Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 277
- Development 237
- Application software 192
- Leadership 172
- Cloud computing 159
- History 144
- Artificial intelligence 128
- Computer networks 102
- RELIGION 102
- Historia 101
- Data processing 97
- Information technology 97
- Python (Computer program language) 97
- Computer programming 89
- Machine learning 82
- Computer software 81
- Design 81
- Examinations 80
- Computer programs 78
- Computer security 78
- Programming 75
- Security measures 75
- Success in business 70
- Documentales 65
- Web site development 64
- Organizational change 59
- Big data 56
- Database management 56
- Technological innovations 55
- Certification 54
-
4381Nuxt 3 Projects Build Scalable Applications with Nuxt 3 Using TypeScript, Pinia, and Composition APIPublicado 2024“…Explore the world of Nuxt 3, the powerful Vue.js framework to build scalable, production-ready applications Key Features Acquire essential skills through eight practical Nuxt 3 projects Gain hands-on exposure to routing, authentication, state management, Composition API, SEO, testing, custom modules, and monorepos Power up your projects with widely used libraries and features such as Pinia, NuxtUI, TailwindCSS, and more Purchase of the print or Kindle book includes a free PDF eBook Book Description Nuxt 3 Projects takes you on a hands-on learning journey through the world of Nuxt 3, the cutting-edge Vue.js framework. …”
Libro electrónico -
4382Publicado 2024“…Book Description Embark on a transformative journey with this course designed to equip you with robust Python and SQL skills. …”
Libro electrónico -
4383Publicado 2024“…This book takes you on a journey through the intricate world of malware development, shedding light on the techniques and strategies employed by cybercriminals. …”
Libro electrónico -
4384por Streib, HeinzTabla de Contenidos: “…-- George's Moral Perspective and his Approach to Tolerance -- General Interpretation of George's Moral and Spiritual Journey -Triangulating the Data -- Conclusion-Comparing Gisela and George -- References -- Chapter 13 "It's the certainty that my faith reflects a reality that I can't see at the moment, but this is where I'm going" - The Impact of an Exclusivist Faith in Old Age. …”
Publicado 2024
Libro electrónico -
4385Publicado 2024“…This book takes you on a journey with TypeScript 5, introducing its nuances and advantages over traditional JavaScript, explaining TypeScript basics, and highlighting the syntax, typing, generics, classes, and interfaces. …”
Libro electrónico -
4386Publicado 2022“…This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. …”
Libro electrónico -
4387por Justus, RoyTabla de Contenidos: “…Regression framework -- Metrics for regression -- Input data quality -- Improving data quality -- Similarity framework -- Assessing the similarity framework's performance -- Clustering framework -- Creating a clustering solution -- Summary -- Chapter 11: Designing Exceptional Experiences -- Types of ServiceNow user interfaces -- Jelly -- Service Portal -- Next Experience -- Portals -- Types of portals -- The journey from department to enterprise portals -- Employee Center Pro -- Content taxonomy -- Custom app portals and portal customizations -- Application portals -- Workspaces -- Determining which workspaces to use -- Optimizing experiences with user-facing AI -- AI Search -- AI Search configurability -- Conversational interfaces -- Incorporating Virtual Agent into your user experience -- Advantages of Virtual Agent as a user interface -- Disadvantages of conversational interfaces -- Recommendations for Virtual Agent -- ServiceNow NLU -- Summary -- Conclusion -- Index -- Other Books You May Enjoy…”
Publicado 2022
Libro electrónico -
4388Publicado 2021Tabla de Contenidos: “…-- Looking back at our journey -- Deno's roadmap -- Deno's future and community -- Interesting things happening in the community -- Publishing a package to Deno's official registry -- Summary -- Why subscribe? …”
Libro electrónico -
4389Publicado 2022Tabla de Contenidos: “…-- Understanding a Win -- Making the Right Choice -- Leaders Lead -- E-Connections -- SPA for the Win -- Taming the Beast-Your Emotions -- Experience the Wins -- Look Up, Not Down -- The Sky Is Your Limit -- Locus of Control -- Owning the Outcomes -- Foundation for Leadership, Balance -- Your Turn -- Leadership Quality -- Take Action -- A Rookie Cop -- Wins Follow a Process -- The Power of Leading, Not Following -- Identify Problems First -- Expect the Fear -- Winning in Uncertain Times -- Pivot and Act -- Holistic Approach Is Essential -- Model the Right Behavior -- Your Turn to Fix Things -- Chapter 2 Our Missions Set the Playbook -- The Sum of All Our Missions -- Intimidating Yet Powerful -- The Downside -- A Perfect (Better) World -- Take a Chance -- Regret Isn't an Option -- Learnings and Lessons Mount Up -- Emotions and Control -- Pay Attention to Your Gut -- Instincts Matter -- Crucial Input -- Talking Points -- Failures Are Wins, Too -- Tough Times -- Relationships Make the Difference -- The Role of Emotions -- Debriefing Is Essential -- Lessons from Entrepreneurship -- Building Your Business -- Real Estate Grit -- Consistency Wins -- Attitude and More Relationships -- Knowing When to Stop -- A Word About Success -- Your Toolbox for the Journey -- Part II Your ToolBox -- Chapter 3 Party With the Beast (Your Emotions) -- Friend or Foe? …”
Libro electrónico -
4390Publicado 2022Tabla de Contenidos: “…-- Chapter 11 How Can I Progress? -- The Security Journey -- The Opportunist -- The Intentional Career Seeker -- How to Get Promoted -- What's Next? …”
Libro electrónico -
4391Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Red Hat Linux 8 -Configuring and Maintaining Storage with Automation -- Chapter 1: Block Storage - Learning How to Provision Block Storage on Red Hat Enterprise Linux -- Technical requirements -- Setting up GitHub access -- Setting up your lab environment -- iSCSI block storage - overview of what it is and why we need it -- Testing your knowledge -- iSCSI block storage - manual provisioning and deployment -- iSCSI block storage - Ansible automation playbook creation and usage -- Summary -- Chapter 2: Network File Storage - Expanding Your Knowledge of How to Share Data -- Technical requirements -- Setting up GitHub access -- Setting up your lab environment for NFS and SMB -- NFS and SMB network storage - the way they work and when to choose one over the other -- NFS Ansible Automation playbook creation and usage -- SMB storage manual provisioning and deployment -- SMB storage Ansible Automation playbook creation and usage -- Summary -- Part 2: Red Hat Linux 8 - Configuring and Maintaining Networking with Automation -- Chapter 3: Network Services with Automation - Introduction to Red Hat Linux Networking -- Technical requirements -- Setting up GitHub access -- Setting up your lab environment for networking -- The beginning of your journey into Linux networking! -- Getting to know what the different terms mean and how they apply to what you are trying to achieve! …”
Libro electrónico -
4392Publicado 2023Tabla de Contenidos: “…-- The quality of CTI -- Types of threat intelligence -- Strategic threat intelligence -- Tactical threat intelligence -- Operational threat intelligence -- Threat intelligence implementation -- 1 - Developing a plan -- 2 - Collection -- 3 - Processing -- 4 - Analysis -- 5 - Dissemination -- 6 - Feedback -- Threat hunting -- The importance of threat hunting -- Using CTI effectively -- The MITRE ATT& -- CK framework -- The MITRE ATT& -- CK Matrix -- How to implement the ATT& -- CK framework -- Summary -- Chapter 10: Incident Response and Recovery -- Incident response planning -- Testing incident response plans -- Incident response playbooks -- Ransomware attacks Playbook -- Data loss/theft attacks playbook -- Phishing attacks playbook -- Disaster recovery planning -- Cyber insurance -- Summary -- Chapter 11: Prioritizing and Implementing a Blue Team Strategy -- Emerging detection and prevention technologies and techniques -- Adversary emulation -- VCISO services -- Context-aware security -- Defensive AI -- Extended Detection and Response (XDR) -- Manufacturer Usage Description (MUD) -- Zero Trust -- Pitfalls to avoid while setting up a blue team -- Getting started on your blue team journey -- Summary -- Part 3: Ask the Experts -- Chapter 12: Expert Insights -- Anthony Desvernois -- William B. …”
Libro electrónico -
4393por Mezzetta, SoniaTabla de Contenidos: “…-- A data maturity framework -- A data maturity assessment -- Creating a data strategy -- Topics in a data strategy document -- Creating a data strategy document -- Data strategy implementation -- Summary -- Part 3: Designing and Realizing Data Fabric Architecture -- Chapter 6: Designing a Data Fabric Architecture -- Introduction to enterprise architecture -- Types of enterprise architecture -- Data Fabric principles -- Data Fabric architecture principles -- Data Fabric architecture layers -- Data Governance -- Data Integration -- Self-Service -- Summary -- Chapter 7: Designing Data Governance -- Data Governance architecture -- Metadata-driven architecture -- EDA -- Metadata as a service -- Metadata collection -- Metadata integration -- Metadata-based events -- The Data Governance layer -- Active metadata -- Life cycle governance -- Operational models -- The Data Fabric's governance applied -- The Create phase -- The Ingest phase -- The Integrate phase -- The Consume phase -- The Archive and Destroy phase -- Summary -- Chapter 8: Designing Data Integration and Self-Service -- DataOps-based architecture -- Data Integration layer -- Data management -- Development workflow -- Self-Service layer -- Data democratization -- Data consumption -- Data journey in a Data Fabric architecture -- Phase 1 - Create phase in the Data Integration layer -- Phases 2 and 3 - Ingest and Integrate phases in the Data Integration layer -- Phase 4 - Consume phase in the Self-Service layer -- Phase 5 - Archive and Destroy phase -- Data Fabric reference architecture -- Data Fabric architecture highlights -- Summary…”
Publicado 2023
Libro electrónico -
4394por Simon, PhilTabla de Contenidos: “…-- Think Free Speech, Not Free Beer -- Starting the Journey -- Start Relatively Small and Organically -- First Aim for Little Victories -- New Employees and New Skills -- Experiment with Big Data Solutions -- Gradually Gain Acceptance throughout the Organization -- Open Your Mind -- Let the Data Model Evolve -- Tap into Existing Communities -- Realize That Big Data Is Iterative -- Avoiding the Big Pitfalls -- Big Data Is a Binary…”
Publicado 2013
Libro electrónico -
4395Publicado 2018Tabla de Contenidos: “…-- The Turing test -- The art and science of simulation -- An emotion state machine -- Playing the emotion game -- Creating a model of human behavior -- Integrating artificial personality into our robot -- Personality construction - building blocks -- Context -- Under construction -- The robot emotion engine -- The human emotion model -- Human information storage -- Context memory -- Questions -- Further reading -- Chapter 10: Conclusions and Reflections -- Conclusions about our journey -- Careers in robotics -- Issues in AI - real and not real -- Some very brief words about robots and AI phobia -- Understanding risk in AI -- Final words -- Summary -- Questions -- Further reading -- Appendix: Assessments -- Other Books You May Enjoy -- Index…”
Libro electrónico -
4396Publicado 2021Tabla de Contenidos: “…Data Strategy: Completing the journey from definition to execution -- 12.1 Culture - is your strategy heading for the breakfast plate? …”
Libro electrónico -
4397Publicado 2023Tabla de Contenidos: “…-- Ethereum blockchain and security -- How to find and exploit vulnerabilities in Ethereum smart contracts -- Installing Foundry -- Auditing the LicenseManager smart contract -- Analyzing the source code of the winLicense function -- Compiling with "forge build" and analyzing the artifacts -- Decompiling and disassembling the smart contract's bytecode -- Dynamic analysis with "forge test" -- Exploiting weak sources of randomness from chain attributes -- Exploiting business logic vulnerabilities -- Exploiting reentrancy and analyzing the traces -- Other vulnerabilities -- Unleashing the power of Foundry and other tools -- Summary -- Further reading -- Chapter 8: Continuing the Journey of Vulnerability Discovery -- An approach to discovering vulnerabilities -- Understanding what you are doing -- Getting into the flow -- The fellowship of the exploit -- The dilemma of disclosing vulnerabilities -- What we did while writing the book -- Different perspectives -- Disclosure for Chief Information Security Officers (CISOs) -- Vulnerability disclosure today -- What's next? …”
Libro electrónico -
4398Publicado 2011Tabla de Contenidos: “…Paths to Transformation -- Hope in The Dark -- Nonviolent Communication: A Language of Compassion -- Nonviolence: Weapon of the Brave, Weapon of the Future -- Ahimsa or the Way of Nonviolence -- Candles in Babylon -- On Citizen Diplomacy -- A New World Diplomacy -- On Courage and Resistance -- War Crimes Tribunal May End Impurity but They Can't Heal Hatred -- The Courage to Love -- At Hell's Gate: A Soldier's Journey from War to Peace -- The Greatest Danger -- Thanks but No Thanks -- The Life You Can Save: Acting Now to End World Poverty -- The Generation of Trust -- Contributor Biographies -- Credits…”
Libro electrónico -
4399Publicado 2024Tabla de Contenidos: “…-- Summary -- References -- Chapter 8: Techniques for Identifying and Removing Bias -- The bias conundrum -- Types of bias -- Easy to identify bias -- Difficult to identify bias -- The data-centric imperative -- Sampling methods -- Other data-centric techniques -- Case study -- Loading the libraries -- AllKNN undersampling method -- Instance hardness undersampling method -- Oversampling methods -- Shapley values to detect bias, oversample, and undersample data -- Summary -- Chapter 9: Dealing with Edge Cases and Rare Events in Machine Learning -- Importance of detecting rare events and edge cases in machine learning -- Statistical methods -- Z-scores -- Interquartile Range (IQR) -- Box plots -- Scatter plots -- Anomaly detection -- Unsupervised method using Isolation Forest -- Semi-supervised methods using autoencoders -- Supervised methods using SVMs -- Data augmentation and resampling techniques -- Oversampling using SMOTE -- Undersampling using RandomUnderSampler -- Cost-sensitive learning -- Choosing evaluation metrics -- Ensemble techniques -- Bagging -- Boosting -- Stacking -- Summary -- Part 4: Getting Started with Data-Centric ML -- Chapter 10: Kick-Starting Your Journey in Data-Centric Machine Learning -- Solving six common ML challenges -- Being a champion for data quality -- Bringing people together -- Taking accountability for AI ethics and fairness -- Making data everyone's business - our own experience -- Summary -- References -- Index -- Other Books You May Enjoy…”
Libro electrónico -
4400por Barrah, Beirem BenTabla de Contenidos: “…MINDSPACE: An Evidence-Based Tool for Communicating Change -- Conclusion -- Chapter 7 Leadership Support -- Leadership Support Interventions -- Current Approaches to Leadership Support -- On Biases in Leadership Support -- Real-World Challenges in Leadership Support -- Facilitate Role-Modeling (or Anything Else) with If-Then Plans -- If-Then Plans in the Wild -- Interventions for Senior Leaders -- Re-Anchoring for Fact-Based Allocation of Resources -- Re-Anchoring in the GreenTech Scenario -- Gradual Escalation of Commitment -- Conclusion -- Chapter 8 Stakeholder Engagement -- Stakeholder Engagement in Change Management -- Stakeholder Engagement Interventions -- On Biases in Stakeholder Engagement -- The Importance of Psychological Safety -- Cultivating Psychological Safety -- Understanding Your Stakeholders Beyond the Org Chart -- Organizational Network Analysis -- Navigating Resistance -- Engaging Resistance Through Constructive Conflict: Red-Blue Team -- Conclusion -- Chapter 9 Measuring Change -- Measuring the Impact of Change -- Measuring Change Interventions -- Measuring the Hard and Soft Sides of Change -- Good Metrics Follow the Use Case -- On Biases in Measuring Change -- Beyond the Net Promoter Score -- Measuring Behavioral Change -- Watermelon Project Dashboards -- Applying Scientific Rigor: A/B Testing Your Change Initiatives -- Conclusion -- Chapter 10 Learning and Development -- What Is L& -- D? -- The L& -- D Journey of dsm-firmenich -- Learning and Development Interventions -- The Importance of L& -- D in Change Management -- Current Approaches to L& -- D -- On Biases in Learning and Development -- Enhancing Learning Agility Amid Change with a Growth Mindset -- Going to the Gemba -- Integrating Developmental KPIs: A Learning-Driven Approach -- Conclusion -- Conclusion: Toward Behaviorally Informed Organizations -- Notes…”
Publicado 2024
Libro electrónico