Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 87
- Application software 79
- Cloud computing 67
- Engineering & Applied Sciences 63
- Database management 58
- Java (Computer program language) 58
- Computer Science 48
- Management 47
- Virtual computer systems 45
- Machine learning 37
- Python (Computer program language) 34
- Computer networks 32
- Electronic data processing 28
- Economics 27
- Programming 27
- Computer programming 26
- Computer programs 26
- Artificial intelligence 25
- Web servers 24
- Data processing 23
- Operating systems (Computers) 23
- Examinations 22
- Oracle (Computer file) 22
- Finance 21
- Design 20
- Security measures 20
- Client/server computing 19
- VMware 19
- History 18
- Microsoft .NET Framework 18
-
981Publicado 2024Tabla de Contenidos: “…Eradicating incidents -- Recovering from incidents -- Conducting a post-mortem -- Utilizing Defense-in-Depth -- Part 2 Exploring the CCSP Certification Domains -- Chapter 3 Domain 1: Cloud Concepts, Architecture, and Design, Part 1 -- Understanding Cloud Computing Concepts -- Defining cloud computing terms -- Identifying cloud computing roles and responsibilities -- Recognizing key cloud computing characteristics -- On-demand self-service -- Broad network access -- Resource pooling -- Rapid elasticity -- Measured service -- Building block technologies -- Storage -- Networking -- Virtualization -- Orchestration -- Describing Cloud Reference Architecture -- Cloud computing activities -- Cloud service provider -- Cloud service customer -- Cloud service partner -- Cloud service capabilities -- Cloud service categories -- Infrastructure as a service (IaaS) -- Platform as a service (PaaS) -- Function as a service (FaaS) -- Software as a service (SaaS) -- Cloud deployment models -- Public cloud deployment -- Private cloud deployment -- Community cloud deployment -- Hybrid cloud deployment -- Cloud shared considerations -- Interoperability -- Portability and reversibility -- Availability -- Resiliency -- Security and privacy -- Governance -- Service-level agreements -- Maintenance and versioning -- Regulatory compliance -- Auditability -- Impact of related technologies -- Artificial Intelligence (AI) and machine learning (ML) -- Data science -- Blockchain -- Internet of things (IoT) -- Edge computing -- Confidential computing -- Containers -- Quantum computing -- DevSecOps -- Chapter 4 Domain 1: Cloud Concepts, Architecture, and Design, Part 2 -- Identifying Security Concepts Relevant to Cloud Computing -- Cryptography and key management -- Data at rest -- Data in transit -- Data in use -- Key management -- Identity and access control…”
Libro electrónico -
982Publicado 2024Tabla de Contenidos: “…-- How to access and store data with the Windows Registry -- Comparing the Windows Registry to JSON settings files -- Worker Services -- Docker support -- Dissecting the Worker Service -- Controlling the lifetime of the service -- Wrapping up Worker Services -- WMI -- How to use WMI -- Reading the CPU temperature -- Reading the BIOS -- Controlling the Windows Update service -- Watching USB devices -- Registry and WMI - risks and how to avoid them -- The Windows Registry -- Potential risks when dealing with WMI -- Next steps -- Chapter 8: The One with the Network Navigation -- Technical requirements -- The fundamentals -- A walk down the OSI layers -- Exploring the System.Net namespace -- Understanding HTTP/HTTPS -- FTP -- Email protocols -- Working with the System.Net.Sockets namespace -- Steps to take when using sockets -- IPv4 and IPv6 -- Looking up time with sockets -- Async, non-blocking networking -- Making asynchronous calls -- Networking performance -- Connection pooling -- Caching -- Compression and serialization -- Keep-alive connections -- Networking errors and time-outs -- Using the HTTPClient wisely -- Implementing retries with Polly -- The circuit breaker pattern -- Validating network availability -- Monitoring and logging -- Next steps -- Chapter 9: The One with the Hardware Handshakes -- Technical requirements…”
Libro electrónico -
983por Jellow, D. H. L. (h. c. ).Tabla de Contenidos: “…Moving a VM to a different network segment -- Summary -- Part 3: Configuring Your AVS -- Chapter 7: Creating and Configuring a Secure vWAN Hub for Internet Connectivity -- Azure vWAN in Azure -- Advantages of a vWAN -- vWAN types -- Creating a vWAN in Azure -- Prerequisites -- Creating a virtual hub and an ExpressRoute Gateway in the vWAN -- Connecting the AVS ExpressRoute circuit to the hub gateway -- Changing the size of the gateway -- Deploying Azure Firewall to secure the vWAN -- Prerequisites -- Deploying Azure Firewall -- Creating an Azure Firewall policy for the AVS internet connection -- Adding a rule to the firewall policy -- Associating the Firewall policy with the hub -- Routing the AVS traffic to the vWAN hub -- Summary -- Chapter 8: Inspecting Traffic for AVS -- Internet consideration design options for AVS -- SNAT managed from AVS -- Public IP to the AVS NSX Edge -- Some considerations for which option you choose to utilize -- Implementing an NVA solution for traffic inspection -- Prerequisites -- Creating a virtual network -- Deploying an Azure Route Server -- Deploying a Quagga using an NVA -- Configuring the Route Server peering -- Checking the learned routes on the Route Server and the Quagga NVA -- Summary -- CChapter 9: Storage Concepts in AVS -- Fault tolerance and storage policies -- Configuring a storage policy -- Prerequisites -- Listing all storage policies -- Setting a storage policy for a VM -- Specifying the default storage policy for an AVS cluster -- Encryption of data at rest -- Azure NetApp Files -- Prerequisites -- Creating a NetApp Files volume for AVS -- Creating a NetApp account -- Creating a capacity pool for Azure NetApp Files -- Delegating a subnet to Azure NetApp Files -- Creating an NFS volume for Azure NetApp Files -- Attaching an Azure NetApp Files volume to an AVS cluster -- Supported regions…”
Publicado 2023
Libro electrónico -
984
-
985Publicado 2013Tabla de Contenidos: “…Bonuses and the recent Global Financial Crisis -- Bowen, Howard -- Bribery and Corruption -- Broadband Stakeholder Group -- Broadcasters and Creative Industry Diability Network -- Brown Certificate -- Brundtland Report -- BS8900 British sustainable development guidelines -- Buddhist Ethics and CSR -- Business and the Arts -- Business case -- Business case for CSR -- Business Ethics, Japaness approach -- Business for Social Responsibility -- Business in the Community (UK+derivatives) -- Business judgement rule -- Business Model Innovation -- Business Performance -- Business Strategy -- Cadbury Report (UK) and CSR -- Canadian Business for Corporate Social Responsibility -- Cap and Trade/Emissions Trading Scheme -- Carbon -- Carbon Capture -- Carbon Disclosure Project -- Carbon emissions -- Carbon footprint -- Carbon Offsets -- Carbon offsetting -- Carbon Pool and Renewable Energy -- Carbon trading -- Carpooling -- Carroll, A.B. -- Cause Related Marketing -- Caux Round Table Principles -- Centre for Corporate Governance (Nairobi) -- CERES -- CH2 Building, Melbourne -- Chapman Report (2006) (Australia) -- Cheating -- Chief Executive Officer -- Chief Sustainability Officer -- Christianity and CSR -- Christine Parker -- Civil Regulation -- Climate Change -- Clinton Global Initiative -- Club of Rome -- Co-determination -- Co-operation -- Co-ownership -- Coalation of Environmentally -- Responsible Economies -- Code of 'best practice' and norms of behavior -- Colin Scott -- Collaborative Advantage -- Collective bargaining/trade unions -- Combined Assurance -- Combined Code (June 2008) -- Command and Control -- Commonwealth Association of CG -- Communicating with Stakeholders -- Communities of Practice -- Community -- Community activism -- Community of practice -- Community outrage -- Community relations -- Company Directors and CSR -- Competition -- Competitive advantage -- Compliance/Legal Compliance -- Compliant Finance -- Comply-or-explain -- Comprehensive Environmental Responses , Compensation and Liability Act -- Confucian Ethics -- Consumer Driven Corporate Responsibility -- Consumerism Consumers' protection -- Core Principles of CSR Approaches Corporate -- Corporate Activism -- Corporate Citizenship -- Corporate codes of conduct -- Corporate giving -- Corporate Governance -- Corporate Governance as a Tool for Alleviating -- Developmental Issues -- Corporate Governance Reporting -- Corporate killing -- Corporate manslaughter -- Corporate Mission, Vision and Values -- Corporate moral agency -- Corporate negligence -- Corporate outrage -- Corporate Political Connection -- Corporate Reputation -- Corporate Responsibility Index -- Corporate Responsibiliy Maturity -- Corporate Secretaries -- Corporate Social Entrepreneurship -- Corporate Social innovation -- Corporate Social -- Irresponsibility -- Corporate Social Marketing -- Corporate Social Opportunity -- Corporate Social Performance -- Corporate Social Performance Measurement -- Corporate social responsibility -- Corporate Social Responsibility Report -- Corporate Social Responsibility Strategy -- Corporate social responsiveness (Carroll, Frederick and Ackerman) -- Corporate Strategy -- Corporate Sustainability -- Corporation as Psychopath -- Corporatism -- Corruption and National Development -- Cost-benefit analysis -- Cradle to cradle -- Cradle to grave -- Critical reflection in corporate management -- Critiques of Corporate Social Responsibility -- Cross-cultural attitudes to CSR -- CSR and Africa -- CSR and Catholic Social Teaching -- CSR and Corruption -- CSR and Poverty -- CSR and Spirituality -- CSR Butterfly effect -- CSR Communication -- CSR Continuum - core business to broader goals -- CSR Europe -- CSR Evolutionary Journey - CSR Journey, CSR Organisational Evolutions -- CSR Frameworks -- CSR Innovation -- CSR Lifecycle -- CSR Measurement -- CSR: Australian Standard AS8003 [world first] -- CSRwire -- Cultural differences in values/ethics and decision-making -- Culture and Organization Performance -- Cultures, businesses, and global CSR -- Customer value creation -- Dame Anita Roddick -- Data protection -- David Henderson -- Decent work -- Definitions of social responsibility -- Deming 14 points model -- Demographic change -- Design for Environment (sep entry Hannover Principles) -- Development -- Dialogue -- Director Competencies and Skills -- Director Interlocks -- Director Role Position Description -- Disability -- Disclosure (CSR reporting) -- Discrimination -- Distributive Justice -- Diversity -- Dividend -- Dow Jones Sustainability Index -- Downsizing -- Due Diligence -- Duties of employees (comlpy with contract, comply with law, respect employers property) -- E-Waste -- Earth Summitt (separate entry on Rio declaration and on Agenda 21) -- Earthscan (publisher) -- EC Non-Discrimination Law -- Eco-Efficiency -- Eco-innovation -- Ecolabel -- Ecological economics -- Ecological footprint -- Ecology (separate entries on human and industrial) -- Econology -- Economic Globalization -- Economic sociology -- Economic Sociology of the CSR Movement -- Ecopreneurship -- Ecosystem -- Ecotoxity -- Education -- Elkington, John -- Embedded CSR -- Emissions trading -- Employability -- Employee participation/'ownership -- Employee Surveillance -- Employee volunteer programmes -- Employers' Forum on Age -- Employers' Forum on Disability -- EMS -- Endemic -- Energy Biofuels -- Energy—renewable -- Energy-solar -- Engagement/Stakeholder Engagement -- Enlightened Self-Interest -- Enron -- Environmental Accounting -- Environmental Audit -- Environmental ethics -- Environmental governance -- Environmental impact assessment -- Environmental law -- Environmental Management System -- Environmental protection agencies (all countries) -- Environmental Report Verification -- Environmental sustainability index (World economic forum) -- Environmental, Social and Governance Factors in Investment -- Environmental, Social and Governance Risk -- Environmentally Sensitive Accounting -- Equal Opportunity -- Equal Pay -- Equator Principles -- Ethic of responsibility to other stakeholders -- Ethical absolutism v. ethical relativism -- Ethical Corporation -- Ethical CSR -- Ethical Egoism & CSR -- Ethical problems in financial markets -- Ethical Theories -- Ethical Trading Initiative -- European Corporate Governance Institute -- European Multistakeholder Forum -- European Union Directive - The 8th Company Law Directive on Disclosure & Transparency -- European Urban Charter 1992 and 1998 -- Evolution of Corporate Governance Reports in the UK and Ireland -- Executive remuneration and CSR -- Externalities -- Externally Driven Business Case (EDBC) -- Extractive Industries Transparency Initiative (EITI) -- Exxon Mobil -- Exxon Valdez -- Factor 4 / Factor 10 -- Fair Pensions -- Fair Trade -- Fair wages -- Family Business and Corporate Social Responsibility -- Fiduciary duty -- Filial Piety & CSR -- Financial Regulations -- Financial Reporting Council (UK) -- Five Capitals Framework (Forum for the Future) -- Forest Stewardship Council -- Fortune at the bottom of the pyramid (Prahalad) -- Franchising Fraud prevention, detection and auditing -- Free range/cage-free/crate free/ethically raised -- Freedom of conscience -- Freedom of speech -- Friedman, Milton -- FTSE4Good Index -- G20.…”
Libro electrónico -
986Publicado 2018Tabla de Contenidos: “…. -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Choosing good names for database objects -- Getting ready -- How to do it... -- There's more... -- Handling objects with quoted names -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enforcing the same name and definition for columns -- Getting ready -- How to do it... -- How it works... -- There's more... -- Identifying and removing duplicates -- Getting ready…”
Libro electrónico -
987Publicado 2018Tabla de Contenidos: “…Cloud management services -- Service catalogue -- Self-service portal -- Infrastructure and process orchestration -- Software orchestration -- Operational services -- Backup and restore -- Disaster recovery -- Monitoring -- Log consolidation and analysis -- Patching -- Business services -- Business management -- IT financials -- IT benchmarking -- Cloud-based approaches for Disaster Recovery as a Service (DRaaS) solutions -- Summary -- Chapter 5: Implementing Service Redundancy Across All Layers -- vSphere virtualization software -- VMware vCenter Management Server -- vCenter main components -- Environment preparation -- Certificate for the vSphere Web Client and the Log Browser -- Verify that the environment is working properly -- Comparison of the vCenter deployment topologies -- vSphere HA/redundancy features -- vSphere HA -- vSphere vMotion details -- EVC feature details -- vSphere DRS feature details -- VMware vSphere Distributed Power Management -- Resource pools feature details -- vSphere Fault Tolerance -- Relevance of vSphere Fault Tolerance for vCenter HA -- VM Component Protection (VMCP) -- vSphere Metro Storage Cluster (vMSC) -- vSphere Replication -- vCenter Watchdog -- vCenter database clustering -- Memory reservations -- Maximizing memory performance -- CPU and memory shares, reservations, and limits -- Virtual machine disks -- Multiple virtual disks -- Virtual disk location -- Swap file location -- Virtual SCSI HBA type -- Virtual NICs -- Virtual GPUs -- VMware vSphere Flash Read Cache -- Guest operating system considerations -- VMware Tools -- Templates -- Templates and multiple sites -- Snapshot management -- Virtual machine security considerations -- Encryption and security certificates -- Monitoring and management design practices -- Time synchronization -- Syslog logging -- Performance monitoring…”
Libro electrónico -
988Publicado 2018Tabla de Contenidos: “…. -- Exploiting common services -- Getting ready -- How to do it -- MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption -- Getting ready -- How to do it... -- MS17-010 EternalRomance/EternalSynergy/EternalChampion -- How to do it... -- Installing backdoors -- Getting ready -- How to do it... -- Denial of Service -- Getting ready -- How to do it... -- How to do it... -- Chapter 4: Meterpreter -- Introduction -- Understanding the Meterpreter core commands -- Getting ready -- How to do it... -- How it works... -- Understanding the Meterpreter filesystem commands -- How to do it... -- How it works... -- Understanding Meterpreter networking commands -- Getting ready -- How to do it... -- How it works... -- Understanding the Meterpreter system commands -- How to do it... -- Setting up multiple communication channels with the target -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
989Publicado 2018Tabla de Contenidos: “…-- Convolutions in three dimensions -- A layer of convolutions -- Benefits of convolutional layers -- Parameter sharing -- Local connectivity -- Pooling layers -- Batch normalization -- Training a convolutional neural network in Keras -- Input -- Output -- Cost function and metrics -- Convolutional layers -- Fully connected layers -- Multi-GPU models in Keras -- Training -- Using data augmentation -- The Keras ImageDataGenerator -- Training with a generator -- Summary -- Chapter 8: Transfer Learning with Pretrained CNNs -- Overview of transfer learning -- When transfer learning should be used -- Limited data -- Common problem domains -- The impact of source/target volume and similarity -- More data is always beneficial -- Source/target domain similarity -- Transfer learning in Keras -- Target domain overview -- Source domain overview -- Source network architecture -- Transfer network architecture -- Data preparation -- Data input -- Training (feature extraction) -- Training (fine-tuning) -- Summary -- Chapter 9: Training an RNN from scratch -- Introducing recurrent neural networks -- What makes a neuron recurrent? …”
Libro electrónico -
990Publicado 2018Tabla de Contenidos: “…Step 7 - Dimensionality reduction with hidden layers -- Step 8 - Anomaly detection -- Step 9 - Pre-trained supervised model -- Step 10 - Model evaluation on the highly-imbalanced data -- Step 11 - Stopping the Spark session and H2O context -- Auxiliary classes and methods -- Hyperparameter tuning and feature selection -- Summary -- Chapter 10: Human Activity Recognition using Recurrent Neural Networks -- Working with RNNs -- Contextual information and the architecture of RNNs -- RNN and the long-term dependency problem -- LSTM networks -- Human activity recognition using the LSTM model -- Dataset description -- Setting and configuring MXNet for Scala -- Implementing an LSTM model for HAR -- Step 1 - Importing necessary libraries and packages -- Step 2 - Creating MXNet context -- Step 3 - Loading and parsing the training and test set -- Step 4 - Exploratory analysis of the dataset -- Step 5 - Defining internal RNN structure and LSTM hyperparameters -- Step 6 - LSTM network construction -- Step 7 - Setting up an optimizer -- Step 8 - Training the LSTM network -- Step 9 - Evaluating the model -- Tuning LSTM hyperparameters and GRU -- Summary -- Chapter 11: Image Classification using Convolutional Neural Networks -- Image classification and drawbacks of DNNs -- CNN architecture -- Convolutional operations -- Pooling layer and padding operations -- Subsampling operations -- Convolutional and subsampling operations in DL4j -- Configuring DL4j, ND4s, and ND4j -- Convolutional and subsampling operations in DL4j -- Large-scale image classification using CNN -- Problem description -- Description of the image dataset -- Workflow of the overall project -- Implementing CNNs for image classification -- Image processing -- Extracting image metadata -- Image feature extraction -- Preparing the ND4j dataset -- Training the CNNs and saving the trained models…”
Libro electrónico -
991Publicado 2018Tabla de Contenidos: “…Chapter 9: Stream Processing with Apache Flink -- Introduction to streaming execution model -- Data processing using the DataStream API -- Execution environment -- Data sources -- Socket-based -- File-based -- Transformations -- map -- flatMap -- filter -- keyBy -- reduce -- fold -- Aggregations -- window -- Global windows -- Tumbling windows -- Sliding windows -- Session windows -- windowAll -- union -- Window join -- split -- Select -- Project -- Physical partitioning -- Custom partitioning -- Random partitioning -- Rebalancing partitioning -- Rescaling -- Broadcasting -- Event time and watermarks -- Connectors -- Kafka connector -- Twitter connector -- RabbitMQ connector -- Elasticsearch connector -- Cassandra connector -- Summary -- Chapter 10: Visualizing Big Data -- Introduction -- Tableau -- Chart types -- Line charts -- Pie chart -- Bar chart -- Heat map -- Using Python to visualize data -- Using R to visualize data -- Big data visualization tools -- Summary -- Chapter 11: Introduction to Cloud Computing -- Concepts and terminology -- Cloud -- IT resource -- On-premise -- Cloud consumers and Cloud providers -- Scaling -- Types of scaling -- Horizontal scaling -- Vertical scaling -- Cloud service -- Cloud service consumer -- Goals and benefits -- Increased scalability -- Increased availability and reliability -- Risks and challenges -- Increased security vulnerabilities -- Reduced operational governance control -- Limited portability between Cloud providers -- Roles and boundaries -- Cloud provider -- Cloud consumer -- Cloud service owner -- Cloud resource administrator -- Additional roles -- Organizational boundary -- Trust boundary -- Cloud characteristics -- On-demand usage -- Ubiquitous access -- Multi-tenancy (and resource pooling) -- Elasticity -- Measured usage -- Resiliency -- Cloud delivery models -- Infrastructure as a Service…”
Libro electrónico -
992Publicado 2017Tabla de Contenidos: “…Many Pandas -- Multiphase bosses -- A better spawning system -- Switching difficulty at runtime -- Training and extending your Unity skills to become a better game developer -- Making things easier for other team members -- Exposing events -- Sprinkles pooling -- Saving your data -- Debugging -- Remote Logs -- Cleaning the release version -- More about communication between scripts -- Documenting the code -- Protecting your game -- Building for more than one platform -- Input/output devices -- Virtual reality in Unity -- Balancing the game -- Extending the Unity editor -- Multiplayer and networking -- Practice makes perfect -- Improving the atmosphere of the game -- Visuals -- Color schemes -- Homework -- Lighting -- Lights in Unity -- Homework -- Environment -- Homework -- Special effects -- Particle systems -- Post processing -- Other visual effects -- Audio -- Music -- Sound effects -- Eliciting emotions -- Homework -- Audio in Unity -- External audio systems -- Teamwork -- It is not just about you, it is about working in a team -- Sharing a common vision -- Managing expectations -- Collaboration and communication are key -- Ways to communicate -- Version control -- Make a GDD and stick to it -- Keeping it tidy with project management tools -- Slack -- HacknPlan -- Drive -- Dropbox -- Trello -- Redbooth -- GitHub -- BitBucket -- Calendar -- Pinterest -- Hootsuite -- Polishing your game -- Processing the power -- Checking the build size -- Texture optimitation -- Stats and profiling -- Other optimization tips -- Playtesting -- Why are you even playtesting? …”
Libro electrónico -
993Publicado 2017Tabla de Contenidos: “…. -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Introduction -- Choosing good names for database objects -- Getting ready -- How to do it…”
Libro electrónico -
994Publicado 2018Tabla de Contenidos: “…The vcenter_folder module -- The vcenter_license module -- The vmware_guest module -- The vmware_guest_facts module -- The vmware_guest_file_operation module -- The vmware_guest_find module -- The vmware_guest_powerstate module -- The vmware_guest_snapshot module -- The vmware_guest_tools_wait module -- VMware ESXi -- The vmware_dns_config module -- The vmware_host_dns_facts module -- The vmware_host module -- The vmware_host_facts module -- The vmware_host_acceptance module -- The vmware_host_config_manager module -- The vmware_host_datastore module -- The vmware_host_firewall_manager module -- The vmware_host_firewall_facts module -- The vmware_host_lockdown module -- The vmware_host_ntp module -- The vmware_host_package_facts module -- The vmware_host_service_manager module -- The vmware_host_service_facts module -- The vmware_datastore_facts module -- The vmware_host_vmnic_facts module -- The vmware_local_role_manager module -- The vmware_local_user_manager module -- The vmware_cfg_backup module -- The vmware_vmkernel module -- The vmware_vmkernel_facts module -- The vmware_target_canonical_facts module -- The vmware_vmotion module -- The vmware_vsan_cluster module -- The vmware_vswitch module -- The vmware_drs_rule_facts module -- The vmware_dvswitch module -- The vmware_dvs_host module -- The vmware_dvs_portgroup module -- The vmware_maintenancemode module -- The vmware_portgroup module -- The vmware_resource_pool module -- An example playbook -- Summary -- Questions -- Further reading -- Chapter 12: Ansible Windows Modules -- Technical requirements -- Up-and-running -- Vagrantfile -- Ansible preparation -- The ping module -- The setup module -- Installing a web server -- IIS role -- ASP.NET role -- Interacting with AWS Windows instances -- AWS role -- User role -- Chocolatey role -- Information role -- Running the playbook -- Summary…”
Libro electrónico -
995Publicado 2018Tabla de Contenidos: “…-- Concurrent execution in Python -- Starting a thread -- Starting a process -- Stopping threads and processes -- Stopping a process -- Spawning multiple threads -- Dealing with race conditions -- A thread's local data -- Thread and process communication -- Thread communication -- Sending events -- Inter-process communication with queues -- Thread and process pools -- Using a process to add a timeout to a function -- Case examples -- Example one - concurrent mergesort -- Single-thread mergesort -- Single-thread multipart mergesort -- Multithreaded mergesort -- Multiprocess mergesort -- Example two - batch sudoku-solver -- What is Sudoku? …”
Libro electrónico -
996Publicado 2018Tabla de Contenidos: “…Deploying a service to the flexible environment -- Pricing in the flexible environment -- App Engine resources and integrations -- Task queues -- Push and pull queues -- Push queues -- Named queues -- Pull queues -- Creating tasks -- Structuring tasks queues -- Scheduled tasks -- Deploying a cron definition -- Trying the App Engine cron service -- Scaling App Engine services -- Autoscaling -- Basic and manual scaling -- Externalizing configuration and managing secrets -- Application configuration files -- Compute Engine metadata server -- Runtime Configurator -- Cloud Key Management Service (KMS) -- General considerations -- Networking and security -- The App Engine firewall -- Cloud Endpoints -- Google Cloud IAP -- Virtual private networks -- Summary -- Chapter 5: Google Kubernetes Engine -- Google Kubernetes Engine -- When to choose GKE -- GKE or App Engine Flex -- Creating and maintaining a GKE cluster -- Node pools -- Multi-zonal and regional clusters -- Container Registry -- Deploying workloads to GKE -- Rolling updates -- Rolling back updates -- Scaling deployments -- Manually scaling deployments -- Automatically scaling deployments -- Exposing GKE Services -- Exposing services within a cluster -- Exposing services to external traffic -- Managing secrets with GKE -- Creating/Storing secrets -- Using secrets -- Billing -- Summary -- Chapter 6: Google Cloud Functions -- Functions as a Service -- Google Cloud Functions -- Advantages of Cloud Functions -- Price -- Scalability -- Developer velocity -- Considerations when using Cloud Functions -- Invoking Cloud Functions -- HTTP functions -- Processing HTTP requests -- Background functions -- Cloud Pub/Sub functions -- Cloud Storage functions -- Background function retries and termination -- Developing Cloud Functions -- Using the Cloud Console -- Local development -- Debugging functions…”
Libro electrónico -
997Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The First Step - Concurrency Design Principles -- Basic concurrency concepts -- Concurrency versus parallelism -- Synchronization -- Immutable object -- Atomic operations and variables -- Shared memory versus message passing -- Possible problems in concurrent applications -- Data race -- Deadlock -- Livelock -- Resource starvation -- Priority inversion -- A methodology to design concurrent algorithms -- The starting point - a sequential version of the algorithm -- Step 1 - analysis -- Step 2 - design -- Step 3 - implementation -- Step 4 - testing -- Step 5 - tuning -- Conclusion -- Java Concurrency API -- Basic concurrency classes -- Synchronization mechanisms -- Executors -- The fork/join framework -- Parallel streams -- Concurrent data structures -- Concurrency design patterns -- Signaling -- Rendezvous -- Mutex -- Multiplex -- Barrier -- Double-checked locking -- Read-write lock -- Thread pool -- Thread local storage -- Tips and tricks for designing concurrent algorithms -- Identifying the correct independent tasks -- Implementing concurrency at the highest possible level -- Taking scalability into account -- Using thread-safe APIs -- Never assume an execution order -- Preferring local thread variables over static and shared when possible -- Finding the easier parallelizable version of the algorithm -- Using immutable objects when possible -- Avoiding deadlocks by ordering the locks -- Using atomic variables instead of synchronization -- Holding locks for as short a time as possible -- Taking precautions using lazy initialization -- Avoiding the use of blocking operations inside a critical section -- Summary -- Chapter 2: Working with Basic Elements - Threads and Runnables…”
Libro electrónico -
998Publicado 2019Tabla de Contenidos: “…Beginning the CNN Tour with Character Recognition -- Understanding image basics -- Explaining How Convolutions Work -- Understanding convolutions -- Simplifying the use of pooling -- Describing the LeNet architecture -- Detecting Edges and Shapes from Images -- Visualizing convolutions -- Unveiling successful architectures -- Discussing transfer learning -- Chapter 11 Introducing Recurrent Neural Networks -- Introducing Recurrent Networks -- Modeling sequences using memory -- Recognizing and translating speech -- Placing the correct caption on pictures -- Explaining Long Short-Term Memory -- Defining memory differences -- Walking through the LSTM architecture -- Discovering interesting variants -- Getting the necessary attention -- Part 3 Interacting with Deep Learning -- Chapter 12 Performing Image Classification -- Using Image Classification Challenges -- Delving into ImageNet and MS COCO -- Learning the magic of data augmentation -- Distinguishing Traffic Signs -- Preparing image data -- Running a classification task -- Chapter 13 Learning Advanced CNNs -- Distinguishing Classification Tasks -- Performing localization -- Classifying multiple objects -- Annotating multiple objects in images -- Segmenting images -- Perceiving Objects in Their Surroundings -- Discovering how RetinaNet works -- Using the Keras-RetinaNet code -- Overcoming Adversarial Attacks on Deep Learning Applications -- Tricking pixels -- Hacking with stickers and other artifacts -- Chapter 14 Working on Language Processing -- Processing Language -- Defining understanding as tokenization -- Putting all the documents into a bag -- Memorizing Sequences that Matter -- Understanding semantics by word embeddings -- Using AI for Sentiment Analysis -- Chapter 15 Generating Music and Visual Art -- Learning to Imitate Art and Life -- Transferring an artistic style…”
Libro electrónico -
999Publicado 2016Tabla de Contenidos: “…-- Failure to Cohere -- Detractors -- Summary -- Chapter 11 - Believing Our Own Stories -- Overview -- Increasing Investment Increases Belief -- The Three Traps -- Pitching the Design -- Presenting the Design -- Arguing with Stakeholders -- Confirmation Bias -- Seeking Supporting Data -- Resisting Effort -- Experience Is Not Our Guide -- Success Is Not So Easily Defined -- In a Small Pool, Any Fish Looks Big -- Been There, Done That -- Owning the Stakeholder's Story -- The Stakeholders' Stories Reinforce the Team's Assumptions -- Summary -- Chapter 12 - Unclear Objectives -- Overview -- Explicit and Implicit Objectives -- It Takes a Village ... -- Structural Failures -- Lack of Well-Defined Objectives…”
Libro electrónico -
1000Publicado 2022Tabla de Contenidos: “…Using Cost-Volume-Profit Analysis to Make Savvy Business Decisions -- Deciding to advertise -- Lowering your price without losing your profit -- Combining the results of two products -- Costing and pricing a new product -- The Tax Man Cometh, the Profits Goeth -- Understanding pre-tax dollars -- Adjusting target net income for income taxes -- Chapter 4 Estimating Costs with Job Costing -- Understanding How Job Costing Works -- Cost objects: The sponges that absorb money -- Charging customers for direct and indirect costs -- Implementing job costing in manufacturing: An example -- Computing direct costs -- Calculating indirect costs -- Presenting total job costs -- Deciding on costing for IT consulting projects -- Determining project needs -- Plugging in job costing -- Taking a Closer Look at Indirect Costs using Normal Costing -- Budgeting for indirect costs -- Following a normal job costing system -- Computing direct costs and indirect costs -- Introducing the job cost sheet -- Following the Flow of Costs through a Manufacturing System -- Control starts with control accounts -- Explaining the debit and credit process -- Walking through a manufacturing cost example -- Applying the methodology to other control accounts -- Chapter 5 More Activity, More Cost: Activity-Based Costing -- Avoiding the Slippery Peanut Butter Costing Slope -- Recognizing a single indirect cost allocation -- A fly in the peanut butter: Dealing with different levels of client activity -- Missing the mark: Undercosting and overcosting -- Designing an Activity-Based Costing System -- Refining your approach -- Grouping costs using a cost hierarchy -- Testing your ABC design -- Using Activity-Based Costing to Compute Total Cost, Profit, and Sale Price -- Allocating indirect costs evenly by product -- Analyzing and reallocating cost activities -- Changing allocations to cost pools…”
Libro electrónico