Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Application software 116
- Development 112
- Twitter 100
- Social media 98
- Internet marketing 83
- Online social networks 78
- Marketing 49
- Computer networks 46
- Design 44
- Management 44
- Web site development 44
- Engineering & Applied Sciences 42
- Computer Science 35
- Internet 35
- Python (Computer program language) 35
- Security measures 35
- Web sites 35
- Social aspects 34
- Data mining 32
- Data processing 31
- Programming 28
- Cloud computing 27
- JavaScript (Computer program language) 27
- iPhone (Smartphone) 27
- Computer programming 25
- Computer security 25
- Mobile computing 25
- Xarxes socials en línia 25
- Java (Computer program language) 24
- Operating systems (Computers) 24
-
901Publicado 2016Tabla de Contenidos: “…Handling the upload -- Serving the images -- The Avatar implementation for local files -- Supporting different file types -- Refactoring and optimizing our code -- Replacing concrete types with interfaces -- Changing interfaces in a test-driven way -- Fixing the existing implementations -- Global variables versus fields -- Implementing our new design -- Tidying up and testing -- Combining all three implementations -- Summary -- Chapter 4: Command-Line Tools to Find Domain Names -- Pipe design for command-line tools -- Five simple programs -- Sprinkle -- Domainify -- Coolify -- Synonyms -- Using environment variables for configuration -- Consuming a web API -- Getting domain suggestions -- Available -- Composing all five programs -- One program to rule them all -- Summary -- Chapter 5: Building Distributed Systems and Working with Flexible Data -- The system design -- The database design -- Installing the environment -- Introducing NSQ -- NSQ driver for Go -- Introducing MongoDB -- MongoDB driver for Go -- Starting the environment -- Reading votes from Twitter -- Authorization with Twitter -- Extracting the connection -- Reading environment variables -- Reading from MongoDB -- Reading from Twitter -- Signal channels -- Publishing to NSQ -- Gracefully starting and stopping programs -- Testing -- Counting votes -- Connecting to the database -- Consuming messages in NSQ -- Keeping the database updated -- Responding to Ctrl + C -- Running our solution -- Summary -- Chapter 6: Exposing Data and Functionality through a RESTful Data Web Service API -- RESTful API design -- Sharing data between handlers -- Context keys -- Wrapping handler functions -- API keys -- Cross-origin resource sharing -- Injecting dependencies -- Responding -- Understanding the request -- Serving our API with one function -- Using handler function wrappers -- Handling endpoints…”
Libro electrónico -
902Publicado 2018Tabla de Contenidos: “….) -- MEDIDAS DE LA FOTO DE PORTADA EN FACEBOOK -- DISTRIBUCIÓN DE LA FOTO DE PORTADA EN FACEBOOK -- DISTRIBUCIÓN DE LA PÁGINA DE PERFIL DE TWITTER -- REDES SOCIALES -- CAPÍTULO IV FACEBOOK: LA HIDRA DE DIEZ MIL CABEZAS -- PERFILACIÓN CRIMINAL PSICPOST: LA PSICOLOGÍA DEL QUE (...) -- LAS GALERÍAS DE LA INFAMIA: NARCISISMO Y SEXUALIDAD (...) -- LA PLAZA PÚBLICA O EL CIRCO DE LAS REDES SOCIALES -- EL FENÓMENO DE LA CRIMINALIDAD EN LAS REDES SOCIALES -- CUTTING -- ESCARIFICACIONES -- LA FRONTERA DEL CRIMEN Y EL DELITO -- CAPÍTULO V CAMPO SEMÁNTICO Y ANÁLISIS DEL DISCURSO EN LAS REDES (...) -- CAMPO SEMÁNTICO: QUÉ POSTEAMOS O QUÉ QUEREMOS (...) -- DOS ENFOQUES CON RESPECTO AL TÉRMINO IDIOMA -- EJEMPLOS DE CAMPO SEMÁNTICO -- IGNIFICADO PRAGMÁTICO -- EL CONCEPTO DE REPRESENTACIÓN -- CAPÍTULO VI EL PSICÓLOGO FORENSE UTILIZANDO EL MÉTODO PSICPOST (CASO DE...) -- PERFILACIÓN CRIMINAL PSICPOST -- LOS POSTS COMO TEST PROYECTIVO -- EL SIGNIFICADO DE LA ROTACIÓN DE LA FOTO DE PERFIL -- MATRICIDIO Y FRATICIDIO DE ANASTASIA LECHTCHENKO -- CONCLUSIÓN -- BIBLIOGRAFÍA…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
903Publicado 2016Tabla de Contenidos: “…56 2.3 Newsletter im Fokus 60 2.4 Journalisten informieren 67 2.5 Souverän auf Kritik reagieren 70 3.1 Menschen da abholen, wo sie sind 72 3.2 Content-Strategie 78 3.3 Social Media im Überblick 83 3.4 Social-Media-Management 86 3.5 Facebook im Fokus 89 3.6 Interview "Auf Facebook erreicht man auch alte Menschen" 96 3.7 Twitter im Fokus 99 3.8 YouTube im Fokus 103 4.1 Richtig bitten mit Brief, Bild und Video 108 4.2 "Wenn jetzt jeder einen Euro spendet, dann " 114 4.3 Kampagnenplanung 118 4.4 Interview "Wir hatten großes Vertrauen in unsere Megafone" 121 5.1 Persönlich, schnell und kreativ 124 6.1 Dauerspender finden und binden 132 6.2 Interview Caritas und SyrienHilfe e.V. …”
Libro electrónico -
904Publicado 2016Tabla de Contenidos: “…12: Tweeque: Identifying Social Cliques for Location Mining13: Understanding News Queries with Geo-Content Using Twitter; 14: Our Approach to Studying Privacy in Social Networks; 15: Classification of Social Networks Incorporating Link Types; 16: Extending Classification of Social Networks through Indirect Friendships; 17: Social Network Classification through Data Partitioning; 18: Sanitization of Social Network Data for Release to Semitrusted Third Parties; 19: Access Control for Social Networks; 20: Implementation of an Access Control System for Social Networks…”
Libro electrónico -
905Publicado 2020Tabla de Contenidos: “…Multivariate Time Series as Images: Imputation Using Convolutional Denoising Autoencoder -- Dual Sequential Variational Autoencoders for Fraud Detection -- A Principled Approach to Analyze Expressiveness and Accuracy of Graph Neural Networks -- Efficient Batch-Incremental Classification Using UMAP for Evolving Data Streams -- GraphMDL: Graph Pattern Selection Based on Minimum Description Length -- Towards Content Sensitivity Analysis -- Gibbs Sampling Subjectively Interesting Tiles -- Even Faster Exact k-Means Clustering -- Ising-Based Consensus Clustering on Special Purpose Hardware -- Transfer Learning by Learning Projections from Target to Source -- Computing Vertex-Vertex Dissimilarities Using Random Trees: Application to Clustering in Graphs -- Towards Evaluation of CNN Performance in Semantically Meaningful Latent Spaces -- Vouw: Geometric Pattern Mining Using the MDL Principle -- A Consensus Approach to Improve NMF Document Clustering -- Discriminative Bias for Learning Probabilistic Sentential Decision Diagrams -- Widening for MDL-Based Retail Signature Discovery -- Addressing the Resolution Limit and the Field of View Limit in Community Mining -- Estimating Uncertainty in Deep Learning for Reporting Confidence: An Application on Cell Type Prediction in Testes Based on Proteomics -- Adversarial Attacks Hidden in Plain Sight -- Enriched Weisfeiler-Lehman Kernel for Improved Graph Clustering of Source Code -- Overlapping Hierarchical Clustering (OHC) -- Digital Footprints of International Migration on Twitter -- Percolation-Based Detection of Anomalous Subgraphs in Complex Networks -- A Late-Fusion Approach to Community Detection in Attributed Networks -- Reconciling Predictions in the Regression Setting: an Application to Bus Travel Time Prediction -- A Distribution Dependent and Independent Complexity Analysis of Manifold Regularization -- Actionable Subgroup Discovery and Urban Farm Optimization -- AVATAR - Machine Learning Pipeline Evaluation Using Surrogate Model -- Detection of Derivative Discontinuities in Observational Data -- Improving Prediction with Causal Probabilistic Variables -- DO-U-Net for Segmentation and Counting -- Enhanced Word Embeddings for Anorexia Nervosa Detection on Social Media -- Event Recognition Based on Classification of Generated Image Captions -- Human-to-AI Coach: Improving Human Inputs to AI Systems -- Aleatoric and Epistemic Uncertainty with Random Forests -- Master your Metrics with Calibration -- Supervised Phrase-Boundary Embeddings -- Predicting Remaining Useful Life with Similarity-Based Priors -- Orometric Methods in Bounded Metric Data -- Interpretable Neuron Structuring with Graph Spectral Regularization -- Comparing the Preservation of Network Properties by Graph Embeddings -- Making Learners (More) Monotone -- Combining Machine Learning and Simulation to a Hybrid Modelling Approach -- LiBRe: Label-Wise Selection of Base Learners in Binary Relevance for Multi-Label Classification -- Angle-Based Crowding Degree Estimation for Many-Objective Optimization…”
Libro electrónico -
906Publicado 2016Tabla de Contenidos: “…Introducing loggingDebugging applications; The console; The Node debugger; The debug mode in hapi; Profiling heapdumps; TV; Debugging summary; General production advice; Further learning; Getting started with hapi.js GitHub repo; Hapijs.com; Makemehapi; The hapi community; The hapi discussion repo; Stack Overflow; hapi Gitter channel; @hapijs on Twitter; Read the code!; Summary; Index; hapijs.com/plugins…”
Libro electrónico -
907Publicado 2016Tabla de Contenidos: “…Eine nicht authentifizierte API verwendenAPIs finden; Beispiel: Verwenden der Twitter-APIs; Zugriff auf die APIs erhalten; Twython verwenden; Weiterführendes Material; Kapitel 10 - Arbeiten mit Daten; Erkunden Ihrer Daten; Erkunden eindimensionaler Daten; Zwei Dimensionen; Mehrere Dimensionen; Bereinigen und Umformen; Manipulieren von Daten; Umskalieren; Hauptkomponentenanalyse; Weiterführendes Material; Kapitel 11 - Maschinelles Lernen; Modellieren; Was ist maschinelles Lernen?…”
Libro electrónico -
908Publicado 2015Tabla de Contenidos: “…Your Website Is Your Shop WindowYour Website Is Your Foundation; The Essential Considerations When Building A Website; To Blog or Not to Blog, That is The Question; The Blogging No-Nos; To Use Social Media You Need to Be A Social Being; Beyond Facebook and Twitter; Digital Etiquette; The Art of Sending An E-Mail; In It to Win It: Competitions and Festivals; Your Personal Digital Network; Chapter 4 The Power of the Personal Project; Photo Sketching; The Emotional Project; The Intellectual Project; The Personal Project: Books and Exhibitions; The Golden Age of Publishing: The Photo Book…”
Libro electrónico -
909Publicado 2015Tabla de Contenidos: “…Advantages and disadvantages of using the Integrated Windows Authentication mechanismConfiguring Windows Authentication; Difference between Basic Authentication and Windows authentication; Enabling Windows authentication in Katana; Summary; Chapter 7: Using External Authentication Services with ASP.NET Web API; Using OWIN external authentication services; Creating an ASP.NET MVC Application; Implementing Facebook authentication ; Implementing Twitter authentication; Implementing Google authentication; Implementing Microsoft authentication; Discussing authentication; Summary…”
Libro electrónico -
910por Buchanan, CameronTabla de Contenidos: “…Creating an FTP C2Creating an Twitter C2; Creating a simple Netcat shell; Chapter 9: Reporting; Introduction; Converting Nmap XML to CSV; Extracting links from a URL to Maltego; Extracting e-mails to Maltego; Parsing Sslscan into CSV; Generating graphs using plot.ly; Index…”
Publicado 2015
Libro electrónico -
911Publicado 2015Tabla de Contenidos: “…"" Chapter 10: Introducing Your Site to the World""""Your Website Promotion Plan""; ""Making Your Site Search-Engine Friendly""; ""Registering with Search Engines""; ""Tracking Visitors""; "" Chapter 11: Website Promotion""; ""Spreading the Word""; ""Transforming a Site into a Community""; ""Email Newsletters""; ""Twitter""; ""Facebook""; ""Groups""; "" Chapter 12: Adding a Blog""; ""Understanding Blogs""; ""Getting Started with Blogger""; ""Blog Management""; ""Reviewing Comments""; "" Chapter 13: Making Money with Your Site""; ""Money-Making the Web Way""; ""Google AdSense""…”
Libro electrónico -
912Publicado 2015Tabla de Contenidos:Libro electrónico
-
913por Costello, CashTabla de Contenidos: “…User registration and authentication Widgets; Friendship model; Roles; Help and support; Summary; Chapter 4:Sharing Content; Blogs; Creating a blog post; Embedding photos and files; Publishing; Finding and viewing; Search; Lists of blog posts; RSS feeds; Widget; Commenting; Use cases; Customizations; Bookmarks; Adding a bookmark; Bookmarklet; Viewing; Use cases; File; Uploading a file; Viewing; Use cases; Customizations; The wire; Posting; Viewing; Twitter integration; Use cases; Customizations; Summary; Chapter 5:Communities, Collaboration, and Conversation; Groups; Creating a group…”
Publicado 2012
Libro electrónico -
914por Kadavy, DavidTabla de Contenidos: “…Design for Hackers: Reverse-Engineering Beauty; About the Author; Credits; Acknowledgments; Contents; Introduction; Design as Literacy; The Hacker Attitude; The Gap in Design Knowledge; Part I: Understanding Design; Chapter 1: Why Design Matters; What Design Really Is; What Design Is Not; The Layers of Design; Conclusion; Chapter 2: The Purpose of Design; Visual Design and Its Relation to User Experience Design; Sometimes a Visual Design Is Just Good Enough; Sometimes Visual Design Is Your Advantage; Reverse-Engineering the Twitter User Experience; Knowledge Applied; Part II: Medium and Form…”
Publicado 2011
Libro electrónico -
915por Saltzman, MarcTabla de Contenidos: “…; Rise and Shine; Chapter 9: Ten Great Ways to Use Siri; Reminders by Location; Siri Can Read Your Texts; Post to Facebook, Twitter; It's a Verbal Calculator, Too; Find Your Friends (The Ones You Like); Ask Siri to Play Movie Trailers; Book Restaurant Reservations; Get Directions by Asking for Them; FaceTime with Someone; Faster, Smarter Web Searches; Index…”
Publicado 2013
Libro electrónico -
916Publicado 2015Tabla de Contenidos: “…THE INTERSECTION OF BIG DATA AND LAW ENFORCEMENTCASE EXAMPLE AND WORKSHOP OVERVIEW; SITUATIONAL AWARENESS; TWITTER AS A SOCIAL MEDIA SOURCE OF BIG DATA; SOCIAL MEDIA DATA ANALYZED FOR THE WORKSHOP; TOOLS AND CAPABILITIES PROTOTYPES DURING THE WORKSHOP; LAW ENFORCEMENT FEEDBACK FOR THE SESSIONS; DISCUSSION; ACKNOWLEDGMENTS; REFERENCES; CHAPTER 5 - INTERPRETATION AND INSIDER THREAT: REREADING THE ANTHRAX MAILINGS OF 2001 THROUGH A "BIG DATA" LENS; INTRODUCTION; IMPORTANCE OF THE CASE; THE ADVANCEMENT OF BIG DATA ANALYTICS AFTER 2001; RELEVANT EVIDENCE…”
Libro electrónico -
917Publicado 2015Tabla de Contenidos: “…Target directoryDealing with existing filenames; File transformers; FTP/FTPS; Prerequisites; Downloading files from the FTP server; Incomplete files; Uploading files to the FTP server; Avoiding partially written files; FTP outbound gateway; FTPS support; Social integration; Prerequisites; Receiving tweets; Sending tweets; Twitter search outbound gateway; Enterprise messaging; Prerequisites; Receiving messages - the inbound adapter; The polling adapter; The event-driven adapter; Sending messages - the outbound adapter; Gateway; The inbound gateway; The outbound gateway; HTTP; Prerequisites…”
Libro electrónico -
918Publicado 2015Tabla de Contenidos: “…SummaryChapter 7: ZooKeeper in Action; Projects powered by ZooKeeper; Apache BookKeeper; Apache Hadoop; Apache HBase; Apache Helix; OpenStack Nova; Organizations powered by ZooKeeper; Yahoo!; Facebook; eBay; Twitter; Netflix; Zynga; Nutanix; VMware vSphere Storage Appliance; Summary; Index…”
Libro electrónico -
919Publicado 2014Tabla de Contenidos: “…IntroductionHistory of virtualization; How virtualization works; Hypervisors; Snapshots; Platform as a service; Advantages of PaaS; Building a business; Security considerations; Conclusion; Summary; 6 Social Media; Introduction; History and impact of social networking; Social networking sites; Friendster; MySpace; Facebook; Twitter; Google+; Crowdsourcing; Gamification; Human resources; Security considerations; Conclusion; Summary; Further reading; 7 Mobile Computing; Introduction; Smartphones; Apps; Jailbreaking; Providing mobile access; Physical security; Bring your own device; Boundaries…”
Libro electrónico -
920por Siriwardena, Prabath. authorTabla de Contenidos: “…Service""; ""Discovering and Describing APIs""; ""Managed APIs in Practice""; ""Twitter API""; ""Salesforce API""; ""Summary""; ""Chapter 2: Security by Design""; ""Design Challenges""; ""User Comfort""; ""Performance""; ""Weakest Link""; ""Defense in Depth""; ""Insider Attacks""; ""Security by Obscurity""; ""Design Principles""; ""Least Privilege""; ""Fail-Safe Defaults""…”
Publicado 2014
Libro electrónico