Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 783
- Application software 686
- Engineering & Applied Sciences 645
- Computer networks 426
- Computer Science 414
- Management 402
- Python (Computer program language) 393
- Examinations 380
- Machine learning 374
- Artificial intelligence 349
- Data processing 348
- Cloud computing 299
- Certification 294
- Computer programs 276
- Computer security 276
- Security measures 263
- Computer programming 254
- Electronic data processing personnel 250
- Computer software 242
- Web site development 234
- Design 216
- Electrical & Computer Engineering 215
- Java (Computer program language) 207
- Database management 190
- Telecommunications 187
- Operating systems (Computers) 178
- Web sites 175
- Programming 169
- Microsoft .NET Framework 165
- Information technology 164
-
2861Publicado 2017Tabla de Contenidos: “…Best practices to follow -- Conclusion -- Single sign-on -- Idea solution -- Advantages of an SSO solution -- Challenges in the classic method of authentication -- Security Assertion Markup Language -- The high-level overview of working -- Choosing the right identity provider -- Building an SSO from scratch -- Hosted Based Intrusion Detection System -- Exploring OSSEC -- File integrity monitoring -- Log monitoring and active response -- Conclusion -- The hardened image approach -- Implementing hardening standards in scalable environments -- Important to remember -- Conclusion -- Summary -- Chapter 5: Cryptography Network Security -- Introduction to cryptography -- Integrity -- Authenticity -- Real world scenario -- Non-repudiation -- Types of cryptography -- Symmetric key cryptography -- Stream cipher -- The encryption process -- The decryption process -- Advantages of stream ciphers -- Block cipher (AES) -- Padding -- Modes of block ciphers -- Message authentication codes -- The MAC approach -- The challenges with symmetric key storage -- Hardware security modules -- The challenges with HSM in on-premise -- A real-world scenario -- HSM on the cloud -- CloudHSM -- Key management service -- The basic working of AWS KMS -- Encrypting a function in KMS -- Decrypting a function in KMS -- Implementation -- Practical guide -- Configuring AWS CLI -- The decryption function -- Envelope encryption -- The encryption process -- The decryption process -- Implementation steps -- Practical implementation of envelope encryption -- Credential management system with KMS -- Implementation -- Best practices in key management -- Rotation life cycle for encryption keys -- Scenario 1-a single key for all data encryption -- Scenario 2-multiple keys for data encryption -- Protecting the access keys -- Audit trail is important -- Asymmetric key encryption…”
Libro electrónico -
2862Publicado 2021“…You'll find more hands-on examples than ever, culminating in an all-new Bonus Exercises Workshop with even more real-world practice. This guide's straightforward, step-by-step approach shows you how to work with database structures, objects, queries, tables, and more. …”
Libro electrónico -
2863por Stull, Edward. author“…This book provides real-world examples of user experience concepts that empower teams to create compelling products and services, manage social media, interview UX candidates, and oversee product teams. …”
Publicado 2018
Libro electrónico -
2864por Snoyman, Michael“…You’ll also examine several real-world examples, including a blog, a wiki, a JSON web service, and a Sphinx search server. …”
Publicado 2012
Libro electrónico -
2865Publicado 2012“…This comprehensive resource contains everything database administrators and developers need to know to keep Oracle Database 10g performing at its peak. Real-world case studies and in-depth examples illustrate best practices and highlight the latest tuning options…”
Libro electrónico -
2866por Barber, David, 1968-“…Students learn more than a menu of techniques, they develop analytical and problem-solving skills that equip them for the real world. Numerous examples and exercises, both computer based and theoretical, are included in every chapter. …”
Publicado 2012
Libro -
2867Publicado 2023Tabla de Contenidos: “…Further reading -- Part 2 - Image Classification with TensorFlow -- Chapter 5: Image Classification with Neural Networks -- Technical requirements -- The anatomy of neural networks -- Forward propagation -- Activation functions -- Backward propagation -- Learning rate -- Building an image classifier with a neural network -- Loading the data -- Performing exploratory data analysis -- Building the model -- Compiling the model -- Model visualization -- Model fitting -- Training monitoring -- Evaluating the model -- Model prediction -- Summary -- Questions -- Further reading -- Chapter 6: Improving the Model -- Technical requirements -- Data is key -- Fine-tuning hyperparameters of a neural network -- Increasing the number of epochs -- Early stopping using callbacks -- Adding neurons in the hidden layer -- Changing the optimizers -- Changing the learning rate -- Summary -- Questions -- Further reading -- Chapter 7: Image Classification with Convolutional Neural Networks -- Challenges of image recognition with fully connected networks -- Anatomy of CNNs -- Convolutions -- Impact of the number of filters -- Impact of the size of the filter -- Impact of stride -- The boundary problem -- Impact of padding -- Putting it all together -- Pooling -- The fully connected layer -- Fashion MNIST 2.0 -- Working with real-world images -- Weather dataset classification -- Image data preprocessing -- Summary -- Questions -- Further reading -- Chapter 8: Handling Overfitting -- Technical requirements -- Overfitting in ML -- What triggers overfitting -- Detecting overfitting -- Baseline model -- Early stopping -- Model simplification -- L1 and L2 regularization -- Dropout regularization -- Adjusting the learning rate -- Error analysis -- Data augmentation -- Summary -- Questions -- Further reading -- Chapter 9: Transfer Learning -- Technical requirements…”
Libro electrónico -
2868Publicado 2024Tabla de Contenidos: “…2.2 Understanding Flowcharts -- 2.3 Translating Real-World Problems into Pseudocode -- 2.4 Practice Problems -- Problem 1 -- Problem 2 -- Problem 3 -- Chapter 2 Summary -- Chapter 3: Algorithm Efficiency -- 3.1 Understanding Time Complexity -- 3.1.1 Big O notation -- 3.1.2 Difference between the best-case, average-case, and worst-case time complexity -- 3.2 Understanding Space Complexity -- 3.2.1 Caching/Memoization -- 3.3 Introduction to Big O Notation -- 3.3.1 What is Big O Notation? …”
Libro electrónico -
2869por Pillora, JaimeTabla de Contenidos: “…; Benefits of Grunt; Efficiency; Consistency; Effectiveness; Community; Flexibility; Real-world use cases; Static analysis or Linting; Transcompilation; CoffeeScript; Minification; Concatenation; Deployment; FTP; SFTP; S3; Summary; Chapter 2: Setting Up Grunt; Installation; Node.js; Modules; npm; Finding modules; Installing modules; Grunt; Project setup; package.json; Gruntfile.js; Directory structure; Configuring tasks…”
Publicado 2014
Libro electrónico -
2870por Ganssle, Jack G.Tabla de Contenidos: “…Cover; The Art of Designing Embedded Systems; Copyright Page; Contents; Acknowledgments; Chapter 1: Introduction; Chapter 2: The Project; 2.1 Partitioning; 2.2 Scheduling; Chapter 3: The Code; 3.1 Firmware Standards; 3.2 Code Inspections; 3.3 Design by Contract'; 3.4 Other Ways to Insure Quality Code; 3.5 Encapsulation; Chapter 4: Real Time; 4.1 Real Time Means Right Now; 4.2 Reentrancy; 4.3 eXtreme Instrumenting; 4.4 Floating Point Approximations; Chapter 5: The Real World; 5.1 Electromagnetics for Firmware People; 5.2 Debouncing; Chapter 6: Disciplined Development…”
Publicado 2008
Libro electrónico -
2871por Armendariz, MattTabla de Contenidos: “…; Part 4: Tips and Tricks: The Real World; Chapter 12: Matt's Top 10 Tips for Food Photography; Chapter 13: Shooting in a Restaurant; Arrive Early; Ask; Use a Fast Lens and Bump Up That ISO; It's Okay to Ask for Help; Chapter 14: Difficult Foods to Photograph and What You Can Do about It; Soups; Chapter 15: Help! …”
Publicado 2013
Libro electrónico -
2872Publicado 2010Tabla de Contenidos: “…Kotter -- 8 Managing Talent -- 9 Getting Results: Our Journey to Turn Leadership Competencies into Outcomes -- 10 Engaging and Retaining Talented People in Any Economy -- Section II: Leadership Development -- 11 Leadership Development Strategy -- 12 Identifying Real-World Leadership Competencies -- 13 Worst Practices in 360-Degree Assessments: Why Feedback Fails -- 14 Leaders as Mentors and Teachers: Time-Tested Leadership Development Strategies -- 15 Learning on the Job -- 16 Coaching Leaders to Lead -- Section III: Attributes of Successful Leaders -- 17 Good to Great: What Leaders Do -- 18 Unlocking the Mystery of Inspiring Leadership -- 19 The Authentic Leader -- 20 Leading in Turbulent Times -- 21 Leadership Ethics and Integrity for the 21st Century -- 22 Trends Shaping Future Leadership Attributes -- 23 Derailment: How Successful Leaders Avoid It -- Section IV: Contemporary Leadership Challenges -- 24 Leading the Workforce of the Future -- 25 Globally Savvy Leaders -- 26 Women in the Lead -- 27 Leading Across Generations -- 28 Leading for Diversity -- Section V: Broadening the Leadership Discussion -- 29 Why Leadership Development Should Go to School -- 30 Growing Tomorrow's Leaders for the Worlds of 2020 -- 31 A Military View of Leadership in the Private Sector -- 32 Leading in the Public Sector -- 33 Chinese "Sheng Yi": Reinterpreting Challenges for Leaders -- Appendix: List and Descriptions of the Tools on the Website…”
Libro electrónico -
2873Publicado 2016“…Metaliteracy in Practice follows on from this book, placing its concepts firmly in real-world practice and delivering a compilation of innovative and practical teaching ideas from some of the leading thinkers in library and information literacy instruction today. …”
Libro -
2874Publicado 2017“…Authors Tomasz Nurkiewicz and Ben Christensen include concrete examples that use the RxJava library to solve real-world performance issues on Android devices as well as the server. …”
Libro -
2875Publicado 2002Tabla de Contenidos: “…Rinehart -- 4 Challenging the "Academic / Real World" Divide 36 -- Catherine M. Orr -- 5 Teaching Feminist Activism: Probing Our Assumptions, Analyzing Our Choices 54 -- Karen Bojar --II. …”
Acceso restringido con credenciales, usuarios UPSA
Libro electrónico -
2876
-
2877por Mayer, Bernard S.“… Praise for the Second Edition of The Dynamics of Conflict ""Mayer once again demonstrates his unique ability to weave theory and practice together with real-world examples-whether about warring nations or a family dispute-to help readers better understand both the fundamentals and nuances involved in working in the conflict arena. …”
Publicado 2012
Enlace al texto completo en ebscohost
Libro electrónico -
2878por Sansó-Rubert Pascual, Daniel“…It emphasizes practical learning and skill development for law students through real-world case simulations and interactions. The legal clinic at Universidad Europea de Madrid serves as a model, providing students opportunities to engage with real legal environments and professionals. …”
Publicado 2024
Libro electrónico -
2879Publicado 2020“…The goal of the International Journal of Cognitive Computing in Engineering is to explore how these data science technologies and new cognitive methods can be integrated to address real world engineering problems and challenges. For example, the journal welcomes submissions that look at the opportunities offered by combining existing data technologies with the knowledge of experts in the field and artificial intelligence. …”
Seriada digital -
2880Publicado 2017“…Each chapter offers new interpretations of real-world problems, local community initiatives and successful housing projects, and together construct a critique on recent governmental and planning policies globally. …”
Libro electrónico