Mostrando 13,181 - 13,200 Resultados de 13,325 Para Buscar '"The Jam"', tiempo de consulta: 0.12s Limitar resultados
  1. 13181
    Publicado 2018
    Tabla de Contenidos: “…Layer 1 - managing the inputs to the network -- Weights, biases, and preactivation -- Displaying the details of the activation function through the preactivation process -- The activation function of Layer 1 -- Dropout and Layer 2 -- Layer 2 -- Measuring the precision of prediction of a network through accuracy values -- Correct prediction -- accuracy -- Cross-entropy -- Training -- Optimizing speed with Google's Tensor Processing Unit -- Summary -- Questions -- Further reading -- Chapter 11: Conceptual Representation Learning -- Technical requirements -- Generate profit with transfer learning -- The motivation of transfer learning -- Inductive thinking -- Inductive abstraction -- The problem AI needs to solve -- The Γ gap concept -- Loading the Keras model after training -- Loading the model to optimize training -- Loading the model to use it -- Using transfer learning to be profitable or see a project stopped -- Defining the strategy -- Applying the model -- Making the model profitable by using it for another problem -- Where transfer learning ends and domain learning begins -- Domain learning -- How to use the programs -- The trained models used in this section -- The training model program -- GAP - loaded or unloaded -- GAP - jammed or open lanes -- The gap dataset -- Generalizing the Γ(gap conceptual dataset) -- Generative adversarial networks -- Generating conceptual representations -- The use of autoencoders -- The motivation of conceptual representation learning meta-models -- The curse of dimensionality -- The blessing of dimensionality -- Scheduling and blockchains -- Chatbots -- Self-driving cars -- Summary -- Questions -- Further reading -- Chapter 12: Automated Planning and Scheduling -- Technical requirements -- Planning and scheduling today and tomorrow -- A real-time manufacturing process…”
    Libro electrónico
  2. 13182
    Publicado 2021
    Tabla de Contenidos: “…Backdoors and Trojans -- Data Exfiltration and Covert Channels -- New Users -- Pivoting -- Covering Your Tracks -- Summary -- Exam Essentials -- Lab Exercises -- Activity 6.1: Exploit -- Activity 6.2: Discovery -- Activity 6.3: Pivot -- Review Questions -- Chapter 7 Exploiting Network Vulnerabilities -- Identifying Exploits -- Conducting Network Exploits -- VLAN Hopping -- DNS Cache Poisoning -- On-Path Attacks -- NAC Bypass -- DoS Attacks and Stress Testing -- Exploit Chaining -- Exploiting Windows Services -- NetBIOS Name Resolution Exploits -- SMB Exploits -- Identifying and Exploiting Common Services -- Identifying and Attacking Service Targets -- SNMP Exploits -- SMTP Exploits -- FTP Exploits -- Kerberoasting -- Samba Exploits -- Password Attacks -- Stress Testing for Availability -- Wireless Exploits -- Attack Methods -- Finding Targets -- Attacking Captive Portals -- Eavesdropping, Evil Twins, and Wireless On-Path Attacks -- Other Wireless Protocols and Systems -- RFID Cloning -- Jamming -- Repeating -- Summary -- Exam Essentials -- Lab Exercises -- Activity 7.1: Capturing Hashes -- Activity 7.2: Brute-Forcing Services -- Activity 7.3: Wireless Testing -- Review Questions -- Chapter 8 Exploiting Physical and Social Vulnerabilities -- Physical Facility Penetration Testing -- Entering Facilities -- Information Gathering -- Social Engineering -- In-Person Social Engineering -- Phishing Attacks -- Website-Based Attacks -- Using Social Engineering Tools -- Summary -- Exam Essentials -- Lab Exercises -- Activity 8.1: Designing a Physical Penetration Test -- Activity 8.2: Brute-Forcing Services -- Activity 8.3: Using BeEF -- Review Questions -- Chapter 9 Exploiting Application Vulnerabilities -- Exploiting Injection Vulnerabilities -- Input Validation -- Web Application Firewalls -- SQL Injection Attacks -- Code Injection Attacks…”
    Libro electrónico
  3. 13183
    por Rothman, Denis
    Publicado 2020
    Tabla de Contenidos: “…Applying the FNN XOR function to optimizing subsets of data -- Summary -- Questions -- Further reading -- Chapter 9: Abstract Image Classification with Convolutional Neural Networks (CNNs) -- Introducing CNNs -- Defining a CNN -- Initializing the CNN -- Adding a 2D convolution layer -- Kernel -- Shape -- ReLU -- Pooling -- Next convolution and pooling layer -- Flattening -- Dense layers -- Dense activation functions -- Training a CNN model -- The goal -- Compiling the model -- The loss function -- The Adam optimizer -- Metrics -- The training dataset -- Data augmentation -- Loading the data -- The testing dataset -- Data augmentation on the testing dataset -- Loading the data -- Training with the classifier -- Saving the model -- Next steps -- Summary -- Questions -- Further reading and references -- Chapter 10: Conceptual Representation Learning -- Generating profit with transfer learning -- The motivation behind transfer learning -- Inductive thinking -- Inductive abstraction -- The problem AI needs to solve -- The gap concept -- Loading the trained TensorFlow 2.x model -- Loading and displaying the model -- Loading the model to use it -- Defining a strategy -- Making the model profitable by using it for another problem -- Domain learning -- How to use the programs -- The trained models used in this section -- The trained model program -- Gap - loaded or underloaded -- Gap - jammed or open lanes -- Gap datasets and subsets -- Generalizing the (the gap conceptual dataset) -- The motivation of conceptual representation learning metamodels applied to dimensionality -- The curse of dimensionality -- The blessing of dimensionality -- Summary -- Questions -- Further reading -- Chapter 11: Combining Reinforcement Learning and Deep Learning -- Planning and scheduling today and tomorrow -- A real-time manufacturing process…”
    Libro electrónico
  4. 13184
    por Orzach, Yoram
    Publicado 2022
    Tabla de Contenidos: “…Sniffing wireless networks -- Sniffing packets on the target AP -- Packet injection -- Discovering hidden SSIDs -- Compromising open authentication wireless networks -- WLAN encryptions and their corresponding flaws and attacks -- Network jamming - DOS/DDOS wireless network attacks -- Evil twin attack - honeypots -- Person-in-the-Middle (PITM) attacks -- Implementing a secure wireless architecture -- Summary -- Questions -- Chapter 12: Attacking Routing Protocols -- IGP standard protocols - the behaviors RIP (brief), OSPF, and IS-IS -- RIP protocol behavior -- OSPF protocol behavior -- IS-IS protocol behavior -- Dual IS-IS -- CLNP -- IS-IS levels -- Falsification, overclaiming, and disclaiming -- DDOS, mistreating, and attacks on the control plane -- Planes -- DOS and DDOS -- Reflection attacks -- Routing table poisoning and attacks on the management plane -- Traffic generation and attacks on the data plane -- Attacks on the data plane -- How to configure your routers to protect -- BGP - protocol and operation -- BGP hijacking -- BGP mitigation -- Summary -- Questions -- Chapter 13: DNS Security -- The DNS protocol, behavior, and data structure -- The DNS protocol -- DNS behavior and structure -- DNS attack discovery - tools and analysis -- DNS enumeration -- Vulnerability scanning -- Attacks on DNS resources - DNS flooding, NX records, and subdomains -- NX record attacks -- DNS flooding -- Attacks on a service - domain spoofing and hijacking, or cache poisoning -- Using DNS to bypass network controls - DNS tunneling -- DNS protection -- Summary -- Questions -- Chapter 14: Securing Web and Email Services -- HTTP and HTTP2 protocol behavior, data structure, and analysis -- HTTP behavior, data structure, and analysis -- Proxy servers -- HTTP request formation -- HTTP versions -- HTTPS protocol behavior, data structure, and analysis -- What is HTTPS?…”
    Libro electrónico
  5. 13185
  6. 13186
    por Hudson, Shane. author
    Publicado 2014
    “…Specifically, you will learn how to: Expertly use canvas and animation Push audio and video to their full capabilities Code and manipulate advanced 3D visualizations Create your own music directly from the browser Implement real-time collaboration with Node.js Explore real-time audio and video with WebRTC Play with motion detection and gesture control Combine all features into one social music creation experiment, similar to Google's 'Jam with Chrome' JavaScript Creativity is for the developer who has a working knowledge of JavaScript and wants to take their code to the next level. …”
    Libro electrónico
  7. 13187
    por Fulton, Steve
    Publicado 2011
    “…No matter what platform or tools you use, the HTML5 revolution will soon change the way you build web applications, if it hasn't already. HTML5 is jam-packed with features, and there's a lot to learn. …”
    Libro electrónico
  8. 13188
  9. 13189
  10. 13190
  11. 13191
  12. 13192
  13. 13193
  14. 13194
  15. 13195
  16. 13196
  17. 13197
  18. 13198
  19. 13199
  20. 13200