Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mecánica 618
- Engineering & Applied Sciences 343
- Materiales 308
- Technology: general issues 259
- History of engineering & technology 239
- Medicine 216
- Mechanical Engineering 212
- Research & information: general 199
- Law and legislation 196
- Taxation 185
- Propiedades mecánicas 183
- mechanical properties 183
- Mechanical engineering 177
- Development 176
- Física 165
- Engineering and Technology 146
- Physical Sciences 143
- Application software 141
- Management 134
- Computer networks 131
- Engineering 127
- Data processing 124
- History 122
- Security measures 121
- Computer security 113
- microstructure 113
- Economics 112
- Artificial intelligence 107
- Research 104
- Mechanical Engineering - General 103
-
13181Publicado 2019“…In addition to this, you'll gain insights into partitioning the datasets and mechanisms to evaluate the results from each model and be able to compare them. …”
Libro electrónico -
13182Publicado 2020“…What you will learn Create your own customized chatbot by extending the functionality of Google Assistant Improve learning accuracy with the help of features available on mobile devices Perform visual recognition tasks using image processing Use augmented reality to generate captions for a camera feed Authenticate users and create a mechanism to identify rare and suspicious user interactions Develop a chess engine based on deep reinforcement learning Explore the concepts and methods involved in rolling out production-ready deep learning iOS and Android applications Who this book is for This book is for data scientists, deep learning and computer vision engineers, and natu..…”
Libro electrónico -
13183Practical mobile forensics forensically investigate and analyze iOS, Android, and Windows 10 devicesPublicado 2020“…What you will learn Discover new data extraction, data recovery, and reverse engineering techniques in mobile forensics Understand iOS, Windows, and Android security mechanisms Identify sensitive files on every mobile platform Extract data from iOS, Android, and Windows platforms Understand malware analysis, reverse engineering, and data analysis of mobile devices Explore various data recovery techniques on all three mobile platforms Who this book is for This book is for forensic examiners with basic experience in mobile forensics or open source solutions for mobile forensics. …”
Libro electrónico -
13184Publicado 2020“…By the end of the book, you'll have developed the skills you need to work confidently with efficient exploitation techniques What you will learn Develop advanced and sophisticated auxiliary, exploitation, and post-exploitation modules Learn to script automated attacks using CORTANA Test services such as databases, SCADA, VoIP, and mobile devices Attack the client side with highly advanced pentesting techniques Bypass modern protection mechanisms, such as antivirus, IDS, and firewalls Import public exploits to the Metasploit Framework Leverage C and Python programming to effectively evade endpoint protection Who this book is for If you are a professional penetration tester, security engineer, or law enforcement analyst with basic knowledge of Metasploit, this book will help you to master the Metasploit framework and guide you in developing your exploit and module development skills. …”
Libro electrónico -
13185Publicado 2015“…Rob also discusses the coolest and best features of the LX100 that truly make a difference in how you use the camera, such as back-button focus, the pros and cons of electronic vs. mechanical shutter, how to customize the camera so it feels like you have a kit bag of prime lenses rather than a continuous zoom, and using external flash. …”
Libro electrónico -
13186Publicado 2016“…Lesson 5 introduces the annotation mechanism. You will see how tools use annotations for checking program correctness, generating code, interfacing with databases and web services. …”
-
13187Publicado 2018“…After demonstrating how to build web applications that take advantage of the new reactive paradigm using Kotlin in Lesson 3, Lesson 4 focuses on the Reactive Streams specification as a compatibility layer and shows how to use the Reactive Stream types as a mechanism for interoperability across OS projects like Akka Streams, Vert.x. …”
-
13188Publicado 2018“…Lesson 5 introduces the annotation mechanism. You will see how tools use annotations for checking program correctness, generating code, interfacing with databases and web services. …”
-
13189Publicado 2018“…Skill Level Intermediate Learn How To Learn how to understand and analyze Linux performance to determine best optimization methods Learn which parts of the operating system you need to optimize, and the mechanisms in place to do that Optimize Linux performance to manage servers with specific needs Who Should Take This Course Linux users who are preparing to take the exam for the Red Hat Certificate of Expertise in Performance Tuning (EX442) Anyone who want to learn how to analyze an..…”
-
13190Publicado 2017“…You will also learn how to apply security mechanisms on ArcGIS Enterprise and safely expose services to the public in a secure manner. …”
Libro electrónico -
13191Publicado 2020“…With the help of realistic examples, you will gain an understanding of the mechanics of ML techniques in areas such as exploratory data analysis, feature engineering, classification, regression, clustering, and NLP. …”
Libro electrónico -
13192Publicado 2019“…Skill Level Beginner+ Learn How To * Set up the root account and know when to use it* Use access control policies* Understand monitoring and its impact on billing* Use CloudWatch and set up billing alarms* Use tags and implement compliance features* Use data protection mechanisms in AWS* Use CloudTrail, GuardDuty, and Macie for monitoring* Use Control Tower, Security Hub, and AWS Backup to reduce overhead Who Should Take This Course * Anyone getting into AWS for the first time and looking specifically for account setup strategies and best practices* Anyone with a basic knowledge of AWS who has been using it for a while and wants to restart with a strategy in place before account setup Course Requirements Basic understanding of AWS fundamental concepts Lesson Descriptions Lesson 1, "Securing AWS Account Access," covers the basics of account creation, including the root account and when to use it and access control using policies. …”
-
13193Publicado 2020“…Skill Level Intermediate to advanced Learn How To Use architectural patterns to design resilient, highly available, and decoupled infrastructures Deploy high-performance compute, network, storage, and database resources Design least-privilege access control and secure application tiers, and deploy data protection mechanisms for encryption in transit and at rest Recognize cost-effective compute, network, storage, and database implementation Pass the AWS Certified Solutions Architecture Associate SAA-C02 exam Who Should Take This Course AWS architects AWS SysOps professionals AWS security professionals AWS developers and engineers Intermediate to advanced students Course Requirements Strong understanding of the AWS ecosystem and infrastructure architecture Working knowledge of commonly used AWS services such as EC2, S3, IAM, Cloudwatch, et..…”
-
13194Publicado 2013“…More iOS 6 Development covers a variety of networking mechanisms, from GameKit’s relatively simple BlueTooth peer-to-peer model, to the addition of Bonjour discovery and network streams, through the complexity of accessing files via the web. …”
Libro electrónico -
13195Publicado 2013“…Of special interest to new developers are the chapters on the anatomy of a Cordova application, as well as the mechanics of Cordova development. Wargo also covers the development process and the tools you can use to test and debug your Cordova applications, and provides a complete chapter that introduces the Cordova APIs, in addition to a chapter that shows you how to create your own plugins. …”
Libro electrónico -
13196Publicado 2021“…It also investigates the blurred boundaries between science and myth as well as between fact and theory that ultimately weaken the credibility of science as a cultural mechanism for interpreting the natural world"--…”
Libro electrónico -
13197por Sanford, Linda S.“…To escape that trap and grow profitably, you must "let go" of traditional control mechanisms. In their place, you must build new models, relationships, and platforms that capture and deliver value from multiple sources, inside and outside the enterprise. …”
Publicado 2006
Libro electrónico -
13198Publicado 2022“…Linearity is the major theme throughout the book and since quantum mechanics is a linear theory, you'll see how they go hand in hand. …”
Libro electrónico -
13199Publicado 2022“…A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built-in services and capabilities Key Features Discover practical techniques for implementing cloud security Learn how to secure your data and core cloud infrastructure to suit your business needs Implement encryption, detect cloud threats and misconfiguration, and achieve compliance in the cloud Book Description Securing resources in the cloud is challenging, given that each provider has different mechanisms and processes. Cloud Security Handbook helps you to understand how to embed security best practices in each of the infrastructure building blocks that exist in public clouds. …”
Libro electrónico -
13200Publicado 2016“…These include the unraveling of molecular mechanisms and critical steps in hormone signaling, activation of defense reactions and dynamic intracellular processes. …”
Libro electrónico