Mostrando 9,221 - 9,240 Resultados de 17,802 Para Buscar '"Look"', tiempo de consulta: 0.13s Limitar resultados
  1. 9221
    Publicado 2021
    Tabla de Contenidos: “…Controlling the opacity and size of markers -- Using logarithmic scales -- Introducing sliders and range sliders -- Customizing the marks and values of sliders -- Summary -- Chapter 7: Exploring Map Plots and Enriching Your Dashboards with Markdown -- Technical requirements -- Exploring choropleth maps -- Utilizing animation frames to add a new layer to your plots -- Using callback functions with maps -- Creating a Markdown component -- Understanding map projections -- Using scatter map plots -- Exploring Mapbox maps -- Exploring other map options and tools -- Incorporating an interactive map into our app -- Summary -- Chapter 8: Calculating the Frequency of Your Data with Histograms and Building Interactive Tables -- Technical requirements -- Creating a histogram -- Customizing the histogram by modifying its bins and using multiple histograms -- Using color to further split the data -- Exploring other ways of displaying multiple bars in histograms -- Adding interactivity to histograms -- Creating a 2D histogram -- Creating a DataTable -- Controlling the look and feel of the table (cell width, height, text display, and more) -- Adding histograms and tables to the app -- Summary -- What we have covered so far -- Section 3: Taking Your App to the Next Level -- Chapter 9: Letting Your Data Speak for Itself with Machine Learning -- Technical requirements -- Understanding clustering -- Finding the optimal number of clusters -- Clustering countries by population -- Preparing data with scikit-learn -- Handling missing values -- Scaling data with scikit-learn -- Creating an interactive KMeans clustering app -- Summary -- Chapter 10: Turbo-charge Your Apps with Advanced Callbacks -- Technical requirements -- Understanding State -- Understanding the difference between Input and State -- Creating components that control other components…”
    Libro electrónico
  2. 9222
    Publicado 2021
    Tabla de Contenidos: “…Chapter 4 Footprinting and Reconnaissance -- Open Source Intelligence -- Companies -- People -- Social Networking -- Domain Name System -- Name Lookups -- Zone Transfers -- Passive DNS -- Passive Reconnaissance -- Website Intelligence -- Technology Intelligence -- Google Hacking -- Internet of Things (IoT) -- Summary -- Review Questions -- Chapter 5 Scanning Networks -- Ping Sweeps -- Using fping -- Using MegaPing -- Port Scanning -- Nmap -- masscan -- MegaPing -- Metasploit -- Vulnerability Scanning -- OpenVAS -- Nessus -- Looking for Vulnerabilities with Metasploit -- Packet Crafting and Manipulation -- hping -- packETH -- fragroute -- Evasion Techniques -- Protecting and Detecting -- Summary -- Review Questions -- Chapter 6 Enumeration -- Service Enumeration -- Remote Procedure Calls -- SunRPC -- Remote Method Invocation -- Server Message Block -- Built-in Utilities -- nmap Scripts -- NetBIOS Enumerator -- Metasploit -- Other Utilities -- Simple Network Management Protocol -- Simple Mail Transfer Protocol -- Web-Based Enumeration -- Summary -- Review Questions -- Chapter 7 System Hacking -- Searching for Exploits -- System Compromise -- Metasploit Modules -- Exploit-DB -- Gathering Passwords -- Password Cracking -- John the Ripper -- Rainbow Tables -- Kerberoasting -- Client-Side Vulnerabilities -- Living Off the Land -- Fuzzing -- Post Exploitation -- Evasion -- Privilege Escalation -- Pivoting -- Persistence -- Covering Tracks -- Summary -- Review Questions -- Chapter 8 Malware -- Malware Types -- Virus -- Worm -- Trojan -- Botnet -- Ransomware -- Dropper -- Malware Analysis -- Static Analysis -- Dynamic Analysis -- Creating Malware -- Writing Your Own -- Using Metasploit -- Obfuscating -- Malware Infrastructure -- Antivirus Solutions -- Persistence -- Summary -- Review Questions -- Chapter 9 Sniffing -- Packet Capture -- tcpdump -- tshark…”
    Libro electrónico
  3. 9223
    Publicado 2021
    Tabla de Contenidos: “…Scientific and market relations behind informal interindividual exchanges -- 6.1.3. More outwardly looking organizations -- 6.2. Cooperation prevented by paradoxical demands -- 6.2.1. …”
    Libro electrónico
  4. 9224
    Publicado 2023
    Tabla de Contenidos: “…-- Overcoming Negative Momentum -- Growing Your Confidence and Process Goals -- Looking Back at How Far You've Come -- Key Takeaways -- Chapter 9 Serve Others -- How I Came to Adopt a Serving Others Mentality -- My Challenges with Serving Others After My Pivot Point -- The Long-Term Benefits of Generosity and Serving Others -- The Unexpected Benefits of Serving Even When You Are at a Pivot Point -- Finding Ways to Serve in All the Buckets of Your Life -- Internal Challenges of a Serving Mentality -- Servant Leadership -- Key Takeaways -- Chapter 10 Fill Your Mind with What You Want to Show Up in Your Life -- The Sea of Thoughts -- Self-Limiting Beliefs -- The Power of Media -- The Power of Choosing Your Thoughts -- How I Filled My Mind in College Football -- How I Filled My Mind in the NFL -- How to Start Filling Your Mind Intentionally -- Don't Limit Yourself -- Key Takeaways -- Chapter 11 Examine the People You Are Spending the Most Time With -- The Profound Influence of the People You Spend the Most Time With -- Your Profound Influence on Others -- Spend Time with People You Can Learn From -- Find Groups to Learn from Others at an Advanced Level -- Moving On and Letting Go -- Key Takeaways -- Chapter 12 Be Coachable -- First, Be Accountable -- Be Willing to Be Uncomfortable -- Practice Humility and Confidence at the Same Time -- Hold Yourself to a Higher Standard by Seeking Coaching -- Push Your Limits…”
    Libro electrónico
  5. 9225
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Foreword -- Editorial -- Table of contents -- Abbreviations and acronyms -- Executive summary -- Overview -- From a Great lockdown to a Great Divergence -- COVID-19 and Russia's war of aggression against Ukraine are exacerbating global fault lines -- Failure to address multidimensional shockwaves could lock in protracted SDG divides -- The sustainable development finance gap in developing countries keeps growing -- Looking forward, the recovery is stifled and the system of financing for sustainable development increasingly unstable -- The sustainable finance equilibrium: No sustainability without equity -- The pandemic amplified imbalances in the global financial system -- Sustainable finance in developed countries reached a new high despite the global recession -- However, the sustainability boom has not reduced the risk of an equity shortfall -- The recovery will be neither sustainable nor resilient if the poorest are left behind -- Step 1: Reinforce the "equity" pillar of SDG alignment -- Support domestic resource mobilisation to avoid the fiscal and credit crunch in developing countries -- Deepen domestic markets for sustainable finance and investment in countries most in need -- Attract and monitor financing for development aligned to integrated national financing strategies -- Step 2: Promote collective action along the investment value chain -- Strengthen financial risk management standards and incentives, including risk perception criteria and ratings aligned to the SDGs -- Implement regulations to avoid green- and SDG-washing -- Promote coherent domestic and external policies for financing sustainable development -- References -- Notes -- 1 From the Great Lockdown to the Great Divergence -- 1.1. …”
    Libro electrónico
  6. 9226
    Publicado 2016
    Tabla de Contenidos: “…User-defined Cells -- The Visio file format -- Storing data as hidden XML -- Knowing how shapes relate in structured diagrams -- Connections -- 1D to 1D connections -- 2D to 2D connections -- Why the Dynamic connector shape is special -- Containers -- Lists -- Callouts -- Summary -- Chapter 3: Linking Data to Shapes -- A very quick introduction to importing and linking data -- Knowing when to use the Quick Import tool -- Importing to shapes without existing Shape Data rows -- Importing to shapes with existing Shape Data rows -- Using the Custom Import feature -- Importing from Excel workbooks -- Importing from Microsoft Access databases -- Importing from SharePoint lists -- Importing from SQL Server data -- Importing data with OLEDB and ODBC -- Using previously created connections -- Using XML data -- Removing external data connections for privacy and efficiency -- Creating data links to the shapes -- Linking data to shapes manually -- Linking data to shapes automatically -- Linking shapes to a single data row -- Linking multiple shapes to separate data rows -- Linking a new shape to a data row -- Linking multiple new shapes to data rows -- Summary -- Chapter 4: Using the Built-in Data Graphics -- Displaying data with graphics -- Changing the position of a graphic item -- Configuring the graphic item -- Using the Advanced Data Graphics dialog -- Understanding the Graphic Item types -- Using Text Callouts -- Using Icon Sets -- Using Data Bars -- Applying Color By Value -- Adding a legend -- Analyzing the composition of a Data Graphic -- Summary -- Chapter 5: Using the Pivot Diagram Add-on -- Choosing a data source -- Using SQL Server Analysis Services -- Looking behind the data -- Configuring the default Data Graphics -- Breaking down by category -- Sorting Pivot Nodes -- Editing Data Graphics of child nodes -- Selecting Pivot Nodes…”
    Libro electrónico
  7. 9227
    Publicado 2016
    Tabla de Contenidos: “…WHAT THE HEADCOUNT OF A 100-PERSON SAAS COMPANY LOOKS LIKE PART 4: DOUBLE YOUR DEALSIZE Painful Truth: It's hard to build a big business out of small deals. …”
    Libro electrónico
  8. 9228
    Publicado 2017
    Tabla de Contenidos: “…. -- There's more... -- Looking for weakness -- How to do it... -- Horizontal escalation -- How to do it... -- Vertical escalation -- How to do it... -- Node hopping - pivoting -- How to do it... -- There's more... -- Privilege escalation on Windows -- How to do it... -- Using PowerSploit -- How to do it... -- There's more... -- Pulling plaintext passwords with mimikatz -- How to do it... -- Dumping other saved passwords from the machine -- How to do it... -- Pivoting into the network -- How to do it... -- Backdooring for persistence -- How to do it…”
    Libro electrónico
  9. 9229
    Publicado 2017
    Tabla de Contenidos: “…Common data issues -- Contextual data issues -- Cleaning techniques -- R and common data issues -- Outliers -- Step 1 - Profiling the data -- Step 2 - Addressing the outliers -- Domain expertise -- Validity checking -- Enhancing data -- Harmonization -- Standardization -- Transformations -- Deductive correction -- Deterministic imputation -- Summary -- Chapter 4: Data Mining and the Database Developer -- Data mining -- Common techniques -- Visualization -- Cluster analysis -- Correlation analysis -- Discriminant analysis -- Factor analysis -- Regression analysis -- Logistic analysis -- Purpose -- Mining versus querying -- Choosing R for data mining -- Visualizations -- Current smokers -- Missing values -- A cluster analysis -- Dimensional reduction -- Calculating statistical significance -- Frequent patterning -- Frequent item-setting -- Sequence mining -- Summary -- Chapter 5: Statistical Analysis for the Database Developer -- Data analysis -- Looking closer -- Statistical analysis -- Summarization -- Comparing groups -- Samples -- Group comparison conclusions -- Summarization modeling -- Establishing the nature of data -- Successful statistical analysis -- R and statistical analysis -- Summary -- Chapter 6: Database Progression to Database Regression -- Introducing statistical regression -- Techniques and approaches for regression -- Choosing your technique -- Does it fit? …”
    Libro electrónico
  10. 9230
    Publicado 2017
    Tabla de Contenidos:
    Libro electrónico
  11. 9231
    Publicado 2024
    Tabla de Contenidos: “…Updating micro frontends at runtime -- Summary -- Chapter 10: SPA Composition -- Technical requirements -- Basics of SPA composition -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages of SPA composition -- Building a core SPA shell -- Activating pages -- Sharing dependencies -- Integrating SPA micro frontends -- Declaring the lifecycle -- Using cross-framework components -- Exploring communication patterns -- Exchanging events -- Sharing data -- Extending components -- Optimizing hydration and progressive rendering -- Summary -- Chapter 11: Siteless UIs -- Technical requirements -- The basics of siteless UIs -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages of siteless UIs -- Comparing siteless UIs and serverless -- Developing locally -- Publishing modules -- Creating a siteless UI runtime -- Building a runtime with Piral -- Deploying a runtime with Piral -- Writing siteless UI modules -- Looking at a pilet's life cycle -- Implementing framework-agnostic components -- Implementing islands composition with Qwik -- Summary -- Part 3: Bee Brood - Implementation Details -- Chapter 12: Sharing Dependencies with Module Federation -- Technical requirements -- Sharing dependencies between micro frontends -- Utilizing Module Federation -- Understanding Native Federation -- Achieving independence with SystemJS -- Summary -- Chapter 13: Isolating CSS -- Technical requirements -- Understanding the consequences of open styling -- Implementation techniques to scope CSS -- Using the shadow DOM -- Using modern CSS features for isolation -- Summary -- Chapter 14: Securing the Application -- Technical requirements -- Using web standards to harden security -- Limiting script access -- Verifying authenticity -- Summary…”
    Libro electrónico
  12. 9232
    Publicado 2023
    Tabla de Contenidos: “…Manipulating how a child component looks -- Passing dynamic content through slots -- Providing default slot content -- Having multiple slots with named slots -- Passing data through slot props -- Rendering different HTML element or component types -- Creating recursive components for recursive data -- Example - a JSON tree viewer -- The Container/Presentational pattern -- Summary -- Part 2: Actions -- Chapter 5: Custom Events with Actions -- Technical requirements -- Defining actions -- Reusing DOM event logic with custom events -- Encapsulating logic into a component -- Encapsulating logic into an action -- Passing parameters to an action -- Example - validating form inputs with custom events -- Exercise - creating a drag-and-drop event -- Summary -- Chapter 6: Integrating Libraries with Actions -- Technical requirements -- Integrating vanilla JavaScript UI libraries into Svelte -- Why use Svelte actions to integrate a UI library? …”
    Libro electrónico
  13. 9233
    por Mihay, Roger
    Publicado 2005
    Tabla de Contenidos: “…Exploring your inventory -- 4.1 Finding information about your applications -- 4.2 Our sample application -- 4.2.1 How to obtain a general overview -- 4.2.2 How to look for something specific -- 4.2.3 Reanalyzing a project -- 4.3 Advanced functions -- 4.4 Visual relationships -- 4.4.1 e-business rating -- 4.5 Exploring the distributed environment -- 4.6 Summary -- Chapter 5. …”
    Libro electrónico
  14. 9234
    Publicado 2020
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- How This Book Is Organized -- Part 1: Getting Started with Growth Hacking -- Part 2: Seeing Where Growth Opportunities Come From -- Part 3: Applying the Growth Hacking Process -- Part 4: The Part of Tens -- Beyond the Book -- Other For Dummies Books -- Where to Go from Here -- Part 1 Getting Started with Growth Hacking -- Chapter 1 Defining Growth Hacking -- Defining Growth Hacking Goals -- Working through the Basics -- Recognizing the Distinctive Nature of Growth Hacking -- Traditional marketing versus growth hacking -- Lean start-up versus growth hacking -- Agile product development versus growth hacking -- Steering Clear of Growth Hacking Obstacles -- The phrase itself -- Getting caught up in the "hacking" part -- Thinking that growth has to come at the cost of the customer experience -- Thinking that it's about quick hits and tactics -- Thinking that there's a magical growth hacker -- Thinking that only the growth team is responsible for growth -- Thinking that you need a background in product development or marketing -- Thinking that you need to be a coder -- Thinking that growth comes from acquisition -- Thinking that the "famous growth hacks" did all the hard work -- Thinking that you can just call yourself a growth hacker -- Chapter 2 Building Growth Hacking Skills -- Determining the Growth Hacker's Skill Set -- Inspecting the Growth Hacker's Toolbox -- Seeing What Makes Growth Hackers Tick -- Chapter 3 Building Growth Teams -- Investigating Growth Team Structure -- Getting a growth team off the ground -- Seeing who answers to whom -- Gauging the Impact of Growth Leads -- Looking at the Four Types of Organizational Cultures -- Determining the overall impact of specific organizational cultures…”
    Libro electrónico
  15. 9235
    Publicado 2011
    Tabla de Contenidos: “…-- Isolated Storage -- Saving and Loading Data -- The IsolatedStorageFile Object -- XNA Game Studio Storage -- Recreating the Project on Xbox -- Devices and Containers -- Getting a Device -- Looking at the API -- Loading Loose Files from Your Project -- Summary -- 15 Gamer Services -- GamerServicesComponent -- Guide Class -- Trial Mode -- Now the Bad News -- Platform-Specific Guide Functionality -- Gamers and Profiles -- GameDefaults -- Presence -- Privileges…”
    Libro electrónico
  16. 9236
    Publicado 2022
    Tabla de Contenidos: “…-- Step 7: Be Patient -- The Publication Process -- Responding to Reviewers -- What Not To Do -- What To Do -- Five Simple Rules for Writing a Response to Reviewers -- Activities Post Case Acceptance -- 9: Teaching with Compact Cases -- The Case for Teaching with Cases -- Cases Encourage the Development of Effective Communication Skills -- Cases Stick with Students Beyond the Classroom -- Design, Assign, and Align -- Case Teaching Modalities -- Teaching with Cases Online -- Motivating Case Preparation Regardless of Modality -- Tools for Teaching Cases Online -- Best Practices for Online Case Pedagogy -- Challenges for Online Case Pedagogy -- Teaching Tips for Compact Cases -- What Have We Learned about Case Teaching? -- 10: Looking to the Future -- Final Thoughts -- Appendix 1: Annotated Copy Chipotle Case -- Appendix 2: Annotated Copy Chipotle Instructor's Manual -- Index…”
    Libro electrónico
  17. 9237
    por Parasram, Shiva V. N.
    Publicado 2023
    Tabla de Contenidos: “…Running Guymager -- Acquiring evidence with Guymager -- Drive and memory acquisition using FTK Imager in WINE -- Installing FTK Imager -- RAM acquisition with FTK Imager -- RAM and paging file acquisition using Belkasoft RAM Capturer -- Summary -- Chapter 9: File Recovery and Data Carving Tools -- File basics -- Downloading the sample files -- File recovery and data carving with Foremost -- Image recovery with Magicrescue -- Data carving with Scalpel -- Data extraction with bulk_extractor -- NTFS recovery using scrounge-ntfs -- Image recovery using Recoverjpeg -- Summary -- Chapter 10: Memory Forensics and Analysis with Volatility 3 -- What's new in Volatility 3 -- Downloading sample memory dump files -- Installing Volatility 3 in Kali Linux -- Memory dump analysis using Volatility 3 -- Image and OS verification -- Process identification and analysis -- Summary -- Chapter 11: Artifact, Malware, and Ransomware Analysis -- Identifying devices and operating systems with p0f -- Looking at the swap_digger tool to explore Linux artifacts -- Installing and using swap_digger -- Password dumping with MimiPenguin -- PDF malware analysis -- Using Hybrid Analysis for malicious file analysis -- Ransomware analysis using Volatility 3 -- The pslist plugin -- Summary -- Part 4: Automated Digital Forensics and Incident Response Suites -- Chapter 12: Autopsy Forensic Browser -- Introduction to Autopsy - The Sleuth Kit -- Downloading sample files for use and creating a case in the Autopsy browser -- Starting Autopsy -- Creating a new case in the Autopsy forensic browser -- Evidence analysis using the Autopsy forensic browser -- Summary -- Chapter 13: Performing a Full DFIR Analysis with the Autopsy 4 GUI -- Autopsy 4 GUI features -- Installing Autopsy 4 in Kali Linux using Wine -- Downloading sample files for automated analysis…”
    Libro electrónico
  18. 9238
    Publicado 2022
    Tabla de Contenidos: “…Convenient BNs -- 8.2.3. Looking for Candidate BNs -- 8.3. Further Reading -- A. …”
    Libro electrónico
  19. 9239
    Publicado 2024
    Tabla de Contenidos: “…Understanding the Stroopwafelshop use case -- Business objectives, metrics, and KPIs -- Looking at the data -- The thing about spreadsheets -- What about BI tools? …”
    Libro electrónico
  20. 9240
    por Cheek, Paul
    Publicado 2024
    Tabla de Contenidos: “…Expanding Your Pool of Participants -- Virtual Watering Holes -- Introduction to Virtual Watering Holes -- Finding Virtual Watering Holes -- When You Can't Find a Virtual Watering Hole -- Outreach in Virtual Watering Holes -- Network Effects and Warm Introductions -- Moving Forward with Virtual Watering Holes -- Optimizing Outreach with Experiments -- When It's Difficult to Find PMR Subjects -- Interviewing -- Observational PMR -- Immersive PMR -- Keeping Records and Taking Notes -- Quantifying Qualitative Research -- Quantifying PMR with Surveys -- Incorporating Additional Secondary Market Research -- Next Steps -- Example -- FindOurView -- Summary -- Tactic 4 Assets: Developing Startup Visual Assets -- In This Tactic, You Will: -- Building a Brand -- Explaining What You Do and How You Do It -- Website -- Social Profiles -- Content Generation -- Leveraging Generative AI -- Example -- Invictus BCI -- Summary -- Tactic 5 Marketing: Proving Persona Assumptions with Digital Advertising -- In This Tactic, You Will: -- Overall Marketing Strategy -- Mousetrap Model -- Goals of Early-Stage Digital Advertising -- How to Approach Digital Advertising -- Platforms -- Planning -- Budgeting -- Digital Advertising Metrics -- When Nothing Works -- Tips and Tricks -- Beyond Digital Advertising: Other Means of Marketing -- Example -- Livvi -- Summary -- Tactic 6 Sales: Early Customer Demand Generation -- In This Tactic, You Will: -- "What Does Your Pipeline Look Like?" -- Marketing and Sales Stages -- Estimated Value -- Increasing Estimated Value -- Building a Lead List -- Step 1: Identifying Target Accounts (B2B) -- Step 2: Identifying Individuals -- Writing Compelling Content -- Outreach with Experiments -- Compounding Communication Mediums -- Outbound Sales Metrics -- Beyond Outbound Outreach: Sales for Startups -- Example -- Path Technologies -- Summary…”
    Libro electrónico