Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Statistics 667
- Economic conditions 625
- Estadística 602
- Data processing 480
- Economic policy 420
- Statistical methods 387
- Estadística matemática 353
- Mathematical statistics 286
- Economics 263
- Mathematics 262
- Matemáticas 260
- Data mining 235
- Machine learning 234
- Mental illness 233
- Python (Computer program language) 230
- R (Computer program language) 215
- Diagnosis 210
- Métodos estadísticos 208
- Artificial intelligence 170
- Probabilidades y estadística 169
- Research 164
- Business & Economics 162
- Finance 160
- Computer programs 159
- Database management 147
- Mathematical models 142
- Diagnostic and statistical manual of mental disorders 141
- Probabilidades 136
- Management 132
- Economic development 130
-
12081Publicado 2017Tabla de Contenidos: “…4.2 - Maintenance analysis procedures -- 4.2.1 - The MSG Series Procedures -- 4.2.2 - Reliability-Centered Maintenance -- 4.2.3 - MSG-3 Logic -- 4.2.4 - Structures -- 4.2.5 - Fatigue Damage -- 4.2.6 - Environmental Deterioration -- 4.2.7 - Accidental Damage -- 4.2.8 - Systems and Power Plants -- 4.2.9 - Setting Task Frequencies/Intervals -- 4.3 - Statistical reliability assessment -- 4.4 - Logistic support analysis -- 4.4.1 - LSA Tasks -- 4.4.2 - Failure Mode Effect Analysis -- 4.5 - Fault tree analysis -- 4.5.1 - Qualitative Analysis of a Fault Tree -- 4.5.2 - Quantitative Analysis of a Fault Tree -- 4.6 - Level of repair analysis -- 4.7 - Logistic support analysis record -- 4.8 - LSA models -- 4.9 - Elements of ILS -- 4.10 - Support equipment -- 4.11 - Facilities -- 4.12 - Data -- Chapter 5 - Intelligent Structural Rating System Based on Back-Propagation Network -- 5.1 - Introduction -- 5.2 - Artificial neural network -- 5.2.1 - Basic Theory -- 5.2.2 - Back-Propagation Network -- 5.3 - Design BPN for AD -- 5.3.1 - BPN Configuration -- 5.3.2 - Case Study -- 5.4 - Discussion -- 5.4.1 - Selection of Number of Nodes in Hidden Layers and Parameter Ratio -- 5.4.2 - Selection of Training Algorithms -- 5.5 - Conclusions -- Chapter 6 - Fault Tree Analysis for Composite Structural Damage -- 6.1 - Introduction -- 6.2 - Basic principles of fault tree analysis -- 6.2.1 - Elements of FTA -- 6.2.2 - Boolean Algebra Theorems -- 6.3 - FTA for composite damage -- 6.4 - Qualitative analysis -- 6.4.1 - Minimal Cut Sets -- 6.4.2 - Structure Importance Analysis -- 6.4.3 - Probability Importance Analysis -- 6.4.4 - Relative Probability Importance Analysis -- 6.5 - Quantitative analysis -- 6.6 - Discussion -- 6.7 - Potential solutions -- 6.7.1 - Material Design -- 6.7.2 - Fabrication Process -- 6.7.3 - Personnel Training -- 6.7.4 - Surface Protection…”
Libro electrónico -
12082Publicado 2019Tabla de Contenidos: “…-- 1.2.1 Extracting Meaningful Patterns -- 1.2.2 Building Representative Models -- 1.2.3 Combination of Statistics, Machine Learning, and Computing -- 1.2.4 Learning Algorithms -- 1.2.5 Associated Fields -- 1.3 Case for Data Science -- 1.3.1 Volume -- 1.3.2 Dimensions -- 1.3.3 Complex Questions -- 1.4 Data Science Classification -- 1.5 Data Science Algorithms -- 1.6 Roadmap for This Book -- 1.6.1 Getting Started With Data Science -- 1.6.2 Practice using RapidMiner -- 1.6.3 Core Algorithms -- References -- 2 Data Science Process -- 2.1 Prior Knowledge -- 2.1.1 Objective -- 2.1.2 Subject Area -- 2.1.3 Data -- 2.1.4 Causation Versus Correlation -- 2.2 Data Preparation -- 2.2.1 Data Exploration -- 2.2.2 Data Quality -- 2.2.3 Missing Values -- 2.2.4 Data Types and Conversion -- 2.2.5 Transformation -- 2.2.6 Outliers -- 2.2.7 Feature Selection -- 2.2.8 Data Sampling -- 2.3 Modeling -- 2.3.1 Training and Testing Datasets -- 2.3.2 Learning Algorithms -- 2.3.3 Evaluation of the Model -- 2.3.4 Ensemble Modeling -- 2.4 Application -- 2.4.1 Production Readiness -- 2.4.2 Technical Integration -- 2.4.3 Response Time -- 2.4.4 Model Refresh -- 2.4.5 Assimilation -- 2.5 Knowledge -- References -- 3 Data Exploration -- 3.1 Objectives of Data Exploration -- 3.2 Datasets -- 3.2.1 Types of Data -- Numeric or Continuous -- Categorical or Nominal -- 3.3 Descriptive Statistics -- 3.3.1 Univariate Exploration -- Measure of Central Tendency -- Measure of Spread -- 3.3.2 Multivariate Exploration -- Central Data Point -- Correlation -- 3.4 Data Visualization -- 3.4.1 Univariate Visualization -- Histogram…”
Libro electrónico -
12083Publicado 2019Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part 1 Cybersecurity Concept -- 1 Introduction on Cybersecurity -- 1.1 Introduction to Cybersecurity -- 1.2 Cybersecurity Objectives -- 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) -- 1.4 Cybersecurity Roles -- 1.5 Cybercrimes -- 1.5.1 Overview -- 1.5.2 Traditional Computer Crime and Contemporary Computer Crime -- 1.5.3 Combating Crimes -- 1.5.3.1 Securing Networks -- 1.5.3.2 Incident Response Team -- 1.5.3.3 Detecting Malware -- 1.5.3.4 Authentication and Authorization -- 1.5.3.5 Filtering -- 1.5.3.6 Best Practices -- 1.6 Security Models -- 1.7 Computer Forensics -- 1.8 Cyber Insurance -- 1.8.1 Digital Citizenship -- 1.8.2 Information Warfare and Its Countermeasures -- 1.8.3 Network Neutrality -- 1.8.4 Good Practices and Policies -- 1.8.5 Cybersecurity and Human Rights -- 1.9 Future of Cybersecurity -- 1.10 Conclusion -- References -- 2 Steganography and Steganalysis -- 2.1 Introduction -- 2.2 Steganography -- 2.2.1 Method for Evaluating Hidden Information Schema Security -- 2.2.2 Peak Signal-to-Noise Ratio -- 2.3 Steganalysis -- 2.3.1 Blind Detection Based on LSB -- 2.3.1.1 Standard Deviation Analysis -- 2.3.1.2 Statistical Method X2 with a Degree of Freedom -- 2.3.1.3 Analyzing the Gray Ratio between Any Image and Image Set Up as \Landmark -- 2.3.1.4 Estimating Information Concealed in an Image -- 2.3.2 Constraint Steganalysis -- 2.3.2.1 HKC Hiding Technique -- 2.3.2.2 DIH Technique -- 2.3.2.3 IWH Hiding Technique -- 2.3.2.4 RVH Hiding Technique ( Hiding in Two Phases) -- 2.4 Conclusion -- References -- 3 Security Threats and Vulnerabilities in E-business -- 3.1 Introduction to e-Business -- 3.1.1 Benefits of e-Business -- 3.1.2 Business Revolution…”
Libro electrónico -
12084por Bijalwan, AnchitTabla de Contenidos: “…5.4.4 Identification of Potential Vulnerabilities and Areas of Improvement -- 5.5 Conclusion -- 5.5.1 Summary of the Research Objectives and Main Findings -- 5.5.2 Contribution to the Field of Cybersecurity and MFA Protection -- 5.5.3 Implications for Organizations and Recommendations for Future Research -- References -- Chapter 6 Implementation of Rule-Based DDoS Solution in Software-Defined Network -- 6.1 Introduction -- 6.2 Background Study -- 6.2.1 Software-Defined Network (SDN) -- 6.2.2 Software-Defined Architecture -- 6.2.2.1 Application Layer -- 6.2.2.2 Control Layer -- 6.2.2.3 Data Layer -- 6.2.3 OpenFlow Protocol -- 6.2.4 Flow Table -- 6.2.5 Advantages of SDN -- 6.2.6 Vulnerabilities of SDN and OpenFlow -- 6.2.6.1 SYN Flag DDoS Attacks in SDN -- 6.2.6.2 Three-Way Handshake in TCP Protocol -- 6.3 Critical Literature Review -- 6.3.1 Machine Learning-Based Mitigation -- 6.3.1.1 Limitations of Machine Learning-Based Approach -- 6.3.2 Statistical-Based Mitigation -- 6.3.2.1 Limitations of Statistical-Based Approach -- 6.3.3 Rule-Based Mitigation -- 6.3.3.1 Limitations of Rule-Based Approach -- 6.4 Methodologies -- 6.4.1 System Configuration -- 6.4.2 Static Threshold Rule-Based Approach -- 6.4.3 Testing -- 6.5 Results and Discussion -- 6.5.1 Reflection and Future Scope -- 6.6 Conclusion -- References -- Chapter 7 Securing Network Data with a Novel Encryption Scheme -- 7.1 Introduction -- 7.2 Related Work -- 7.3 Proposed System and Methodology -- 7.3.1 Advanced Encryption Standards (AES) -- 7.3.2 RSA Public-Key Encryption -- 7.4 Results and Discussion -- 7.4.1 Result Analysis -- 7.4.1.1 CRC Generation Time -- 7.4.1.2 Encryption Time -- 7.4.1.3 Decryption Time -- 7.4.1.4 CRC Checker Time -- 7.4.1.5 CRC Generation Memory -- 7.4.1.6 Encryption Memory -- 7.4.1.7 CRC Checker Memory -- 7.4.1.8 Decryption Memory -- 7.4.1.9 Error Detection Capability…”
Publicado 2024
Libro electrónico -
12085por Malik, ReenaTabla de Contenidos: “…-- 14.3 Definition of Virtual Reality -- 14.4 Virtual Reality as an Instructive Tool -- 14.5 Educator and Student Acceptance of VR Use in Education -- 14.6 Statistics of the Usage of Virtual Reality in the Education Sector -- 14.7 Enablers for Teaching with Technology -- 14.8 Virtual Reality in Modern Education: Benefits -- 14.9 Areas of VR Application in Education -- 14.10 Constraints and Challenges in the Path of VR Learning -- 14.11 The Road Ahead -- 14.12 Conclusion -- 15 Application of VR Technology in the Educational Sector -- Opportunities and Challenges 249 Sushmitha Abhishek Rao, Bonnie Rajesh and Rajesh Raut -- 15.1 An Introduction to Virtual Reality -- 15.2 Literature Review -- 15.3 Important Elements of Virtual Reality (VR) -- 15.4 Features of VR -- 15.5 Opportunities of Virtual Reality in Education -- 15.6 Challenges of Virtual Reality in Education -- 15.7 Conclusion -- 16 Is Virtual Reality Really the Future of Learning? …”
Publicado 2024
Libro electrónico -
12086Publicado 2011Tabla de Contenidos: “…Chapter 7: Project Scheduling and Resource Levelling -- 7.1 Introduction -- 7.2 Resource Levelling -- 7.3 Resource Allocation -- 7.4 Importance of Project Scheduling -- 7.5 Other Schedules Derived from Project Schedules -- 7.5.1 Preparing Invoice Schedule -- 7.5.2 Schedule of Milestone Events -- 7.5.3 Schedule of Plant and Equipment -- 7.5.4 Schedule of Project Staff -- 7.5.5 Schedule of Labour Requirement -- 7.5.6 Schedule of Materials Requirement -- 7.5.7 Schedule of Specialized Agencies -- 7.5.8 Schedule of Direct Costs -- 7.5.9 Schedule of Overheads -- 7.5.10 Schedule of Cash Inflow -- 7.5.11 Schedule of Cash Outflow -- 7.6 Network Crashing and Cost-Time Trade-Off -- References -- Review Questions -- Chapter 8: Contractor's Estimation of Cost and Bidding Strategy -- 8.1 Contractor's Estimation and Bidding Process -- 8.1.1 Get Involved in Pre-Qualification Process -- 8.1.2 Study the Tender Document, Drawings and Prepare Tender Summary -- 8.1.3 Decisions to Take -- 8.1.4 Arrange for Site Visit and Investigation -- 8.1.5 Consultation, Queries and Meetings, and other Associated Works -- 8.1.6 Prepare Construction Schedule and other Related Schedules -- 8.1.7 Collect Information -- 8.1.8 Determining Bid Price -- 8.1.9 Analysis of Rates -- 8.1.10 Fix Mark-Up -- 8.1.11 Computing Bid Price -- 8.1.12 Submit Bid -- 8.1.13 Post-Submission Activities -- 8.2 Bidding Models -- 8.2.1 Game Theory Models -- 8.2.2 Statistical Bidding Strategy Models -- 8.2.3 Cash Flow-Based Models -- 8.3 Determination of Optimum Mark-Up Level -- 8.4 Bidding and Estimation Practices in Indian Construction Industry -- 8.4.1 Prevailing Estimation Practices -- 8.4.2 Use of Statistical/Mathematical Tools in Estimation -- 8.4.3 Breakup of Mark-Up -- 8.4.4 Labour Cost Estimation -- 8.4.5 Plant and Equipment Cost Estimation -- 8.4.6 Dealing with Uncertainties…”
Libro electrónico -
12087Publicado 2019Tabla de Contenidos: “…Seeing That Formulations Do Not All Merit the Same Attention -- 2.4.3.2. Using Statistical Fit as a Guide, Not a Straitjacket -- 2.4.3.3. …”
Libro electrónico -
12088por Ganegedara, ThushanTabla de Contenidos: “…Deep networks in the real world -- 6 Teaching machines to see: Image classification with CNNs -- 6.1 Putting the data under the microscope: Exploratory data analysis -- 6.1.1 The folder/file structure -- 6.1.2 Understanding the classes in the data set -- 6.1.3 Computing simple statistics on the data set -- 6.2 Creating data pipelines using the Keras ImageDataGenerator -- 6.3 Inception net: Implementing a state-of-the-art image classifier -- 6.3.1 Recap on CNNs -- 6.3.2 Inception net v1 -- 6.3.3 Putting everything together -- 6.3.4 Other Inception models -- 6.4 Training the model and evaluating performance -- Summary -- Answers to exercises -- 7 Teaching machines to see better: Improving CNNs and making them confess -- 7.1 Techniques for reducing overfitting -- 7.1.1 Image data augmentation with Keras -- 7.1.2 Dropout: Randomly switching off parts of your network to improve generalizability -- 7.1.3 Early stopping: Halting the training process if the network starts to underperform -- 7.2 Toward minimalism: Minception instead of Inception…”
Publicado 2022
Libro electrónico -
12089Publicado 2018Tabla de Contenidos: “…Local Basis Functions -- 4.1.4 Experimental Model Validation -- 4.1.4.1 Quantifying Modeling Performance -- 4.1.5 Mutually Orthogonal Basis Functions -- 4.1.6 Multi-Antenna Environments and Mutual Coupling -- 4.2 Oscillator Phase Noise -- 4.2.1 Phase-Noise Power Spectrum and Leeson's Equation -- 4.2.2 Phase-Noise Modeling: Free-Running Oscillator -- 4.2.3 Phase-Noise Modeling: Phase-Locked Loop -- 4.3 Data Converters -- 4.3.1 Modeling of Quantization Noise -- 4.4 Statistical Modeling -- 4.4.1 The Bussgang Theorem and the System Model -- 4.5 Stochastic Modeling of Power Ampli ers -- 4.6 Oscillator Phase Noise -- 4.7 Stochastic Modeling of Data Converters -- 4.8 Model Concatenation and Simulations -- 4.8.1 Signal-to-Interference and Noise Ratio -- 4.8.2 Simulations -- 4.8.3 Simulation Results -- References -- 5 Multicarrier Waveforms -- 5.1 Multicarrier Waveforms -- 5.1.1 The Principle of Orthogonality -- 5.1.2 OFDM-Based Waveforms…”
Libro electrónico -
12090por Brown, IainTabla de Contenidos: “…3.2.1 The Role of Descriptive Analytics in Marketing -- 3.2.2 Key Techniques in Descriptive Analytics -- 3.2.3 The Importance of Data Visualization -- 3.3 Descriptive Statistics for Marketing Data -- 3.3.1 Measures of Central Tendency -- 3.3.2 Measures of Dispersion -- 3.3.3 Measures of Association -- 3.3.4 Symmetry and Skewness -- 3.4 Data Visualization Techniques -- 3.4.1 Bar Charts and Histograms -- 3.4.2 Line Charts and Time Series Plots -- 3.4.3 Scatterplots and Bubble Charts -- 3.4.4 Heat Maps and Geographic Maps -- 3.4.5 Visualization Best Practices -- 3.5 Exploratory Data Analysis in Marketing -- 3.5.1 Data Distribution Analysis -- 3.5.2 Correlation and Covariance -- 3.5.3 Visual Exploratory Techniques -- 3.6 Analyzing Marketing Campaign Performance -- 3.6.1 Key Performance Indicators -- 3.6.2 Techniques for Analyzing Marketing Campaign Performance -- 3.6.3 The Role of Descriptive Analytics in Marketing Campaign Performance Analysis -- 3.7 Practical Example: Descriptive Analytics for a Beverage Company's Social Media Marketing Campaign -- 3.7.1 Data Collection and Preparation -- 3.7.2 Selection of Key Performance Indicators -- 3.7.3 Descriptive Analytics -- 3.7.4 Segmentation Analysis -- 3.7.5 Insights and Optimization -- 3.8 Conclusion -- 3.9 References -- Chapter 4 Inferential Analytics and Hypothesis Testing -- 4.1 Introduction -- 4.2 Inferential Analytics in Marketing -- 4.2.1 Overview of Inferential Analytics -- 4.2.2 Basics of Probability -- 4.2.3 Parametric Versus Nonparametric Tests -- 4.2.4 Key Concepts in Inferential Analytics -- 4.3 Confidence Intervals -- 4.3.1 Estimating Population Mean -- 4.3.2 Margin of Error and Level of Confidence -- 4.3.3 Interpreting Confidence Intervals -- 4.3.4 Practical Example: Confidence Interval in Marketing Campaign Evaluation -- 4.4 A/B Testing in Marketing -- 4.4.1 Basics and Importance…”
Publicado 2024
Libro electrónico -
12091Publicado 2022Tabla de Contenidos: “…Objective 18 Summarize cloud concepts and connectivity options -- Deployment Models -- Public -- Private -- Hybrid -- Community -- Service Models -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Infrastructure as Code -- Automation/Orchestration -- Connectivity Options -- Virtual Private Network (VPN) -- Private-Direct Connection to Cloud Provider -- Multitenancy -- Scalability -- 00-FMindd 15 22/04/22 11:12 AM -- xvi Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Elasticity -- Security Implications -- REVIEW -- 18 QUESTIONS -- 18 ANSWERS -- 20 Network Implementations -- Objective 21 Compare and contrast various devices, their features, -- and their appropriate placement on the network -- Networking Devices -- Layer 2 Switch -- Layer 3 Capable Switch -- Router -- Hub -- Access Point -- Bridge -- Wireless LAN Controller -- Load Balancer -- Proxy Server -- Cable Modem -- DSL Modem -- Repeater -- Voice Gateway -- Media Converter -- Firewall -- Intrusion Prevention System(IPS)/Intrusion Detection System (IDS) Device -- VPN Headend -- Networked Devices -- Voice over Internet Protocol (VoIP) Phone -- Printer -- Physical Access Control Devices -- Cameras -- Heating, Ventilation, and Air Conditioning (HVAC) Sensors -- Internet of Things (IoT) -- Industrial Control Systems/Supervisory Control and Data Acquisition (SCADA) -- REVIEW -- 21 QUESTIONS -- 21 ANSWERS -- Objective 22 Compare and contrast routing technologies -- and bandwidth management concepts -- Routing -- Dynamic Routing -- Static Routing -- 00-FMindd 16 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Default Route -- Administrative Distance -- Exterior vs Interior -- Time to Live -- Bandwidth Management -- Quality of Service (QoS), Traffic Shaping -- REVIEW -- 22 QUESTIONS -- 22 ANSWERS -- Objective 23 Given a scenario, configure and deploy common -- Ethernet switching features -- Data Virtual Local Area Network (VLAN) -- Voice VLAN -- Port Configurations -- Port Tagging/8021Q -- Port Aggregation -- Duplex -- Speed -- Flow Control -- Port Mirroring -- Port Security -- Jumbo Frames -- Auto-Medium-Dependent Interface Crossover (MDI-X) -- Media Access Control (MAC) Address Tables -- Power over Ethernet (PoE)/Power over Ethernet Plus (PoE+) -- Spanning Tree Protocol -- Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) -- Address Resolution Protocol (ARP) -- Neighbor Discovery Protocol -- REVIEW -- 23 QUESTIONS -- 23 ANSWERS -- Objective 24 Given a scenario, install and configure the appropriate -- wireless standards and technologies -- 80211 Standards -- a -- b -- g -- n (Wi-Fi 4) -- ac (Wi-Fi 5) -- ax (Wi-Fi 6) -- 00-FMindd 17 22/04/22 11:12 AM -- xviii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Frequencies and Range -- 24 GHz -- 50 GHz -- Channels -- Regulatory Impacts -- Channel Bonding -- Service Set Identifier (SSID) -- Basic Service Set -- Independent Basic Service Set (Ad-hoc) -- Extended Service Set -- Roaming -- Antenna Types -- Omni -- Directional -- Encryption Standards -- Wi-Fi Protected Access (WPA)/WPA2 Personal [Advanced Encryption -- Standard (AES)/Temporal Key Integrity Protocol (TKIP)] -- WPA/WPA2 Enterprise (AES/TKIP) -- Cellular Technologies -- Global System for Mobile Communications (GSM) -- Code-Division Multiple Access (CDMA) -- Long-Term Evolution (LTE) -- 3G, 4G, 5G -- Multiple Input, Multiple Output (MIMO) and Multi-user MIMO (MU-MIMO) -- REVIEW -- 24 QUESTIONS -- 24 ANSWERS -- 30 Network Operations -- Objective 31 Given a scenario, use the appropriate statistics -- and sensors to ensure network availability -- Performance Metrics/Sensors -- Device/Chassis -- Network Metrics -- SNMP -- Management Information Bases (MIBs) -- Object Identifiers (OIDs) -- Traps -- Network Device Logs -- Log Reviews…”
Libro electrónico -
12092Publicado 2019“…Updated with new examples, exercises, and statistics, the 4th ed. gives students the opportunity to practice and apply course concepts, while connecting them to the latest financial issues and policy in today's world of business…”
Libro electrónico -
12093Publicado 2018Tabla de Contenidos: “…Chapter 6: Advanced Search Examples -- Using subsearches to find loosely related events -- Subsearch -- Subsearch caveats -- Nested subsearches -- Using transaction -- Using transaction to determine session length -- Calculating the aggregate of transaction statistics -- Combining subsearches with transaction -- Determining concurrency -- Using transaction with concurrency -- Using concurrency to estimate server load -- Calculating concurrency with a by clause -- Calculating events per slice of time -- Using timechart -- Calculating average requests per minute -- Calculating average events per minute, per hour -- Rebuilding top -- Acceleration -- Big data - summary strategy -- Report acceleration -- Report acceleration availability -- Version 7.0 advancements in metrics -- Definition of a Splunk metric -- Using Splunk metrics -- Creating a metrics index -- Creating a UDP or TCP data input -- Summary -- Chapter 7: Extending Search -- Using tags to simplify search -- Using event types to categorize results -- Using lookups to enrich data -- Defining a lookup table file -- Defining a lookup definition -- Defining an automatic lookup -- Troubleshooting lookups -- Using macros to reuse logic -- Creating a simple macro -- Creating a macro with arguments -- Creating workflow actions -- Running a new search using values from an event -- Linking to an external site -- Building a workflow action to show field context -- Building the context workflow action -- Building the context macro -- Using external commands -- Extracting values from XML -- xmlkv -- XPath -- Using Google to generate results -- Summary -- Chapter 8: Working with Apps -- Defining an app -- Included apps -- Installing apps -- Installing apps from Splunkbase -- Using Geo Location Lookup Script -- Using Google Maps -- Installing apps from a file -- Building your first app -- Editing navigation…”
Libro electrónico -
12094por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Skills use at work: Definition, measurement and some descriptive statistics -- Measuring skills use at work: The approach taken by PIAAC -- Box 2.1. …”
Publicado 2016
Libro electrónico -
12095Publicado 2017Tabla de Contenidos: “…. -- Enumerating file type statistics -- Getting ready -- How to do it... -- How it works... -- Using loopback files -- How to do it... -- How it works... -- There's more... -- Creating partitions inside loopback images -- Mounting loopback disk images with partitions more quickly -- Mounting ISO files as loopback -- Flush changing immediately with sync -- Creating ISO files and hybrid ISO -- Getting ready -- How to do it... -- There's more... -- Hybrid ISO that boots off a flash drive or hard disk -- Burning an ISO from the command line -- Playing with the CD-ROM tray -- Finding the difference between files, and patching -- How to do it... -- There's more... -- Generating difference against directories -- Using head and tail for printing the last or first 10 lines -- How to do it... -- Listing only directories - alternative methods -- Getting ready -- How to do it... -- How it works... -- Fast command-line navigation using pushd and popd -- Getting ready -- How to do it... -- There's more... -- pushd and popd are useful when there are more than three directory paths used. …”
Libro electrónico -
12096Publicado 2017Tabla de Contenidos: “…-- History of Lambda Architecture -- Principles of Lambda Architecture -- Fault-tolerant principle -- Immutable Data principle -- Re-computation principle -- Components of a Lambda Architecture -- Batch layer -- Speed layer -- CAP Theorem -- Eventual consistency -- Serving layer -- Complete working of a Lambda Architecture -- Advantages of Lambda Architecture -- Disadvantages of Lambda Architectures -- Technology overview for Lambda Architecture -- Applied lambda -- Enterprise-level log analysis -- Capturing and analyzing sensor data -- Real-time mailing platform statistics -- Real-time sports analysis -- Recommendation engines -- Analyzing security threats -- Multi-channel consumer behaviour -- Working examples of Lambda Architecture -- Kappa architecture -- Summary -- Chapter 4: Applied Lambda for Data Lake -- Knowing Hadoop distributions -- Selection factors for a big data stack for enterprises -- Technical capabilities -- Ease of deployment and maintenance -- Integration readiness -- Batch layer for data processing -- The NameNode server -- The secondary NameNode Server -- Yet Another Resource Negotiator (YARN) -- Data storage nodes (DataNode) -- Speed layer -- Flume for data acquisition -- Source for event sourcing -- Interceptors for event interception -- Channels for event flow -- Sink as an event destination -- Spark Streaming -- DStreams -- Data Frames -- Checkpointing -- Apache Flink -- Serving layer -- Data repository layer -- Relational databases -- Big data tables/views -- Data services with data indexes -- NoSQL databases -- Data access layer -- Data exports -- Data publishing -- Summary -- Chapter 5: Data Acquisition of Batch Data using Apache Sqoop -- Context in data lake - data acquisition…”
Libro electrónico -
12097Publicado 2016“…What You Will Learn Create and deploy your own JIRA plugins Manipulate workflows to transform JIRA into a user-friendly system Create custom reports that show statistics for particular people, projects, versions, or other fields within issues Simplify reporting by writing your own JIRA gadgets, which can be added into a user's dashboard Master database handling by extending and retrieving custom field details from the database Deal with custom fields on an issue and program custom field option In Detail JIRA provides issue and project tracking for software development teams to improve code quality and the speed of development. …”
Libro electrónico -
12098Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Real-time statistics -- How to do it... -- How it works... -- See also -- Chapter 2: Common PHP Scenarios -- Introduction -- Configuring NGINX for WordPress -- Getting ready -- How to do it... -- How it works... -- There's more... -- WordPress multisite with NGINX -- How to do it... -- Subdomains -- See also -- Running Drupal using NGINX -- Getting ready -- How to do it... -- How it works... -- See also -- Using NGINX with MediaWiki -- Getting ready -- How to do it... -- See also -- Using Magento with NGINX -- Getting ready -- How to do it... -- How it works... -- See also -- Configuring NGINX for Joomla -- Getting ready -- How to do it... -- See also -- Chapter 3: Common Frameworks -- Introduction -- Setting up Django with NGINX -- Getting ready -- How to do it... -- How it works.... -- See also -- Setting up NGINX with Express -- Getting ready -- How to do it... -- How it works.... -- See also -- Running Ruby on Rails with NGINX -- Getting ready -- How to do it... -- How it works... -- See also -- Easy Flask with NGINX -- Getting ready -- How to do it... -- How it works... -- Laravel via NGINX -- Getting ready -- How to do it... -- How it works... -- See also -- Meteor applications with NGINX…”
Libro electrónico -
12099
-
12100Publicado 2024Tabla de Contenidos: “…Global Finance in Practice 6.1: Lies, Damn Lies, and Statistics: Uber Fare as the Basis for Exchange Rate Parity -- 6.2 Interest Rates and Exchange Rates -- Global Finance in Practice 6.2: Are Foreign Capital Inflow and Interest Rate Directly Related? …”
Libro electrónico