Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Database management 6
- Digital video 6
- Data processing 5
- Editing 5
- Big data 4
- Engineering & Applied Sciences 4
- Art, Architecture & Applied Arts 3
- Development 3
- Digital techniques 3
- Electrical & Computer Engineering 3
- Electrical Engineering 3
- Final cut (Electronic resource) 3
- Photography 3
- SQL (Computer program language) 3
- Visual Arts 3
- Cinematography 2
- Computer graphics 2
- Computer programs 2
- Data mining 2
- Electronic data processing 2
- Microsoft Excel (Computer file) 2
- Music 2
- Python (Computer program language) 2
- Recording and reproducing 2
- Sound 2
- Special effects 2
- Video tapes 2
- A la television 1
- AMR 1
- ANOVA 1
-
41Publicado 2013Tabla de Contenidos: “…ACFS Encryption Configuration and Use -- ACFS Snapshots, Security, and Encryption -- ACFS Security and Encryption Implementation -- Summary -- Chapter 12: ASM Optimizations in Oracle Engineered Solutions -- Overview of Exadata -- Exadata Components -- 11gR2 Database Optimizations for Exadata -- ASM Optimizations for Exadata -- ODA Overview -- ODA Components -- ASM Optimizations for ODA -- ODA and NFS -- Summary -- Chapter 13: ASM Tools and Utilities -- ASMCA -- ASMCMD -- Renamedg -- ASM Storage Reclamation Utility (ASRU) -- Overview of ASRU Operation -- When to Use ASRU to Reclaim Storage -- Using ASRU to Reclaim Storage on 3Par: Use Cases -- KFOD -- AMDU -- Summary -- Chapter 14: Oracle 12c ASM: A New Frontier -- Password Files in ASM -- Disk Management and Rebalance New Features -- Fast Disk Resync and Checkpoints -- Fast Disk Replacement -- Failure Group Repair Timer -- Rebalance Time Estimations -- File Priority Rebalance -- Flex ASM -- Flex ASM Clustering -- Flex ASM Listeners -- Flex ASM Network -- Remote ASM Access -- ASM Optimizations on Engineered Systems -- Error Checking and Scrubbing -- Other Miscellaneous Flex ASM Features -- Summary -- Appendix: Best Practices for Database Consolidation in Private Clouds -- Private Database Cloud Consolidation: The Business Drivers -- Initial Server Pool Sizing -- CPU -- Partitioning vs. …”
Libro electrónico -
42Publicado 2018Tabla de Contenidos: “…MPLS VPN -- VPN Design -- IKE V1 versus IKE V2 -- WAN Encryption technique -- IPsec Layer-3 encryption -- MACsec-Layer-2 Encryption -- Optical Network-Layer-1 Encryption -- Summary -- Questions -- Further Reading -- Chapter 12: Summary and Scope of Security Technologies -- DDoS protection -- Remotely triggered black hole routing (RTBH) -- Black hole traffic from the source of the attack -- Black hole traffic to the destination of the attack -- BGP FlowSpec -- DDoS scrubbing -- Blockchain Technology for Fighting DDoS Attacks -- AI in cyber security -- Next Gen SIEM -- Software Defined Networking Firewall -- Bring-Your-Own-Identity (BYOI) -- Summary -- Further reading -- Assessment -- Other Books you may enjoy -- Index…”
Libro electrónico -
43Publicado 2023Tabla de Contenidos: “…Types of data sources -- Getting started with data extraction -- CSV and Excel data files -- Parquet data files -- API connections -- Databases -- Data from web pages -- Creating a data extraction pipeline using Python -- Data extraction -- Logging -- Summary -- References -- Chapter 5: Data Cleansing and Transformation -- Technical requirements -- Scrubbing your data -- Data transformation -- Data cleansing and transformation in ETL pipelines -- Understanding the downstream applications of your data -- Strategies for data cleansing and transformation in Python -- Preliminary tasks - the importance of staging data -- Transformation activities in Python -- Creating data pipeline activity in Python -- Summary -- Chapter 6: Loading Transformed Data -- Technical requirements -- Introduction to data loading -- Choosing the load destination -- Types of load destinations -- Best practices for data loading -- Optimizing data loading activities by controlling the data import method -- Creating demo data -- Full data loads -- Incremental data loads -- Precautions to consider -- Tutorial - preparing your local environment for data loading activities -- Downloading and installing PostgreSQL -- Creating data schemas in PostgreSQL -- Summary -- Chapter 7: Tutorial - Building an End-to-End ETL Pipeline in Python -- Technical requirements -- Introducing the project -- The approach -- The data -- Creating tables in PostgreSQL -- Sourcing and extracting the data -- Transformation and data cleansing -- Loading data into PostgreSQL tables -- Making it deployable -- Summary -- Chapter 8: Powerful ETL Libraries and Tools in Python -- Technical requirements -- Architecture of Python files -- Configuring your local environment -- config.ini -- config.yaml -- Part 1 - ETL tools in Python -- Bonobo -- Odo -- Mito ETL -- Riko -- pETL -- Luigi…”
Libro electrónico -
44Publicado 2024Tabla de Contenidos: “…-- Estimating the potential cost of using metadata extractors -- Follow these simple best practices to minimize your costs -- Estimate your maximal costs before running the actual extractors -- Preserving privacy with metadata extractors, and not only -- Scrubbing personal data and other sensitive information -- Using the ingestion pipeline to increase efficiency -- Handling documents that contain a mix of text and tabular data -- Hands-on - ingesting study materials into our PITS -- Summary -- Chapter 5: Indexing with LlamaIndex -- Technical requirements…”
Libro electrónico -
45Publicado 2018Tabla de Contenidos: “…Mesh topology -- Hybrid topology -- Transmission modes -- Communication networks -- Local area network -- Metropolitan area network -- Wide area network -- Wireless network -- Data center multi-tier model design -- Open Systems Interconnection model -- In-depth network scanning -- TCP communication -- ICMP scanning -- SSDP scanning -- UDP Scanning -- Intrusion detection systems -- Machine learning for intrusion detection -- Supervised learning -- Unsupervised learning -- Semi-supervised learning -- Reinforcement -- Machine learning systems' workflow -- Machine learning model evaluation metrics -- Services enumeration -- Insecure SNMP configuration -- DNS security -- DNS attacks -- Sniffing attacks -- DDoS attacks -- Types of DDoS attacks -- Defending against DDoS attacks -- DDoS scrubbing centers -- Software-Defined Network penetration testing -- SDN attacks -- SDNs penetration testing -- DELTA: SDN security evaluation framework -- SDNPWN -- Attacks on database servers -- Summary -- Chapter 4: Active Directory Exploitation -- Active Directory -- Single Sign-On -- Kerberos authentication -- Lightweight Directory Access Protocol -- PowerShell and Active Directory -- Active Directory attacks -- PowerView -- Kerberos attacks -- Kerberos TGS service ticket offline cracking (Kerberoast) -- SPN scanning -- Passwords in SYSVOL and group policy preferences -- 14-068 Kerberos vulnerability on a domain controller -- Dumping all domain credentials with Mimikatz -- Pass the credential -- Dumping LSASS memory with Task Manager (get domain admin credentials) -- Dumping Active Directory domain credentials from an NTDS.dit file -- Summary -- Chapter 5: Docker Exploitation -- Docker fundamentals -- Virtualization -- Cloud computing -- Cloud computing security challenges -- Docker containers -- Docker exploitation -- Kernel exploits -- DoS and resource abuse…”
Libro electrónico -
46por Vanderburg, Eric A.Tabla de Contenidos: “…Maintenance Automation -- Monitoring Techniques -- Collector Protocols and Methods -- Tagging -- Log Analysis -- Baselines -- Thresholds -- Trending -- Automated Event Responses -- Log Scrubbing -- Verification of Continuous Monitoring Activities -- Management Tools -- Chapter Review -- Questions -- Answers -- Chapter 11 Security in the Cloud -- Data Security -- Encryption -- Public Key Infrastructure -- Encryption Protocols -- Tunneling Protocols -- Ciphers -- Storage Security -- Protected Backups -- Network Security -- Segmentation -- Firewall -- DDoS Protection -- Packet Capture -- Network Flow -- IDS/IPS -- Packet Broker -- APIs -- Effects of Cloud Service Models on Security Implementation -- Endpoint Protection -- Host-Based Firewall -- Antivirus/Antimalware -- Endpoint Detection and Response -- Data Loss Prevention -- Exercise 11-1: Creating a DLP Policy for Office 365 -- NAC -- Hardening -- Application Whitelisting -- Impact of Security Tools to Systems and Services -- Access Control -- Identification -- Authentication -- Authorization -- Single Sign-On -- Federation -- Access Control Protocols -- Access Control Methodologies -- Multifactor Authentication -- Chapter Review -- Questions -- Answers -- Chapter 12 Security Best Practices -- Cloud Security Engineering -- Implementing Layered Security -- Protecting Against Availability Attacks -- Least Privilege -- Separation of Duties -- Security Automation -- Security Governance and Strategy -- Developing Company Security Policies -- Account Management Policies -- Documenting Security Procedures -- Assessment and Auditing -- Leveraging Established Industry Standards and Regulations -- Applying Platform-Specific Security Standards -- Data Classification -- Legal Holds -- Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365 -- Keeping Employees and Tools Up to Date…”
Publicado 2021
Libro electrónico -
47Publicado 2019Tabla de Contenidos: “…-- Exporting Data from Other Programs -- Importing External Data into Excel -- Importing data from an Access table -- Importing data from a Word table -- Introducing text file importing -- Importing a delimited text file -- Importing a fixed-width text file -- Importing data from a web page -- Importing an XML file -- Querying External Databases -- Defining a data source -- Querying a data source -- It's Sometimes a Raw Deal -- Chapter 5 Scrub-a-Dub-Dub: Cleaning Data -- Editing Your Imported Workbook -- Deleting unnecessary columns -- Deleting unnecessary rows -- Resizing columns -- Resizing rows -- Erasing unneeded contents in a cell or range -- Formatting numeric values -- Copying worksheet data -- Moving worksheet data -- Replacing data in fields -- Cleaning Data with Text Functions -- The CLEAN function -- The CONCAT function -- The EXACT function -- The FIND function -- The LEFT function -- The LEN function -- The LOWER function -- The MID function -- The NUMBERVALUE function -- The PROPER function -- The REPLACE function -- The RIGHT function -- The SEARCH function -- The SUBSTITUTE function -- The TEXT function -- The TEXTJOIN function -- The TRIM function -- The UPPER function -- The VALUE function -- Converting text function formulas to text -- Using Validation to Keep Data Clean -- Chapter 6 Analyzing Table Data with Functions -- The Database Functions: Some General Remarks -- Retrieving a Value from a Table -- Summing a Column's Values -- Counting a Column's Values -- Averaging a Column's Values…”
Libro electrónico -
48Publicado 2017Tabla de Contenidos: “…. -- Chapter 10: Production Planning and Performance Tuning for Ceph -- Introduction -- The dynamics of capacity, performance, and cost -- Choosing hardware and software components for Ceph -- Processor -- Memory -- Network -- Disk -- Partitioning the Ceph OSD journal -- Partitioning Ceph OSD data -- Operating system -- OSD filesystem -- Ceph recommendations and performance tuning -- Tuning global clusters -- Tuning Monitor -- OSD tuning -- OSD general settings -- OSD journal settings -- OSD filestore settings -- OSD recovery settings -- OSD backfilling settings -- OSD scrubbing settings -- Tuning the client -- Tuning the operating system -- Tuning the network -- Sample tuning profile for OSD nodes -- How to do it... -- Ceph erasure-coding -- Erasure code plugin -- Creating an erasure-coded pool -- How to do it... -- Ceph cache tiering -- Writeback mode -- Read-only mode -- Creating a pool for cache tiering -- How to do it... -- See also -- Creating a cache tier -- How to do it... -- Configuring a cache tier -- How to do it... -- Testing a cache tier -- How to do it... -- Cache tiering - possible dangers in production environments -- Known good workloads -- Known bad workloads -- Chapter 11: The Virtual Storage Manager for Ceph -- Introductionc…”
Libro electrónico -
49Publicado 2010Tabla de Contenidos: “…-- Working with Browser Items -- Mouseless Browser Navigation -- Chapter 8: Working with Clips in the Viewer -- Anatomy of the Viewer -- Transport controls -- Clip-marking controls -- Pop-up selectors -- View selectors -- Playhead Sync pop-up menu -- Timecode navigation and display -- Working with Clips in the Viewer -- Playing clips -- JKL Keys: The Way to Move -- FCP 7 Update: Multi-Touch Gestures Support -- Other ways to move: jogging, scrubbing, and shuttling -- Navigating with Timecode -- FCP Protocol: Entering Timecode Numbers -- Working with In and Out Points -- Other Ways to Set In and Out Points -- About Subclips -- Marking Shortcuts -- FCP Protocol: Subclips Are Master Clips, Too -- Using Markers -- On the Fly: Working With Markers During Playback -- Adjusting the Viewer Display -- Changing magnification and window size in the Viewer or Canvas -- Wireframes in the Viewer -- Viewing overlays -- Viewing Title Safe and Action Safe boundaries -- Viewing Timecode overlays -- Viewing with different backgrounds -- Chapter 9: Basic Editing -- Basic Editing Overview -- Basic Editing Step-by-Step -- Many Ways to Make an Edit -- FCP Protocol: Three-Point Editing -- Specifying target tracks -- Moving the playhead -- FCP Protocol: Editing Multiple Tracks in Final Cut Pro…”
Libro electrónico -
50por Bouldrey, Brian“…Crossing the unmappable scrub of Corsica, on the paths of bandits and patriots…”
Publicado 2007
Libro electrónico -
51Publicado 2018Tabla de Contenidos: “…Deidentification and Reidentification -- Section 3.7. Case Study: Data Scrubbing -- Section 3.8. Case Study (Advanced): Identifiers in Image Headers -- Section 3.9. …”
Libro electrónico -
52Publicado 2015“…You’ll learn how to combine small, yet powerful, command-line tools to quickly obtain, scrub, explore, and model your data. To get you started—whether you’re on Windows, OS X, or Linux—author Jeroen Janssens introduces the Data Science Toolbox, an easy-to-install virtual environment packed with over 80 command-line tools. …”
Libro electrónico -
53Publicado 2010Tabla de Contenidos: “…Release Builds -- 10.6.1 Enforce Is Not (Quite) assert -- 10.6.2 Assert(false) -- 10.7 Contracts: Not for Scrubbing Input -- 10.8 Contracts and Inheritance -- 10.8.1 Inheritance and in Contracts -- 10.8.2 Inheritance and out Contracts -- 10.8.3 Inheritance and invariant Contracts -- 10.9 Contracts in Interfaces -- 11 Scaling Up -- 11.1 Packages and Modules -- 11.1.1 Import Declarations -- 11.1.2 Module Searching Roots -- 11.1.3 Name Lookup…”
Libro electrónico -
54Publicado 2007“…After a tour of the Final Cut Pro interface and instruction on setting up your project, you will quickly jump into tasks that include creating a sequence; marking and logging clips; importing image and audio files; scrubbing clips and jumping edits; timeline scaling, scrolling and zooming; viewing transitions and effects; creating animated titles; and more."…”
Vídeo online -
55Publicado 2008“…The graphic located at the bottom of every video makes it easy to quickly scrub through each sub-lesson to find the specific task you need help with. …”
Vídeo online -
56Publicado 2008“…The graphic located at the bottom of every video makes it easy to quickly scrub through each sub-lesson to find the specific task the viewer needs help with. …”
Vídeo online -
57por Adobe Creative Team“…You'll also learn about Audition 2.0's new features, including low-latency mixing with unlimited tracks, ASIO support, audible scrubbing, analog-modeled Multiband Compressor, recordable parameter automation with external hardware support, and more. …”
Publicado 2006
Libro electrónico -
58Publicado 2022“…According to this, the vegetation of the Lake Tana Basin was a complex mosaic of woodland, scrub, forest, farmland and lake shore vegetation now difficult to interpret in detail. …”
Libro electrónico -
59por Lotz, Amanda D., 1974-“…She explores the dynamics ofclose male friendships both in groups, as in Entourage and Men of aCertain Age, wherein characters test the boundaries between the homosocialand homosexual in their relationships with each other, and in the dyadicintimacy depicted in Boston Legal and Scrubs. Cable Guys provides amuch needed look into the under-considered subject of how constructions of masculinitycontinue to evolve on television…”
Publicado 2014
Libro electrónico -
60Publicado 2014“…However, before we get to that point, usually much effort goes into obtaining, scrubbing, and exploring the required data. The command line, although invented decades ago, is an amazing environment for performing such data science tasks. …”