Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 669
- Development 666
- Management 647
- Application software 594
- Computer Science 452
- Computer networks 403
- Leadership 365
- Computer programs 360
- Photography 332
- Design 325
- Examinations 312
- Business & Economics 308
- Security measures 288
- Data processing 282
- Digital techniques 280
- Operating systems (Computers) 276
- Computer security 274
- Computer programming 268
- Web site development 265
- Web sites 265
- Programming 262
- Certification 258
- Computer software 242
- Database management 227
- Python (Computer program language) 213
- Electronic data processing personnel 208
- Java (Computer program language) 204
- Cloud computing 196
- Success in business 194
- Computer graphics 182
-
5741Publicado 2022Tabla de Contenidos: “…-- How to Contact the Publisher -- Chapter 1 Security Operations and Administration -- Comply with Codes of Ethics -- Understand, Adhere to, and Promote Professional Ethics -- (ISC)2 Code of Ethics -- Organizational Code of Ethics -- Understand Security Concepts -- Conceptual Models for Information Security -- Confidentiality -- Integrity -- Availability -- Accountability -- Privacy -- Nonrepudiation -- Authentication -- Safety -- Fundamental Security Control Principles -- Access Control and Need-to-Know -- Job Rotation and Privilege Creep -- Document, Implement, and Maintain Functional Security Controls -- Deterrent Controls -- Preventative Controls -- Detective Controls -- Corrective Controls -- Compensating Controls -- The Lifecycle of a Control -- Participate in Asset Management -- Asset Inventory -- Lifecycle (Hardware, Software, and Data) -- Hardware Inventory -- Software Inventory and Licensing -- Data Storage -- Implement Security Controls and Assess Compliance -- Technical Controls -- Physical Controls -- Administrative Controls -- Periodic Audit and Review -- Participate in Change Management -- Execute Change Management Process -- Identify Security Impact -- Testing/Implementing Patches, Fixes, and Updates -- Participate in Security Awareness and Training -- Security Awareness Overview -- Competency as the Criterion -- Build a Security Culture, One Awareness Step at a Time -- Participate in Physical Security Operations…”
Libro electrónico -
5742Publicado 2023Tabla de Contenidos: “…-- The cost of highly available architecture -- Mixing good and bad - tricks to wrapping bad code and making it resilient -- Alerting that fires actions -- Adding additional logging to monitor potential issues -- Using try catch to encapsulate exceptions -- Retries to the rescue...or not -- Summary -- Part 2 - Implementing Observability for Site Reliability Engineering -- Chapter 4: Essential Observability - Metrics, Events, Logs, and Traces (MELT) -- Technical requirements -- Accomplishing systems monitoring and telemetry -- Monitoring targets for infrastructure -- Monitoring types and tools -- Monitoring golden signals -- Monitoring data -- Understanding APM -- Getting to know topology self-discovery, the blast radius, predictability, and correlation -- Alerting - the art of doing it quietly -- The user perspective notification trigger principle -- Event-to-incident mapping principle -- Mixing everything into observability -- Outages versus downtime -- Observability architecture -- Observability effectiveness -- In practice - applying what you have learned -- Lab architecture -- Lab contents -- Lab instructions -- Summary -- Further reading -- Chapter 5: Resolution Path - Master Troubleshooting -- Properly defining the problem - and what to ask and not ask -- Source of information…”
Libro electrónico -
5743Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyrights and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Learning the Concepts and Skills Required to Get Started -- Chapter 1: Introduction to Industrial Automation -- Introducing industrial automation -- Exploring the types of industrial automation -- Fixed automation system -- Programmable automation system -- Flexible automation system -- Integrated automation system -- Understanding the levels of industrial automation -- Field level -- Control level -- Supervisory and production level -- Discovering the advantages and disadvantages of industrial automation -- Advantages of industrial automation -- Disadvantages of industrial automation -- Summary -- Questions -- Chapter 2: Switches and Sensors - Working Principles, Applications, and Wiring -- Introducing switches and sensors -- Describing manually operated switches -- Push button -- Rocker switch -- Toggle switch -- Slide switch -- Selector switch -- Knife switch -- Describing mechanically operated switches -- Limit switches -- Level switch -- SPDT float switch -- Pressure switch -- Temperature switch -- Understanding proximity sensors (capacitive, inductive, and photoelectric) -- Inductive proximity sensor -- Capacitive proximity sensor -- Photoelectric -- Summary -- Questions -- Chapter 3: Actuators and Their Applications in Industrial Automation -- Introducing actuators -- Learning about electric actuators -- Direct current motors -- Alternating current motors -- Stepper motor -- Servo motor -- Electro-mechanical relay -- Exploring pneumatic actuators -- Pneumatic linear actuator -- Pneumatic rotary actuator -- Getting to know about hydraulic actuators -- Summary -- Questions -- Chapter 4: Overview of AC and DC Motors -- Understanding AC motors -- Synchronous AC motors -- Asynchronous AC motors (induction motors)…”
Libro electrónico -
5744Publicado 2024Tabla de Contenidos: “…Comparing Discrete and Continuous Distributions -- Understanding the Normal Distribution -- Graphing the normal distribution -- Getting to know the standard normal distribution -- Computing standard normal probabilities -- Computing "less than or equal to" standard normal probabilities -- Property 1: The area under the standard normal curve equals 1 -- Property 2: The standard normal curve is symmetrical about the mean -- Computing "greater than or equal to" standard normal probabilities -- Computing "in between" standard normal probabilities -- Computing normal probabilities other than standard normal -- Computing Probabilities for the Normal Distribution with the TI-84 Plus Calculator -- Chapter 10 Sampling Techniques and Distributions -- Sampling Techniques: Choosing Data from a Population -- Probability sampling -- Simple random samples -- Systematic samples -- Stratified samples -- Cluster samples -- Nonprobability sampling -- Convenience samples -- Quota samples -- Purposive samples -- Judgment samples -- Sampling Distributions -- Portraying sampling distributions graphically -- Moments of a sampling distribution -- The Central Limit Theorem -- Converting to a standard normal random variable -- Part 3 Drawing Conclusions from Samples -- Chapter 11 Confidence Intervals and the Student's t-Distribution -- Almost Normal: The Student's t-Distribution -- Properties of the t-distribution -- Degrees of freedom -- Moments of the t-distribution -- Graphing the t-Distribution -- Probabilities and the t-Table -- Point Estimates vs. …”
Libro electrónico -
5745Publicado 2023Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Home Assistant - Installation and Configuration -- Chapter 1: Understanding Home Automation Systems -- Technical requirements -- Overview of home automation systems -- Benefits of having an automated home -- Saving time -- Feeling comfortable -- Saving money -- Being safe -- Home automation structure -- Home automation server -- Sensors -- Actuators -- Communication media -- Protocols and brokers (MQTT) -- User interface and other clients -- Example of a real home automation system -- History -- Current configuration -- Bill of materials and costs -- Summary -- Chapter 2: Getting Started with Home Assistant -- Technical requirements -- Learning about Home Assistant -- Introduction and evolution -- Home Assistant features and resources -- Important Home Assistant definitions -- Home Assistant availability -- Community and support -- YAML -- Raspberry Pi as a home automation server -- Hardware architecture -- Main Raspberry Pi features used by the home automation system -- Installing Home Assistant on a Raspberry Pi -- Preparing the SD card for Home Assistant installation -- Home Assistant installation verification of Raspberry Pi -- Home Assistant initial configuration -- Exploring a Home Assistant installation -- Home Assistant default screen and menu disposition -- Home Assistant sidebar navigation -- Home Assistant basic configurations -- User preference configuration -- General configuration -- People configuration -- MQTT configuration -- Wi-Fi network configuration -- Dashboard cleanup -- Summary -- Part 2: Install, Create, and Hack Sensors and Actuators -- Chapter 3: Hands-On Project 1 - Creating Your Own Sensor -- Technical requirements -- Knowing the parts and tools to build your sensor…”
Libro electrónico -
5746Publicado 2024Tabla de Contenidos: “…How to Start Tapping into Community from the Get-Go -- Getting to Know Your Audience -- Find Your First Advocates -- Engage in Your Audience's Current Communities -- Start Small Initiatives to Bring Customers Together -- Involve Your Whole Organization in Early Efforts -- Create Experiences That Demonstrate Your Culture and Values -- Get Ready for the Next Phase of Community-Building -- Chapter 6 Law 2: You Have to Own the Platform: Engage Your Customers Beyond Borrowed GroundBy Kenneth Refsgaard and Nadia Nicolai -- Building a Community on a Social Platform (Like Facebook) -- Building a Community on a Collaboration Platform (like Slack) -- The Power of an Owned Platform -- Summary -- Chapter 7 Law 3: Community Should Be the Heart of the Customer Journey: Activate and Engage Your Customers at ScaleBy Aaron Hatton and Haiko Krumm -- Customer Life Cycle and Customer Journey Explained -- Journey Map to Define the Desired Customer Journey -- Community at the Heart of the Customer Journey -- Community as a Concept versus Content and Engagement Within -- Stages of the Customer Journey, from Onboarding to Pre-Sales -- Onboarding -- Adoption -- Nurturing -- Renewal/Growth -- Loyalty -- Pre-Sales -- It Starts with Valuable Content -- Chapter 8 Law 4: Create Content That Educates and Inspires: Be the Best Thought Leader You Can BeBy Remco de Vries and Kenneth Refsgaard -- The Four Pillars of Community Content -- Where to Focus Your Attention -- Types of Community Content -- Conversations -- Questions and Answers -- Articles and Blogs -- Courses and Trainings -- Feedback and Ideas -- Product Updates -- Event-Focused Content -- Social Content -- Getting Started with Community Content -- Segmenting Your Audience -- Who Creates Community Content? …”
Libro electrónico -
5747Publicado 2024Tabla de Contenidos: “…Chapter 4: Design Principles for Secure Cloud Computing -- Security for IaaS, SaaS, and PaaS -- Security Considerations for Infrastructure as a Service (IaaS) -- Core Elements of Security for IaaS -- Security Considerations for Platform as a Service (PaaS) -- Core Elements of Security for PaaS -- Security Considerations for Software as a Service (SaaS) -- Core Elements of Security for SaaS -- Shared Responsibility Model for Cloud Service Models -- Review of Your Responsibilities -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 5: How to Evaluate Your Cloud Service Provider -- Key Cloud Service Contractual Documents -- CSA -- The Customer Agreement -- The CSA from a CSP Perspective -- AUP -- The Purpose of an AUP -- The Importance of an AUP -- SLA -- The Purpose of an SLA -- The Key Characteristics of an SLA -- The Importance of an SLA -- Evaluation of the CSP Services -- Know Your Business Needs -- Assessing Security and Compliance -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 6: Cloud Data Security Concepts and Architectures -- Structured and Unstructured Data -- Key Differences -- The Cloud Data Lifecycle -- Data Creation or Procurement -- Data Storage -- Data Usage -- Data Sharing -- Data Archiving -- Data Destruction -- Various Storage Types and Common Threats -- Object Storage -- File Storage -- Block Storage -- Prevalent Threats to Cloud Data -- Security Measures for Cloud Object Storage, File Storage, and Block Storage -- Data Classification and Discovery -- Recommended Data Classification Process -- Cloud Data Security Technologies and Common Strategies -- Encryption in Cloud Data Security -- IAM -- SIEM -- Firewall and Intrusion Detection Systems -- Data Loss Prevention Tools -- Critical Cloud Data Security Strategies -- Importance of a Cloud Security Policy…”
Libro electrónico -
5748Publicado 2024Tabla de Contenidos: “…-- The Apriori algorithm - a practical example -- Evaluation metrics -- In summary -- Applications of UL -- Market segmentation -- Anomaly detection -- Feature extraction -- Summary -- Interpreting and Evaluating Machine Learning Models -- How do I know whether this model will be accurate? -- Evaluating on test (holdout) data -- Understanding evaluation metrics -- Evaluating regression models -- R-squared -- Root mean squared error -- Mean absolute error -- When and how to use each metric -- Practical evaluation strategies -- Summarizing the evaluation of regression models -- Evaluating classification models -- Classification model evaluation metrics -- Precision, recall, and F1-Score -- Recall -- F1-score -- Methods for explaining machine learning models -- Making sense of regression models - the power of coefficients -- Decoding classification models - unveiling feature importance -- Beyond specific models - universal insights using SHAP values -- Summary -- Common Pitfalls in Machine Learning -- Understanding the complexity -- Dirty data, damaged models - how data quantity and quality impact ML -- The importance of adequate training data -- Dealing with poor data quality -- Conclusion -- Overcoming overfitting and underfitting -- Navigating training-serving skew and model drift -- Ensuring fairness -- Mastering overfitting and underfitting for optimal model performance…”
Libro electrónico -
5749por Tsuji, KoichiTabla de Contenidos: “…Adding app users to your apps and defining editing permissions -- Adding new users as normal users -- Adding new users as a co-author -- Defining the app role for each user -- Controlling permission levels with expressions -- Using the userrole() expression to control permissions -- Using the useremail() expression to control permissions -- Passing an expression to the table permission control -- Controlling what data is sent to a user's device and security options -- Creating a new security filter per table -- Implementing additional security measures for safety -- Summary -- Chapter 7: Managing the App Environment -- Analyzing app features and transferring the app ownership -- The Plan requirements tab -- Transferring the app ownership -- Setting editor settings, copying, and deleting apps -- Performing app version management -- The version history of an app -- Upgrading the app version for all users -- Creating a stable version of an app -- Deploying an app with all features -- Checking an app's deployment readiness -- White labeling an app -- Additional options under the Deploy tab -- Monitoring app usage and app sync performance -- Knowing the user's app usage pattern -- Using Audit History for the row-level user activity -- Analyzing an app's sync performance -- Sending on-demand messages to app users -- Summary -- Part 3 - Advanced Features and External Services -- Chapter 8: Automating Recurring Data Changes and Scheduling Tasks -- What is AppSheet Automation? …”
Publicado 2023
Libro electrónico -
5750
-
5751Publicado 2017“…Is there something they know that the rest of us don't? Is it something we can all learn? …”
Libro electrónico -
5752Publicado 1999“…Most companies know that their creative performance falls far short of potential, but they don't know what to do about it. …”
Grabación no musical -
5753por Overstreet, H. A. 1875-1970
Publicado 1964Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
5754por Dupré, Ben
Publicado 2014Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
5755Publicado 2014“…These small business owners know their markets, know their customers, and know how to make their small business run. …”
Libro electrónico -
5756Publicado 2022“…As a leader, you might know exactly what you need to do, but might be less clear on how to do it. …”
Grabación no musical -
5757por Bruhns, Wibke, 1938-“…I know I wouldn't be here without him. And what do I know about him? …”
Publicado 2008
Libro -
5758por Tannenbaum, Scott I.“…If you are a team leader, team member, senior leader, or consultant you need to know what really drives team effectiveness. Are you confident you know what truly makes a difference?…”
Publicado 2020
Libro -
5759
-
5760