Mostrando 8,861 - 8,880 Resultados de 17,802 Para Buscar '"Look"', tiempo de consulta: 0.14s Limitar resultados
  1. 8861
    Publicado 2022
    Tabla de Contenidos: “…. -- 2.1.1 Planning the project -- 2.1.2 Understanding 3D coordinate space -- 2.2 Begin the project: Place objects in the scene -- 2.2.1 The scenery: Floor, outer walls, and inner walls -- 2.2.2 Lights and cameras -- 2.2.3 The player's collider and viewpoint -- 2.3 Make things move: A script that applies transforms -- 2.3.1 Visualizing how movement is programmed -- 2.3.2 Writing code to implement the diagram -- 2.3.3 Understanding local vs. global coordinate space -- 2.4 Script component for looking around: MouseLook -- 2.4.1 Horizontal rotation that tracks mouse movement -- 2.4.2 Vertical rotation with limits -- 2.4.3 Horizontal and vertical rotation at the same time -- 2.5 Keyboard input component: First-person controls -- 2.5.1 Responding to keypresses…”
    Libro electrónico
  2. 8862
    Publicado 2017
    Tabla de Contenidos: “…1.6 MAIN CONTENT OF THIS BOOK -- REFERENCES -- 2 - Lossless Information Hiding in Images on the Spatial Domain -- 2.1 OVERVIEW OF SPATIAL DOMAIN-BASED INFORMATION HIDING -- 2.2 MODULO ADDITION-BASED SCHEME -- 2.2.1 EMBEDDING PROCESS -- 2.2.2 AUTHENTICATION PROCESS -- 2.2.3 EXPLANATION OF THE MODULO ADDITION OPERATION -- 2.3 DIFFERENCE EXPANSION-BASED SCHEMES -- 2.3.1 TIAN'S SCHEME -- 2.3.2 ALATTER'S SCHEME -- 2.4 HISTOGRAM MODIFICATION-BASED SCHEMES -- 2.4.1 ORIGINAL HISTOGRAM SHIFTING-BASED SCHEME -- 2.4.2 ADJACENT PIXEL DIFFERENCE-BASED SCHEME -- 2.4.3 MULTILEVEL HISTOGRAM MODIFICATION-BASED SCHEME -- 2.4.3.1 Data Embedding -- 2.4.3.2 Data Extraction and Image Recovery -- 2.4.3.3 Examples -- 2.4.3.3.1 EL=0 -- 2.4.3.3.2 EL=2 -- 2.4.3.4 Discussion -- 2.4.3.4.1 Capacity Estimation -- 2.4.3.4.2 Overflow and Underflow Prevention -- 2.4.3.5 Experimental Results and Comparison With Other Schemes -- 2.4.4 HYBRID PREDICTION AND INTERLEAVING HISTOGRAM MODIFICATION-BASED SCHEME -- 2.4.4.1 Data Embedding -- 2.4.4.2 Data Extraction and Image Recovery -- 2.4.4.3 Experimental Results and Comparisons -- 2.5 LOSSLESS COMPRESSION-BASED SCHEMES -- 2.5.1 LOSSLESS BIT-PLANE COMPRESSION IN THE SPATIAL DOMAIN -- 2.5.2 LOSSLESS RS-DATA EMBEDDING METHOD -- 2.5.3 LOSSLESS G-LSB DATA EMBEDDING METHOD -- 2.5.3.1 G-LSB Embedding -- 2.5.3.2 Lossless G-LSB Data Embedding and Extraction -- 2.5.4 LOOK-UP TABLE-BASED SCHEME FOR ERROR DIFFUSED HALFTONE IMAGES -- 2.5.4.1 Pattern Histogram -- 2.5.4.2 Human Visual System Characteristics -- 2.5.4.3 Look-Up Table Construction -- 2.5.4.4 Data Hiding -- 2.5.4.5 Look-Up Table Embedding -- 2.5.4.6 Data Extraction -- 2.5.4.7 Experimental Results -- 2.6 REVERSIBLE SECRET SHARING-BASED SCHEMES -- 2.6.1 DATA HIDING IN REVERSIBLE SECRET SHARING -- 2.6.1.1 Related Work -- 2.6.1.2 Proposed Scheme -- 2.6.1.2.1 Encoding Stage…”
    Libro electrónico
  3. 8863
    Publicado 2020
    Tabla de Contenidos: “…-- 12.4 What does an ideal dataset look like? -- 12.4.1 Making the data look less like the actual and more like the "ideal" -- 12.4.2 Contrasting training with a balanced LunaDataset to previous runs -- 12.4.3 Recognizing the symptoms of overfitting -- 12.5 Revisiting the problem of overfitting -- 12.5.1 An overfit face-to-age prediction model -- 12.6 Preventing overfitting with data augmentation…”
    Libro electrónico
  4. 8864
    Publicado 2023
    Tabla de Contenidos: “…12.9 Chief Information Security Officer (CISO) -- Summary -- Checklist -- 13 Housekeeping -- 13.1 Managing hardware -- 13.2 Support contracts -- 13.2.1 Providing support -- 13.3 Monitoring -- 13.3.1 Outside looking in -- 13.3.2 Inside looking in -- 13.4 Backup and restoration -- 13.4.1 Frequency/retention -- 13.4.2 Archive security -- 13.5 Budget oversight -- Summary -- Checklist -- 14 Company growth -- 14.1 Investment groups -- 14.2 Impromptu pitch -- 14.3 Investment cadence -- 14.4 Preparing for integration -- 14.5 Due diligence -- 14.5.1 Performing due diligence -- 14.5.2 Conducting due diligence -- 14.5.3 Presenting your findings -- 14.5.4 Answering due diligence -- 14.6 Handing over the reins -- 14.7 Taking the reins -- Summary -- Checklist -- 15 You, Inc. -- 15.1 Reviewing yourself -- 15.2 Mentor -- 15.3 Keeping pace -- 15.4 Monitoring change -- 15.5 Succession planning -- 15.6 Career success -- 15.7 Stepping up -- Summary -- Checklist -- index…”
    Libro electrónico
  5. 8865
    Tabla de Contenidos: “…The future of landscape archaeology / 6.2. Look the other way - from a branch of archaeology to a root of landscape studies / 6.3. …”
    Libro electrónico
  6. 8866
    por Silver, Seth R.
    Publicado 2021
    Tabla de Contenidos: “…-- What Do Real Workplace Covenants Look Like? -- Sample Workplace Covenants -- Chapter 3: A Covenant Story -- Covenant Story I: Roy - ̋From Great to Superb ̋ -- The Initial Session -- Reviews and Breakthroughs -- Lessons Learned from Roy and His Staff -- How Did the Workplace Covenant Session Go? …”
    Libro electrónico
  7. 8867
    Publicado 2018
    Tabla de Contenidos: “…The code for character customization -- Preserving our character state -- Recap -- Non-player characters -- Non-player character basics -- Setting up the non-player character -- NPC Animator Controller -- NPC Attack -- NPC AI -- PC and NPC interaction -- Summary -- Chapter 5: GameMaster and Game Mechanics -- GameMaster -- Managing game settings and audio -- Managing scenes -- Improving GameMaster -- Level controller -- Audio controller -- Player data management -- PC class enhancements -- Character customization class update -- Changes to the game level controller -- Testing -- Summary -- Chapter 6: Inventory System -- Designing an inventory system -- Weighted inventory -- Determining item types -- Creating an inventory item -- Creating the prefab -- Adding an inventory item agent -- Inventory items defined as prefabs -- Designing an inventory interface -- Creating the inventory UI framework -- Designing a dynamic item viewer -- Adding a scroll view -- Adding elements to PanelItem and Scroll View -- Adding txtItemElement dynamically -- Building the final inventory item UI -- Integrating the UI with the actual inventory system -- Hooking the category buttons and displaying the data -- Testing the inventory system -- Inventory items and the player character -- Applying inventory items -- How it looks -- Summary -- Chapter 7: User Interface and System Feedback -- Designing a heads-up display -- HUD basics -- Our design -- HUD framework -- Completing our HUD design -- Character info panel -- Active inventory items panel -- Special items panel -- Integrating the code -- Enemy stats in the HUD -- NPC stats user interface -- Creating the NPC canvas -- NPC taking a hit -- Enhancing the code -- Summary -- Chapter 8: Multiplayer Setup -- Challenges of a multiplayer game -- Initial multiplayer game -- Fundamental networking components…”
    Libro electrónico
  8. 8868
    Publicado 2021
    Tabla de Contenidos: “…Myth #3: Real Estate Is Merely an Inflation Hedge -- Myth #4: REIT Performance Is Anchored to REIT Property Performance -- Myth #5: REIT Stocks Are Trading Vehicles -- Chapter 10 REITs: Growth and Value Creation -- The Significance of FFO -- Funds from Operations (FFO) -- Adjusted Funds from Operations (AFFO) -- The Dynamics of FFO/AFFO Growth -- Internal Growth -- Rental Revenue Increases -- How to Build Internal Growth into a Lease -- Property Refurbishments -- Capital Recycling -- Technology Upgrades -- NOI and IRR -- External Growth -- Acquisition Opportunities -- The Cost of Equity Capital -- New Developments -- More External Growth Avenues -- Chapter 11 Searching for Blue Chips -- Growth REITs -- Value or "Turnaround" REITs -- The Virtue of Blue-Chip REITs -- The Supreme Importance of Management -- Creating Value in All Types of Climates -- Extra Growth Internally -- The "One-Off" Deal -- Cost Control -- Track Record of Value Creation -- Access to Capital and Its Effective Deployment -- Chapter 12 Breaking Down the REIT Balance Sheet -- Debt Ratios -- Interest Coverage Ratios -- Debt Maturity -- Variable-Rate Debt -- Secured Debt -- Conservative and Consistent Dividends -- Corporate Governance -- Chapter 13 REIT Preferred Stocks: (Contributed by Jay Hatfield) -- Primary Characteristics of REIT Preferred Stocks -- Types of Preferred Stocks -- Credit Ratings and Analysis -- Yield to Call -- Interest Rate Risk -- Stock Market Risk and Recessions -- Types of Preferred Stocks -- Taxation -- ETFs, Mutual Funds, and Closed End Funds -- Conclusion -- Chapter 14 The Quest for Investment Value -- Real Estate Asset Values -- P/FFO Models -- Discounted Cash Flow and Dividend Growth Models -- Valuing REITs as a Group -- Chapter 15 Building a REIT Portfolio -- Modest Risks and Sustainable Retirements -- Looking for the "Holy Grail" Allocation…”
    Libro electrónico
  9. 8869
    Publicado 2021
    Tabla de Contenidos: “…-- Benefits of a Demand Signal Repository -- What Are Users Looking to Gain? -- Why Is It Important? -- What Is Consumption-Based Analytics? …”
    Libro electrónico
  10. 8870
    Publicado 2016
    Tabla de Contenidos: “…Mineral resources and multinational corporations and its impact on African people -- Introduction -- The contemporary scene -- Bible study -- A prayer -- References -- SECTION 3: Transgressive Bodies -- 1. Look out -- Introduction…”
    Libro electrónico
  11. 8871
    Publicado 2023
    Tabla de Contenidos: “…-- Let Us Claw Our Way Back -- Seeking Numbers, Forming Theories, Creating Narratives -- Looking to the Future -- Chapter 13 The Advancement of Intelligence or the End of It? …”
    Libro electrónico
  12. 8872
    Publicado 2016
    Tabla de Contenidos: “…File Management -- File and Directory Names -- File and Directory Wildcards -- Looking Inside Files -- cat -- less -- grep -- Creating and Editing Files -- Text Editors and Word Processors -- The vi Text Editor -- vi Basics -- A Simpler vi Alternative: Pico -- The More Complex Option: Emacs -- Managing Files -- Creating Directories with mkdir -- Copying Files -- Renaming and Moving Files with mv -- Removing Files and Directories -- Working with Links -- Compressing and Archiving Files -- Files on Other Operating Systems -- Chapter 5. …”
    Libro electrónico
  13. 8873
    Publicado 2017
    Tabla de Contenidos: “…Diversity and Inclusion -- 6. Technology -- Looking Ahead -- The Future Happened Yesterday -- Chapter 2: Leadership -- An Old Brand of Leadership -- Self-Focused Leadership -- Greed -- The Consequences -- Twenty-First-Century Leadership -- The Privilege of Leadership -- Personal Values Create Company Values -- Defining Values -- Leaders with Heart -- A Decision to Lead -- Future-Proof Your Company -- Future-Proof Your Career -- Chapter 3: Culture -- What's the Difference? …”
    Libro electrónico
  14. 8874
    Publicado 2016
    Tabla de Contenidos: “…Backing up and restoring packages -- Making use of aptitude -- Installing Snap packages -- Summary -- Chapter 6: Controlling and Monitoring Processes -- Showing running processes with the ps command -- Managing jobs -- Killing misbehaving processes -- Utilizing htop -- Managing system processes -- Monitoring memory usage -- Scheduling tasks with Cron -- Understanding load average -- Summary -- Chapter 7: Managing Your Ubuntu Server Network -- Planning your IP address scheme -- Serving IP addresses with isc-dhcp-server -- Setting up name resolution (DNS) with bind -- Creating a secondary DNS server -- Setting up an Internet gateway -- Keeping your system clock in sync with NTP -- Summary -- Chapter 8: Accessing and Sharing Files -- File server considerations -- Sharing files with Windows users using Samba -- Setting up NFS shares -- Transferring files with rsync -- Transferring files with SCP -- Mounting remote filesystems with SSHFS -- Summary -- Chapter 9: Managing Databases -- Preparations for setting up a database server -- Installing MariaDB -- Taking a look at MariaDB configuration -- Understanding how MariaDB differs in Ubuntu 16.04 -- Managing databases -- Setting up a slave DB server -- Summary -- Chapter 10: Serving Web Content -- Installing and configuring Apache -- Installing additional Apache modules -- Securing Apache with SSL -- Setting up high availability with keepalived -- Installing and configuring ownCloud -- Summary -- Chapter 11 : Virtualizing Hosts and Applications -- Setting up a virtual machine server -- Creating virtual machines -- Bridging the virtual machine network -- Creating, running, and managing Docker containers -- Summary -- Chapter 12 : Securing Your Server -- Lowering your attack surface -- Securing OpenSSH -- Installing and configuring Fail2ban -- MariaDB best practices -- Setting up a firewall…”
    Libro electrónico
  15. 8875
    Publicado 2023
    Tabla de Contenidos: “…-- Turning on the LDE -- Linux features -- Managing device permissions and Linux backup/restore -- Linux permissions -- Linux backup/restore -- Managing Linux storage -- Enabling Android Debug Bridge -- Implementing port forwarding -- Summary -- Chapter 8: Working with the Chrome Shell (Crosh) -- Technical requirements -- Accessing Crosh -- Looking at the essential Crosh commands for systems administration -- help -- help_advanced -- uptime -- top -- enroll_status -- ipaddrs -- ping -- modem -- set_time -- battery_test -- battery_firmware info -- free -- meminfo -- memeory_test -- Ssorage_test -- network_diag -- tracepath -- route -- rollback -- vmc -- exit -- Shell scripting -- Summary -- Chapter 9: Google Workspace Admin Console -- Technical requirements -- An overview of Google Workspace -- The major features of the Admin console -- Accessing the Admin console…”
    Libro electrónico
  16. 8876
    por Celko, Joe
    Publicado 2008
    Tabla de Contenidos: “…Group Characteristics; 12.1 Grouping Is Not Equality; 12.2 Using Groups without Looking Inside; 12.3 Grouping over Time…”
    Libro electrónico
  17. 8877
    Publicado 2011
    Tabla de Contenidos: “…-- Summary -- 5 Programming the User Interface -- Thinking About UI Patterns -- MVC: A Classic Pattern -- MVP: A More Suitable Pattern -- Implementing MVP -- Callbacks Galore -- Implementation Details -- Some Extensions -- Declarative UI -- A Basic UiBinder Example -- More Complex Examples -- Summary -- 6 Communicating with Your Server -- Introduction to RPC -- Implementation -- Serialization -- Direct Evaluation RPC -- RPC Patterns of Usage -- The World Cities Service -- Code Sharing -- Coding the Server Side Services -- Database-Related Widgets and MVP -- A Look at MVP -- A Country/State Cities Browser -- Live Suggestions -- Data Prevalidation…”
    Libro electrónico
  18. 8878
    Publicado 2023
    Tabla de Contenidos: “…Between Warfighting Capability and Counter-insurgency -- Reinventing Manoeuvre after Afghanistan: Army 2020 and Organizational Change -- From Army 2020 to Integrated Manoeuvre -- Conclusion -- 17 Caught between a Rock and a Hard Place: The French Army, Expeditionary Warfare, and the Return of Strategic Competition -- Introduction -- French Military Interventions: An Important Part of the Army Culture -- A Wide-ranging Operational Experience -- The Force Structure and Main Capabilities -- The French Army Doctrine -- From Network-centric Warfare to High Intensity -- Providing Soldiers for Future Wars -- Conclusion -- 18 Trends in the Land Warfare Capability of Poland and the Visegrád States, 1991-2021 -- Introduction -- Background: From Warsaw Pact to NATO -- How Land Force Capabilities Changed -- Looking to the Future -- Conclusion -- III CONCLUSIONS -- 19 Towards a Versatile Edge: Developing Land Forces for Future Conflict -- Introduction -- Dynamics of Twenty-first-century Land Warfare -- The Continuum of Land Operations -- Locating Land Operations -- Towards a Versatile Edge: Securing Land Warfare Capability -- Ways Forward: Practical Implications and Agenda for Future Research -- Index…”
    Libro electrónico
  19. 8879
    por Spurgeon, Charles E.
    Publicado 2009
    Tabla de Contenidos:
    Libro electrónico
  20. 8880
    por Ballad, Tricia
    Publicado 2009
    Tabla de Contenidos: “…-- Prevent Buffer Overflows by Sanitizing Variables -- Patch the Application -- Wrapping It Up -- Chapter 5 Input Validation -- New Feature: Allow Users to Sign Their Guestbook Comments -- The Problem: Users Who Give You More Than You Asked For -- Assumptions: You Know What Your Data Looks Like -- The Solution: Regular Expressions to Validate Input -- Wrapping It Up -- Chapter 6 Filesystem Access: Accessing the Filesystem for Fun and Profit -- Opening Files -- Creating and Storing Files -- Changing File Properties Safely -- Patching the Application to Allow User-Uploaded Image Files -- Wrapping It Up -- Part IV: "Aw come on man, you can trust me" -- Chapter 7 Authentication -- What Is User Authentication? …”
    Libro electrónico