC Assets into a Lifetime Paycheck: Evaluating the DC Investment Lineup for Retiree Readiness -- Evaluating Portfolio Longevity -- Turning Defined Contribution Assets into a Lifetime Income Stream: How to Evaluate Investment Choices for Retirees -- Guarding Retiree Assets against a Sudden Market Downturn: Sequencing Risk -- Ways to Manage Market and Longevity Risk . . . without Adding In-Plan Insurance Products -- Living beyond 100: Planning for Longevity -- Managing Longevity Risk: Considerations for Buying an Annuity -- Immediate and Deferred Annuities: Why Out-of-Plan Makes Sense -- In Closing -- Questions for Plan Fiduciaries -- Notes -- Chapter 11 A Global View: The Best Ideas from around the Globe for Improving Plan Design -- DC Plans: Becoming the Dominant Global Model -- Retirement Plan Coverage and Participation -- Investment Default and Growth of Target-Date Strategies -- Retirement Income: The Global Search for Solutions -- Defined Ambition in the Netherlands -- New Solutions in Australia and Beyond: Tontines and Group Self-Annuitization -- "Getting DC Right": Lessons Learned in Chapters 1 through 10 -- Chapter 1: DC Plans Today -- Chapter 2: Aligning DC Investment Design to Meet the PRICE of Retirement -- Chapter 3: Plan Investment Structure -- Chapter 4: Target Date Design and Approaches -- Chapter 5: Capital Preservation Strategies -- Chapter 6: Fixed Income Strategies -- Chapter 7: Designing Balanced DC Menus: Considering Equity Options -- Chapter 8: Inflation Protection -- Chapter 9: Additional Strategies and Alternatives: Seeking Diversification and Return…”
    Libro electrónico
  3. 943
    Publicado 2018
    Tabla de Contenidos: “…-- Configuring JWT authentication -- Issuing JWTs -- Adding user role support -- Testing JWT authentication -- User registration -- Authentication and user registration in the client app -- Vuex state properties for authentication -- Vuex mutations for managing authentication state -- Vuex authentication getters -- Vuex login, register, and logout actions -- Authentication modal component -- Login form component -- Register form component -- Auth navigation item component -- Wiring up the new components in App.vue -- Protecting pages with navigation guards -- Setting the authentication state on app startup -- Summary -- Chapter 8: Processing Payments -- Why use Stripe? …”
    Libro electrónico
  4. 944
    Publicado 2022
    Tabla de Contenidos: “…Randomized -- Data Types -- Miscellaneous -- Summary -- Chapter 11: Key Rotation with Always Encrypted -- CMK Rotation -- Rotating the CMK Using the SSMS GUI -- Rotating the CMK Using T-SQL -- Rotating the CMK Using PowerShell -- Rotating the CMK Using PowerShell with Role Separation -- Part 1: DBA -- Part 2: Security Administrator -- Part 3: DBA -- Rotating the CEK -- Summary -- Chapter 12: Considerations When Implementing Always Encrypted -- Choosing What Data to Encrypt -- Source Control and Release Management -- ETL -- Performance -- Client Drivers -- Summary -- Part IV: Column Encryption using Always Encrypted with Enclaves -- Chapter 13: Introducing Always Encrypted with Enclaves -- Attestation -- Executing Queries That Use the Enclave -- The Attestation Process -- The Query Execution Process -- Summary -- Chapter 14: Setting Up Always Encrypted with Enclaves -- Setting Up Your VMs -- Setting Up Networking -- Install and Configure Host Guardian Service (HGS) -- Install SQL Server and Configure as a Guarded Host -- Summary -- Chapter 15: In-Place Encryption with Always Encrypted Enclaves -- Setting Up Our Test Database and Keys -- In-Place Encryption and Decryption of Data -- Performance of In-Place Encryption -- CEK Rotation -- Summary -- Chapter 16: Rich Querying with Always Encrypted Enclaves -- Setting Up Your Database and Data -- Rich Querying -- Indexes on Columns with Randomized Encryption -- Reading from an Index…”
    Libro electrónico
  5. 945
    Publicado 2017
    Tabla de Contenidos: “…. -- Buffer safety -- Dealing with JSON pollution -- See also -- Guarding against Cross Site Scripting (XSS) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Preventing protocol-handler-based XSS -- Parameter validation -- Escaping in JavaScript contexts -- See also -- Preventing Cross Site Request Forgery -- Getting ready -- How to do it... -- How it works... -- There's more... -- Securing older browsers -- See also -- Chapter 9: Optimizing Performance -- Introduction -- Benchmarking HTTP -- Getting ready -- How to do it... -- How it works... -- There's more... -- Profiling for production -- Measuring POST performance -- See also -- Finding bottlenecks with flamegraphs -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding a solution -- How 0x works -- CPU profiling with Chrome Devtools -- See also -- Optimizing a synchronous function call -- Getting ready -- How to do it... -- How it works... -- There's more... -- Function inlining -- Checking the optimization status -- Tracing optimization and deoptimization events -- See also -- Optimizing asynchronous callbacks -- Getting ready -- How to do it... -- How it works... -- There's more... -- A database solution -- A caching solution -- See also -- Profiling memory -- Getting ready -- How to do it... -- How it works... -- There's more... -- Visualizing memory usage in the Terminal -- See also -- Chapter 10: Building Microservice Systems -- Introduction…”
    Libro electrónico
  6. 946
    por Bali, S. P.
    Publicado 2007
    Tabla de Contenidos: “…Extracting the Music -- Types of Microgrooves -- Moving-magnet Cartridges -- Moving-iron Cartridges -- Moving-coil Cartridges -- Ceramic Cartridges -- Features of Stereo Cartridges -- Playback Needles -- Tone (Pickup) Arms -- Turntable -- Descriptive Questions -- Multiple Choice Questions -- Fill in the Blanks -- Chapter 9: Distortion in Disc Equipment -- Loudspeakers -- Disc Equipment-ecording Characteristics -- Disc Equipment-playback Characteristics -- Magnetic Pickup Heads -- Crystal Pickup Heads -- Stereo Pickup Heads -- Discs -- Tracing Distortion -- Pinch Effect -- Needle-scratch -- Tracking Error -- Turntable Driving Systems -- Descriptive Questions -- Multiple Choice Questions -- Fill in the Blanks -- Chapter 10: Magnetic Recording and Reproduction -- Magnetic Recording -- Magnetic Playback -- Magnetic Erasing -- Recording Medium -- Magnetic Heads -- Cassettes -- Tape Speeds -- Maximum Usable Frequency -- Track Configurations -- Tape Transport Mechanism -- Mechanical Controls -- Miscellaneous Features -- Electronic Controls -- Erasure Guard -- Tape Recorders -- Tape vs Disc -- Descriptive Questions -- Multiple Choice Questions -- Fill in the Blanks -- Chapter 11: Distortion in Tape Equipment -- Recording and Playback Heads -- Erase Heads -- Tapes -- Tape Transport Systems -- Amplitude Distortion -- Erasing -- Oscillator Coil -- Frequency Response -- Equalisation -- Block Diagram -- Descriptive Questions -- Multiple Choice Questions -- Fill in the Blanks -- Chapter 12: Noise Reduction -- Noise Reduction -- Pre-emphasis and De-emphasis -- Companders -- Noise Reduction Systems -- Descriptive Questions -- Multiple Choice Questions -- Fill in the Blanks -- Chapter 13: Recording Level in dicators -- VU Meters -- Peak Reading Meters -- Peak Reading Led Meters -- Zero dB Level -- Chapter 14: Optical Recording and Reproduction -- Disc…”
    Libro electrónico
  7. 947
    Publicado 2023
    Tabla de Contenidos: “…-- Pillars of modern data architecture on AWS -- Analytics case studies on AWS -- Case study - data analytics -- Case study - big data and data lake -- Summary -- Part 3: Security and Networking Transformation -- Chapter 10: Transforming Security on the Cloud Using AWS -- Understanding the security implications of digital transformation -- Introducing security on the cloud -- Data security -- Identity and access management (IAM) -- Compliance -- Governance -- Shared responsibility model -- Top cloud security considerations -- Architecting secure workloads on the cloud with AWS -- Building a threat model -- Identity and access management using AWS -- Understanding the concept behind IAM -- Features -- Business use cases -- Fraud and anomaly detection using AWS -- AWS Security Hub -- Amazon GuardDuty -- Network and application protection on AWS -- AWS services for host-level protection -- Data protection using AWS -- Data classification -- Protecting data at rest -- Protecting data in transit -- Summary -- Chapter 11: Transforming Networking on the Cloud Using AWS -- Introduction to networking on the cloud…”
    Libro electrónico
  8. 948
    Publicado 2024
    Tabla de Contenidos: “…Understanding ABAC -- Other access control models for multi-account environments -- Choosing the right access control model -- Managing IAM identities -- Managing both human and non-human identities -- Types of credentials and their use cases -- IAM users, groups, and roles -- External identities and federation in AWS -- Comparing IAM identity types -- Managing IAM policies -- Understanding IAM policies -- Creating and managing IAM policies -- Advanced IAM policy use cases -- IAM in multi-account deployments -- Challenges with managing large-scale IAM deployments -- Centralized IAM management -- Cross-account access -- Sharing resources at scale -- Automating IAM implementation in a DevOps world -- Best practices for multi-account IAM -- Summary -- Questions -- Answers -- Further reading -- Chapter 4: Data Protection - Encryption, Key Management, and Data Storage Best Practices -- AWS encryption mechanisms and services -- AWS approach to encryption -- Types of encryption supported by AWS -- The AWS Encryption SDK -- Key features -- Managing cryptographic keys -- Key management services in AWS -- KMS in-depth overview -- CloudHSM integration and use cases -- Compliance in AWS key management -- Data protection in key AWS services -- S3 buckets -- EBS volumes -- EFS filesystems -- RDS databases -- DynamoDB tables -- Data protection in other AWS services -- Unified data protection strategy -- Summary -- Questions -- Answers -- Further reading -- Chapter 5: Introduction to AWS Security Services -- Unpacking threat and vulnerability detection -- GuardDuty-your AWS security sentinel -- Detective-your AWS security analyst -- Inspector-your AWS security auditor -- CloudTrail Lake and Security Lake-your AWS analytics powerhouses -- Best practices for threat and vulnerability detection -- Managing security governance and compliance…”
    Libro electrónico
  9. 949
    por Núñez Guarde, Juan Agustín
    Publicado 1994
    Libro
  10. 950
    Publicado 2021
    Tabla de Contenidos: “…INTEGRACIÓN DE PYTHON CON EXCEL -- PANDAS PARA LEER UN ARCHIVO DE EXCEL -- MÉTODO Y ARGUMENTOS PD.READ_EXCEL () -- MÉTODO Y ARGUMENTOS PD.READ_CSV () -- LEER VARIAS HOJAS DE EXCEL CON PANDAS -- MÉTODO PD.READ_EXCEL () -- MÉTODO PD.EXCELFILE () -- LEER MÚLTIPLES ARCHIVOS DE EXCEL CON PYTHON -- MÉTODO 1: OBTENER ARCHIVOS DE LA CARPETA - ESTILO POWERQUERY -- MÉTODO 2: USAR UN ARCHIVO DE ENTRADA DE EXCEL -- GUARDANDO LOS DATOS EN UN ARCHIVO DE EXCEL USANDO PYTHON -- GUARDAR EN ARCHIVO CSV -- GUARDE VARIAS HOJAS EN UN ARCHIVO DE EXCEL CON PYTHON -- MÉTODO 1 -- MÉTODO 2 -- OBTENGA VALORES, FILAS Y COLUMNAS EN DATAFRAME DE PANDAS -- OBTENIENDO COLUMNAS CON PANDAS -- OBTENIENDO VARIAS COLUMNAS -- OBTENIENDO FILAS CON PANDAS -- OBTENIENDO VARIAS FILAS -- OBTENIENDO VALORES DE CELDA -- OBTENIENDO DATOS DE LA TABLA DE UNA PÁGINA WEB USANDO PYTHON Y LA LIBRERÍA PANDAS -- OBTENER DATOS DE UN SITIO WEB (WEB SCRAPING) -- REQUISITOS PARA USAR PANDAS PARA WEB SCRAPING -- WEB SCRAPING EN ACCIÓN -- REPLICAR LAS FUNCIONES BUSCAR DE EXCEL EN PYTHON -- 15. …”
    Libro electrónico
  11. 951
    Publicado 2017
    Tabla de Contenidos: “…QueryString und Hash-Fragment -- Lazy Loading von Routen -- Routen für das Lazy Loading einrichten -- Lazy Loading und Webpack -- Lazy Loading im Browser nachvollziehen -- Lazy Loading und Shared Modules -- Den AuthService implementieren und nutzen -- Korrekte Nutzung von SharedModules beim Einsatz von Lazy Loading -- Preloading -- Preloading aktivieren -- Preloading mit einem Experiment nachvollziehen -- Selektives Preloading mit eigener Preloading-Strategie -- Aux-Routes -- Guards -- Das Aktivieren von Routen verhindern -- Das Aktivieren von untergeordneten Routen verhindern -- Das Laden von Modulen verhindern -- Das Deaktivieren einer Komponente verhindern -- Events -- Resolver -- Zusammenfassung -- Kapitel 9 - Formulare und Validierung -- Template-getriebene Formulare -- FormsModule einbinden -- Eingaben validieren -- Zugriff auf den Zustand des Formulars -- Bedingte Formatierung von Eingabefeldern -- Eigene Validierungsdirektiven -- Parametrisierbare Validierungsregeln -- Asynchrone Validatoren -- Die Komponente zum Präsentieren von Validierungsfehlern -- Die Standardsteuerelemente von HTML nutzen -- Checkboxes -- Radio-Buttons -- Dropdown-Felder -- Geschachtelte Formulare -- Multi-Field-Validatoren -- Reaktive Formulare -- Modul einbinden -- Das Formular mit einem Objektgraphen beschreiben -- Einen Objektgraphen an ein Formular binden -- Validatoren -- Wiederholgruppen mit FormArray -- Wiederholgruppen validieren -- Dynamische Formulare -- In die Datenbindung mit Value-Accessoren eingreifen -- Ausgaben formatieren und Eingaben parsen -- Eigene Formular-Steuerelemente -- Zusammenfassung -- Kapitel 10 - Internationalisierung -- Übersetzungen mit Angular -- ng-xi18n ohne die Angular CLI einrichten -- Texte markieren -- Dynamische Übersetzungen -- Integration in die Applikation -- Integration ohne Angular CLI -- Ergebnis…”
    Libro electrónico
  12. 952
    Publicado 2018
    Tabla de Contenidos: “…Setting expiry data on a per-account basis, with useradd and usermod -- Setting expiry data on a per-account basis, with chage -- Hands-on lab for setting account and password expiry data -- Preventing brute-force password attacks -- Configuring the pam_tally2 PAM module -- Hands-on lab for configuring pam_tally2 -- Locking user accounts -- Using usermod to lock a user account -- Using passwd to lock user accounts -- Locking the root user account -- Setting up security banners -- Using the motd file -- Using the issue file -- Using the issue.net file -- Summary -- Chapter 3: Securing Your Server with a Firewall -- An overview of iptables -- Basic usage of iptables -- Hands-on lab for basic iptables usage -- Uncomplicated Firewall for Ubuntu systems -- Basic usage of ufw -- Hands-on lab for basic ufw usage -- firewalld for Red Hat systems -- Verifying the status of firewalld -- firewalld zones -- firewalld services -- Adding ports to a firewalld zone -- firewalld rich language rules -- Hands-on lab for firewalld commands -- nftables - a more universal type of firewall system -- nftables tables and chains -- Getting started with nftables -- Using nft commands -- Hands-on lab for nftables on Ubuntu -- Summary -- Chapter 4: Encrypting and SSH Hardening -- GNU Privacy Guard -- Creating your GPG keys -- Symmetrically encrypting your own files -- Hands-on lab - combining gpg and tar for encrypted backups -- Using private and public keys for asymmetric encryption and signing -- Signing a file without encryption -- Encrypting partitions with Linux Unified Key Setup - LUKS -- Disk encryption during operating system installation -- Adding an encrypted partition with LUKS -- Configuring the LUKS partition to mount automatically -- Encrypting directories with eCryptfs -- Home directory and disk encryption during Ubuntu installation…”
    Libro electrónico
  13. 953
    Publicado 2023
    Tabla de Contenidos: “…Deleting projects -- Tagging Transactions -- Creating Tag Groups and Tags -- Tagging existing transactions -- Tagging new transactions -- Disabling the Tags feature -- Part 3 Budgeting, Reporting, and Analysis -- Chapter 13 Creating Budgets in QuickBooks -- Creating a Budget -- Importing Budgets -- Basing Spreadsheet Budgets on Actuals -- Deleting Budgets -- Chapter 14 Utilizing QuickBooks Reports -- Looking at the Reports Page -- Finding the Report You Want -- Examining standard reports -- Finding customized reports -- Reviewing management reports -- Contemplating Multi-Co reporting -- Searching for a report -- Printing a Report -- Customizing Reports -- Saving a customized report -- Taking actions with custom reports -- Exporting Reports from QuickBooks -- Exporting to Excel -- Exporting to PDF -- Exporting to Google Sheets -- Custom Reporting with Spreadsheet Sync -- Chapter 15 Analyzing QuickBooks Data in Excel -- Automatically Opening Excel Reports Exported from QuickBooks -- Sifting through Excel Reports -- Filtering data -- Guarding against a tricky trap -- Slicing your data -- Sorting data -- Creating Custom Reporting with Pivot Tables -- Understanding pivot table requirements -- Adding fields -- Removing fields -- Spreadsheet Sync -- Part 4 Features for Accountants -- Chapter 16 Introducing QB Accountant -- Getting Started with QuickBooks Online Accountant -- Setting Up Your Team -- Assigning lead accountants -- Examining the QB Accountant Interface -- Using Your Practice commands -- Toolbar commands -- Adding Companies to the Client List -- Inviting you to be the accountant user -- Adding a client to your practice -- Accepting primary admin rights from your client -- Transferring primary admin rights to your client -- Working with the Client List -- Customizing the Client List -- Removing Clients from Your Client List…”
    Libro electrónico
  14. 954
    Publicado 2023
    Tabla de Contenidos: “…Understanding centralized user management -- Microsoft Active Directory -- Samba on Linux -- FreeIPA/Identity Management on RHEL-type distros -- Summary -- Questions -- Further reading -- Answers -- Chapter 4: Securing Your Server with a Firewall - Part 1 -- Technical requirements -- An overview of the Linux firewall -- An overview of iptables -- Mastering the basics of iptables -- Blocking ICMP with iptables -- Blocking everything that isn't allowed with iptables -- Hands-on lab for basic iptables usage -- Blocking invalid packets with iptables -- Restoring the deleted rules -- Hands-on lab for blocking invalid IPv4 packets -- Protecting IPv6 -- Hands-on lab for ip6tables -- nftables - a more universal type of firewall system -- Learning about nftables tables and chains -- Getting started with nftables -- Configuring nftables on Ubuntu -- Using nft commands -- Hands-on lab for nftables on Ubuntu -- Summary -- Questions -- Further reading -- Answers -- Chapter 5: Securing Your Server with a Firewall - Part 2 -- Technical requirements -- The Uncomplicated Firewall for Ubuntu systems -- Configuring ufw -- Working with the ufw configuration files -- Hands-on lab for basic ufw usage -- firewalld for Red Hat systems -- Verifying the status of firewalld -- Working with firewalld zones -- Adding services to a firewalld zone -- Adding ports to a firewalld zone -- Blocking ICMP -- Using panic mode -- Logging dropped packets -- Using firewalld rich language rules -- Looking at iptables rules in RHEL/CentOS 7 firewalld -- Creating direct rules in RHEL/CentOS 7 firewalld -- Looking at nftables rules in RHEL/AlmaLinux 8 and 9 firewalld -- Creating direct rules in RHEL/AlmaLinux firewalld -- Hands-on lab for firewalld commands -- Summary -- Questions -- Further reading -- Answers -- Chapter 6: Encryption Technologies -- GNU Privacy Guard (GPG)…”
    Libro electrónico
  15. 955
    Publicado 2023
    Tabla de Contenidos: “…Adhering to Etsy's House Rules -- Private Party: Guarding Your Privacy on Etsy -- Understanding Etsy's Privacy Policy -- Changing your privacy settings -- Safe Passage: Keeping Yourself Safe on Etsy -- Choosing a strong password -- Making your account more secure -- Staying safe in Etsy's public places -- Avoiding scams on Etsy -- Part 2 If You Build It, They Will Come: Setting Up Your Etsy Shop -- Chapter 5 Sell Yes: Understanding What You Can and Can't Sell on Etsy -- Yes, We Can! …”
    Libro electrónico
  16. 956
    Publicado 2023
    Tabla de Contenidos: “…. -- See also -- Authorized access to routes using route guards -- Getting ready -- How to do it... -- How it works... -- See also -- Working with route parameters -- Getting ready -- How to do it... -- How it works... -- See also -- Showing a global loader between route changes -- Getting ready -- How to do it... -- How it works... -- See also -- Chapters 8: Mastering Angular Forms -- Technical requirements -- Creating your first template-driven form with validation -- Getting ready -- How to do it... -- How it works... -- See also -- Creating your first reactive form with validation -- Getting ready -- How to do it... -- How it works... -- See also -- Testing forms in Angular -- Getting ready -- How to do it... -- How it works... -- See also -- Server-side validation using asynchronous validator functions -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing complex forms with reactive FormArray -- Getting ready -- How to do it... -- How it works... -- See also -- Writing your own custom form control using ControlValueAccessor -- Getting ready -- How to do it... -- How it works... -- See also -- Chapters 9: Angular and the Angular CDK -- Technical requirements -- Using virtual scroll for huge lists -- Getting ready -- How to do it... -- How it works... -- See also -- Keyboard navigation for lists -- Getting ready -- How to do it... -- How it works... -- See also -- Pointy little popovers with the Overlay API -- Getting ready -- How to do it... -- How it works... -- See also -- Input coercion utilities from the Angular CDK -- Getting ready -- How to do it... -- How it works... -- See also -- Using the CDK Drag and Drop API to move items from one list to another -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a multi-step game with the CDK Stepper API -- Getting ready -- How to do it... -- How it works... -- See also…”
    Libro electrónico
  17. 957
    por Ma, Andeed
    Publicado 2024
    Tabla de Contenidos: “…Hidden Breakthroughs Amidst the So-Called Winters -- Beyond the Hype Cycle: AI's Unique Evolution -- Why the Gartner Hype Cycle Falls Short -- AI's VUCA History: Symbolic AI and Connectionist AI -- AI's Modern Disguise: A Game of Hype and Camouflage -- The "AI Trap" Epiphany: AI's Social Media Camouflage -- Media Hype: Amplifying AI's VUCA Evolution -- AI Narratives: Why Portrayals Matter -- Escape AI's VUCA Past: Toward Sustainable AI -- Sustainable AI Odyssey: From AIII to AI for Humanity -- Sustainable AI Wisdom: Lessons from AI's VUCA History -- "Organic" AI Epiphany and Existential AI Threat -- Notes -- Chapter 4 The AI Dilemma -- Self-driving Cars: AI's Moral Machines -- I Am the Operator -- The Dilemma of Self-driving Cars -- The AI Dilemma -- AI: Uncharted Territory, Unprecedented Dilemma -- The AI-Powered Intelligence Revolution -- Decoding the AI Dilemma -- The AI Dilemma Hierarchy -- Guarding Against AI Threats: An Alert System -- The AI Dilemma Hierarchy: A Risk Mitigation Framework -- Countering the Risks of Autonomous Machines -- "To AI or Not to AI" Dilemma: Crossing the Trust Chasm -- AI Trap Dilemma: Combating Hubris and Complacency -- "Organic" AI Dilemma: Containing Weaponized AI -- Confront the Human Dilemma -- The Nature of AI Dilemmas -- Rethinking AI: Toward a Sustainable Human-Machine Relationship -- The AI Dilemma Unraveled -- Notes -- Chapter 5 Rethinking AI -- Artificial Friends: Reimagining the Human-AI Relationship -- #RIPTaybot -- It's Complicated: The Human-AI Relationship -- Rethinking AI -- The "Drunk History" of Epic AI Chatbots Fails -- Rethinking AI: A Three-Step Process -- Principles of Human-Machine Relationship -- Four Principles of A Humanity-First Philosophy -- Rule Number 1: Human over Machine -- Robust and Adaptive Framework -- How the Four Principles Could have Averted the Tay Debacle…”
    Libro electrónico
  18. 958
    por O'Sullivan, Bryan
    Publicado 2009
    Tabla de Contenidos: “…Defining Types, Streamlining Functions -- Defining a New Data Type -- Naming Types and Values -- Type Synonyms -- Algebraic Data Types -- Tuples, Algebraic Data Types, and When to Use Each -- Analogues to Algebraic Data Types in Other Languages -- The structure -- The enumeration -- The discriminated union -- Pattern Matching -- Construction and Deconstruction -- Further Adventures -- Variable Naming in Patterns -- The Wild Card Pattern -- Exhaustive Patterns and Wild Cards -- Record Syntax -- Parameterized Types -- Recursive Types -- Reporting Errors -- A More Controlled Approach -- Introducing Local Variables -- Shadowing -- The where Clause -- Local Functions, Global Variables -- The Offside Rule and Whitespace in an Expression -- A Note About Tabs Versus Spaces -- The Offside Rule Is Not Mandatory -- The case Expression -- Common Beginner Mistakes with Patterns -- Incorrectly Matching Against a Variable -- Incorrectly Trying to Compare for Equality -- Conditional Evaluation with Guards -- Chapter 4. Functional Programming -- Thinking in Haskell -- A Simple Command-Line Framework -- Warming Up: Portably Splitting Lines of Text -- A Line-Ending Conversion Program -- Infix Functions -- Working with Lists -- Basic List Manipulation -- Safely and Sanely Working with Crashy Functions -- Partial and Total Functions -- More Simple List Manipulations -- Working with Sublists -- Searching Lists -- Working with Several Lists at Once -- Special String-Handling Functions -- How to Think About Loops -- Explicit Recursion…”
    Libro electrónico
  19. 959
    por Lucas, Michael, 1967-
    Publicado 2013
    Tabla de Contenidos: “…-- Script Kiddies -- Botnets -- Disaffected Users -- Skilled Attackers -- OpenBSD Security Announcements -- OpenBSD Memory Protection -- W^X -- .rodata Segments -- Guard Pages -- Address Space Layout Randomization -- ProPolice -- And More! …”
    Libro electrónico
  20. 960
    Publicado 2023
    Tabla de Contenidos: “…8 Discussion, Related and Future Work -- References -- Unblocking Dynamic Partial Order Reduction -- 1 Introduction -- 2 DPOR and Blocked Executions -- 2.1 Dynamic Partial Order Reduction -- 2.2 Assume Statements and DPOR -- 3 Key Ideas -- 3.1 Avoiding Blocking Due to Stale Reads -- 3.2 Handling Await Loops with In-Place Revisits -- 3.3 Handling Confirmation CASes with Speculative Revisits -- 4 Await-Aware Model Checking Algorithm -- 4.1 Execution Graphs -- 4.2 Awamoche -- 5 Correctness and Optimality -- 5.1 Approaches to Correctness -- 5.2 Awamoche: Completeness, Optimality, and Strong Optimality -- 6 Evaluation -- 6.1 Results -- 7 Related Work -- 8 Conclusion -- References -- Cyber-Physical and Hybrid Systems -- 3D Environment Modeling for Falsification and Beyond with Scenic 3.0 -- 1 Introduction -- 2 New Features -- 2.1 3D Geometry -- 2.2 Mesh Shapes and Regions -- 2.3 Precise Visibility Model -- 2.4 Temporal Requirements -- 2.5 Rewritten Parser -- 3 Case Studies -- 3.1 Falsification of a Robot Vacuum -- 3.2 Constrained Data Generation for an Autonomous Vehicle -- 4 Conclusion -- References -- A Unified Model for Real-Time Systems: Symbolic Techniques and Implementation -- 1 Introduction -- 2 Generalized timed automata -- 3 Expressivity of GTA and Examples -- 4 The Reachability Problem for GTA -- 5 Symbolic Enumeration -- 6 Computing with GTA Zones Using Distance Graphs -- 7 Finiteness of the Simulation Relation -- 8 Experimental Evaluation -- 9 Conclusion -- References -- Closed-Loop Analysis of Vision-Based Autonomous Systems: A Case Study -- 1 Introduction -- 2 Autonomous Center-Line Tracking with TaxiNet -- 3 Probabilistic Analysis -- 3.1 Probabilistic Abstractions for Perception -- 3.2 DNN Checks as Run-Time Guards -- 3.3 Confidence Analysis -- 4 Experiments -- 5 Conclusion -- References…”
    Libro electrónico