Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFM 2,694
- Gestió de projectes 1,302
- Empreses 1,057
- Universidad Pontificia de Salamanca (España) 987
- Direcció i administració 882
- Planificació estratègica 792
- Development 785
- TFMP 721
- Application software 720
- Engineering & Applied Sciences 583
- Planificació 566
- Management 423
- Computer programs 420
- Computer Science 404
- Computer networks 359
- Examinations 350
- Data processing 338
- Python (Computer program language) 328
- Computer programming 304
- Arquitectura 298
- Edificis 297
- Sistemes d'informació per a la gestió 294
- Design 281
- History 277
- Indústria i comerç 274
- Comerç electrònic 273
- Cloud computing 269
- Certification 266
- Photography 262
- Operating systems (Computers) 259
-
18781por Eisfeld, Rainer Dr“…It is this kind of awareness that affords us the avoidance of such pitfalls as excessive descriptiveness and aim at what Eisfeld propagates throughout the book: becoming critical thinkers. By doing so, we can master the science of democracy Eisfeld's ambitious engagement with the subject matter casts light upon new and alternative approaches in terms of reshaping political science with 21st century relevance, the creation of a discipline with a heightened regional scope, and the adoption of flexible new frameworks that are of service to pluralism and the changing nature of democratic governance. …”
Publicado 2012
Libro electrónico -
18782Publicado 2018Tabla de Contenidos: “…Health checks -- Rollback -- Blue-green deployments -- Canary releases -- Secrets -- Creating secrets -- Using a secret -- Simulating secrets in a development environment -- Secrets and legacy applications -- Updating secrets -- Summary -- Questions -- Further reading -- Chapter 12: Introduction to Kubernetes -- Technical requirements -- Architecture -- Kubernetes master nodes -- Cluster nodes -- Introduction to Minikube -- Kubernetes support in Docker for Desktop -- Pods -- Comparing Docker container and Kubernetes pod networking -- Sharing the network namespace -- Pod life cycle -- Pod specification -- Pods and volumes -- Kubernetes ReplicaSet -- ReplicaSet specification -- Self-healing -- Kubernetes deployment -- Kubernetes service -- Context-based routing -- Comparing SwarmKit with Kubernetes -- Summary -- Questions -- Further reading -- Chapter 13: Deploying, Updating, and Securing an Application with Kubernetes -- Technical requirements -- Deploying a first application -- Deploying the web component -- Deploying the database -- Streamlining the deployment -- Zero downtime deployments -- Rolling updates -- Blue-green deployment -- Kubernetes secrets -- Manually defining secrets -- Creating secrets with kubectl -- Using secrets in a pod -- Secret values in environment variables -- Summary -- Questions -- Further reading -- Chapter 14: Running a Containerized App in the Cloud -- Technical requirements -- Deploying our application into AWS ECS -- Introduction to ECS -- Creating a Fargate ECS cluster of AWS -- Authoring a task definition -- Running a task in ECS -- Modifying the task definition -- Adding the database component to the application -- Deploying and using Docker EE on AWS -- Provisioning the infrastructure -- Installing Docker -- Installing Docker UCP -- Remote admin the UCP cluster -- Deploying to Docker Swarm…”
Libro electrónico -
18783Publicado 2018“…What You Will Learn Get to know the reasons for choosing Scala: its use and the advantages it provides over other languages Bring together functional and object-oriented programming constructs to make a manageable application Master basic to advanced Scala constructs Test your applications using advanced testing methodologies such as TDD Select preferred language constructs from the wide variety of constructs provided by Scala Make the transition from the object-oriented paradigm to the functional programming paradigm Write clean, concise, and powerful code with a functional mindset Create concurrent, scalable, and reactive applications utilizing the advantages of Scala In Detail Scala is a general-purpose programming language that supports both functional and object-oriented programming paradigms. …”
Libro electrónico -
18784Publicado 2021Tabla de Contenidos: “…Constants -- INTO CORRESPONDING -- DDIC Information -- Using Standard SAP Functions Incorrectly -- Conclusion -- Chapter 6: User Friendliness: Ensuring UI Quality -- General Philosophy -- Difference Between UI and UX -- Don't Make Me Think -- Waterfall Projects -- Consistency -- Standards -- Applying Industry Standards -- Non-Standard Icon Appearance -- Non-Standard Icon Usage -- Inconsistency -- Inconsistency in F4 Helps -- Inconsistency in Pop-Ups -- Inconsistency in Master Data Transactions -- Ease of Use -- Laying Traps for the User -- Hiding Icons for No Reason -- Hiding Fields for No Reason -- Slightly Hidden Field -- Totally Hidden Field -- Incorrect Use of Check Boxes -- Confusing the User -- Giving Incorrect Options -- Giving No Options at All -- Accessibility -- Explaining Things to the User -- Avoiding Abbreviations -- Custom Data Elements -- Custom F1 Help -- Custom Domains -- Error Prevention -- Inviting Errors -- Self-Destruct Button -- Stopping Dumps Before They Begin -- Self-Service -- Logging -- Linking Errors to Training Material -- Sneaky Trick: ALV Filter Not Working -- Error Handling -- Shouting at the User -- Preventing the User from Fixing the Problem -- Making the User Reenter Data -- Making It Impossible to Fix the Problem -- Enabling the User to Fix the Problem -- Mandatory Fields -- Taking the User to the Source of the Problem -- Example: IDoc Application Log -- Documentation -- Documentation Guidelines -- Documentation Terminology -- Documentation for Dialog Transactions -- Documentation for Developers -- Conclusion -- Recommended Reading -- Chapter 7: User Exits: Defusing a Potential Time Bomb -- User Exits in On-Premises SAP Systems -- VOFM Routines -- Repairs -- FORM-Based User Exits -- CMOD User Exits -- BAdi User Exits -- The Enhancement Framework -- User Exits in Your Own Z Programs -- User Exits in Cloud SAP Systems…”
Libro electrónico -
18785Publicado 2009“…This full-color, utterly simple, step-by-step book has been carefully crafted to provide instant access to the tasks beginner-to-intermediate users need to master. Like all books in the Easy series, it's designed to teach visually: readers never have to work their way through lengthy text explanations. …”
Libro electrónico -
18786Publicado 2021Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- List of Figures -- Code Listings -- Preface -- About this Book -- Abstract -- Acknowledgments -- Introduction -- Chapter 1 Market Data -- 1.1 Tick and bar data -- 1.2 Corporate actions and adjustment factor -- 1.3 Linear vs log returns -- Chapter 2 Forecasting -- 2.1 Data for forecasts -- 2.1.1 Point‐in‐time and lookahead -- 2.1.2 Security master and survival bias -- 2.1.3 Fundamental and accounting data -- 2.1.4 Analyst estimates -- 2.1.5 Supply chain and competition -- 2.1.6 M& -- A and risk arbitrage -- 2.1.7 Event‐based predictors -- 2.1.8 Holdings and flows -- 2.1.9 News and social media -- 2.1.10 Macroeconomic data -- 2.1.11 Alternative data -- 2.1.12 Alpha capture -- 2.2 Technical forecasts -- 2.2.1 Mean reversion -- 2.2.2 Momentum -- 2.2.3 Trading volume -- 2.2.4 Statistical predictors -- 2.2.5 Data from other asset classes -- 2.3 Basic concepts of statistical learning -- 2.3.1 Mutual information and Shannon entropy -- 2.3.2 Likelihood and Bayesian inference -- 2.3.3 Mean square error and correlation -- 2.3.4 Weighted law of large numbers -- 2.3.5 Bias‐variance tradeoff -- 2.3.6 PAC learnability, VC dimension, and generalization error bounds -- 2.4 Machine learning -- 2.4.1 Types of machine learning -- 2.4.2 Overfitting -- 2.4.3 Ordinary and generalized least squares -- 2.4.4 Deep learning -- 2.4.5 Types of neural networks -- 2.4.6 Nonparametric methods -- 2.4.7 Hyperparameters -- 2.4.8 Cross‐validation -- 2.4.9 Convex regression -- 2.4.10 Curse of dimensionality, eigenvalue cleaning, and shrinkage -- 2.4.11 Smoothing and regularization -- 2.4.11.1 Smoothing spline. -- 2.4.11.2 Total variation denoising -- 2.4.11.3 Nadaraya-Watson kernel smoother -- 2.4.11.4 Local linear regression -- 2.4.11.5 Gaussian process -- 2.4.11.6 Ridge and kernel ridge regression…”
Libro electrónico -
18787Hire with your head using performance-based hiring to build outstanding diverse teamsHire With Your HeadHire With Your HeadPublicado 2022“…Over the past few years, we have created a series of online training materials including self-paced courses, templates, scorecards and interview guides to help people master Performance-based Hiring. Some of this content will available via download for those who purchase the book including a number of free videos clarifying some of the critical points. …”
Libro electrónico -
18788por Nadeau, Thomas D.“…MPLS Network Management: MIBs, Tools, and Techniques is the first and only book that will help you master MPLS management technologies and techniques, as they apply to classic MPLS networks, traffic-engineered networks, and VPNs. …”
Publicado 2003
Libro electrónico -
18789Publicado 2017“…Become a master of Python programming using the small yet powerful Raspberry Pi Zero About This Book This is the first book on the market that teaches Python programming with Raspberry Pi Zero Develop exciting applications such as a mobile robot and home automation controller using Python This step-by-step guide helps you make the most out of Raspberry Pi Zero using Python programming Who This Book Is For This book is aimed at hobbyists and programmers who want to learn Python programming and develop applications using the Pi Zero. …”
Libro electrónico -
18790Publicado 2017“…By the end of the book, you will gain have mastered automating your IT tasks and accelerating the deployment of your applications. …”
Libro electrónico -
18791Publicado 2017“…What You Will Learn Understand the nature and key concepts used in the field of data science Grasp how data is collected, cleaned, and processed Become comfortable with key data analysis techniques See specialized analysis techniques centered on machine learning Master the effective visualization of your data Work with the Java APIs and techniques used to perform data analysis In Detail Data science is concerned with extracting knowledge and insights from a wide variety of data sources to analyse patterns or predict future behaviour. …”
Libro electrónico -
18792Publicado 2016“…Increase sales, decrease your marathon time, boost your savings, or master a new skill. Just five percent more can get you where you want to be. …”
Libro electrónico -
18793Publicado 2016“…Over 140 practical recipes to help you make sense of your data with ease and build production-ready data apps About This Book Analyze Big Data sets, create attractive visualizations, and manipulate and process various data types Packed with rich recipes to help you learn and explore amazing algorithms for statistics and machine learning Authored by Ivan Idris, expert in python programming and proud author of eight highly reviewed books Who This Book Is For This book teaches Python data analysis at an intermediate level with the goal of transforming you from journeyman to master. Basic Python and data analysis skills and affinity are assumed. …”
Libro electrónico -
18794Publicado 2017“…The 10 projects in this book will teach you to build, code, and invent with the super-smart Arduino and a handful of parts. First, you'll master the basics with a primer that explains how a circuit works, how to read a wiring schematic, and how to build and test projects with a solderless breadboard. …”
Libro electrónico -
18795Publicado 2019“…Python Machine Learning will help coders of all levels master one of the most in-demand programming skillsets in use today. …”
Libro electrónico -
18796
-
18797Publicado 2017“…Recipes to help you overcome your data science hurdles using Java About This Book This book provides modern recipes in small steps to help an apprentice cook become a master chef in data science Use these recipes to obtain, clean, analyze, and learn from your data Learn how to get your data science applications to production and enterprise environments effortlessly Who This Book Is For This book is for Java developers who are familiar with the fundamentals of data science and want to improve their skills to become a pro. …”
Libro electrónico -
18798Publicado 2023Tabla de Contenidos: “…Secrets and Kubernetes -- 1 Kubernetes Secrets -- 1.1 A focus on security -- 1.2 Taking full advantage of the Kubernetes ecosystem -- 1.3 Not everything is a Secret -- 1.4 Bringing secrets management and Kubernetes together -- 1.5 Tools to get started -- Summary -- 2 An introduction to Kubernetes and Secrets -- 2.1 Kubernetes architecture -- 2.1.1 What is a master Node? -- 2.1.2 What is a worker Node? -- 2.2 Deploying workloads in Kubernetes -- 2.2.1 Deploying a workload -- 2.2.2 Deployment objects -- 2.2.3 Volume -- 2.3 Managing application configuration -- 2.3.1 ConfigMaps -- 2.4 Using Kubernetes Secrets to store sensitive information -- 2.4.1 Secrets are encoded in Base64 -- 2.4.2 Secrets are mounted in a temporary file system -- 2.4.3 Secrets can be encrypted at rest -- 2.4.4 Risks -- Summary -- Part 2. …”
Libro electrónico -
18799Publicado 2023“…If you're interested in cybersecurity or working as a cybersecurity professional, this book will help you master ZAP. You'll start with an overview of ZAP and understand how to set up a basic lab environment for hands-on activities over the course of the book. …”
Libro electrónico -
18800Publicado 2024Tabla de Contenidos: “…Business logic vulnerabilities -- Preview of the Open Worldwide Application Security Project API Security Top 10 2023 -- Summary -- Further reading -- Chapter 4: Investigating Recent Breaches -- The importance of learning from mistakes -- Examining 10 high-profile API breaches from 2022 -- 1-Global shipping company -- 2-Campus access control -- 3-Microbrewery application -- 4-Cryptocurrency portal -- 5-Dating application -- 6-The All in One SEO WordPress plugin -- 7-X account information leakage -- 8-Home router -- 9-Remote access to two popular vehicles -- 10-Smart Scale -- Key takeaways and learning -- Summary -- Further reading -- Part 2: Attacking APIs -- Chapter 5: Foundations of Attacking APIs -- Technical requirements -- Understanding API attackers and their methods -- Interacting with APIs -- Finding API keys -- Enumeration and discovery of APIs -- Fuzzing API endpoints -- Attacking JWTs -- Mastering the tools of the trade -- CLI clients (HTTPie/cURL) -- Postman -- Browser tools -- Burp Suite -- Reverse proxies -- Learning the key skills of API attacking -- Building a laboratory -- Hacking vulnerable APIs -- Training courses -- Summary -- Further reading -- Chapter 6: Discovering APIs -- Technical requirements -- Passive discovery -- Google -- Offensive security Google database -- Other API-specific searchable databases -- Code analysis techniques -- Active discovery -- Network discovery and scan -- OWASP ZAP -- Burp Suite -- Reverse-engineering mobile apps -- Postman -- Implementation analysis -- Verbose error and debug messages -- OS and framework enumeration -- Timing or volume attacks -- Utilizing online tools such as BuiltWith or Wappalyzer -- Evading common defenses -- Summary -- Further reading -- Chapter 7: Attacking APIs -- Technical requirements -- Authentication attacks -- Insecure implementation logic…”
Libro electrónico