Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 783
- Application software 686
- Engineering & Applied Sciences 645
- Computer networks 426
- Computer Science 414
- Management 402
- Python (Computer program language) 393
- Examinations 380
- Machine learning 374
- Artificial intelligence 349
- Data processing 348
- Cloud computing 299
- Certification 294
- Computer programs 276
- Computer security 276
- Security measures 263
- Computer programming 254
- Electronic data processing personnel 250
- Computer software 242
- Web site development 234
- Design 216
- Electrical & Computer Engineering 215
- Java (Computer program language) 207
- Database management 190
- Telecommunications 187
- Operating systems (Computers) 178
- Web sites 175
- Programming 169
- Microsoft .NET Framework 165
- Information technology 164
-
5681Publicado 2023Tabla de Contenidos: “…Typical Bitcoin addresses -- Advanced Bitcoin addresses -- Transactions -- Coinbase transactions -- The transaction lifecycle -- Transaction validation -- Transaction fees -- The transaction data structure -- Metadata -- Inputs -- Outputs -- Verification -- The Script language -- Opcodes -- Standard transaction scripts -- Contracts -- Transaction bugs -- Blockchain -- Structure -- The genesis block -- Stale and orphan blocks -- Forks -- Properties -- Miners -- Proof of Work (PoW) -- Mining systems -- CPU -- GPU -- FPGAs -- ASICs -- Mining pools -- Network -- Types of messages -- Client software -- Bloom filters -- Wallets -- Summary -- Chapter 7 : Bitcoin in Practice -- Bitcoin in the real world -- Bitcoin payments -- Innovation in Bitcoin -- Bitcoin improvement proposals -- Advanced protocols -- Segregated Witness -- Bitcoin Cash -- Bitcoin Unlimited -- Bitcoin Gold -- Taproot -- Extended protocols on top of Bitcoin -- Colored coins -- Counterparty -- Altcoins from Bitcoin -- Bitcoin client installation -- Types of clients and tools -- Setting up a Bitcoin node -- Setting up the source code -- Setting up bitcoin.conf -- Starting up a node in the testnet -- Starting up a node in regtest -- Experimenting further with bitcoin-cli -- Using the Bitcoin command-line tool -- Using the JSON-RPC interface -- Using the HTTP REST interface -- Bitcoin programming -- Summary -- Chapter 8 : Smart Contracts -- Introducing smart contracts -- Definitions -- Properties -- Real-world application -- Ricardian contracts -- Smart contract templates -- Oracles -- Software-and network-assisted proofs -- TLSNotary -- TLS-N-based mechanism -- Hardware device-assisted proofs -- Android proof -- Ledger proof -- Trusted hardware-assisted proofs -- Types of blockchain oracles -- Inbound oracles -- Outbound oracles -- Cryptoeconomic oracles -- Blockchain oracle services…”
Libro electrónico -
5682por Pinto, RohanTabla de Contenidos: “…-- DID standards and protocols -- The impact on the DID ecosystem -- W3C DID standards -- Anatomy of a DID -- DID methods -- DID documents -- DID universal resolver -- Decentralized trust -- Privacy by design -- Proactive not reactive -- preventative not remedial -- Privacy as the default setting -- Privacy embedded into design -- Full functionality - positive-sum, not zero-sum -- End-to-end security - full life cycle protection -- Visibility and transparency -- Respect for user privacy -- Verifiable credentials -- Key components of verifiable credential standards -- W3C Verifiable Credentials Data Model -- Examples of implementing VCs -- Summary -- Chapter 13: DID Authentication -- Traditional authentication -- Lightweight Directory Access Protocol -- Kerberos -- OAuth 2 and OIDC -- Understanding the OAuth 2.0 authorization model -- Security Assertion Markup Language -- DID authentication protocols -- Implementing DID authentication -- Core methodologies in DID authentication -- Strategies for implementing DID authentication -- Real-world examples and case studies -- Paving the way for a decentralized identity frontier -- Security and privacy considerations -- The pillars of DID security -- Privacy-first design -- Security challenges -- Privacy challenges -- Ongoing developments and initiatives -- Summary -- Chapter 14: Identity Verification -- Historical evolution of identity verification…”
Publicado 2024
Libro electrónico -
5683Publicado 2024Tabla de Contenidos: “…The evolution of distributed systems -- Designing a distributed queue -- Designing a pub/sub system -- Key characteristics of pub/sub systems -- Pub/sub system design considerations -- Kafka -- The importance of Kafka in distributed systems -- Kafka Streams -- Kinesis -- Summary -- Part 3: System Design in Practice -- Chapter 8: Design and Implementation of System Components: API, Security, and Metrics -- REST APIs -- Design principles of REST APIs -- Use cases for REST APIs -- Strengths and weaknesses -- gRPC APIs -- Design principles of gRPC APIs -- Use cases for gRPC APIs -- Strengths and weaknesses -- Comparing REST and gRPC -- API security -- Authentication -- Authorization -- Secure communication of APIs -- Rate limiting -- Distributed systems logging -- Centralized logging -- Best practices for implementing distributed logging -- Metrics in a distributed system -- Types of metrics -- Open source tools for metrics -- Best practices for implementing metrics -- Alerting in a distributed system -- Designing effective alerts -- Open-source tools for alerting -- Best practices for implementing alerting -- Tracing in a distributed system -- Distributed tracing -- Open-source tools for distributed tracing -- Best practices for implementing tracing -- Best practices -- Summary -- Chapter 9: System Design - URL Shortener -- Real-world use cases -- Functional requirements -- Non-functional requirements -- Client APIs needed -- Estimates and calculations -- System design -- Core challenge -- Choice of database -- High-level solution architecture -- Requirements verification -- Summary -- Chapter 10: System Design - Proximity Service -- Real-world use cases -- Functional requirements -- Non-functional requirements -- Client APIs needed -- Estimates and calculations -- System design -- High-level system design -- Core challenge…”
Libro electrónico -
5684por Ciaburro, GiuseppeTabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Getting Started with Numerical Simulation -- Chapter 1: Introducing Simulation Models -- Technical requirements -- Introducing simulation models -- Decision-making workflow -- Comparing modeling and simulation -- Pros and cons of simulation modeling -- Simulation modeling terminology -- Classifying simulation models -- Comparing static and dynamic models -- Comparing deterministic and stochastic models -- Comparing continuous and discrete models -- Approaching a simulation-based problem -- Problem analysis -- Data collection -- Setting up the simulation model -- Simulation software selection -- Verification of the software solution -- Validation of the simulation model -- Simulation and analysis of results -- Exploring Discrete Event Simulation (DES) -- Finite-state machine (FSM) -- State transition table (STT) -- State transition graph (STG) -- Dynamic systems modeling -- Managing workshop machinery -- Simple harmonic oscillator -- The predator-prey model -- How to run efficient simulations to analyze real-world systems -- Summary -- Chapter 2: Understanding Randomness and Random Numbers -- Technical requirements -- Stochastic processes -- Types of stochastic processes -- Examples of stochastic processes -- The Bernoulli process -- Random walk -- The Poisson process -- Random number simulation -- Probability distribution -- Properties of random numbers -- The pseudorandom number generator -- The pros and cons of a random number generator -- Random number generation algorithms -- Linear congruential generator -- Random numbers with uniform distribution -- Lagged Fibonacci generator -- Testing uniform distribution -- Chi-squared test -- Uniformity test -- Exploring generic methods for random distributions…”
Publicado 2022
Libro electrónico -
5685Publicado 2019Tabla de Contenidos: “…-- Basic Concepts: Responsibility, Accountability, and Liability -- Ethical Analysis -- Candidate Ethical Principles -- Professional Codes of Conduct -- Some Real-World Ethical Dilemmas -- 4-3 Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? …”
Libro electrónico -
5686Publicado 2017“…Learn data exploration, data munging, and how to process structured and semi-structured data using real-world datasets and gain hands-on exposure to the issues and challenges of working with noisy and "dirty" real-world data. …”
Libro electrónico -
5687por Hollander, MylesTabla de Contenidos: “…The Distribution-Free Property -- Distribution-Free Test Statistic -- 1.3. Some Real-World Applications -- 1.4. Format and Organization -- Procedure -- Large-Sample Approximation -- Ties -- Example -- Comments -- Properties -- Problems -- Efficiency -- 1.5. …”
Publicado 2014
Libro electrónico -
5688por Ayyadevara, V. KishoreTabla de Contenidos: “…Preparing our data for image classification -- Training a neural network -- Scaling a dataset to improve model accuracy -- Understanding the impact of varying the batch size -- Batch size of 32 -- Batch size of 10,000 -- Understanding the impact of varying the loss optimizer -- Building a deeper neural network -- Understanding the impact of batch normalization -- Very small input values without batch normalization -- Very small input values with batch normalization -- The concept of overfitting -- Impact of adding dropout -- Impact of regularization -- L1 regularization -- L2 regularization -- Summary -- Questions -- Section 2: Object Classification and Detection -- Chapter 4: Introducing Convolutional Neural Networks -- The problem with traditional deep neural networks -- Building blocks of a CNN -- Convolution -- Filters -- Strides and padding -- Strides -- Padding -- Pooling -- Putting them all together -- How convolution and pooling help in image translation -- Implementing a CNN -- Classifying images using deep CNNs -- Visualizing the outcome of feature learning -- Building a CNN for classifying real-world images -- Impact on the number of images used for training -- Summary -- Questions -- Chapter 5: Transfer Learning for Image Classification -- Introducing transfer learning -- Understanding the VGG16 architecture -- Implementing VGG16 -- Understanding the ResNet architecture -- Implementing ResNet18 -- Implementing facial keypoint detection -- 2D and 3D facial keypoint detection -- Implementing age estimation and gender classification -- Introducing the torch_snippets library -- Summary -- Questions -- Chapter 6: Practical Aspects of Image Classification -- Generating CAMs -- Understanding the impact of data augmentation and batch normalization -- Coding up road sign detection -- Practical aspects to take care of during model implementation…”
Publicado 2023
Libro electrónico -
5689Publicado 2010Tabla de Contenidos: “…21 SQL Server Clustering -- What's New in SQL Server Clustering -- How Microsoft SQL Server Clustering Works -- Installing SQL Server Clustering -- Summary -- 22 Administering Policy-Based Management -- Introduction to Policy-Based Management -- Policy-Based Management Concepts -- Implementing Policy-Based Management -- Sample Templates and Real-World Examples -- Policy-Based Management Best Practices -- Summary -- Part IV: Database Administration -- 23 Creating and Managing Databases -- What's New in Creating and Managing Databases -- Data Storage in SQL Server -- Database Files -- Creating Databases -- Setting Database Options -- Managing Databases -- Summary -- 24 Creating and Managing Tables -- What's New in SQL Server 2008 -- Creating Tables -- Defining Columns -- Defining Table Location -- Defining Table Constraints -- Modifying Tables -- Dropping Tables -- Using Partitioned Tables -- Creating Temporary Tables -- Summary -- 25 Creating and Managing Indexes -- What's New in Creating and Managing Indexes -- Types of Indexes -- Creating Indexes -- Managing Indexes -- Dropping Indexes -- Online Indexing Operations -- Indexes on Views -- Summary -- 26 Implementing Data Integrity -- What's New in Data Integrity -- Types of Data Integrity -- Enforcing Data Integrity -- Using Constraints -- Rules -- Defaults -- Summary -- 27 Creating and Managing Views in SQL Server -- What's New in Creating and Managing Views -- Definition of Views -- Using Views -- Creating Views -- Managing Views -- Data Modifications and Views -- Partitioned Views -- Indexed Views -- Summary -- 28 Creating and Managing Stored Procedures -- What's New in Creating and Managing Stored Procedures -- Advantages of Stored Procedures -- Creating Stored Procedures -- Executing Stored Procedures -- Deferred Name Resolution -- Viewing Stored Procedures -- Modifying Stored Procedures…”
Libro electrónico -
5690por Roldan, Maria C.Tabla de Contenidos: “…Time for action - avoiding errors while converting the estimated time from string to integer -- The error handling functionality -- Time for action - configuring the error handling to see the description of the errors -- Personalizing the error handling -- Summary -- Chapter 3: Manipulating Real-world Data -- Reading data from files -- Time for action - reading results of football matches from files -- Input files -- Input steps -- Reading several files at once -- Time for action - reading all your files at a time using a single text file input step -- Time for action - reading all your files at a time using a single text file input step and regular expressions -- Regular expressions -- Troubleshooting reading files -- Sending data to files -- Time for action - sending the results of matches to a plain file -- Output files -- Output steps -- Getting system information -- Time for action - reading and writing matches files with flexibility -- The Get System Info step -- Running transformations from a terminal window -- Time for action - running the matches transformation from a terminal window -- XML files -- Time for action - getting data from an XML file with information about countries -- What is XML? …”
Publicado 2013
Libro electrónico -
5691Publicado 2018Tabla de Contenidos: “…Interpreting the grayscale previews -- Radius and Detail grayscale preview -- Masking slider -- Masking slider example -- Real world sharpening examples -- Sharpening portrait images -- Sharpening landscape images -- Sharpening a fine-detailed image -- How to save sharpening settings as presets -- Capture sharpening summary -- Selective sharpening in Camera Raw -- Negative sharpening -- Extending the sharpening limits -- Dual Smart Object sharpening layers -- How to apply localized sharpening -- Negative sharpening to blur an image -- Noise removal in Camera Raw -- Detail panel Noise Reduction sliders -- Color noise -- Removing random pixels -- CMOS and CCD sensors -- Noise Reduction adjustments -- Color Smoothness slider -- Adding grain to improve appearance of sharpness -- Localized noise reduction in Camera Raw -- Localized moiré removal in Camera Raw -- Smart Sharpened -- No sharpening -- Localized sharpening in Photoshop -- Sharpen tool -- Smart Sharpen filter -- Basic Smart Sharpen mode -- Advanced Smart Sharpen mode -- Removing Motion Blur -- Shake Reduction filter -- The Shake Reduction controls -- Repeat filtering -- Smart object support -- Blur direction tool -- How to get the best results -- Creating a depth of field brush -- 4 Image editing essentials -- Pixels versus vectors -- Photoshop as a vector program -- Image resolution terminology -- PPI: pixels per inch -- LPI: lines per inch -- DPI: dots per inch -- Desktop printer resolution -- Altering the image size -- Image interpolation -- Nearest Neighbor (hard edges) -- Bilinear -- Bicubic (smooth gradients) -- Bicubic Smoother (enlargement) -- Bicubic Sharper (reduction) -- Bicubic Automatic -- Preserve Details (enlargement) -- Photoshop image adjustments -- The image histogram -- The Histogram panel -- Basic Levels editing and the histogram -- Bit depth…”
Libro electrónico -
5692Publicado 2012Tabla de Contenidos: “…-- Default operations -- Man-in-the-middle attacks -- Part III: Real-World Wireless Security Defenses -- Chapter 6: Theory of Defense for Securing Wireless Networks -- We'll Cover -- Setting the Stage -- Context -- Reality -- The Attacker Has the Advantage -- Phases of Wireless Deployment -- New Deployments -- Existing Wireless Networks -- Dealing with Downtime -- New Wireless Network in Parallel -- Touch Every Wireless Client -- Wireless Refresh -- Secure Design Principles for Wireless Networks -- Defense In Depth -- Least Privilege -- Network Segmentation -- Wireless Assessments -- Secure the Infrastructure -- Rogue AP Detection -- Physical Security -- Change the Default Configurations -- Due Diligence -- Confidentiality Integrity Availability (CIA) -- Encryption -- Authentication -- Useless Defenses -- Faraday Cage -- MAC Filtering -- SSID Cloaking -- WEP -- WEP Cloaking -- Good Wireless Defenses -- Firewalls -- Routers -- Switches -- Intrusion Detection Systems and Intrusion Prevention Systems -- When to Use IDS vs. …”
Libro electrónico -
5693Publicado 2023“…A strategic guide that will help you make key decisions related to cloud-based architectures, modernize your infrastructure and applications, and transform your business using AWS with real-world case studies Key Features Learn cloud migration and modernization strategies on AWS Innovate your applications, data, architecture and networking by adopting AWS Leverage AWS technologies with real world use-cases to implement cloud operations Purchase of the print or Kindle book includes a free eBook in the PDF format Book Description AWS cloud technologies help businesses scale and innovate, however, adopting modern architecture and applications can be a real challenge. …”
Libro electrónico -
5694Publicado 2024Tabla de Contenidos: “…Case study 1 - Streamlining microservices communication in multi-clouds -- Case study 2 - Managing data consistency in a multi-cloud environment -- Case study 3 - Scaling challenges in a multi-cloud environment -- SRE in multi-cloud environments -- The principles of SRE -- The benefits of SRE -- Chaos engineering -- Summary -- Part 4: Best Practices, Case Studies, and Future Trends for Multi-Cloud and Cloud-Native -- 8 -- Chapter 8: Learning from Pioneers and Case Studies -- Real-world case studies -- Capital One - accelerating decision-making applications with Kubernetes -- Ygrene - using cloud-native tech to bring security and scalability to the finance industry -- T-Mobile - scaling up for peak with Kubernetes -- Uber - cloud-native transformation for agility -- Deployment strategies and best practices -- Deployment strategies -- Lessons learned and recommendations -- Lessons learned -- Recommendations for future projects -- Summary -- 9 -- Chapter 9: Bringing Your Cloud-Native Application to Life -- Project planning -- Designing cloud-native applications for multi-cloud -- Designing a cloud-native application on multi-cloud -- Building your cloud-native application -- Practical examples: building effective cloud-native applications -- Deployment best practices -- Security best practices for deployment -- Load testing and performance optimization -- Performing load testing and performance optimization -- Troubleshooting and optimization -- Optimization and scaling -- Cost-optimization strategies -- Scalability and elasticity -- Performance monitoring and tuning -- Hands-on exercise: e-commerce in multi-cloud architecture -- Summary -- 10 -- Chapter 10: Future-Proofing Your Cloud Computing Skills -- Next-generation cloud-native infrastructure and platforms -- Evolution of platform engineering…”
Libro electrónico -
5695Publicado 2024Tabla de Contenidos: “…Working on AL coding guidelines -- Summary -- Chapter 4: Developing a Customized Solution for Dynamics 365 Business Central -- Translating a business case into a real-world extension -- Developing the Dynamics 365 Business Central customization -- Customer category implementations -- Table definition -- Page definition -- The tableextension definition -- The pageextension definition -- Codeunit definition -- Handling event subscribers -- Gift campaign implementations -- Table definition -- Page definition -- Codeunit definition -- Vendor quality implementations -- Table definition -- Page definition -- The pageextension definition -- Codeunit definition -- Promoting actions -- Creating page views -- Installing and upgrading codeunits -- Defining permission sets in AL -- Summary -- Chapter 5: Writing Code for Extensibility -- Why do we need extensible code? …”
Libro electrónico -
5696Publicado 2024“…Mastering Go, now in its fourth edition, remains the go-to resource for real-world Go development. This comprehensive guide delves into advanced Go concepts, including RESTful servers, and Go memory management. …”
Libro electrónico -
5697Publicado 2024“…By the end of this book , you'll have gained a comprehensive understanding of AI/ML across all key aspects, including business use cases, data science, real-world solution architecture, risk management, and governance. …”
Libro electrónico -
5698Publicado 2021“…In addition to its comprehensive coverage, this book offers a highly contextual real-world sample app that you can use as a reference for building different types of APIs for real-world applications. …”
Libro electrónico -
5699Publicado 2024“…Packed with real-world examples, it offers a practical understanding of the Power Pages environment. …”
Libro electrónico -
5700Publicado 2021Tabla de Contenidos: “…Chapter Exercises -- Part 2 -- Chapter 4: Leadership Involvement: Change Leadership -- Learning Objectives -- The Differences between Leaders and Managers -- Leadership Qualities - Approaches -- Leadership and Organizational Development -- OD Practitioners and Motivation to Change -- Myer-Briggs Type Indicator Assessments -- Summary -- References -- Chapter Exercises -- Chapter 5: Practical Organizational Considerations -- Learning Objectives -- Critical Variables in Organizational Transformation -- Organization Structure -- The Impact of Policies -- Leadership Interaction -- Performance Measures -- People, Policies, and Culture in Organizational Transformations -- Competing Values Framework -- Four Major Culture Profiles -- Internal and External Stakeholders -- Organizational Community -- Organizational Culture -- The Complexities of Change Management -- Organizational Theory and the Real World -- Organizational Theory and Change Managers -- Organizational Theory and Employees -- Public Organizations and Private Organizations -- Organizational Transformation Strategies -- Strategic-Level Transformational Strategy -- Incremental-Level Transformational Strategy -- Reactive Transformational Strategy -- Anticipatory Transformational Strategy -- Project Management Versus Change Management -- Change Capacity -- Summary -- References -- Chapter Exercises -- Part 3 -- Chapter 6: After the Change -- Learning Objectives -- Maintaining the Change Initiative -- Preparation for the Next Change Initiative -- Technology as a Business Risk: Technology Changes Impacting an Industry -- Industry Case Study: Newspaper Industry and Technology Changes -- Technological Changes - The Internet -- Competition Strategies -- Porter's Analysis Model -- Competitive Advantages -- Internal Focus -- External Criticalities -- Specific Challenges Facing Newspapers…”
Libro electrónico