Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
1061Publicado 2023Tabla de Contenidos: “…Labels -- Issue workflows -- Editing files safely with commits, branches, and merge requests -- Commit history -- Merging one Git branch into another -- The three amigos - issues, branches, and merge requests -- When two amigos are enough -- How are issues and merge requests different? …”
Libro electrónico -
1062Publicado 2016Tabla de Contenidos: “…Information necessary for safe and enjoyable driving -- 7.4.2.1. Category 1: guidance for routing -- 7.4.2.2. …”
Libro electrónico -
1063Publicado 2010Tabla de Contenidos: “…-- Working with Browser Items -- Mouseless Browser Navigation -- Chapter 8: Working with Clips in the Viewer -- Anatomy of the Viewer -- Transport controls -- Clip-marking controls -- Pop-up selectors -- View selectors -- Playhead Sync pop-up menu -- Timecode navigation and display -- Working with Clips in the Viewer -- Playing clips -- JKL Keys: The Way to Move -- FCP 7 Update: Multi-Touch Gestures Support -- Other ways to move: jogging, scrubbing, and shuttling -- Navigating with Timecode -- FCP Protocol: Entering Timecode Numbers -- Working with In and Out Points -- Other Ways to Set In and Out Points -- About Subclips -- Marking Shortcuts -- FCP Protocol: Subclips Are Master Clips, Too -- Using Markers -- On the Fly: Working With Markers During Playback -- Adjusting the Viewer Display -- Changing magnification and window size in the Viewer or Canvas -- Wireframes in the Viewer -- Viewing overlays -- Viewing Title Safe and Action Safe boundaries -- Viewing Timecode overlays -- Viewing with different backgrounds -- Chapter 9: Basic Editing -- Basic Editing Overview -- Basic Editing Step-by-Step -- Many Ways to Make an Edit -- FCP Protocol: Three-Point Editing -- Specifying target tracks -- Moving the playhead -- FCP Protocol: Editing Multiple Tracks in Final Cut Pro…”
Libro electrónico -
1064Publicado 2022Tabla de Contenidos: “…-- Can I Just Copy and Paste the Code? -- How Safe Is PHP? -- What's New in PHP 8? -- What Software Do I Need to Write PHP? …”
Libro electrónico -
1065por Gurfinkel, ArieTabla de Contenidos: “…4.1 Generating Attractor Caches from Sub-Games -- 4.2 Constructing Sub-games from Abstract Strategy Templates -- 5 Game Solving with Abstract Template-Based Caching -- 6 Experimental Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Learning -- Bisimulation Learning -- 1 Introduction -- 2 Illustrative Example -- 3 Stutter-Insensitive Bisimulations of Deterministic Transition Systems -- 3.1 Model Checking -- 4 Counterexample-Guided Bisimulation Learning -- 4.1 Learner-Verifier Framework for Bisimulation Learning -- 4.2 Binary Decision Tree Partition Templates -- 5 Experimental Evaluation -- 5.1 Discrete-Time Clock Synchronization -- 5.2 Conditional Termination -- 6 Conclusion -- References -- Regular Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Regular Languages -- 3.2 Rational Transductions -- 3.3 Markov Decision Processes -- 4 Regular Markov Decision Processes -- 4.1 Undecidability of Values -- 4.2 Discounted Optimization -- 4.3 Finiteness Conditions -- 4.4 Q-Learning in RMDPs -- 5 Deep Regular Reinforcement Learning -- 5.1 Token Passing -- 5.2 Duplicating Pebbles -- 5.3 Shunting Yard Algorithm -- 5.4 Modified Tangrams -- 6 Conclusion -- References -- LTL Learning on GPUs -- 1 Introduction -- 2 Formal Preliminaries -- 3 High-Level Structure of the Algorithm -- 4 In-Memory Representation of Search Space -- 5 Correctness and Complexity of the Branch-Free Implementation of Temporal Operators -- 6 Relaxed Uniqueness Checks -- 7 Divide & -- Conquer -- 8 Evaluation of Algorithm Performance -- 9 Conclusion -- References -- Safe Exploration in Reinforcement Learning by Reachability Analysis over Learned Models -- 1 Introduction -- 2 Problem Setup -- 3 Verified Exploration Through Learned Models -- 3.1 Symbolic Environment Models -- 3.2 Shielding for Verified Safe Exploration…”
Publicado 2024
Libro electrónico -
1066por O'Sullivan, BryanTabla de Contenidos: “…-- A Naive Finding Function -- Predicates: From Poverty to Riches, While Remaining Pure -- Sizing a File Safely -- The Acquire-Use-Release Cycle -- A Domain-Specific Language for Predicates…”
Publicado 2009
Libro electrónico -
1067Publicado 2012Tabla de Contenidos: “…Operational Procedures -- Workplace Safety and Safe Equipment Handling -- Cable Management -- Using Appropriate Tools -- Fire Safety -- Lifting and Moving Equipment -- Exercise 1-1: Research Lifting Guidelines -- Hot Components -- Electrical Safety -- Electrostatic Discharge (ESD) -- Exercise 1-2: ESD-Proofing Your Workspace -- Electromagnetic Interference (EMI) -- Working Safely with Power Supplies -- Display Devices -- Printers -- Compressed Air -- Environmental Concerns for IT Professionals -- Working in a Harsh Environment -- Disposing of Computing Waste -- Exercise 1-3: Researching Recycling Centers -- Professionalism and Proper Communication -- Professionalism -- Dealing with Prohibited Content and Prohibited Activities -- Defining Prohibited Content and Behavior -- Policies Concerning Prohibited Content and Behavior -- Responding to the Discovery of Prohibited Content and/or Behavior -- Two-Minute Drill -- Self Test -- Self Test Answers -- 2. …”
Libro electrónico -
1068Publicado 2018Tabla de Contenidos: “…Parallel sort algorithm -- 65. Thread-safe logging to the console -- 66. Customer service system -- Solutions -- 61. …”
Libro electrónico -
1069Publicado 2023Tabla de Contenidos: “…-- "What is the purpose of the safe area in Auto Layout, and how do you ensure that your views are properly positioned within the safe area?" …”
Libro electrónico -
1070Publicado 2018Tabla de Contenidos: “…ANDROID SOFTWARE STACK [18] -- FIGURA 2. ARQUITECTURA DE SAFE CANDY -- FIGURA 3. MARCO DE TRABAJO PARA EL ANÁLISIS ESTÁTICO -- FIGURA 4. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
1071Publicado 2018Tabla de Contenidos: “…The case study of Tor Vergata (Rome, Italy) -- chapter New ornaments’ influence on the character of modern cities -- part, History and arts -- chapter Arabian urban text art: Between cultural identity and artistic identity -- chapter The remaining houses of the two pearl merchants Ahmed Munawar Rifai and Hussein Bin Yahiya Rifai in the Farasan Islands in the 14th century AH/20th century AD: A study of aesthetic and artistic values -- part, City as an organism -- part, Architecture -- chapter Architecture of the 21st century museum as a catalytic phenomenon in the evolving cultural identity of a city -- chapter Conserving historical areas through the roles of main cities: Urban identity in the era of globalisation -- chapter Entrance gateway of Kerala temples: Assessing the form of a Kerala temple gopuram through material and construction -- chapter Expression of cultural identity in the contemporary urban built form of Kathmandu -- chapter Reimagining city identity through safe and sustainable public environments -- chapter Smart grids, smart cities, interior spaces and human behaviour: An interactive development process -- part, History and arts -- chapter Identity in transformation of rural Egyptian villages -- chapter Metaphysics and identity in architecture: Peter Eisenman’s Wexner Center for the Arts as case study -- chapter Immersing the landscape in its music: The case of iso-polyphony in South Albania -- chapter The changing image of Istanbul through its monuments (1923–1973) -- chapter The cumulative effect of an interdisciplinary project -- chapter Unearthing the spatial archetypes of two indigenous South Asian cities: The walled city of Old Delhi and Old Dhaka -- part, Planning and approaching the city…”
Libro electrónico -
1072por Loshin, PeterTabla de Contenidos: “…1.6.7 Business People and IT Professionals1.6.8 Others; 1.6.9 The Benefit of Having Diverse Users; 1.7 How Do I Use Tor; 1.7.1 Plan Ahead and Learn Tor Now; 1.7.2 TBB or Tails; 1.7.3 Tor Browser Bundle; 1.7.4 Tails; 1.7.5 What Can Go Wrong; 1.8 Using Tor Safely; 1.8.1 Use the Tor Browser; 1.8.2 Don't Open Documents; 1.8.3 Don't Install or Enable Browser Plugins; 1.8.4 Avoid Websites that Are Not HTTPS-Enabled; 1.8.5 Use Bridges/Find Company; 2 Using the Tor Browser Bundle; 2.1 What Is Bundled in the Tor Browser Bundle; 2.1.1 Vidalia; 2.1.2 Tor; 2.1.3 Mozilla Firefox ESR+Torbutton…”
Publicado 2013
Libro electrónico -
1073Publicado 2016Tabla de Contenidos: “…-- Part 1 The Board -- Chapter 1 Meet the Raspberry Pi -- A Trip Around the Board -- Model A/B -- Model A+/B+ -- Raspberry Pi 2 -- Raspberry Pi 3 -- Raspberry Pi Zero -- A Bit of Background -- ARM Versus x86 -- Windows Versus Linux -- Chapter 2 Getting Started with the Raspberry Pi -- Connecting a Display -- Composite Video -- HDMI Video -- DSI Video -- Connecting Audio -- Connecting a Keyboard and Mouse -- Installing NOOBS on an SD Card -- Connecting External Storage -- Connecting the Network -- Wired Networking -- Wireless Networking -- Connecting Power -- Installing the Operating System -- Installing Using NOOBS -- Installing Manually -- Connecting Bluetooth Devices -- Chapter 3 Linux System Administration -- Linux: An Overview -- Linux Basics -- Introducing Raspbian -- About Raspbian's Parent, Debian -- Alternatives to Raspbian -- Using External Storage Devices -- Creating a New User Account -- File System Layout -- Logical Layout -- Physical Layout -- Installing and Uninstalling Software -- Managing Software Graphically -- Managing Software at the Command Line -- Finding the Software You Want -- Installing Software -- Uninstalling Software -- Upgrading Software -- Shutting the Pi Down Safely -- Chapter 4 Troubleshooting -- Keyboard and Mouse Diagnostics -- Power Diagnostics -- Display Diagnostics -- Boot Diagnostics -- Network Diagnostics -- Chapter 5 Network Configuration -- Wired Networking -- Connecting to a Wired Network via the GUI -- Connecting to a Wired Network via the Console -- Testing Your Connectivity -- Wireless Networking -- Connecting to a Wireless Network via the GUI…”
Libro electrónico -
1074Publicado 2023Tabla de Contenidos: “…Large classes -- Switches -- Primitive Obsession -- Middle man -- Message chains -- Feature envy methods -- Divergent change -- Shotgun Surgery -- God object -- Summary -- Further reading -- Chapter 4: Testing -- Why you should test (often) -- Identifying and fixing defects -- Ensuring quality and reliability -- Customer satisfaction -- Compliance and standards -- Security -- Integration and compatibility -- Confidence and peace of mind -- Unit testing -- JUnit framework -- Integration testing -- Mockito -- Contract testing -- Be safe - checking and improving your test coverage -- What is test coverage? …”
Libro electrónico -
1075Publicado 2023Tabla de Contenidos: “…Intro -- Table of Contents -- Title Page -- Copyright -- Dedication -- Introduction -- Eight Feedback Styles -- Pushing Past Style to Completion -- Collaboration Is Key -- Note -- 1 Why Feedback Hurts -- How the Human Brain Processes Feedback -- Better Feedback Can Be Learned -- Completion with Kindness -- Notes -- 2 The Good, the Bad, and the Ugly of Review -- Defining the Creator‐Reviewer Relationship -- Good Feedback Is about Feeling Safe -- What Is Kind Review? -- Feedback Is Always Personal -- 3 Receiving Feedback: Tough Skin, Tough Love, or Tough -- Face Your Anxieties -- Learn the Levels of Feedback -- Manage Feedback Before You Burn Out -- 4 Giving Feedback -- Polish the Idea to Make It Shine -- Improve through Process -- Editing Is Not Creating -- Take a Hot Minute and Reflect -- 5 Taste Is an Unconscious Bias -- Feedback Is a Personal Opinion of Quality -- Risk Avoidance Can Be an Unconscious Bias -- Use Taste to Be Inclusive -- 6 Feedback Styles -- The Eight Review Styles -- When Styles Meet -- It's Part of Who You Are -- 7 Kind Collaborator -- Attributes of the Kind Collaborator -- How to Manage a Kind Collaborator -- How to Become a Kind Collaborator -- 8 Perfect Pass‐Through -- Attributes of a Perfect Pass‐Through -- Why a Perfect Pass‐Through Is Dangerous -- How to Manage a Perfect Pass‐Through -- What to Do If You Are a Perfect Pass‐Through -- 9 Vague Vocalist -- Attributes of the Vague Vocalist -- Why the Vague Vocalist Is Dangerous -- How to Manage a Vague Vocalist -- What to Do If You Are a Vague Vocalist -- 10 Land Mine -- Attributes of a Land Mine -- Why a Land Mine Is Dangerous -- How to Manage a Land Mine -- What to Do If You Are a Land Mine -- 11 Silent but Deadly -- Attributes of a Silent but Deadly -- Why a Silent but Deadly Is Dangerous -- How to Manage a Silent but Deadly -- What to Do If You Are a Silent but Deadly…”
Libro electrónico -
1076Publicado 2016Tabla de Contenidos: “…Chapter 2 With Power Comes Responsibility: Hewlett-Packard, Target, the Cops, and the NSA Deduce Your Secrets (ethics) 37 How do we safely harness a predictive machine that can foresee job resignation, pregnancy, and crime? …”
Libro electrónico -
1077por Loy, MarcTabla de Contenidos: “…Working with Photoshop 7.0 and below; 2.3.3. Safe zones…”
Publicado 2005
Libro electrónico -
1078por Greenwald, RickTabla de Contenidos: “…Data Guard; 1.9.4.3. Fail Safe; 1.9.4.4. Oracle Real Application Clusters; 1.9.4.5. …”
Publicado 2004
Libro electrónico -
1079Publicado 2022Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- How to Use This Book -- Chapter 1: Working with Data -- Conversion Between Data Types -- Safe Number Conversion -- Conversion from Number to String and Back -- Boolean Conversions -- String to Data and Back -- Dates, Timestamps, and ISO 8601 Format -- Extracting Data from Dictionaries and Arrays -- Complex Data Types -- Extracting Data from Dictionary -- Extracting Data from Array -- Summary -- Chapter 2: Working with JSON and Other Popular Formats -- How Devices Exchange Data -- What Are Serialization and Deserialization -- Working with JSON -- Parsing JSON to Dictionary or Array -- Generating JSON from Dictionary or Array -- Working with XML -- Parsing XML -- Generating XML -- Working with YAML -- URL-Encoded Strings -- Serialization and Deserialization -- Serializing an Object -- Deserializing an Object -- Coding Keys -- Using @propertyWrapper -- Unit Conversion -- Distance and Length Units -- Area Units -- Volume Units -- Weight Units -- Summary -- Chapter 3: Working with Strings -- Analyzing String Content -- First, Last, and Other Names -- Email Address -- Password -- Phone Number -- Gender -- Date of Birth -- Credit Card Information -- Base64 and Hex Encoding -- Base64 Encoding -- Hex Encoding -- MD5, SHA, and Other Hashes -- MD5 Hash -- SHA Hashes -- Hashable Protocol and Swift Hashes -- Salt -- Integer Indexing -- Localization -- NSLocalizedString Macro -- Files with Translations -- LocalizedStringKey Struct -- Syntactic Sugar -- Summary -- Chapter 4: UIKit and Storyboards -- Navigation Between App Screens -- Screens, Windows, and Views -- Navigation in iOS Apps -- Scenes -- Going Back -- Replacing Root View -- Modifying UINavigationController Stack -- Removing Elements from the Navigation Stack…”
Libro electrónico -
1080Publicado 2023Tabla de Contenidos: “…-- Chapter 6: Adding a Registration and Login Form for Our Users -- Technical requirements -- Creating a sign-up screen -- Understanding Vertical Layout Group -- Creating a sign-in screen -- Placing the player -- Summary -- Chapter 7: Building an NPC That Allows Us to Travel -- Technical requirements -- Choosing an aspect -- Bringing the NPC to life -- Triggering when we are close -- Showing the available worlds in a window -- Mobile support -- Traveling to the selected world -- Canvas -- NPC -- PlayerInstance -- Summary -- Chapter 8: Acquiring a House -- Technical requirements -- The concept of home -- Enabling a user to obtain a home -- Adding a trigger to the Prefab of the house -- Programming script to acquire a house -- Linking a house to a player -- Understanding what an NFT is -- Converting a house to an NFT -- IPFS -- Goerli -- ChainSafe -- MetaMask -- Mining cryptocurrencies -- Programming the generation of the NFT -- Summary -- Chapter 9: Turning Our World into a Multiplayer Room -- Technical requirements -- Getting started with Photon SDK -- Pricing -- Signing up for Photon SDK -- Creating a new application -- Installing Photon SDK -- Photon life cycle -- Regions -- Rooms -- Lobby -- Synchronizing movements and animations in the network -- Preparing the player Prefab -- Disabling other players' scripts -- Creating the network logic script -- Adapting login for multiplayer support -- Adapting world navigation for multiplayer support -- Testing the changes -- Testing synchronization with another user -- Introducing ParrelSync -- Installing ParrelSync -- Summary -- Chapter 10: Adding Text and a Voice Chat to the Room -- Technical requirements -- Getting started with Photon Chat -- Introduction to the Photon Chat SDK -- Creating a Photon Chat project…”
Libro electrónico