Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
2601por Arboledas Brihuega, DavidTabla de Contenidos: “….) -- 2.7 LA ERA DE LOS ORDENADORES -- 2.8 RESUMEN -- 2.9 EVALUACIÓN -- 2.10 EJERCICIOS PROPUESTOS -- LA INSTALACIÓN DE PYTHON -- 3.1 DESCARGA E INSTALACIÓN DE PYTHON -- 3.1.1 INSTALACIÓN EN WINDOWS -- 3.1.2 INSTALACIÓN EN MAC OS X -- 3.1.3 INSTALACIÓN EN LINUX -- 3.2 DESCARGA DEL MÓDULO PYPERCLIP.PY -- 3.3 LA EJECUCIÓN DEL ENTORNO INTERACTIVO -- 3.3.1 REGLAS DE ESTILO -- 3.4 SPYDER -- 3.5 RESUMEN -- LOS ELEMENTOS DEL LENGUAJE -- 4.1 PYTHON COMO CALCULADORA -- 4.1.1 PRIORIDAD EN LAS OPERACIONES -- 4.2 VARIABLES -- 4.3 CADENAS Y LISTAS -- 4.3.1 CONCATENACIÓN DE CADENAS -- 4.3.2 REPLICACIÓN CON EL OPERADOR * -- 4.3.3 CARACTERES DE ESCAPE -- 4.3.4 INDEXACIÓN Y FRACCIONAMIENTO -- 4.3.5 LAS LISTAS -- 4.4 LOS COMENTARIOS -- 4.5 EL PRIMER PROGRAMA -- 4.6 RESUMEN -- 4.7 EVALUACIÓN -- 4.8 EJERCICIOS PROPUESTOS -- ATBASH Y LA CIFRA CÉSAR -- 5.1 LA CIFRA ATBASH -- 5.1.1 EL CÓDIGO FUENTE -- 5.1.2 CÓMO FUNCIONA EL PROGRAMA -- 5.2 LA CIFRA CÉSAR -- 5.2.1 EL CÓDIGO FUENTE -- 5.2.2 CÓMO FUNCIONA EL PROGRAMA -- 5.2.3 CÓMO CIFRAR CARACTERES NO ALFABÉTICOS -- 5.3 RESUMEN -- 5.4 EVALUACIÓN -- 5.5 EJERCICIOS PROPUESTOS…”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2602por Rodenburg, Jort“…Code Like A Pro in C# you will learn: Unit testing and test-driven development Refactor a legacy .NET codebase Principles of clean code Essential backend architecture skills Query and manipulate databases with LINQ and Entity Framework Core Critical business applications worldwide are written in the versatile C# language and the powerful .NET platform, running on desktops, cloud systems, and Windows or Linux servers. Code Like a Pro in C# makes it easy to turn your existing abilities in C# or another OO language (such as Java) into practical C# mastery. …”
Publicado 2021
Libro electrónico -
2603Publicado 2024Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Python for Offensive Security -- Chapter 1: Introducing Offensive Security and Python -- Understanding the offensive security landscape -- Defining offensive security -- The origins and evolution of offensive security -- Use cases and examples of offensive security -- Industry relevance and best practices -- The role of Python in offensive operations -- Key cybersecurity tasks that are viable with Python -- Python's edge in cybersecurity -- The limitations of using Python -- Ethical hacking and legal considerations -- The key protocols of ethical hacking -- Ethical hacking's legal aspects -- Exploring offensive security methodologies -- Significance of offensive security -- The offensive security lifecycle -- Offensive security frameworks -- Setting up a Python environment for offensive tasks -- Setting up Python on Linux -- Setting up Python on macOS -- Setting up Python on Windows -- Exploring Python modules for penetration testing -- Essential Python libraries for penetration testing -- Case study - Python in the real world -- Scenario 1 - real-time web application security testing -- Scenario 2 - network intrusion detection -- Summary -- Chapter 2: Python for Security Professionals - Beyond the Basics -- Utilizing essential security libraries -- Harnessing advanced Python techniques for security -- Compiling a Python library -- Advanced Python features -- Decorators -- Generators -- Summary -- Activity -- Part 2: Python in Offensive Web Security -- Chapter 3: An Introduction to Web Security with Python -- Fundamentals of web security -- Python tools for a web vulnerability assessment -- Wapiti -- MITMProxy -- SQLMap -- Exploring web attack surfaces with Python -- HTTP header analysis -- HTML analysis…”
Libro electrónico -
2604por Moeller, Morten“…This IBM Redbooks publication demonstrates how to architect, establish, and configure a Tivoli systems management environment that supports the central management of thousands of outlet systems based on the open United Linux platform. The main focus of this book is to provide step-by-step instructions, sample scripts, and code to install and deploy the core Tivoli products that enable the organization to: - Deploy and maintain distributed application solutions - Monitor availability and performance of remote systems, middleware components and applications - Perform diagnostics and troubleshooting of remote system and application components to resolve availability or performance issues - Gather metrics to document performance levels This book is intended for IT professionals with a basic understanding of the core Tivoli product set and who are responsible for deploying a Tivoli management infrastructure. …”
Publicado 2005
Libro electrónico -
2605
-
2606Publicado 2013Tabla de Contenidos: “…Postmortem Forensics -- Live Forensics -- When Live Forensics Is the Best Option -- Tools for Live Forensics -- Postmortem Forensics -- Postmortem Memory Analysis -- Chapter 8: Capturing Evidence -- Creating Forensic Images of Internal Hard Drives -- FTK Imager with a Hardware Write Blocker -- FTK Imager with a Software Write Blocker -- Creating Forensic Images of External Drives -- FTK Imager with a USB Write Blocker -- FTK Imager with a Software Write Blocker -- Software Write Blocking on Linux Systems -- Creating Forensic Images of Network Shares…”
Libro electrónico -
2607Publicado 2023Tabla de Contenidos: “…Cloning the Repository -- Import an Existing Git Repository to Azure DevOps -- Pull Requests -- Draft Pull Requests -- Create a Pull Request from Azure Repos -- Creating a Pull Request from the Pull Requests Page -- Creating a Pull Request from a Feature Branch -- Creating a Pull Request from a Work Item in Azure Boards -- Creating a Draft Pull Request -- Collaborate in Pull Requests -- Git Tags -- Annotated Tags -- Lightweight Tags -- Create Tags in Azure DevOps -- Using the Tags View -- Using the Commits View -- Summary -- Chapter 5 Automating Code Builds with Azure Pipelines -- Overview of Continuous Integration and Continuous Deployment -- Continuous Integration -- Continuous Deployment -- Continuous Delivery -- Overview of Azure Pipelines -- Azure Pipelines Features -- Defining Pipelines -- Defining Pipelines Using YAML -- Defining Pipelines Using the Classic Editor -- Components of Azure Pipelines -- Azure Pipelines Agents and Agent Pools -- Agents -- Agent Pools -- Using Microsoft-Hosted Agents -- Using Self-Hosted Linux Agents -- Using Self-Hosted Windows Agents -- Using Self-Hosted macOS Agents -- Azure Pipelines Build Script -- YAML Overview -- Writing a Build Script -- Summary -- Chapter 6 Running Automated Tests with Azure Pipelines -- Overview of Software Testing -- History of Software Testing -- Continuous Testing -- Importance of Software Testing -- Types of Software Tests -- Unit Tests -- Integration Tests -- Smoke Tests -- Regression Tests -- End-to-End Tests -- Other Types of Software Tests -- Steps for Running Software Tests -- Setting Up Testing in Azure Pipelines -- Summary -- Chapter 7 Creating and Hosting Source Code Packages with Azure Artifacts -- Overview of Artifact Repositories -- Introduction to Azure Artifacts -- Azure Artifacts Feeds -- Project-Scoped Feeds -- Organization-Scoped Feeds…”
Libro electrónico -
2608Publicado 2014Tabla de Contenidos: “…Installation -- Installing on Windows -- Installing the server and the default agent -- Installing additional agents -- Installation on Mac OS X -- Running the TeamCity server and the default agent -- Setting up the TeamCity server as a daemon -- Installing additional agents -- Installation on Linux -- Running the server and the default agent -- Running the TeamCity server as a daemon -- Installing additional agents -- Summary -- 3. …”
Libro electrónico -
2609Publicado 2018Tabla de Contenidos: “…Modeling the whole of Wikipedia -- Choosing the number of topics -- Summary -- Chapter 11: Classification III - Music Genre Classification -- Sketching our roadmap -- Fetching the music data -- Converting into WAV format -- Looking at music -- Decomposing music into sine-wave components -- Using FFT to build our first classifier -- Increasing experimentation agility -- Training the classifier -- Using a confusion matrix to measure accuracy in multiclass problems -- An alternative way to measure classifier performance using receiver-operator characteristics -- Improving classification performance with mel frequency cepstral coefficients -- Music classification using Tensorflow -- Summary -- Chapter 12: Computer Vision -- Introducing image processing -- Loading and displaying images -- Thresholding -- Gaussian blurring -- Putting the center in focus -- Basic image classification -- Computing features from images -- Writing your own features -- Using features to find similar images -- Classifying a harder dataset -- Local feature representations -- Image generation with adversarial networks -- Summary -- Chapter 13: Reinforcement Learning -- Types of reinforcement learning -- Policy and value network -- Q-network -- Excelling at games -- A small example -- Using Tensorflow for the text game -- Playing breakout -- Summary -- Chapter 14: Bigger Data -- Learning about big data -- Using jug to break up your pipeline into tasks -- An introduction to tasks in jug -- Looking under the hood -- Using jug for data analysis -- Reusing partial results -- Using Amazon Web Services -- Creating your first virtual machines -- Installing Python packages on Amazon Linux -- Running jug on our cloud machine -- Automating the generation of clusters with cfncluster -- Summary -- Appendi A: Where to Learn More About Machine Learning -- Online courses -- Books -- Blogs…”
Libro electrónico -
2610Publicado 2019Tabla de Contenidos: “…-- 10.3.1 Regression -- 10.3.2 Clustering -- 10.3.3 Working with maps -- 10.3.4 Interacting with APIs -- 10.3.5 Sharing your package -- 10.4 More resources -- Terminology -- Summary -- Appendix A: Installing R -- Windows -- Mac -- Linux -- From source -- Appendix B: Installing RStudio -- Installing RStudio -- Packages used in this book -- Appendix C: Graphics in base R -- Index -- List of Figures -- List of Tables -- List of Listings…”
Libro electrónico -
2611por Soni, MaulikTabla de Contenidos: “…Setting up the Cost Management connector for Power BI -- Forecasting based on manual estimates -- Forecasting based on past usage -- Advanced forecasting by application -- Identifying usage charges by application -- Fully loaded costs in forecasting -- Summary -- Chapter 4: Case Study - Beginning the Azure FinOps Journey -- Case study - Peopledrift Healthcare -- Challenges -- Objectives -- Solution -- Benefits -- Summary -- Part 2: Optimize -- Chapter 5: Hitting the Goals for Usage Optimization -- Technical requirements -- The project management triangle method for goal setting -- Setting OKRs or KPIs -- OKR examples -- KPI - tagging by business unit -- KPI - cost avoidance for unattached disks by business unit -- KPI - Azure Hybrid Benefit utilization by business unit -- KPI - storage accounts with hot, cool, and archive tiers -- Understanding Azure Advisor recommendations for usage optimization -- Accessing Azure Advisor using the portal -- Accessing Azure Advisor using the CLI -- Top 10 usage optimization targets using custom Azure workbooks -- Target 1 - 98% of all your resources must be tagged -- Target 2 - right-sizing underutilized virtual machines -- Target 3 - enabling Azure Hybrid Benefit for Windows and Linux VMs -- Target 4 - right-sizing underutilized SQL databases -- Target 5 - enabling Azure Hybrid Benefit for SQL databases, managed instances, and SQL VMs -- Target 6 - upgrading storage accounts to General-purpose v2 -- Target 7 - deleting unattached discs -- Target 8 - deleting unattached public IPs -- Target 9 - Azure App Service - using the v3 plan with reservations and autoscaling -- Target 10 - Azure Kubernetes Service - using the cluster autoscaler, Spot VMs, and start/stop features in AKS -- Trade-offs of cost versus security, performance, and reliability -- Cost versus security -- Cost versus performance…”
Publicado 2023
Libro electrónico -
2612Publicado 2023Tabla de Contenidos: “…-- Summary -- Chapter 2: The Unity Editor and Scene Creation -- Technical requirements -- Setting up the Unity development environment -- Installing the Unity Hub -- Installing the Unity Editor -- Loading a sample scene as a new Unity project -- Choosing the right render pipeline -- Getting to know the Unity Editor and its interface -- Exploring the Unity interface -- Using the Grid and Snap system -- Understanding GameObjects and components -- Understanding the default new scene -- Adding a collider -- Creating a basic scene in Unity and adding objects -- Building a table with primitives -- Changing the appearance of the ground, table, and sphere -- Creating a brick wall material -- Unpacking a prefab -- Importing from the Unity Asset Store -- Understanding Unity's lighting pipeline -- Choosing the right lighting settings -- Adding lights and a skybox -- Exploring light and reflection probes -- Summary -- Part 2 - Interactive XR Applications with Custom Logic, Animations, Physics, Sound, and Visual Effects -- Chapter 3: VR Development in Unity -- Technical requirements -- Windows -- macOS -- Linux -- What is VR development? -- Exploring the contrasts between classical and VR game development -- Understanding different approaches to power VR headsets -- Setting up a VR project in Unity and the XR Interaction Toolkit -- Creating a project in Unity for VR development -- Installing XR Plug-in Management and XR Plug-ins…”
Libro electrónico -
2613Publicado 2022Tabla de Contenidos: “…2.32 Conclusions - predictions about storage systems -- 2.32.1 Resurgence in shared storage, but Fibre-Channel fades -- 3 Disk drive data placement and scheduling -- 3.1 The organization of Hard Disk Drives - HDDs -- 3.2 Internal organization of files in UNIX -- 3.3 Review of disk arm scheduling -- 3.3.1 Implementation of SATF -- 3.3.2 Disk performance studies by Windsor Hsu and Alan Jay Smith at IBM ARC -- 3.3.3 Linux support for disk scheduling -- 3.4 Disk scheduling for mixed workloads -- 3.5 Real time disk scheduling for multimedia -- 3.6 Storage virtualization -- 3.7 File placement on disk -- 3.7.1 Anticipatory disk arm placement -- 3.8 Disks with Shingled Magnetic Recording - SMR -- 3.9 Review of analyses of disk scheduling methods -- 3.10 Analytic studies of disk storage -- 3.11 Analysis of a zoned disk with the FCFS scheduling -- 3.11.1 Disk service time in zoned disks with FCFS scheduling -- 3.12 Performance analysis of the SCAN policy -- 3.13 Analysis of the SATF policy -- 3.13.1 Preliminary investigation of SATF -- 3.13.2 First method for the analysis of SATF -- 3.13.3 Second method for the analysis of SATF -- 3.14 Conclusions -- 4 Mirrored & -- hybrid arrays -- 4.1 Introduction to mirrored and hybrid disk arrays -- 4.2 Mirrored and hybrid disk array organizations -- 4.2.1 Basic Mirroring - BM -- 4.2.2 Group Rotate Declustering - GRD -- 4.2.3 Interleaved Declustering - ID -- 4.2.4 Chained Declustering - CD -- 4.2.5 Dual striping -- 4.2.6 Logical volume and automatic storage management and GPFS -- 4.2.7 LSI Logic RAID -- 4.2.8 Adaptive disk arrays -- 4.2.9 SSPiRAL (Survivable Storage using Parity in Redundant Array Layout) -- 4.2.10 B-code -- 4.2.11 Weaver codes -- 4.2.12 Robust, Efficient, Scalable, Autonomous, Reliable - RESAR -- 4.2.13 Multiway placement -- 4.2.14 Classification of mirrored and hybrid disk arrays…”
Libro electrónico -
2614Publicado 2021Tabla de Contenidos: “…Chapter 6 Software Composition Analysis in the Automotive Industry -- 6.1 Software Composition Analysis: Benefits and Usage Scenarios -- 6.2 Problem Statement: Analysis of Automotive Software Open‐Source Software Risks -- 6.2.1 Analysis Results -- 6.2.1.1 zlib -- 6.2.1.2 libpng -- 6.2.1.3 OpenSSL -- 6.2.1.4 curl -- 6.2.1.5 Linux Kernel -- 6.2.2 Discussion -- 6.3 Solution: Countermeasures on Process and Technical Levels -- 6.3.1 Fully Inventory Open‐Source Software -- 6.3.2 Use Appropriate Software Composition Analysis Approaches -- 6.3.3 Map Open‐Source Software to Known Security Vulnerabilities -- 6.3.4 Identify License, Quality, and Security Risks -- 6.3.5 Create and Enforce Open‐Source Software Risk Policies -- 6.3.6 Continuously Monitor for New Security Threats and Vulnerabilities -- 6.3.7 Define and Follow Processes for Addressing Vulnerabilities in Open‐Source Software -- 6.3.8 How to Get Started -- 6.4 Chapter Summary -- References -- Chapter 7 Overview of Automotive Security Testing Approaches -- 7.1 Practical Security Testing -- 7.1.1 Security Functional Testing -- 7.1.2 Vulnerability Scanning -- 7.1.3 Fuzz Testing -- 7.1.4 Penetration Testing -- 7.2 Frameworks for Security Testing -- 7.3 Focus on Fuzz Testing -- 7.3.1 Fuzz Engine -- 7.3.2 Injector -- 7.3.3 Monitor -- 7.4 Chapter Summary -- References -- Chapter 8 Automating Fuzz Testing of In‐Vehicle Systems by Integrating with Automotive Test Tools -- 8.1 Overview of HIL Systems -- 8.2 Problem Statement: SUT Requires External Input and Monitoring -- 8.3 Solution: Integrating Fuzz Testing Tools with HIL Systems -- 8.3.1 White‐Box Approach for Fuzz Testing Using HIL System -- 8.3.1.1 Example Test Setup Using an Engine ECU -- 8.3.1.2 Fuzz Testing Setup for the Engine ECU -- 8.3.1.3 Fuzz Testing Setup Considerations -- 8.3.2 Black‐Box Approach for Fuzz Testing Using HIL System…”
Libro electrónico -
2615Publicado 2018Tabla de Contenidos: “…. -- 11.4.9 Capturing the full visualization -- Feeding the chart with data -- Multipage reports -- Debugging code in the headless browser -- Making it work on a Linux server -- 11.5 You can do much more with a headless browser -- 11.5.1 Web scraping -- 11.5.2 Other uses -- Summary -- Chapter 12: Live data -- 12.1 We need an early warning system -- 12.2 Getting the code and data -- 12.3 Dealing with live data -- 12.4 Building a system for monitoring air quality -- 12.5 Set up for development -- 12.6 Live-streaming data -- 12.6.1 HTTP POST for infrequent data submission -- 12.6.2 Sockets for high-frequency data submission -- 12.7 Refactor for configuration -- 12.8 Data capture -- 12.9 An event-based architecture -- Code restructure for event handling -- 12.10.1 Triggering SMS alerts -- 12.10.2 Automatically generating a daily report -- Live data processing -- Live visualization -- Summary -- Chapter 13: Advanced visualization with D3 -- 13.1 Advanced visualization -- 13.2 Getting the code and data -- 13.3 Visualizing space junk -- 13.4 What is D3? …”
Libro electrónico -
2616Publicado 2019Tabla de Contenidos: “…-- Private Package Repositories -- All Poudrieres, Large and Small -- Updating Poudriere -- More Poudriere -- 17 ADVANCED SOFTWARE MANAGEMENT -- Using Multiple Processors: SMP -- Threads, Threads, and More Threads -- Startup and Shutdown Scripts -- Managing Shared Libraries -- Remapping Shared Libraries -- Running Software from the Wrong OS -- Using Linux Mode…”
Libro electrónico -
2617Publicado 2023Tabla de Contenidos: “…Components of Azure Load Balancer -- Algorithm of Azure Load Balancer -- The differences between public and internal load balancers -- Delving into backend pools -- Adding a frontend IP configuration -- Adding a backend pool -- Understanding load balancer rules -- Creating a load balancer rule -- High availability ports -- Floating IP -- Comprehending health probes -- Creating a health probe -- Linking a health probe to a load-balancing rule -- Differences between probe protocols -- Additional guidelines for health probes -- Summary -- Part 3: Administration of Azure Virtual Machines -- Chapter 5: Provisioning Azure Virtual Machines -- Technical requirements -- Exploring the sizes and families of Azure VMs -- Families and their pricing -- Operating systems -- Delving into Azure VM storage -- Types of disks -- Redundancy of disks -- Deploying a VM -- Deploying a single VM -- Connecting to a VM -- Connecting using SSH -- Connecting using RDP -- Connecting with the DNS name -- Connecting using Azure Bastion -- The availability of Azure VMs -- Availability sets -- VMSS -- Summary -- Chapter 6: Configuring Virtual Machine Extensions -- Technical requirements -- Using virtual machine extensions -- Employing an extension in a Windows Azure Virtual Machine -- Using extension in Linux Azure Virtual Machines -- Installing extensions -- Implementing the Custom Script Extension -- Installing software with the Custom Script Extension -- Executing a script -- What is the Desired State Configuration? …”
Libro electrónico -
2618Publicado 2018Tabla de Contenidos: “…-- Litmus testing to justify the application of blockchain technology -- Integrating a blockchain infrastructure for the whole enterprise -- Enterprise design principles -- Business drivers and evolution -- Ensuring sustainability -- The principles that drive blockchain adoption -- Business considerations for choosing a blockchain framework -- Technology considerations for choosing a blockchain framework -- Identity management -- Scalability -- Enterprise security -- Development tooling -- Crypto-economic models -- Decentralization with systemic governance -- Enterprise support -- Use case-driven pluggability choices -- Shared ledger technology -- Consensus -- Crypto algorithms and encryption technology -- Use case-driven pluggable choices -- Enterprise integration and designing for extensibility -- Other considerations -- Consensus, ACID property, and CAP -- CAP -- ACID -- Attestation - SSCs are signed and encrypted -- Use of HSMs -- Summary -- Chapter 2: Exploring Hyperledger Fabric -- Building on the foundations of open computing -- Fundamentals of the Hyperledger project -- The Linux Foundation -- Hyperledger…”
Libro electrónico -
2619Publicado 2018Tabla de Contenidos: “…The policy gradient theorem -- Actor-critic algorithm -- Advantage actor-critic algorithm -- n-step advantage actor-critic algorithm -- n-step returns -- Implementing the n-step return calculation -- Deep n-step advantage actor-critic algorithm -- Implementing a deep n-step advantage actor critic agent -- Initializing the actor and critic networks -- Gathering n-step experiences using the current policy -- Calculating the actor's and critic's losses -- Updating the actor-critic model -- Tools to save/load, log, visualize, and monitor -- An extension - asynchronous deep n-step advantage actor-critic -- Training an intelligent and autonomous driving agent -- Training and testing the deep n-step advantage actor-critic agent -- Training the agent to drive a car in the CARLA driving simulator -- Summary -- Chapter 9: Exploring the Learning Environment Landscape - Roboschool, Gym-Retro, StarCraft-II, DeepMindLab -- Gym interface-compatible environments -- Roboschool -- Quickstart guide to setting up and running Roboschool environments -- Gym retro -- Quickstart guide to setup and run Gym Retro -- Other open source Python-based learning environments -- StarCraft II - PySC2 -- Quick start guide to setup and run StarCraft II PySC2 environment -- Downloading the StarCraft II Linux packages -- Downloading the SC2 maps -- Installing PySC2 -- Playing StarCraftII yourself or running sample agents -- DeepMind lab -- DeepMind Lab learning environment interface -- reset(episode=-1, seed=None) -- step(action, num_steps=1) -- observations() -- is_running() -- observation_spec() -- action_spec() -- num_steps() -- fps() -- events() -- close() -- Quick start guide to setup and run DeepMind Lab -- Setting up and installing DeepMind Lab and its dependencies -- Playing the game, testing a randomly acting agent, or training your own! …”
Libro electrónico -
2620por Córcoles Córcoles, SheilaTabla de Contenidos: “…2.3.3 INSTALACIÓN EN MACOS -- 2.3.4 INSTALACIÓN EN LINUX -- 2.4 ARDUINO WEB EDITOR -- 2.4.1 PROCESO DE REGISTRO -- 2.4.2 ACCESO AL ENTORNO -- 2.5.1 PANTALLA PRINCIPAL -- 2.5.2 MENÚ -- 2.5.3 ACCESOS DIRECTOS -- 2.5.4 EDITOR DE TEXTO -- 2.5.5 MENSAJES -- 2.5.6 ESTADO -- CAPÍTULO 3. …”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico