Mostrando 285,361 - 285,380 Resultados de 286,064 Para Buscar '"S. J."', tiempo de consulta: 0.59s Limitar resultados
  1. 285361
    Publicado 2018
    Tabla de Contenidos: “…Chapter 10: The Power of UDA in National Security -- National Security: Playground for UDA or Civil Liberty Threat? -- Edward J. Snowden, the NSA Whistle-Blower? -- What Is the NSA? …”
    Libro electrónico
  2. 285362
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- About the Author -- Abbreviations -- Endorsements for Martin Lee's Book -- Chapter 1 Introduction -- 1.1 Definitions -- 1.1.1 Intelligence -- 1.1.2 Cyber Threat -- 1.1.3 Cyber Threat Intelligence -- 1.2 History of Threat Intelligence -- 1.2.1 Antiquity -- 1.2.2 Ancient Rome -- 1.2.3 Medieval and Renaissance Age -- 1.2.4 Industrial Age -- 1.2.5 World War I -- 1.2.6 World War II -- 1.2.7 Post War Intelligence -- 1.2.8 Cyber Threat Intelligence -- 1.2.9 Emergence of Private Sector Intelligence Sharing -- 1.3 Utility of Threat Intelligence -- 1.3.1 Developing Cyber Threat Intelligence -- Summary -- References -- Chapter 2 Threat Environment -- 2.1 Threat -- 2.1.1 Threat Classification -- 2.2 Risk and Vulnerability -- 2.2.1 Human Vulnerabilities -- 2.2.1.1 Example - Business Email Compromise -- 2.2.2 Configuration Vulnerabilities -- 2.2.2.1 Example - Misconfiguration of Cloud Storage -- 2.2.3 Software Vulnerabilities -- 2.2.3.1 Example - Log4j Vulnerabilities -- 2.3 Threat Actors -- 2.3.1 Example - Operation Payback -- 2.3.2 Example - Stuxnet -- 2.3.3 Tracking Threat Actors -- 2.4 TTPs - Tactics, Techniques, and Procedures -- 2.5 Victimology -- 2.5.1 Diamond Model -- 2.6 Threat Landscape -- 2.6.1 Example - Ransomware -- 2.7 Attack Vectors, Vulnerabilities, and Exploits -- 2.7.1 Email Attack Vectors -- 2.7.2 Web-Based Attacks -- 2.7.3 Network Service Attacks -- 2.7.4 Supply Chain Attacks -- 2.8 The Kill Chain -- 2.9 Untargeted versus Targeted Attacks -- 2.10 Persistence -- 2.11 Thinking Like a Threat Actor -- Summary -- References -- Chapter 3 Applying Intelligence -- 3.1 Planning Intelligence Gathering -- 3.1.1 The Intelligence Programme -- 3.1.2 Principles of Intelligence -- 3.1.3 Intelligence Metrics -- 3.2 The Intelligence Cycle -- 3.2.1 Planning, Requirements, and Direction…”
    Libro electrónico
  3. 285363
    Publicado 2023
    Tabla de Contenidos: “…25.1 Background -- 25.2 Theory -- 25.3 Practice -- 25.3.1 Example Code -- 25.3.2 Example Output -- References -- Part IV Programming -- Chapter 26 Interfaces -- 26.1 Configuration and Observation -- 26.1.1 Management -- 26.1.2 Printing -- 26.2 Simple Entities -- 26.2.1 Units -- 26.2.2 Components -- 26.2.3 Numbers -- 26.2.3.1 Establishing and Recovering Values -- 26.2.3.2 Functions -- 26.2.3.3 Addition and Subtraction -- 26.2.3.4 Multiplication -- 26.2.3.5 Geometric -- 26.2.3.6 Filtering -- 26.3 Higher Entities -- 26.3.1 Vectors -- 26.3.2 Bicomplex Numbers -- 26.3.3 Quaternions -- 26.3.4 Pauli Matrices -- 26.3.5 Electromagnetic Fields -- 26.4 Multiple Entities -- 26.4.1 Arrays -- 26.4.2 Fast Fourier Transforms -- 26.4.3 Series -- 26.4.4 Matrices -- Reference -- Chapter 27 Descriptions -- 27.1 Arguments -- 27.2 Data types -- 27.3 Formats -- 27.4 Manual Pages -- 27.4.1 A-E -- 27.4.2 F-J -- 27.4.3 K-O -- 27.4.4 P-T -- 27.4.5 U-Z -- 27.5 Quick Reference -- Reference -- A Key to Example Code and Results -- Index -- EULA…”
    Libro electrónico
  4. 285364
    Publicado 2024
    Tabla de Contenidos: “…-- Getting started with Git -- Using the most common Git commands -- GitHub - Git, but nice -- Thinking like a hacker - securing the web -- Common exploits -- Secure coding practices -- Working all in one place - IDEs -- VS Code -- Visual Studio -- Eclipse -- IntelliJ IDEA -- Understanding the operating system - Linux -- The structure of Linux -- Basic commands -- Security and the one "weird" Linux fact you need to know -- Linux for web developers -- Reviewing the roadmap -- Summary -- Chapter 5: Understanding the User Experience, Deployment Options, and DevOps…”
    Libro electrónico
  5. 285365
    Publicado 2004
    Tabla de Contenidos: “…Checklist and worksheet -- IBM Grid Toolbox checklist -- Configuration worksheet -- Servers -- Installed grid services -- User IDs -- Appendix J. Software support for the IBM Grid Toolbox -- IBM Grid Toolbox Web Page -- Glossary -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
    Libro electrónico
  6. 285366
    Publicado 2003
    Tabla de Contenidos: “…-- 12.4 Business rules and system rules -- 12.5 Business rules -- 12.6 Business system rules -- 12.7 Rules and business processes -- 12.8 The physical location of rules -- 12.9 Rules and formal logic -- 12.10 Logic and the Rule archetype pattern -- 12.11 RuleElement -- 12.12 Operator -- 12.13 Proposition -- 12.14 Variable and DateVariable -- 12.15 RuleContext -- 12.16 Rule -- 12.17 Rule evaluation -- 12.18 ActivityRule -- 12.19 RuleSet -- 12.20 RuleOverride -- 12.21 Summary -- Summary -- Archetype glossary -- Bibliography -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M.…”
    Libro electrónico
  7. 285367
    Publicado 2002
    Tabla de Contenidos: “…Using Host Publisher Studio to develop J2EE applications -- 6.1 Overview of Host Publisher applications -- 6.2 Integration Objects -- 6.2.1 Interacting with a data source -- 6.2.2 Defining connection pools -- 6.2.3 Information specified in a connection pool -- 6.2.4 Enabling and disabling connection pooling -- 6.2.5 User lists -- 6.3 Creating a Host Access Integration Object -- 6.3.1 Building an Integration Object using macros -- 6.3.2 Sample scenario -- 6.4 Creating a Database Access Integration Object -- 6.4.1 Integration Objects overview -- 6.4.2 Sample scenario -- 6.5 Application Integrator…”
    Libro electrónico
  8. 285368
    Publicado 2011
    Tabla de Contenidos: “…-- Authorizing editing -- 8.7.Restricting delete access -- Enforcing destroy protection -- Hiding links based on permission -- 8.8.Assigning permissions -- Viewing projects -- And the rest -- 8.9.Seed data -- 8.10.Summary -- 9.File uploading -- 9.1.Attaching a File -- A feature featuring files -- Enter stage right, Paperclip -- Using Paperclip -- 9.2.Attaching many files -- Two more files -- Using nested attributes -- 9.3.Serving files through a controller -- Protecting files -- Showing your assets -- Public assets -- Privatizing assets -- 9.4.Using JavaScript -- JavaScript testing -- Introducing jQuery -- Adding more files with JavaScript -- Responding to an asynchronous request -- Sending parameters for an asynchronous request -- 9.5.Summary -- 10.Tracking state -- 10.1.Leaving a comment -- Where's the ticket? …”
    Libro electrónico
  9. 285369
    por Krishnan, Vinod
    Publicado 2013
    Tabla de Contenidos: “…-- Have a go hero - explore the bc4j.xcfg file -- Exposing data -- Time for action - exposing a method using the client interface -- What just happened? …”
    Libro electrónico
  10. 285370
    por Ozer, Jan
    Publicado 2010
    Tabla de Contenidos: “…Speeding Up A Clip -- Changing Speed With The Rate Stretch Tool -- Enabling Variable Time Changes With Time Remapping -- Applying Time Remapping With Speed Transitions -- Using Time Remapping With Reverse Motion -- Recognizing The Downstream Effects Of Changing Time -- Changing The Speed Of Multiple Clips Simultaneously -- Changing The Length Of Multiple Stills Simultaneously -- 12 Acquiring And Editing Audio -- Topics Covered In This Lesson -- Getting Started -- Making The Connection -- Setting Up A Basic Voice-Recording Area -- Voicing Professional Narrations -- Creating A High-Quality Aural Experience -- Examining Audio Characteristics -- Adjusting Audio Volume -- Adjusting Audio In The Effect Controls Panel -- Adjusting Audio Gain -- Adding J-Cuts And L-Cuts -- Adding An L-Cut -- 13 Sweetening Your Sound And Mixing Audio -- Topics Covered In This Lesson -- Getting Started -- Sweetening Sound With Audio Effects -- Trying Stereo And 5.1 Surround Sound Effects -- Looking At One More Vst Plug-In -- Editing Keyframes By Using The Clip Effect Menu -- Working With The Audio Mixer -- Automating Changes In Audio Tracks -- Outputting Tracks To Submixes -- Recording Voice-Overs -- Creating A 5.1 Surround Sound Mix -- Fixing, Sweetening, And Creating Soundtracks In Adobe Soundbooth -- Cleaning Up Noisy Audio -- Adding Audio Effects In Adobe Soundbooth -- 14 Analyzing Content -- Topics Covered In This Lesson -- Getting Started -- Transcribing Speech To Text -- Enhancing The Accuracy Of Speech Analysis -- Searching Transcription For Keywords -- Setting In And Out Points Using Speech Analysis Text -- Modifying The Metadata -- Detecting Faces In A Sequence -- 15 Exploring Compositing Techniques -- Topics Covered In This Lesson -- Getting Started -- Making Compositing Part Of Your Projects -- Shooting Videos With Compositing In Mind…”
    Libro electrónico
  11. 285371
    por Leonard, Anghel
    Publicado 2014
    Tabla de Contenidos: “…JSF Custom Components -- Building noncomposite custom components -- Writing a custom tag handler -- Dissecting a custom component -- Custom component implementation -- Building composite components -- Developing the Temperature composite component -- Transforming a jQuery component into composite component -- Writing the HTML5 date picker as a composite component -- Decorating an image with actions…”
    Libro electrónico
  12. 285372
    Publicado 2023
    Tabla de Contenidos: “…Craine, Gordon Wellman and -- Vanessa J. Melino et al. -- Quinoa Phenotyping Methodologies: An International Consensus -- Reprinted from: Plants 2021, 10, 1759, doi:10.3390/plants10091759 291 -- Patr ́ıcia Carvalho da Silva, Walter Quadros Ribeiro Junior, Maria Lucrecia Gerosa Ramos, -- Sonia Maria Costa Celestino, Alberto do Nascimento Silva and Raphael Augusto das Chagas -- Noqueli Casari et al. -- Quinoa for the Brazilian Cerrado: Agronomic Characteristics of Elite Genotypes under Different -- Water Regimes -- Reprinted from: Plants 2021, 10, 1591, doi:10.3390/plants10081591 343 -- Elsa Helena Manjarres-Hern ́andez, Diana Marcela Arias-Moreno, Ana Cruz -- Morillo-Coronado, Zaida Zarely Ojeda-P ́erez and Agobardo C ́ardenas-Chaparro -- Phenotypic Characterization of Quinoa (Chenopodium quinoa Willd.) for the Selection of -- Promising Materials for Breeding Programs -- Reprinted from: Plants 2021, 10, 1339, doi:10.3390/plants10071339 361 -- Carla Colque-Little, Daniel Buchvaldt Amby and Christian Andreasen -- A Review of Chenopodium quinoa (Willd.) …”
    Libro electrónico
  13. 285373
    por Leonard, Anghel
    Publicado 2024
    Tabla de Contenidos: “…Tackling records in JPA -- DTO via record constructor -- DTO via record and JPA constructor expression -- DTO via record and result transformer -- DTO via record and JdbcTemplate -- Team up Java records and @Embeddable -- 106. Tackling records in jOOQ -- Summary -- Chapter 5: Arrays, Collections, and Data Structures -- Problems -- 107. …”
    Libro electrónico
  14. 285374
    Tabla de Contenidos: “…Ferrer Lerín / Begoña Pozo Sánchez ; Huellas de la poética bíblica en "Retratos de mujeres antiguas" de José Jiménez Lozano / Guadalupe Arbona Abascal, Ignacio Carbajosa Pérez ; Reescritura de "De Profundis" en la narrativa de Luis Antonio de Villena / Ignacio Ramos Gay ; La poesía bajo el signo de la comunicabilidad: Paul Celán y José Angel Valente / Linda Maeding ; La traducción como búsqueda de los orígenes en la poética de Juan Gelman / Elisa Martín Ortega ; La reescritura de los clásicos en la narrativa de J. M. Coetzee / Margarita Garbisu Buesa ; Don Juanes de Austria: nuevas aproximaciones a una figura literaria por Peter Handke y Robert Menasse / Elke Sturm-Trigonakis…”
    Libro
  15. 285375
    Publicado 2014
    “…He has used JavaScript and jQuery for years and is the author of jQuery and JavaScript Phrasebook and Sams Teach Yourself jQuery and JavaScript in 24 Hours . …”
    Video
  16. 285376
    por Virtanen, Tuomas
    Publicado 2012
    Tabla de Contenidos: “…11.3 Maximum A Posteriori Reestimation 290 -- 11.4 Maximum Likelihood Linear Regression 293 -- 11.4.1 Class Regression Tree 294 -- 11.4.2 Constrained Maximum Likelihood Linear Regression 297 -- 11.4.3 CMLLR Implementation 297 -- 11.4.4 Speaker Adaptive Training 298 -- 11.5 Discriminative Training 299 -- 11.5.1 MMI Discriminative Training Criterion 301 -- 11.5.2 MPE Discriminative Training Criterion 302 -- 11.5.3 I-smoothing 303 -- 11.5.4 MPE Implementation 304 -- 11.6 Conclusion 307 -- References 308 -- 12 Factorial Models for Noise Robust Speech Recognition 311 / John R. Hershey, Steven J. Rennie, Jonathan Le Roux -- 12.1 Introduction 311 -- 12.2 The Model-Based Approach 313 -- 12.3 Signal Feature Domains 314 -- 12.4 Interaction Models 317 -- 12.4.1 Exact Interaction Model 318 -- 12.4.2 Max Model 320 -- 12.4.3 Log-Sum Model 321 -- 12.4.4 Mel Interaction Model 321 -- 12.5 Inference Methods 322 -- 12.5.1 Max Model Inference 322 -- 12.5.2 Parallel Model Combination 324 -- 12.5.3 Vector Taylor Series Approaches 326 -- 12.5.4 SNR-Dependent Approaches 331 -- 12.6 Efficient Likelihood Evaluation in Factorial Models 332 -- 12.6.1 Efficient Inference using the Max Model 332 -- 12.6.2 Efficient Vector-Taylor Series Approaches 334 -- 12.6.3 Band Quantization 335 -- 12.7 Current Directions 337 -- 12.7.1 Dynamic Noise Models for Robust ASR 338 -- 12.7.2 Multi-Talker Speech Recognition using Graphical Models 339 -- 12.7.3 Noise Robust ASR using Non-Negative Basis Representations 340 -- References 341 -- 13 Acoustic Model Training for Robust Speech Recognition 347 / Michael L. …”
    Libro electrónico
  17. 285377
  18. 285378
    por Hannoun, Hubert
    Publicado 2019
    “…Carrel, P. Drieu La Rochelle, J.-A. Gobineau, G. Le Bon, J. de Maistre, Ch. Mourras, G. …”
    Electrónico
  19. 285379
    Publicado 2020
    “…Cox, Cyndia Susan Clegg, Grace Tiffany, Matthew J. Smith, Bethany C. Besteman, Sarah Skwire, Feisal Mohamed, Benedict J. …”
    Libro electrónico
  20. 285380
    Publicado 1997
    CDROM