Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 616
- Historia 581
- Development 437
- Social aspects 425
- Application software 372
- Management 322
- RELIGION 247
- Computer networks 241
- Social conditions 238
- Filosofía 224
- Leadership 219
- Engineering & Applied Sciences 214
- Psychological aspects 189
- Examinations 182
- Business & Economics 179
- Operating systems (Computers) 178
- Computer security 168
- Cloud computing 163
- Security measures 162
- Artificial intelligence 158
- Certification 158
- Economic conditions 156
- Design 155
- Philosophy 153
- History and criticism 148
- Crítica e interpretación 147
- Aspectos sociales 141
- Computer software 138
- Computer programs 137
- Psychology 136
-
11381por Antenhofer, ChristinaTabla de Contenidos: “…-- Perpetuierung tradierter Geschlechtervorstellungen - Eine Fragestellung -- Alte Gebäude in neuem (Erziehungs‐)Gewand -- Arbeit und Freiräume machen Geschlechter -- Die wohnende Frau, der arbeitende Mann -- Räumliche und geschlechtsspezifische Aspekte der Anstaltsrichtlinien -- Schlussüberlegungen -- Die Okkupation des Raumes -- Sophie Taeuber‐Arp for Greatness -- Performance und Performativität -- Raum -- Fazit -- Performanz -- Die Maske des Ahnen -- 1 Einleitung -- 2 Imago, cera, eikōn: Maske aus Wachs und Abbild des Ahnen -- 3 Die anwesenden Abwesenden -- 3.1 Imagines maiorum und die pompa funebris -- 3.2 Die Masken im Atrium -- 3.3 Die Maske des Ahnen - ein wertvolles Gut -- 4 Fazit: Sozialisation junger »ehrgeiziger« Römer -- 5 Abkürzungen antiker Quellen -- Live Like a Viking -- Einleitung: »When you leave here, you'll leave as Vikings« -- Historische Authentizität in den Historical Game Studies -- Ein Gefühl von Geschichte: Authentizität als Marketingtechnik -- LikeAViking: Assassin's Creeds Versprechen vom Geschichtstourismus -- Narrative und spielmechanische Techniken von Genderkonstruktionen entlang des Gegensatzes Wikinger:innen und Christentum -- Fazit -- Autor:innen -- Personenregister…”
Publicado 2024
Libro electrónico -
11382Publicado 2024Tabla de Contenidos: “…-- 7 Moving Forward: Opportunities for Shifting the Paradigm of How Archaeological Heritage is Valued -- 7.1 The Place for Archaeological Heritage in Education -- 8 Conclusion -- References -- 7 Engaging with Colonial Archaeological Sites in Haiti -- 1 Introduction -- 2 Historical Background of the Colonial Settlements -- 3 A Closer Look at the Approach and Method -- 4 Colonial Ruins as Places for Reappropriation -- 5 Discussion and Conclusion: Looking Closer at Tourism and Memory -- References -- 8 The Social Construction of "Cultural Heritage" in Guadeloupe -- 1 Introduction -- 2 The Case of the Domaine de Fonds Saint-Jacques (Martinique) -- 2.1 Short History and Official Summary -- 2.2 A Thousand Lives and a Long History -- 2.3 Uses and Representations, from the Other to Oneself -- 2.4 Dissolving Memory: History under Construction -- 3 The Case of Poterie Fidelin and the Fonds Rousseau Habitation -- 3.1 The Poterie Fidelin -- 3.2 Habitation Fonds Rousseau -- 3.3 The Formal Context of France -- 3.4 The Economic Possession of Places of Memory: the békés of Martinique -- 3.5 Paths to Sustainable Developments -- 3.6 Personal Feedback in Relation to Both Examples -- 4 The Case of the Centre d'Animation et d'Interprétation de la Culture Amérindienne (CAICA) -- 4.1 History of the project -- 4.2 CAICA's Mission through the Framework of Cultural Rights -- 5 The Case of Museums and Archaeology: a Brief History of Archaeology in the French West Indies -- 5.1 Edgar Clerc Museum: Departmental Museum of Amerindian Archaeology -- 5.2 International "Caribbean Ties" Exhibition -- 5.3 Local Variation Exhibition: Liens Caribéens/Lyannaj péyi LaKarayib -- 5.4 A New Generation of Local Archaeologists -- 5.5 Interest and Reappropriation of Amerindian Culture -- 6 Conclusion -- References…”
Libro electrónico -
11383Publicado 1996Tabla de Contenidos: “…SELECTED FEATURES OF AMERICAN INDIAN FAMILIES -- Children Living with Two Parents -- Possible Factors Associated with the Prevalence of Single-Parent Families -- Women Who Have Never Married -- Divorce -- Interracial Marriage -- SUMMARY AND CONCLUSIONS -- REFERENCES -- 10 Demography of American Indian Elders: Social, Economic, and Health Status -- INTRODUCTION -- MARITAL STATUS AND HOUSEHOLD COMPOSITION -- ECONOMIC STATUS -- Poverty -- Sources of Income -- SPATIAL DISTRIBUTION -- MORTALITY AND DISABILITY -- Life Expectancy at Birth -- Comparative Mortality Rates -- Trends in Mortality: 1977-1988 -- Disability Status -- DISCUSSION -- References -- IV Health Issues and Health Care Access and Utilization -- 11 Overview of Alcohol Abuse Epidemiology for American Indian Populations -- STEREOTYPES OF INDIAN DRINKING -- EPIDEMIOLOGY OF INDIAN YOUTH SUBSTANCE ABUSE FROM SURVEYS -- ADULT ALCOHOL ABUSE SURVEYS -- Patterns of Heavy Use -- Less-Problematic Patterns -- LONGITUDINAL FOLLOW-UP STUDIES OF ADULT INDIAN DRINKERS -- CURRENT DATA ON ALCOHOL-INVOLVED MORTALITY -- Mortality Rates -- Male And Female Alcohol-Involved Deaths As A Percentage Of All Deaths -- Age-Adjusted Rates -- Alcohol-Related Versus Alcohol-Specific Mortality -- Explanations of Tribal Variations in Rates -- FETAL ALCOHOL SYNDROME -- PREVENTION OF ALCOHOL PROBLEMS -- Primary Prevention -- Secondary Prevention -- Tertiary Prevention -- SUMMARY OF FINDINGS AND AREAS FOR FUTURE RESEARCH -- References -- 12 Diabetes Mellitus in Native Americans: The Problem and Its Implications -- INTRODUCTION -- PIMA INDIAN STUDY -- MAGNITUDE OF THE PROBLEM OF NIDDM IN NATIVE AMERICANS -- Prevalence -- Incidence -- DETERMINANTS OF NIDDM -- Genetic Factors -- Environmental Factors -- Obesity -- Diet -- Physical Activity -- COMPLICATIONS OF NIDDM -- Mortality -- End-Stage Renal Disease (ESRD)…”
Libro electrónico -
11384por Connors, Christopher D.Tabla de Contenidos: “…-- Connecting in Person -- The Importance of Psychological Safety -- The Spirit of Camaraderie -- Chapter 7 Fortune Favors the Bold Leader (Learn to Lead with Confidence and Courage) -- Assertiveness (A Deeper Dive) -- Telling the Truth -- Building Relationships -- Leadership Is a Contact Sport -- Playing Offense and Defense -- Live Boldly -- The Power of Reinvention…”
Publicado 2024
Libro electrónico -
11385Publicado 2018Tabla de Contenidos: “…Solutions 130 Chapter 35: Opportunity Assessment Technique 131 Chapter 36: Customer Letter Technique 133 Chapter 37: Startup Canvas Technique 135 Breakout: The Biggest Risk 136 Discovery Planning Techniques 138 Chapter 38: Story Map Technique 139 Chapter 39: Customer Discovery Program Technique 141 Breakout: Defining Product/Market Fit 147 Chapter 40: Profile: Martina Lauchengco of Microsoft 148 Discovery Ideation Techniques 150 Chapter 41: Customer Interviews 151 Chapter 42: Concierge Test Technique 153 Chapter 43: The Power of Customer Misbehavior Technique 154 Breakout: The Power of Developer Misbehavior 156 Chapter 44: Hack Days 157 Discovery Prototyping Techniques 158 Chapter 45: Principles of Prototypes 160 Chapter 46: Feasibility Prototype Technique 161 Chapter 47: User Prototype Technique 163 Chapter 48: Live-Data Prototype Technique 165 Chapter 49: Hybrid Prototype Technique 167 Discovery Testing Techniques 168 Chapter 50: Testing Usability 169 Chapter 51: Testing Value 174 Chapter 52: Demand Testing Techniques 176 Breakout: Discovery Testing in Risk-Averse Companies 178 Chapter 53: Qualitative Value Testing Techniques 180 Chapter 54: Quantitative Value Testing Techniques 183 Breakout: The Role of Analytics 185 Breakout: Flying Blind 188 Chapter 55: Testing Feasibility 190 Breakout: Discovery for Hardware Products 192 Chapter 56: Testing Business Viability 193 Breakout: User Test vs. …”
Libro electrónico -
11386Publicado 2021Tabla de Contenidos: “…Intro -- inside front cover -- Rust in Action -- Copyright -- dedication -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- Other online resources -- about the author -- about the cover illustration -- 1 Introducing Rust -- 1.1 Where is Rust used? …”
Libro electrónico -
11387Publicado 2021Tabla de Contenidos: “…Intro -- Self-Sovereign Identity -- Copyright -- dedication -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- About the code -- liveBook discussion forum -- Other online resources -- about the authors -- about the cover illustration -- Part 1 An introduction to SSI -- 1 Why the internet is missing an identity layer-and why SSI can finally provide one -- 1.1 How bad has the problem become? …”
Libro electrónico -
11388por Rodenburg, JortTabla de Contenidos: “…Intro -- inside front cover -- Clean Code Checklist -- Code like a Pro in C# -- Copyright -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the author -- about the cover illustration -- Part 1 Using C# and .NET -- 1 Introducing C# and .NET -- 1.1 Why work in C#? …”
Publicado 2021
Libro electrónico -
11389Publicado 2021Tabla de Contenidos: “…Intro -- inside front cover -- Machine Learning Bookcamp -- Copyright -- brief contents -- contents -- front matter -- foreword -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: a roadmap -- About the code -- liveBook discussion forum -- Other online resources -- about the author -- about the cover illustration -- 1 Introduction to machine learning -- 1.1 Machine learning -- 1.1.1 Machine learning vs. rule-based systems -- 1.1.2 When machine learning isn't helpful -- 1.1.3 Supervised machine learning -- 1.2 Machine learning process -- 1.2.1 Business understanding -- 1.2.2 Data understanding -- 1.2.3 Data preparation -- 1.2.4 Modeling -- 1.2.5 Evaluation -- 1.2.6 Deployment -- 1.2.7 Iterate -- 1.3 Modeling and model validation -- Summary -- 2 Machine learning for regression -- 2.1 Car-price prediction project -- 2.1.1 Downloading the dataset -- 2.2 Exploratory data analysis -- 2.2.1 Exploratory data analysis toolbox -- 2.2.2 Reading and preparing data -- 2.2.3 Target variable analysis -- 2.2.4 Checking for missing values -- 2.2.5 Validation framework -- 2.3 Machine learning for regression -- 2.3.1 Linear regression -- 2.3.2 Training linear regression model -- 2.4 Predicting the price -- 2.4.1 Baseline solution -- 2.4.2 RMSE: Evaluating model quality -- 2.4.3 Validating the model -- 2.4.4 Simple feature engineering -- 2.4.5 Handling categorical variables -- 2.4.6 Regularization -- 2.4.7 Using the model -- 2.5 Next steps -- 2.5.1 Exercises -- 2.5.2 Other projects -- Summary -- Answers to exercises -- 3 Machine learning for classification -- 3.1 Churn prediction project -- 3.1.1 Telco churn dataset -- 3.1.2 Initial data preparation -- 3.1.3 Exploratory data analysis -- 3.1.4 Feature importance -- 3.2 Feature engineering -- 3.2.1 One-hot encoding for categorical variables…”
Libro electrónico -
11390Publicado 2022Tabla de Contenidos: “…Intro -- inside front cover -- Praise for earlier editions of Unity in Action -- Unity in Action, Third Edition -- Copyright -- contents -- front matter -- foreword -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the author -- about the cover illustration -- Part 1 First steps -- 1 Getting to know Unity -- 1.1 Why is Unity so great? …”
Libro electrónico -
11391Publicado 2023Tabla de Contenidos: “…-- How this book is organized: A road map -- About the code -- liveBook discussion forum -- Other online resources -- about the author -- about the cover illustration -- Part 1 Cloud native fundamentals -- 1 Introduction to cloud native -- 1.1 What is cloud native? …”
Libro electrónico -
11392Publicado 2023Tabla de Contenidos: “…-- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- Other online resources -- about the author -- about the cover illustration -- Part 1. …”
Libro electrónico -
11393Publicado 2023Tabla de Contenidos: “…-- How this book is organized: A roadmap -- liveBook discussion forum -- Author online -- about the author -- about the cover illustration -- Part 1. …”
Libro electrónico -
11394Publicado 2023Tabla de Contenidos: “…Intro -- inside front cover -- Java Persistence with Spring Data and Hibernate -- Copyright -- dedication -- brief contents -- contents -- front matter -- forewords -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A road map -- About the code -- liveBook discussion forum -- about the author -- authors of Java Persistence with Hibernate, Second Edition -- about the cover illustration -- Part 1. …”
Libro electrónico -
11395Publicado 2017Tabla de Contenidos: “…5.1 Introduction -- 5.2 A Cloud-Based Software Application -- 5.3 Differences in Architectural Models Among Development and Operations -- 5.4 The iObserve Approach -- 5.5 Addressing the Differences in Architectural Models -- 5.5.1 The iObserve Megamodel -- 5.5.2 Descriptive and Prescriptive Architectural Models in iObserve -- 5.5.3 Static and Dynamic Content in Architectural Models -- 5.6 Applying iObserve to CoCoME -- 5.6.1 Applying the iObserve Megamodel -- 5.6.2 Applying Descriptive and Prescriptive Architectural Models -- 5.6.3 Applying Live Visualization -- 5.7 Limitations -- 5.8 Related Work -- 5.9 Conclusion -- References -- 6 Bridging Ecology and Cloud: Transposing Ecological Perspective to Enable Better Cloud Autoscaling -- 6.1 Introduction -- 6.2 Motivation -- 6.3 Natural Ecosystem -- 6.4 Transposing Ecological Principles, Theories and Models to Cloud Ecosystem -- 6.5 Ecology-Inspired Self-Aware Pattern -- 6.6 Opportunities and Challenges -- 6.7 Related Work -- 6.8 Conclusion -- References -- Acknowledgement -- Part 2 Analyzing and Evaluating -- 7 Evaluating Web PKIs -- 7.1 Introduction -- 7.2 An Overview of PKI -- 7.3 Desired Features and Security Concerns -- 7.4 Existing Proposals -- 7.4.1 Classic -- 7.4.2 Difference Observation -- 7.4.2.1 Perspectives -- 7.4.2.2 DoubleCheck -- 7.4.2.3 Convergence -- 7.4.2.4 Certi cate patrol -- 7.4.2.5 CertLock -- 7.4.2.6 TACK -- 7.4.3 Scope Restriction -- 7.4.3.1 Public key pinning (PKP) -- 7.4.3.2 DANE -- 7.4.3.3 CAge -- 7.4.4 Certi cate Management Transparency -- 7.4.4.1 Sovereign keys -- 7.4.4.2 Certi cate transparency -- 7.4.4.3 Accountable key infrastructure -- 7.4.4.4 Certi cate issuance and revocation transparency -- 7.4.4.5 Attack resilient public-key infrastructure -- 7.4.4.6 Distributed transparent key infrastructure -- 7.5 Observations -- 7.5.1 Property Perspective -- 7.5.2 System Perspective…”
Libro electrónico -
11396Publicado 2018Tabla de Contenidos: “…5.4.2 Registering your application's DbContext with the DI provider -- 5.5 Calling your database access code from ASP.NET Core -- 5.5.1 A summary of how ASP.NET Core works and the terms it uses -- 5.5.2 Where does the EF Core code live in the book app? -- 5.6 Implementing the book list query page -- 5.7 Implementing your database methods as a DI service -- 5.7.1 Registering your class as a DI service -- 5.7.2 Injecting ChangePubDateService into the ASP.NET action method -- 5.7.3 Improving registering your database access classes as services -- 5.8 Deploying an ASP.NET Core application with a database -- 5.8.1 Knowing where the database is on the web server -- 5.8.2 Creating and migrating the database -- 5.9 Using EF Core's Migrate to change the database structure -- 5.9.1 Updating your production database -- 5.9.2 Having your application migrate your database on startup -- 5.10 Using async/await for better scalability -- 5.10.1 Why async/await is useful in a web application using EF Core -- 5.10.2 Where should you use async/await with database accesses? …”
Libro electrónico -
11397Publicado 2018Tabla de Contenidos: “…Intro -- Secure by Design -- brief contents -- contents -- front matter -- foreword -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the authors -- about the cover illustration -- Part 1 Introduction -- 1 Why design matters for security -- 1.1 Security is a concern, not a feature -- 1.1.1 The robbery of Öst-Götha Bank, 1854 -- 1.1.2 Security features and concerns -- 1.1.3 Categorizing security concerns: CIA-T -- 1.2 Defining design -- 1.3 The traditional approach to software security and its shortcomings -- 1.3.1 Explicitly thinking about security -- 1.3.2 Everyone is a security expert -- 1.3.3 Knowing all and the unknowable -- 1.4 Driving security through design -- 1.4.1 Making the user secure by design -- 1.4.2 The advantages of the design approach -- 1.4.3 Staying eclectic -- 1.5 Dealing with strings, XML, and a billion laughs -- 1.5.1 Extensible Markup Language (XML) -- 1.5.2 Internal XML entities in a nutshell -- 1.5.3 The Billion Laughs attack -- 1.5.4 Configuring the XML parser -- 1.5.5 Applying a design mindset -- 1.5.6 Applying operational constraints -- 1.5.7 Achieving security in depth -- Summary -- 2 Intermission: The anti-Hamlet -- 2.1 An online bookstore with business integrity issues -- 2.1.1 The inner workings of the accounts receivable ledger -- 2.1.2 How the inventory system tracks books in the store -- 2.1.3 Shipping anti-books -- 2.1.4 Systems living the same lie -- 2.1.5 A do-it-yourself discount voucher -- 2.2 Shallow modeling -- 2.2.1 How shallow models emerge -- 2.2.2 The dangers of implicit concepts -- 2.3 Deep modeling -- 2.3.1 How deep models emerge -- 2.3.2 Make the implicit explicit -- Summary -- Part 2 Fundamentals -- 3 Core concepts of Domain-Driven Design…”
Libro electrónico -
11398por Ganegedara, ThushanTabla de Contenidos: “…-- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the author -- about the cover illustration -- Part 1 Foundations of TensorFlow 2 and deep learning -- 1 The amazing world of TensorFlow -- 1.1 What is TensorFlow? …”
Publicado 2022
Libro electrónico -
11399Publicado 2022Tabla de Contenidos: “…Your Financial Adulting Action Items -- Chapter 5 Your Money Outflows -- Map Out Your Expenses -- Add Numbers to Your List -- Multigenerational Living -- Become Aware of Your Spending -- The Pink Tax -- Set Up a Sinking Fund -- Make a List -- Price the Expenses Out -- Give Them a Home -- Make Them Automatic -- Adding Sinking Funds to Your Financial Plan -- Plan for Pitfalls -- Making Your Plan Too Complicated -- Unrealistic or Too-Optimistic Planning -- Excluding "Small" Things -- Planning for Four-Week Months -- Time to Incorporate Your Goals -- Putting It All Together -- Pay Yourself First -- If You Need It - the Health and Safety Budget -- Set Up Your Net Worth Tracker -- Start with What You Own -- Add Up What You Owe -- Calculate Your Net Worth -- Why Does It Matter? …”
Libro electrónico -
11400Publicado 2023Tabla de Contenidos: “…Intro -- inside front cover -- Privacy-Preserving Machine Learning -- Copyright -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A road map -- About the code -- liveBook discussion forum -- about the authors -- about the cover illustration -- Part 1 Basics of privacy-preserving machine learning with differential privacy -- 1 Privacy considerations in machine learning -- 1.1 Privacy complications in the AI era -- 1.2 The threat of learning beyond the intended purpose -- 1.2.1 Use of private data on the fly -- 1.2.2 How data is processed inside ML algorithms -- 1.2.3 Why privacy protection in ML is important -- 1.2.4 Regulatory requirements and the utility vs. privacy tradeoff -- 1.3 Threats and attacks for ML systems -- 1.3.1 The problem of private data in the clear -- 1.3.2 Reconstruction attacks -- 1.3.3 Model inversion attacks -- 1.3.4 Membership inference attacks -- 1.3.5 De-anonymization or re-identification attacks -- 1.3.6 Challenges of privacy protection in big data analytics -- 1.4 Securing privacy while learning from data: Privacy-preserving machine learning -- 1.4.1 Use of differential privacy -- 1.4.2 Local differential privacy -- 1.4.3 Privacy-preserving synthetic data generation -- 1.4.4 Privacy-preserving data mining techniques -- 1.4.5 Compressive privacy -- 1.5 How is this book structured? …”
Libro electrónico