Mostrando 17,861 - 17,880 Resultados de 18,419 Para Buscar '"The Reader"', tiempo de consulta: 0.10s Limitar resultados
  1. 17861
    Publicado 2018
    “…For people who need to use the command line regularly in their daily work, this book provides practical advice for using the command-line shell beyond merely typing or copy-pasting commands into the shell. Readers will learn techniques suitable for automating processes and controlling processes, on both servers and workstations, whether for single command lines or long and complex scripts. …”
    Libro electrónico
  2. 17862
    Publicado 2019
    “…What you will learn Learn various neural network architectures and its advancements in AI Master deep learning in Python by building and training neural network Master neural networks for regression and classification Discover convolutional neural networks for image recognition Learn sentiment analysis on textual data using Long Short-Term Memory Build and train a highly accurate facial recognition security system Who this book is for This book is a perfect match for data scientists, machine learning engineers, and deep learning enthusiasts who wish to create practical neural network projects in Python. Readers should already have some basic knowledge of machine learning and neural networks." -- Publisher's description…”
    Libro electrónico
  3. 17863
    por Catrinescu, Vlad. author
    Publicado 2018
    “…What You’ll Learn: Manage users in bulk Export data such as user lists and groups Create and manage Office 365 groups Manage Exchange online distribution lists, mailboxes, and contacts Configure Skype for Business settings Perform compliance searches directly from PowerShell This book is for any IT pro who needs to manage Office 365 or one of its services such as Exchange, SharePoint, or Skype for Business. Readers should have a basic knowledge of PowerShell and the Office 365 service they want to manage. …”
    Libro electrónico
  4. 17864
    Publicado 2011
    “…For this introduction to the zEnterprise System, readers are not expected to be familiar with current IBM System z technology and terminology…”
    Libro electrónico
  5. 17865
    Publicado 2014
    “…IT specialists and product specialists who are responsible for implementing the migration of a solution based on IBM Intelligent Operations Center V1.5 to a V1.6 solution. Readers of this book will benefit from the IBM Redbooks publication IBM Intelligent Operations Center 1.6 Programming Guide , SG24-8201…”
    Libro electrónico
  6. 17866
    “…Not only does it provide network security recommendations but it teaches you how to use black-hat tools such as oclHashcat, Loki, Burp Suite, Scapy, Metasploit, and Kali to actually test the security concepts learned. Readers of Cisco Networks will learn How to configure Cisco switches, routers, and data center devices in typical corporate network architectures The skills and knowledge needed to pass Cisco CCENT, CCNA, and CCNP certification exams How to set up and configure at-home labs using virtual machines and lab exercises in the book to practice advanced Cisco commands How to implement networks of Cisco devices supporting WAN, LAN, and data center configurations How to implement secure network configurations and configure the Cisco ASA firewall How to use black-hat tools and network penetration techniques to test the security of your network…”
    Libro electrónico
  7. 17867
    por Richard, Paul
    Publicado 2015
    “…References corresponding chapters later in the book, allowing readers to delve into topics at their own pace and level. …”
    Libro electrónico
  8. 17868
    Publicado 2015
    “…Broadens the book appeal to many students, professors, and readers.¿ The coverage of math in chapters 8, 9, and 13 may be ignored without affecting the continuity of the material in those chapters. …”
    Libro electrónico
  9. 17869
    por Waschke, Marvin. author
    Publicado 2015
    “…The transitional phase of mixed cloud and on-premises applications presents thorny problems for IT management. Waschke shows the reader how to normalize the performance and capacity measurements of concurrent traditional and cloud resources. …”
    Libro electrónico
  10. 17870
    Publicado 2023
    “…This book is aimed at novices, freshers, students, experts in other fields, and managers, that, are willing to learn, understand, and manage how a security function is working, especially if you need to be. Although the reader will be able, by reading this book, to build and manage a security function on their own, it is highly recommended to supervise a team devoted to implementing cybersecurity and privacy practices in an organization…”
    Grabación no musical
  11. 17871
    “…Truly a unique work in translation and interpreting studies, this essential new textbook offers: A thorough introduction to the fields of translation and interpreting with discussion of applications to interdisciplinary topics Explorations of translation machines and technology, including their history and recent trends Practical discussions of culture, gender, and society in the context of translation and interpreting studies, as well as training and pedagogical issues in translation and interpreting A concise examination of translation process research and methods, including the mental processes and actions that people take while translating Complementary web materials including PowerPoint slides and practice questions Ideal for advanced undergraduate and graduate students in programs in such as linguistics, language studies, and communications, or for those who plan to work in translation and/or interpreting, Introduction to Translation and Interpreting Studies will earn a place in the libraries of anyone interested in a reader-friendly translation and interpreting resource…”
    Libro electrónico
  12. 17872
    Publicado 2024
    “…Who This Book Is For Reader of all skills who wants to save time and efforts to start to work with C++. …”
    Libro electrónico
  13. 17873
    Publicado 2023
    “…What you will learn The fundamental concepts and principles of conformal prediction Learn how conformal prediction differs from traditional ML methods Apply real-world examples to your own industry applications Explore advanced topics - imbalanced data and multi-class CP Dive into the details of the conformal prediction framework Boost your career as a data scientist, ML engineer, or researcher Learn to apply conformal prediction to forecasting and NLP Who this book is for Ideal for readers with a basic understanding of machine learning concepts and Python programming, this book caters to data scientists, ML engineers, academics, and anyone keen on advancing their skills in uncertainty quantification in ML."…”
    Libro electrónico
  14. 17874
    por Olwig, Mette Fog
    Publicado 2024
    “…Against the backdrop of increasingly precarious farmer livelihoods, it focuses on cocoa-agroforestry in Ghana – the second largest producer of cocoa in the world. Taking the reader on a journey across experimental plots and on-farm studies, the book delivers a holistic understanding of cocoa-agroforestry. …”
    Libro electrónico
  15. 17875
    Publicado 2018
    “…From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. …”
    Libro electrónico
  16. 17876
    Publicado 2018
    “…Provides a fully connected, systematic, methodological, consecutive, and easy approach to solving redundancy resolution problems Describes a new approach to the time-varying Jacobian matrix pseudoinversion, applied to the redundant-manipulator kinematic control Introduces The QP-based unification of robots' redundancy resolution Illustrates the effectiveness of the methods presented using a large number of computer simulation results based on PUMA560, PA10, and planar robot manipulators Provides technical details for all schemes and solvers presented, for readers to adopt and customize them for specific industrial applications Robot Manipulator Redundancy Resolution is must-reading for advanced undergraduates and graduate students of robotics, mechatronics, mechanical engineering, tracking control, neural dynamics/neural networks, numerical algorithms, computation and optimization, simulation and modelling, analog, and digital circuits. …”
    Libro electrónico
  17. 17877
    por Zero G Team Staff
    Publicado 2005
    “…It is the recipient of prestigious industry accolades, including two consecutive Java Developer's Journal Readers' Choice Awards, the Jolt Product Excellence Award from Software Development, and JavaWorld 's Editor's Choice Award…”
    Libro electrónico
  18. 17878
    “…Words are also the means to talk about emotions that the virus has overwhelmed and that readers who come to this book want to express. It is a way of understanding the present and the future the public health situation that so many countries of the world go through and a means to understand ourselves and put ourselves in the place of others. …”
    Libro electrónico
  19. 17879
    Publicado 2021
    “…This book examines dynamic models, and how time is fundamental to the structure of the model and data as well as the understanding of how a process unfolds*Discusses mathematical modeling with soft computing and the implementations of uncertain mathematical models*Examines how uncertain dynamic systems models include uncertain state, uncertain state space and uncertain state's transition functions*Assists readers to become familiar with many soft numerical methods to simulate the solution function's behaviorThis book is intended for system specialists who are interested in dynamic systems that operate at different time scales. …”
    Libro electrónico
  20. 17880
    Publicado 2023
    “…The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography. The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. …”
    Libro electrónico