Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 8,635
- Història 4,168
- Biblia 3,441
- Filosofía 2,853
- Crítica e interpretación 2,459
- Bíblia 2,156
- Església Catòlica 1,559
- Teología 1,512
- -Historia 1,498
- Iglesia Católica 1,352
- Crítica i interpretació 1,277
- Jesuitas 1,113
- History 1,077
- Espiritualidad 1,042
- Padres de la Iglesia 987
- Filosofia 976
- Matemáticas 966
- Teología dogmática 924
- Economía 904
- Biografia 870
- Política 868
- Literatura 865
- Jesucristo 852
- Psicología 795
- Teologia 787
- Derecho 775
- Historia y crítica 771
- historia 747
- Iglesia 734
- Patrística 731
-
285361Publicado 2018Tabla de Contenidos: “…Chapter 10: The Power of UDA in National Security -- National Security: Playground for UDA or Civil Liberty Threat? -- Edward J. Snowden, the NSA Whistle-Blower? -- What Is the NSA? …”
Libro electrónico -
285362Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- About the Author -- Abbreviations -- Endorsements for Martin Lee's Book -- Chapter 1 Introduction -- 1.1 Definitions -- 1.1.1 Intelligence -- 1.1.2 Cyber Threat -- 1.1.3 Cyber Threat Intelligence -- 1.2 History of Threat Intelligence -- 1.2.1 Antiquity -- 1.2.2 Ancient Rome -- 1.2.3 Medieval and Renaissance Age -- 1.2.4 Industrial Age -- 1.2.5 World War I -- 1.2.6 World War II -- 1.2.7 Post War Intelligence -- 1.2.8 Cyber Threat Intelligence -- 1.2.9 Emergence of Private Sector Intelligence Sharing -- 1.3 Utility of Threat Intelligence -- 1.3.1 Developing Cyber Threat Intelligence -- Summary -- References -- Chapter 2 Threat Environment -- 2.1 Threat -- 2.1.1 Threat Classification -- 2.2 Risk and Vulnerability -- 2.2.1 Human Vulnerabilities -- 2.2.1.1 Example - Business Email Compromise -- 2.2.2 Configuration Vulnerabilities -- 2.2.2.1 Example - Misconfiguration of Cloud Storage -- 2.2.3 Software Vulnerabilities -- 2.2.3.1 Example - Log4j Vulnerabilities -- 2.3 Threat Actors -- 2.3.1 Example - Operation Payback -- 2.3.2 Example - Stuxnet -- 2.3.3 Tracking Threat Actors -- 2.4 TTPs - Tactics, Techniques, and Procedures -- 2.5 Victimology -- 2.5.1 Diamond Model -- 2.6 Threat Landscape -- 2.6.1 Example - Ransomware -- 2.7 Attack Vectors, Vulnerabilities, and Exploits -- 2.7.1 Email Attack Vectors -- 2.7.2 Web-Based Attacks -- 2.7.3 Network Service Attacks -- 2.7.4 Supply Chain Attacks -- 2.8 The Kill Chain -- 2.9 Untargeted versus Targeted Attacks -- 2.10 Persistence -- 2.11 Thinking Like a Threat Actor -- Summary -- References -- Chapter 3 Applying Intelligence -- 3.1 Planning Intelligence Gathering -- 3.1.1 The Intelligence Programme -- 3.1.2 Principles of Intelligence -- 3.1.3 Intelligence Metrics -- 3.2 The Intelligence Cycle -- 3.2.1 Planning, Requirements, and Direction…”
Libro electrónico -
285363Publicado 2023Tabla de Contenidos: “…25.1 Background -- 25.2 Theory -- 25.3 Practice -- 25.3.1 Example Code -- 25.3.2 Example Output -- References -- Part IV Programming -- Chapter 26 Interfaces -- 26.1 Configuration and Observation -- 26.1.1 Management -- 26.1.2 Printing -- 26.2 Simple Entities -- 26.2.1 Units -- 26.2.2 Components -- 26.2.3 Numbers -- 26.2.3.1 Establishing and Recovering Values -- 26.2.3.2 Functions -- 26.2.3.3 Addition and Subtraction -- 26.2.3.4 Multiplication -- 26.2.3.5 Geometric -- 26.2.3.6 Filtering -- 26.3 Higher Entities -- 26.3.1 Vectors -- 26.3.2 Bicomplex Numbers -- 26.3.3 Quaternions -- 26.3.4 Pauli Matrices -- 26.3.5 Electromagnetic Fields -- 26.4 Multiple Entities -- 26.4.1 Arrays -- 26.4.2 Fast Fourier Transforms -- 26.4.3 Series -- 26.4.4 Matrices -- Reference -- Chapter 27 Descriptions -- 27.1 Arguments -- 27.2 Data types -- 27.3 Formats -- 27.4 Manual Pages -- 27.4.1 A-E -- 27.4.2 F-J -- 27.4.3 K-O -- 27.4.4 P-T -- 27.4.5 U-Z -- 27.5 Quick Reference -- Reference -- A Key to Example Code and Results -- Index -- EULA…”
Libro electrónico -
285364Publicado 2024Tabla de Contenidos: “…-- Getting started with Git -- Using the most common Git commands -- GitHub - Git, but nice -- Thinking like a hacker - securing the web -- Common exploits -- Secure coding practices -- Working all in one place - IDEs -- VS Code -- Visual Studio -- Eclipse -- IntelliJ IDEA -- Understanding the operating system - Linux -- The structure of Linux -- Basic commands -- Security and the one "weird" Linux fact you need to know -- Linux for web developers -- Reviewing the roadmap -- Summary -- Chapter 5: Understanding the User Experience, Deployment Options, and DevOps…”
Libro electrónico -
285365Publicado 2004Tabla de Contenidos: “…Checklist and worksheet -- IBM Grid Toolbox checklist -- Configuration worksheet -- Servers -- Installed grid services -- User IDs -- Appendix J. Software support for the IBM Grid Toolbox -- IBM Grid Toolbox Web Page -- Glossary -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
Libro electrónico -
285366Publicado 2003Tabla de Contenidos: “…-- 12.4 Business rules and system rules -- 12.5 Business rules -- 12.6 Business system rules -- 12.7 Rules and business processes -- 12.8 The physical location of rules -- 12.9 Rules and formal logic -- 12.10 Logic and the Rule archetype pattern -- 12.11 RuleElement -- 12.12 Operator -- 12.13 Proposition -- 12.14 Variable and DateVariable -- 12.15 RuleContext -- 12.16 Rule -- 12.17 Rule evaluation -- 12.18 ActivityRule -- 12.19 RuleSet -- 12.20 RuleOverride -- 12.21 Summary -- Summary -- Archetype glossary -- Bibliography -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M.…”
Libro electrónico -
285367Publicado 2002Tabla de Contenidos: “…Using Host Publisher Studio to develop J2EE applications -- 6.1 Overview of Host Publisher applications -- 6.2 Integration Objects -- 6.2.1 Interacting with a data source -- 6.2.2 Defining connection pools -- 6.2.3 Information specified in a connection pool -- 6.2.4 Enabling and disabling connection pooling -- 6.2.5 User lists -- 6.3 Creating a Host Access Integration Object -- 6.3.1 Building an Integration Object using macros -- 6.3.2 Sample scenario -- 6.4 Creating a Database Access Integration Object -- 6.4.1 Integration Objects overview -- 6.4.2 Sample scenario -- 6.5 Application Integrator…”
Libro electrónico -
285368Publicado 2011Tabla de Contenidos: “…-- Authorizing editing -- 8.7.Restricting delete access -- Enforcing destroy protection -- Hiding links based on permission -- 8.8.Assigning permissions -- Viewing projects -- And the rest -- 8.9.Seed data -- 8.10.Summary -- 9.File uploading -- 9.1.Attaching a File -- A feature featuring files -- Enter stage right, Paperclip -- Using Paperclip -- 9.2.Attaching many files -- Two more files -- Using nested attributes -- 9.3.Serving files through a controller -- Protecting files -- Showing your assets -- Public assets -- Privatizing assets -- 9.4.Using JavaScript -- JavaScript testing -- Introducing jQuery -- Adding more files with JavaScript -- Responding to an asynchronous request -- Sending parameters for an asynchronous request -- 9.5.Summary -- 10.Tracking state -- 10.1.Leaving a comment -- Where's the ticket? …”
Libro electrónico -
285369por Krishnan, VinodTabla de Contenidos: “…-- Have a go hero - explore the bc4j.xcfg file -- Exposing data -- Time for action - exposing a method using the client interface -- What just happened? …”
Publicado 2013
Libro electrónico -
285370por Ozer, JanTabla de Contenidos: “…Speeding Up A Clip -- Changing Speed With The Rate Stretch Tool -- Enabling Variable Time Changes With Time Remapping -- Applying Time Remapping With Speed Transitions -- Using Time Remapping With Reverse Motion -- Recognizing The Downstream Effects Of Changing Time -- Changing The Speed Of Multiple Clips Simultaneously -- Changing The Length Of Multiple Stills Simultaneously -- 12 Acquiring And Editing Audio -- Topics Covered In This Lesson -- Getting Started -- Making The Connection -- Setting Up A Basic Voice-Recording Area -- Voicing Professional Narrations -- Creating A High-Quality Aural Experience -- Examining Audio Characteristics -- Adjusting Audio Volume -- Adjusting Audio In The Effect Controls Panel -- Adjusting Audio Gain -- Adding J-Cuts And L-Cuts -- Adding An L-Cut -- 13 Sweetening Your Sound And Mixing Audio -- Topics Covered In This Lesson -- Getting Started -- Sweetening Sound With Audio Effects -- Trying Stereo And 5.1 Surround Sound Effects -- Looking At One More Vst Plug-In -- Editing Keyframes By Using The Clip Effect Menu -- Working With The Audio Mixer -- Automating Changes In Audio Tracks -- Outputting Tracks To Submixes -- Recording Voice-Overs -- Creating A 5.1 Surround Sound Mix -- Fixing, Sweetening, And Creating Soundtracks In Adobe Soundbooth -- Cleaning Up Noisy Audio -- Adding Audio Effects In Adobe Soundbooth -- 14 Analyzing Content -- Topics Covered In This Lesson -- Getting Started -- Transcribing Speech To Text -- Enhancing The Accuracy Of Speech Analysis -- Searching Transcription For Keywords -- Setting In And Out Points Using Speech Analysis Text -- Modifying The Metadata -- Detecting Faces In A Sequence -- 15 Exploring Compositing Techniques -- Topics Covered In This Lesson -- Getting Started -- Making Compositing Part Of Your Projects -- Shooting Videos With Compositing In Mind…”
Publicado 2010
Libro electrónico -
285371por Leonard, AnghelTabla de Contenidos: “…JSF Custom Components -- Building noncomposite custom components -- Writing a custom tag handler -- Dissecting a custom component -- Custom component implementation -- Building composite components -- Developing the Temperature composite component -- Transforming a jQuery component into composite component -- Writing the HTML5 date picker as a composite component -- Decorating an image with actions…”
Publicado 2014
Libro electrónico -
285372Publicado 2023Tabla de Contenidos: “…Craine, Gordon Wellman and -- Vanessa J. Melino et al. -- Quinoa Phenotyping Methodologies: An International Consensus -- Reprinted from: Plants 2021, 10, 1759, doi:10.3390/plants10091759 291 -- Patr ́ıcia Carvalho da Silva, Walter Quadros Ribeiro Junior, Maria Lucrecia Gerosa Ramos, -- Sonia Maria Costa Celestino, Alberto do Nascimento Silva and Raphael Augusto das Chagas -- Noqueli Casari et al. -- Quinoa for the Brazilian Cerrado: Agronomic Characteristics of Elite Genotypes under Different -- Water Regimes -- Reprinted from: Plants 2021, 10, 1591, doi:10.3390/plants10081591 343 -- Elsa Helena Manjarres-Hern ́andez, Diana Marcela Arias-Moreno, Ana Cruz -- Morillo-Coronado, Zaida Zarely Ojeda-P ́erez and Agobardo C ́ardenas-Chaparro -- Phenotypic Characterization of Quinoa (Chenopodium quinoa Willd.) for the Selection of -- Promising Materials for Breeding Programs -- Reprinted from: Plants 2021, 10, 1339, doi:10.3390/plants10071339 361 -- Carla Colque-Little, Daniel Buchvaldt Amby and Christian Andreasen -- A Review of Chenopodium quinoa (Willd.) …”
Libro electrónico -
285373por Leonard, AnghelTabla de Contenidos: “…Tackling records in JPA -- DTO via record constructor -- DTO via record and JPA constructor expression -- DTO via record and result transformer -- DTO via record and JdbcTemplate -- Team up Java records and @Embeddable -- 106. Tackling records in jOOQ -- Summary -- Chapter 5: Arrays, Collections, and Data Structures -- Problems -- 107. …”
Publicado 2024
Libro electrónico -
285374por Sociedad Española de Literatura General y Comparada.Tabla de Contenidos: “…Ferrer Lerín / Begoña Pozo Sánchez ; Huellas de la poética bíblica en "Retratos de mujeres antiguas" de José Jiménez Lozano / Guadalupe Arbona Abascal, Ignacio Carbajosa Pérez ; Reescritura de "De Profundis" en la narrativa de Luis Antonio de Villena / Ignacio Ramos Gay ; La poesía bajo el signo de la comunicabilidad: Paul Celán y José Angel Valente / Linda Maeding ; La traducción como búsqueda de los orígenes en la poética de Juan Gelman / Elisa Martín Ortega ; La reescritura de los clásicos en la narrativa de J. M. Coetzee / Margarita Garbisu Buesa ; Don Juanes de Austria: nuevas aproximaciones a una figura literaria por Peter Handke y Robert Menasse / Elke Sturm-Trigonakis…”
Publicado 2010
Libro -
285375Publicado 2014“…He has used JavaScript and jQuery for years and is the author of jQuery and JavaScript Phrasebook and Sams Teach Yourself jQuery and JavaScript in 24 Hours . …”
-
285376por Virtanen, TuomasTabla de Contenidos: “…11.3 Maximum A Posteriori Reestimation 290 -- 11.4 Maximum Likelihood Linear Regression 293 -- 11.4.1 Class Regression Tree 294 -- 11.4.2 Constrained Maximum Likelihood Linear Regression 297 -- 11.4.3 CMLLR Implementation 297 -- 11.4.4 Speaker Adaptive Training 298 -- 11.5 Discriminative Training 299 -- 11.5.1 MMI Discriminative Training Criterion 301 -- 11.5.2 MPE Discriminative Training Criterion 302 -- 11.5.3 I-smoothing 303 -- 11.5.4 MPE Implementation 304 -- 11.6 Conclusion 307 -- References 308 -- 12 Factorial Models for Noise Robust Speech Recognition 311 / John R. Hershey, Steven J. Rennie, Jonathan Le Roux -- 12.1 Introduction 311 -- 12.2 The Model-Based Approach 313 -- 12.3 Signal Feature Domains 314 -- 12.4 Interaction Models 317 -- 12.4.1 Exact Interaction Model 318 -- 12.4.2 Max Model 320 -- 12.4.3 Log-Sum Model 321 -- 12.4.4 Mel Interaction Model 321 -- 12.5 Inference Methods 322 -- 12.5.1 Max Model Inference 322 -- 12.5.2 Parallel Model Combination 324 -- 12.5.3 Vector Taylor Series Approaches 326 -- 12.5.4 SNR-Dependent Approaches 331 -- 12.6 Efficient Likelihood Evaluation in Factorial Models 332 -- 12.6.1 Efficient Inference using the Max Model 332 -- 12.6.2 Efficient Vector-Taylor Series Approaches 334 -- 12.6.3 Band Quantization 335 -- 12.7 Current Directions 337 -- 12.7.1 Dynamic Noise Models for Robust ASR 338 -- 12.7.2 Multi-Talker Speech Recognition using Graphical Models 339 -- 12.7.3 Noise Robust ASR using Non-Negative Basis Representations 340 -- References 341 -- 13 Acoustic Model Training for Robust Speech Recognition 347 / Michael L. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
285377
-
285378por Hannoun, Hubert“…Carrel, P. Drieu La Rochelle, J.-A. Gobineau, G. Le Bon, J. de Maistre, Ch. Mourras, G. …”
Publicado 2019
Electrónico -
285379Publicado 2020“…Cox, Cyndia Susan Clegg, Grace Tiffany, Matthew J. Smith, Bethany C. Besteman, Sarah Skwire, Feisal Mohamed, Benedict J. …”
Libro electrónico -
285380