Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mecánica 618
- Engineering & Applied Sciences 343
- Materiales 308
- Technology: general issues 259
- History of engineering & technology 239
- Medicine 216
- Mechanical Engineering 212
- Research & information: general 199
- Law and legislation 196
- Taxation 185
- Propiedades mecánicas 183
- mechanical properties 183
- Mechanical engineering 177
- Development 176
- Física 165
- Engineering and Technology 146
- Physical Sciences 143
- Application software 141
- Management 134
- Computer networks 131
- Engineering 127
- Data processing 124
- History 122
- Security measures 121
- Computer security 113
- microstructure 113
- Economics 112
- Artificial intelligence 107
- Research 104
- Mechanical Engineering - General 103
-
8301Publicado 2021Tabla de Contenidos: “…-- Free IDS/IPS -- IPS versus IDS -- Summary -- Chapter 9: Deep Diving into Physical Security -- Technical requirements -- Understanding physical security and associated threats -- The powerful LAN Turtle -- The stealthy Plunder Bug LAN Tap -- The dangerous Packet Squirrel -- The portable Shark Jack -- The amazing Screen Crab -- The advanced Key Croc -- USB threats -- Equipment theft -- Environmental risks -- Physical security mechanisms -- Mastering physical security -- Clean desk policy -- Physical security audits -- Summary -- Further reading -- Chapter 10: Applying IoT Security -- Understanding the Internet of Things -- The risks -- The vulnerabilities -- Understanding IoT networking technologies -- LoRaWAN -- Zigbee -- Sigfox -- Bluetooth -- Security considerations -- Improving IoT security -- Creating cybersecurity hardware using IoT-enabled devices -- Raspberry Pi firewall and intrusion detection system -- Defensive security systems for industrial control systems (SCADA) -- Secure USB-to-USB copy machine -- Creating a 10 honeypot -- Advanced monitoring of web apps and networks -- Creating an internet ad blocker -- Access control and physical security systems -- Bonus track - Understanding the danger of unauthorized IoT devices -- Detecting unauthorized IoT devices -- Detecting a Raspberry Pi -- Disabling rogue Raspberry Pi devices -- Summary -- Further reading -- Chapter 11: Secure Development and Deployment on the Cloud -- Technical requirements -- Secure deployment and implementation of cloud applications…”
Libro electrónico -
8302Publicado 2022Tabla de Contenidos: “…Self-Study -- The SHRM Exam Objectives -- Using Exam Weights -- Practice Exams -- Exam-Taking Strategies -- Understand the Stem -- Guess When Necessary -- Exam Day Basics -- Mental Mechanisms -- Mindset -- Confidence Building -- Summary -- Exam Essentials -- Part 2 Understanding Human Resource Competencies -- Chapter 3 The Dynamic Environment of Human Resource Management -- Exam Notables -- An Evolving Landscape -- Strategic Alignment -- Global Operations -- Diversity, Equity, and Inclusion -- Talent Acquisition and Workforce Management -- Regulatory Environment -- Measuring Results -- Corporate Social Responsibility -- HR Demographics -- A Day in the Life of HR -- HR Professional Development -- Landing Your First Job in HR -- Managing Burnout -- Summary -- Exam Essentials -- Chapter 4 The Business Competency Cluster -- Exam Notables -- Business Competencies -- Business Acumen -- Business and Competitive Awareness -- Financial Analysis -- Strategic Alignment -- Consultation -- Evaluating Business Challenges -- Designing and Implementing HR Solutions -- Critical Evaluation -- Data Advocate -- Data Gathering and Analysis -- Summary -- Key Terms -- Exam Essentials -- Part 3 The People Knowledge Domain -- Chapter 5 Strategic Human Resource Management -- Exam Notables -- The SHRM Exam Objectives…”
Libro electrónico -
8303por OECDTabla de Contenidos: “…Adopt a housing and habitat policy geared towards sustainable and inclusive urbanisation -- Modernise land use planning to manage urban development -- Shift the focus from urban mobility to urban accessibility -- Leverage digitalisation for more productive, innovative and inclusive cities -- Harness urban policy to advance equity and social justice -- Strengthening the urban governance framework -- Reinforcing inter-municipal co-ordination mechanisms -- Facilitating metropolitan governance -- Strengthening co-ordination across levels of government -- Leveraging fiscal instruments to reinforce urban finance and investment -- Building the capacity and capability of subnational governments -- 1 Colombia's urbanisation trends and challenges -- Introduction -- Colombia's urbanisation trends -- A highly urbanised and polycentric country -- A young but ageing urban population -- Densification and urban expansion -- Informal settlements -- Economic performance of Colombian cities -- Colombian cities are the main engines of economic growth and hubs of employment -- The informal economy is widespread in Colombian cities -- Productivity in Colombian cities is low and agglomeration economies limited -- Living in Colombian cities -- The quantitative and qualitative housing deficit in cities drive low housing affordability -- While social indicators have improved in urban areas, urban inequality remains an issue -- Colombian cities remain unsafe despite recent improvements -- Congestion, fatalities and pollution are the main mobility challenges in Colombian cities -- While air pollution remains high, Colombian cities fare relatively well in other environmental indicators -- References -- Notes -- Annex 1.A. …”
Publicado 2022
Libro electrónico -
8304Publicado 2016Tabla de Contenidos: “…Dimensions for Standing Workstations -- Visual Requirements -- Additional Information Relevant to Console Design -- Vehicle Workstations -- Plant Side Work Areas -- Key Points -- Acknowledgment -- References -- 13 Control system interface design -- List of Abbreviations -- An Interdisciplinary Effort -- Components of an HMI -- Information Display -- Information Requirements -- Layout of Displayed Information -- Alarm Management -- Controls -- Compatibility with the Task -- Compatibility with Displays -- Consistency -- Management of Interaction -- Management of Change -- Error Trapping -- Data Security -- Modes of Operation -- The Interface as a Control Room Component -- Summary: Control System Interface Design -- Key Points -- References -- 14 Plant and equipment design -- List of Abbreviations -- Plant Side Roles and Activities -- Instrumentation Design -- Design of Displays -- Design of Controls -- Considerations for Control Panel Design -- Valve Design -- Valve Positioning -- Size, Type, Orientation, and Torque of Valve Handles -- Valve and Pipework Access -- Design for Maintenance -- Equipment Access -- Equipment Labeling -- Equipment Design -- Maintenance Tools -- Equipment Handling -- Equipment Safety Features -- Workspace Access and Clearance -- Equipment Positioning and Layout -- Internal Plant Side Work Areas -- External Plant Areas -- Signage and Labeling -- Key Points -- References -- 15 Human factors in materials handling -- List of Abbreviations -- Handling Injuries -- Planning and Assessment of Materials Handling -- Assessment of the Load -- Mechanical Handling -- Material Handling Study -- Equipment Selection -- Unit handling -- Bulk handling -- Facility Layout -- Environment -- Maintenance of Equipment -- Reducing the Risk of Manual Handling -- Assessment of the Task -- Assessment of the Work Area -- Space -- Flooring…”
Libro electrónico -
8305Publicado 2016Tabla de Contenidos: “…-- What is an authentication, authorization, and identification mechanism? What tools are used to provide such a capability? …”
Libro electrónico -
8306Publicado 2016Tabla de Contenidos: “…Managing courses in bulk -- Forms of enrolment -- Internal enrolment -- Manual enrolment -- Self enrolment -- Guest access -- Cohort enrolment and synchronization -- Database-driven enrolment -- LDAP -- External databases -- Flat files -- The IMS Enterprise file -- Meta courses - sharing enrolment across courses -- Enrolment with payment -- PayPal -- Summary -- Chapter 5: User Management -- User profiles -- Profile fields -- General category -- User picture category -- Additional names -- Interests category -- Optional category -- Creating user-defined profile fields -- Profile categories -- Profile fields -- User preferences -- Standard user actions -- Browsing users -- Filtering users -- Bulk user actions -- Manual accounts -- Adding individual users -- Bulk uploading and updating of users and their pictures -- The text file format -- Uploading users -- Setting default values and templates -- Loading of data -- Uploading user pictures -- Manual account settings -- Cohorts -- User authentication -- Common authentication settings -- Email-based self-registration -- The LDAP server -- The LDAP server settings -- Data mapping -- External databases -- Connection settings -- Data mapping -- Other authentication mechanisms -- External Moodle authentication methods -- Internal Moodle authentication methods -- Usernames - best practice -- Summary -- Chapter 6: Managing Permissions - Roles and Capabilities -- Moodle predefined roles -- Contexts -- Assigning roles -- The System context -- The Course Category context -- The Course context -- The Module context -- The Block context -- The User context -- The Front page context -- Multiple roles -- Capabilities -- Role definitions -- Modifying roles -- Overriding roles -- Creating custom roles -- Example roles -- The parent/mentor role -- Testing new roles -- Roles management…”
Libro electrónico -
8307Publicado 2019Tabla de Contenidos: “…GMM/DNN -- 2.3.2. Attention Mechanism -- 2.3.3. Connectionist Temporal Classification -- 2.4. …”
Libro electrónico -
8308Publicado 2018Tabla de Contenidos: “…-- Configurations -- Local Configuration Manager - LCM -- Push -- When to use -- Pull -- When to use -- Security -- Resources -- Built-in resources -- Community -- Custom -- Composite -- DSC Core -- Summary -- Questions -- Further reading -- Chapter 13: Working with Windows -- Retrieving the latest PowerShell version -- WMI CIM -- Delivery Optimization -- Retrieving all log events and files for update issues -- Turning off energy-saving mechanisms -- Verifying installed updates -- Working with apps -- EventLog -- ETL parsing -- Convert-PPTX to PDF -- Summary -- Questions -- Further reading -- Chapter 14: Working with Azure -- Azure 101 -- Resource groups -- Tags -- Resources -- PowerShell in Azure Cloud Shell -- The Azure drive -- Resource group deployment -- Finding templates -- Resources -- Parameters and variables -- Functions in templates -- Individual deployments -- Summary -- Questions -- Further reading -- Chapter 15: Connecting to Microsoft Online Services -- Office 365 -- Exchange Online -- Using some cmdlets -- SharePoint Online -- Microsoft Teams -- Summary -- Questions -- Further reading -- Chapter 16: Working with SCCM and SQL Server -- System Center Configuration Manager -- Logging -- PowerShell App Deployment Toolkit -- SQL Server -- Working with the SqlServer module -- The SQL Provider -- Connecting to SQL instances -- Running manual queries -- Working with availability groups -- Masterkeys, encryption, and credentials -- Working with the dbatools module -- Discovering SQL instances…”
Libro electrónico -
8309Publicado 2018Tabla de Contenidos: “…-- Example block data -- Example Ethereum block -- Bitcoin block -- Global state -- Block time and block size -- Blockchain miners -- Blockchain validators -- Smart contracts -- Blockchain speed -- How to calculate blockchain throughput -- Comparisons with traditional networks -- Summary -- Chapter 3: Decentralization Versus Distributed Systems -- Distributed systems -- Resiliency -- Fault tolerance and failure isolation -- Consensus and coordination -- Backups -- Consistency -- Peer-to-peer systems -- Decentralized systems -- Principles of decentralized systems -- Open access -- Non-hierarchical -- Ecosystem diversity -- Transparency -- Downsides -- Speed -- Censorship resistance -- Chaos and non-determinism -- Summary -- Chapter 4: Cryptography and Mechanics Behind Blockchain -- Principles of security -- Historical perspective - classical cryptography…”
Libro electrónico -
8310Publicado 2020Tabla de Contenidos: “…Throws - On/Off Switch Position Designators -- Circuit Symbols -- Electro-Mechanical and Electronic Switches -- Instructive Examples -- References -- 16 Diodes -- Electrical Characteristics -- Diode Types -- Schematic Symbols -- Circuits -- References -- 17 Transistors -- Transistor Types -- General Use and Operation -- Bipolar Junction Transistors (BJTs) -- Junction Field Effect Transistors (JFETs) -- Metal Oxide Semiconductor Field Effect Transistors (MOSFETs) -- References -- 18 Integrated Circuits -- Selected ICs -- Opamps -- IC Power Amps -- LM317 Voltage Regulator -- NE555 Precision Timer -- 4000 Series ICs -- Analog Optocouplers -- References -- 19 Vacuum Tubes -- Principles of Operation -- Diode Tubes -- Triode Tubes -- Low Voltage Tube Circuits -- References -- 20 Audio Transducers -- Microphones -- Loudspeaker Drivers -- Coil Pickups -- Piezo Elements -- Reverb Pans -- References -- Appendices -- A: Prefix Multipliers -- B: Quantities and Equations -- Primary Quantities -- Decibel Equations -- Fundamental Laws -- Resistor Equations -- RLC Equations -- Transformer Equations -- Opamp Equations -- C: Schematic Symbol Reference Chart -- D: Circuit Catalogue -- Circuit Index -- Breadboard Layouts -- Stripboard Layouts -- Bibliography…”
Libro electrónico -
8311por Mishra, SunitaTabla de Contenidos: “…Report on Workers' Discontent in the Schematic Form -- Feasibility Report -- The Empirical Research Report -- Introduction -- Data Recorders Accuracy -- Accuracy and Functioning of Mechanical Data Recorders -- Functioning of Electronic Data Recorders -- Accuracy of Electronic Data Recorders -- Test Plan Development -- Reduced Cost by Defining the Distribution -- Conclusion -- Proposal Writing -- The Overall Structure -- Summary -- Review Questions -- Appendix -- Appendix A: Vocabulary Expansion -- The Importance of Vocabulary -- English Vocabulary -- Recognition and Production Vocabulary -- Content and Function Words -- Confusibles -- B. …”
Publicado 2011
Libro electrónico -
8312Publicado 2017Tabla de Contenidos: “…Introduction -- 6.2. Retargeting Mechanisms -- 6.3. Parallelism and Compiler Options -- 6.3.1. …”
Libro electrónico -
8313Publicado 2022Tabla de Contenidos: “…About the author xiii -- Preface. . xv -- Acknowledgements. xix -- Prologue - Some experiences in my lifetime xxi -- Chapter 1 Introduction - setting the scene. 1 -- 1.1 Where We are Today . 1 -- 1.2 How We Got Here . 2 -- 1.3 Going from Here . . 4 -- 1.4 Some Scenarios . 4 -- 1.4.1 Fossil fuels 5 -- 1.4.2 Food. . 6 -- 1.4.3 Renewable energy - critical minerals . . 7 -- 1.4.4 Economics 7 -- 1.5 Overview of the Book . . 7 -- Chapter 2 Systems thinking . . 11 -- 2.1 Systemic Approach . 12 -- 2.2 Feedback 15 -- 2.3 Wicked Problems . 15 -- 2.4 Hyperobjects. 16 -- 2.5 The UN Sustainable Development Goals . 17 -- 2.6 Global Risks . 18 -- Chapter 3 Climate today . . 19 -- 3.1 The 1992 RIO Conference . 21 -- 3.2 Climate as Reported by IPCC in 2021 23 -- 3.3 Climate Pioneers . 26 -- 3.4 The Million-Year Perspective . 27 -- 3.5 The CO2 -- Budget 28 -- 3.6 The COP26 Agreements . 29 -- 3.7 Deforestation 31 -- 3.8 Actions Needed 34 -- Chapter 4 Global warming impacts . 35 -- 4.1 Global Impact of Climate Change . 37 -- 4.2 Weather vs Climate . 37 -- 4.3 Extreme Weather. 38 -- 4.3.1 Human-made vulnerability 42 -- 4.4 Temperature . 42 -- 4.5 Rossby Waves 45 -- 4.6 Droughts 46 -- 4.7 Air Pollution from Wildfires 47 -- 4.8 Precipitation . 48 -- 4.9 Methane 49 -- 4.10 Other Significant Greenhouse Gases 52 -- 4.10.1 Nitrous oxide . 52 -- 4.10.2 Hydrofluorocarbons . 52 -- 4.11 Climate Feedback Mechanisms . 52 -- 4.12 The Human Cost of Climate Change. 54 -- 4.13 Actions Needed 55 -- Chapter 5The water perspective . . 57 -- 5.1 How We Got Here 59 -- 5.1.1 Drinking water 59 -- 5.1.2 Sanitation 60 -- 5.1.3 Water stress 60 -- 5.2 The State of Water Resources. 60 -- 5.2.1 Water quantity 61 -- 5.2.2 Water quality . 63 -- 5.2.3 Natural disasters and water . 64 -- 5.2.4 Glacier mass loss 64 -- 5.2.5 Water supply from glaciers 65 -- 5.2.6 Sea level rise and land subsidence 66 -- 5.2.7 Predicting future water resources 67 -- 5.2.8 Water conflicts 67 -- 5.3 Energy for Water Supply and Water Treatment 68 -- 5.3.1 Source water abstraction and conveyance . 68 -- 5.3.2 Desalination . . 69 -- 5.3.3 Irrigation and groundwater use 70 -- 5.3.4 Wastewater treatment - water resource recovery . 72 -- 5.4 Water Impact on Hydropower 73 -- 5.5 Economics, Tariffs, and the Value of Water . 74 -- 5.6 Food Consumption Impact on Water 78 -- 5.6.1 Water use 78 -- 5.7 Lifestyle and Water Consumption . 79 -- 5.8 Our Attitude to Nature . . 80 -- 5.9 Actions Needed 82 -- Chapter 6 The energy perspective . 85 -- 6.1 How We Got Here . . 87 -- 6.1.1 Global energy . 87 -- 6.1.2 Electrical energy 88 -- 6.1.3 Transport 90 -- 6.2 Energy Consumption Today . . 92 -- 6.3 Climate and Energy Interactions . . 93 -- 6.4 Water Needs for Energy . 95 -- 6.5 Fossil Fuel Production - Impact on Water and Environment 97 -- 6.5.1 Tar sand operations . . 97 -- 6.5.2 Hydraulic fracturing 100 -- 6.5.3 Flaring 101 -- 6.5.4 Coal 102 -- 6.5.5 Oil accidents and oil pollution 104 -- 6.6 Biofuel Production. 106 -- 6.6.1 Water use . 107 -- 6.6.2 Burning wood 108 -- 6.7 Electric Power Production 109 -- 6.8 Hydropower 110 -- 6.8.1 Impact of reservoirs. 110 -- 6.9 Thermal Electric Power Generation Systems. 112 -- 6.9.1 Nuclear power . 113 -- 6.9.2 Fossil-fuelled power systems 115 -- 6.9.3 Water requirements . 115 -- 6.10 Carbon Capture . 117 -- 6.11 Solar and Wind Power . 119 -- 6.11.1 Energy efficiency and consumption 119 -- 6.11.2 Solar .120 -- 6.11.3 Wind power . 121 -- 6.12 Energy Storage 122 -- 6.12.1 Batteries 122 -- 6.12.2 Hydrogen .125 -- 6.13 Critical Resources for Renewable Energy 127 -- viii Water Interactions - A Systemic View -- 6.13.1 Cobalt128 -- 6.13.2 Lithium . 131 -- 6.14 Energy and Public Health. 133 -- 6.14.1 Coal and public health 135 -- 6.14.2 Biomass burning . 135 -- 6.15 Actions Needed . 135 -- Chapter 7 The food perspective . . 137 -- 7.1 Food and Climate Change 139 -- 7.1.1 Global meat production and consumption 140 -- 7.1.2 Environmental impact. 142 -- 7.2 Land Area for Food 143 -- 7.3 Food Waste. 145 -- 7.4 Water for Food 147 -- 7.4.1 Irrigation, water efficiencies, and available technologies 147 -- 7.4.2 Water quality 148 -- 7.5 Energy for Food . 149 -- 7.5.1 Irrigation 149 -- 7.5.2 Fertilizers . 150 -- 7.6 Conservation Agriculture . 152 -- 7.7 Food-Related Health . 155 -- 7.7.1 Targets for food production and consumption . 155 -- 7.7.2 Health risks factors . 156 -- 7.8 Actions Needed . 157 -- Chapter 8 Economics 159 -- 8.1 Inequalities . 160 -- 8.1.1 Climate change. 162 -- 8.1.2 Water inequalities 162 -- 8.1.3 Energy inequalities . 163 -- 8.1.4 Land use and deforestation. 163 -- 8.1.5 Food inequalities . 164 -- 8.2 Economic Consequences of Climate Change . 164 -- 8.2.1 The polluter pays principle . 165 -- 8.2.2 Paying for climate change 165 -- 8.3 Doughnut Economics 167 -- 8.3.1 Circular economics . 169 -- 8.4 Energy Subsidies 169 -- 8.5 Actions Needed . 170 -- Chapter 9 Lifestyle 173 -- 9.1 The Real Difficulty . 173 -- 9.2 Relation Between Wealth and Emissions 174 -- 9.3 Measuring National Emissions . . 176 -- 9.4 Consumption Patterns. . 177 -- 9.4.1 Apparel industry . 178 -- 9.4.2 Aviation . 179 -- 9.5 Actions . . 180 -- Chapter 10 Crisis or hope 183 -- A1 Units. 187 -- Large numbers . 187 -- Power and energy . 187 -- Mass and volume . 188 -- A2 Glossary 189 -- A3 Abbreviations 191 -- Notes 193 -- References 205 -- Index 217.…”
Libro electrónico -
8314Publicado 2022Tabla de Contenidos: “…Fire prevention, detection, and suppression -- Power -- Chapter 6 Communication and Network Security -- Assess and Implement Secure Design Principles in Network Architectures -- OSI and TCP/IP models -- The OSI Reference Model -- The TCP/IP Model -- Secure Network Components -- Operation of hardware -- Transmission media -- Network access control devices -- Endpoint security -- Implement Secure Communication Channels According to Design -- Voice -- Multimedia collaboration -- Remote access -- Data communications -- Virtualized networks -- Third-party connectivity -- Chapter 7 Identity and Access Management -- Control Physical and Logical Access to Assets -- Information -- Systems and devices -- Facilities -- Applications -- Manage Identification and Authentication of People, Devices, and Services -- Identity management implementation -- Single-/multifactor authentication -- Accountability -- Session management -- Registration, proofing, and establishment of identity -- Federated identity management -- Credential management systems -- Single sign-on -- Just-in-Time -- Federated Identity with a Third-Party Service -- On-premises -- Cloud -- Hybrid -- Implement and Manage Authorization Mechanisms -- Role-based access control -- Rule-based access control -- Mandatory access control -- Discretionary access control -- Attribute-based access control -- Risk-based access control -- Manage the Identity and Access Provisioning Life Cycle -- Implement Authentication Systems -- OpenID Connect/Open Authorization -- Security Assertion Markup Language -- Kerberos -- RADIUS and TACACS+ -- Chapter 8 Security Assessment and Testing -- Design and Validate Assessment, Test, and Audit Strategies -- Conduct Security Control Testing -- Vulnerability assessment -- Penetration testing -- Log reviews -- Synthetic transactions -- Code review and testing -- Misuse case testing…”
Libro electrónico -
8315por Nomani, QamarTabla de Contenidos: “…Best practices for asset inventory management -- Other tools and techniques for asset management -- Summary -- Further reading -- Chapter 10: Reviewing CSPM Dashboards -- Reviewing general dashboard types -- Risk dashboards -- Compliance dashboards -- Inventory dashboards -- Identity dashboards -- Network security dashboards -- Vulnerability dashboards -- Alerts and incident dashboards -- Custom dashboards -- Exporting dashboards -- Best practices for effectively using CSPM dashboards -- Summary -- Further reading -- Chapter 11: Major Configuration Risks -- Workload misconfigurations overview -- Malware, misconfigurations, and vulnerabilities and their correlations -- The risks associated with malware and its vulnerabilities -- Identity misconfigurations -- Network security misconfigurations -- Lateral movement misconfigurations -- Data protection misconfigurations -- Suspicious and malicious activities -- Best practices and lessons learned -- Best practices to mitigate network security misconfigurations -- Lesson learned and its implementation -- Summary -- Further reading -- Chapter 12: Investigating Threats with Query Explorers and KQL -- Query explorer and attack paths overview -- Understanding the security explorer mechanism -- The importance of the security explorer in threat hunting -- Building queries with Cloud Security Explorer -- Exploring built-in query templates -- KQL basics -- KQL statement structure -- KQL practice environment -- Built-in KQL in the query explorer -- Custom queries in the query explorer -- Best practices for effective investigation -- Lessons learned from threat investigation -- Summary -- Further reading -- Chapter 13: Vulnerability and Patch Management -- Vulnerability and patch management overview -- Important terminologies -- Effective strategies to prioritize vulnerabilities…”
Publicado 2024
Libro electrónico -
8316Publicado 2024Tabla de Contenidos: “…Chapter 5: Supervised Fine-Tuning -- Creating an instruction dataset -- General framework -- Data quantity -- Data curation -- Rule-based filtering -- Data deduplication -- Data decontamination -- Data quality evaluation -- Data exploration -- Data generation -- Data augmentation -- Creating our own instruction dataset -- Exploring SFT and its techniques -- When to fine-tune -- Instruction dataset formats -- Chat templates -- Parameter-efficient fine-tuning techniques -- Full fine-tuning -- LoRA -- QLoRA -- Training parameters -- Learning rate and scheduler -- Batch size -- Maximum length and packing -- Number of epochs -- Optimizers -- Weight decay -- Gradient checkpointing -- Fine-tuning in practice -- Summary -- References -- Chapter 6: Fine-Tuning with Preference Alignment -- Understanding preference datasets -- Preference data -- Data quantity -- Data generation and evaluation -- Generating preferences -- Tips for data generation -- Evaluating preferences -- Creating our own preference dataset -- Preference alignment -- Reinforcement Learning from Human Feedback -- Direct Preference Optimization -- Implementing DPO -- Summary -- References -- Chapter 7: Evaluating LLMs -- Model evaluation -- Comparing ML and LLM evaluation -- General-purpose LLM evaluations -- Domain-specific LLM evaluations -- Task-specific LLM evaluations -- RAG evaluation -- Ragas -- ARES -- Evaluating TwinLlama-3.1-8B -- Generating answers -- Evaluating answers -- Analyzing results -- Summary -- References -- Chapter 8: Inference Optimization -- Model optimization strategies -- KV cache -- Continuous batching -- Speculative decoding -- Optimized attention mechanisms -- Model parallelism -- Data parallelism -- Pipeline parallelism -- Tensor parallelism -- Combining approaches -- Model quantization -- Introduction to quantization -- Quantization with GGUF and llama.cpp…”
Libro electrónico -
8317Publicado 2025Tabla de Contenidos: “…Embracing time series features, challenges, and tools -- Developing Vision and Image Processing in AI -- Exploiting the power of convolutional neural networks (CNNs) -- Looking deeper: Advanced vision techniques -- Tools for Machine Learning and Neural Networks -- Participating with Python -- Diving into deep learning platforms -- Chapter 6 Adding Natural Language Processing and Sentiment Analysis -- Demystifying the Backbone of NLP -- Exploring linguistics for NLP -- Seeing the big picture with statistical NLP -- Why linguistics and NLP both matter -- Elevating NLP with Machine Learning -- Integrating NLP and machine learning -- Adapting to the emotional spectrum -- Examining Transformers and Attention Mechanisms -- Unpacking Sentiment Analysis -- Catching the feeling -- Understanding language nuances -- Integrating social media analytics -- Challenges for NLP and Sentiment Analysis -- Engaging Best Practices for Using NLP and Sentiment Analysis -- Chapter 7 Collaborating via Predictions, Procedures, Systems, and Filtering -- Understanding Predictive Analytics -- Using predictive analytics in various industries -- Building predictive models -- Best practices for predictive analytics -- Putting AI Procedures into Practice -- The AI System Development Lifecycle -- Understanding Filtering in AI -- Knowing where you encounter filtering -- AI filtering in recommendation systems -- Chapter 8 Getting Comfortable with Generative AI -- Changing the Game with Generative AI -- Knowing core generative AI concepts and techniques -- Reviewing the training process for generative AI models -- Getting to Know GPT Models -- Training the models is intensive -- Exploring the models' operation -- Creating New Text, Images, and Video -- Generating text -- Creating images -- Producing video -- Introducing Major Consumer-Facing Generative AI Models…”
Libro electrónico -
8318Publicado 2023Tabla de Contenidos: “…Managing Roles in Microsoft 365 and Azure AD -- Planning for Role Assignments -- Managing Roles in the Microsoft 365 Admin Center -- Managing Role Groups for Microsoft Defender, Microsoft Purview, and Microsoft 365 Workloads -- Microsoft Defender -- Microsoft Purview -- Microsoft 365 Workloads -- Managing Administrative Units -- Creating Administrative Units -- Viewing and Updating Administrative Units -- Planning and Implementing Privileged Identity Management -- Creating a Role Assignment -- Reviewing Role Assignments -- Alerting -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 4: Implementing and Managing Identity Synchronization with Azure AD -- Preparing for Identity Synchronization by Using IdFix -- Configuring and Managing Directory Synchronization by Using Azure AD Connect -- Planning and Sizing -- Installing the Synchronization Service -- Configuring Azure AD Connect Filters -- Domain and Organizational Unit-Based Filtering -- Group-Based Filtering -- Attribute-Based Filtering -- Monitoring Synchronization by Using Azure AD Connect Health -- Azure AD Connect Health -- Azure AD Connect Health for Sync -- Azure AD Connect Health for Directory Services -- Azure AD Connect Health for Active Directory Federation Services -- Troubleshooting Azure AD Connect Synchronization -- Configuring and Managing Directory Synchronization by Using Azure AD Connect Cloud Sync -- Installing the Provisioning Agent -- Configuring the Provisioning Service -- Customizing the Provisioning Service -- Scoping Filters -- Attribute Mapping -- Troubleshooting Azure AD Connect Cloud Sync Synchronization -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 5: Implementing and Managing Authentication -- Implementing and Managing Authentication Methods -- Choosing an Authentication Mechanism -- Windows Hello for Business…”
Libro electrónico -
8319Publicado 2023Tabla de Contenidos: “…Regulatory barriers to services trade remain an impediment for both domestic and international firms -- Further improving trade facilitation requires additional progress on implementation of reforms and the easing of regulatory barriers to services trade -- The government should focus on closing the implementation gap and improving access to trade-related information for businesses -- The government should also rationalise services trade regulation and improve regional cooperation to keep trade flowing -- References -- Notes -- 3 Kyrgyzstan -- Introduction -- The economy has so far withstood the shocks of COVID-19 and Russia's invasion of Ukraine -- The 2020 OECD report identified a need for improved implementation of reforms in three priority areas -- Streamline business-related legislation and ensure predictable enforcement -- Simplify the tax code and tax administration -- Ensure predictable, fair, and efficient contract enforcement -- Assessing implementation progress since 2020 -- Priority 1: Digitalisation efforts have begun to bear fruit, but further streamlining of legislation and predictable enforcement are needed -- Increased digitalisation of procedures has eased the administrative burden for firms -- The government has established a one-stop shop to simplify business procedures -- "Tunduk" platform also continues to support the digitalisation of licensing and government services -- New enforcement mechanisms have started to function -- Deteriorating business consultations and hasty implementation create complexity and unpredictability for firms -- Businesses lack awareness of regulatory changes and opportunities to participate in policy consultations -- Business inspections are a key issue for implementation -- Incomplete digitalisation requires a doubling of procedures in person…”
Libro electrónico -
8320Publicado 2024Tabla de Contenidos: “…Identity and the Self -- The Self -- The Self-Concept and Self-Esteem -- The Self and Others -- The Malleable Self -- We Consume to Express Our Identities -- The Extended Self -- New Ways to Express Identity -- Compensatory Consumption -- Anti-Consumption as Self-Defining -- Embodied Cognition -- Our Digital Selves -- Gender and Consumer Behavior -- Gender Socialization and Gender Roles -- Gender Differences in Consumer Behavior -- Toward Greater Gender Fluidity -- The Quest for Gender Justice and Equality -- The Body -- Ideals of Beauty and Stereotypes -- Body Positivity: Enter the Fatshionistas -- Body Decoration and Mutilation -- The Mechanized Body -- The Quantified Self -- Chapter Summary -- Key Terms -- Review -- Consumer Behavior Challenge -- Case Study. …”
Libro electrónico