Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Application software 116
- Development 112
- Twitter 100
- Social media 98
- Internet marketing 83
- Online social networks 78
- Marketing 49
- Computer networks 46
- Design 44
- Management 44
- Web site development 44
- Engineering & Applied Sciences 42
- Computer Science 35
- Internet 35
- Python (Computer program language) 35
- Security measures 35
- Web sites 35
- Social aspects 34
- Data mining 32
- Data processing 31
- Programming 28
- Cloud computing 27
- JavaScript (Computer program language) 27
- iPhone (Smartphone) 27
- Computer programming 25
- Computer security 25
- Mobile computing 25
- Xarxes socials en línia 25
- Java (Computer program language) 24
- Operating systems (Computers) 24
-
1001por Brand, Alexander“…Auch widerspricht er einer technologiefixierten Lesart, wie sie bei der Rede vom »CNN-Effekt« oder der »Twitter-Revolution« dominiert. Auf der Basis eines modifizierten konstruktivistischen Ansatzes für die Internationalen Beziehungen erläutert die Studie, wo genau sich Medieneffekte in internationalen politischen Dynamiken niederschlagen - und zeigt, dass dies weder einseitig gerichtet noch mit durchweg erwartbaren Konsequenzen geschieht »Eine detaillierte und fundierte Diskussion des aktuellen Theoriestandes zur Verknüpfung von Massenmedien und (internationaler) Politik bzw. …”
Publicado 2014
Libro electrónico -
1002por Michaelsen, Marcus“…Ob »Twitter-Revolution« oder »Cyberdemokratie« - häufig prägen Schlagworte die Debatte zum politischen Potenzial des Internets. …”
Publicado 2014
Libro electrónico -
1003Publicado 2016Tabla de Contenidos: “…Chapter 12: Social Patterns -- Adding web pages -- Including a link -- Configuring WebSettings and JavaScript -- Writing HTML for WebViews -- Connecting with Facebook -- Adding the Facebook SDK -- Obtaining a Facebook App ID -- Adding a LikeView -- Content builders -- Integrating Twitter -- Sending tweets -- Summary -- Chapter 13: Distribution Patterns -- Extending platform scope -- Publishing apps -- Generating a signed APK -- Registering as a developer -- Publishing an app on the Google Play store -- Distributing by e-mail and on websites -- Promoting and monetizing apps -- Promoting an app -- Monetizing an app -- In-app billing -- Including an advertisement -- Summary -- Index…”
Libro electrónico -
1004Publicado 2018Tabla de Contenidos: “…Technical requirements -- Artificial neural network overview -- Implementing neural networks in Python -- Deep learning model using PE headers -- Deep learning model with convolutional neural networks and malware visualization -- Convolutional Neural Networks (CNNs) -- Recurrent Neural Networks (RNNs) -- Long Short Term Memory networks -- Hopfield networks -- Boltzmann machine networks -- Malware detection with CNNs -- Promises and challenges in applying deep learning to malware detection -- Summary -- Questions -- Further reading -- Chapter 5: Botnet Detection with Machine Learning -- Technical requirements -- Botnet overview -- Building a botnet detector model with multiple machine learning techniques -- How to build a Twitter bot detector -- Visualization with seaborn -- Summary -- Questions -- Further reading -- Chapter 6: Machine Learning in Anomaly Detection Systems -- Technical requirements -- An overview of anomaly detection techniques -- Static rules technique -- Network attacks taxonomy -- The detection of network anomalies -- HIDS -- NIDS -- Anomaly-based IDS -- Building your own IDS -- The Kale stack -- Summary -- Questions -- Further reading -- Chapter 7: Detecting Advanced Persistent Threats -- Technical requirements -- Threats and risk analysis -- Threat-hunting methodology -- The cyber kill chain -- The diamond model of intrusion analysis -- Threat hunting with the ELK Stack -- Elasticsearch -- Kibana -- Logstash -- Machine learning with the ELK Stack using the X-Pack plugin -- Summary -- Questions -- Chapter 8: Evading Intrusion Detection Systems -- Technical requirements -- Adversarial machine learning algorithms -- Overfitting and underfitting -- Overfitting and underfitting with Python -- Detecting overfitting -- Adversarial machine learning -- Evasion attacks -- Poisoning attacks -- Adversarial clustering -- Adversarial features…”
Libro electrónico -
1005Publicado 2016“…It's based on the experiences of the author, Yevgeniy (Jim) Brikman, as well as interviews with programmers from some of the most successful startups of the last decade, including Google, Facebook, LinkedIn, Twitter, GitHub, Stripe, Instagram, AdMob, Pinterest, and many others…”
Libro electrónico -
1006Publicado 2023Tabla de Contenidos: “…-- Single Sign-On: A Zero Trust Tactic -- OAuth Process -- SAML Process -- Two-Factor Authentication: A Tactic for Zero Trust -- Types of Two-Factor Authentication -- SMS Verification -- Email Verification -- Authenticator Soft Tokens (Like Google Authenticator, ID.me, Blizzard's Battlenet, and LastPass) -- Push Authentication (from Google, Apple, Microsoft, and Twitter) -- Universal 2nd Factor Authentication -- How Secure Is Two Factor Authentication? …”
Libro electrónico -
1007por Belew, Shannon“…Covering everything from creating a business plan and building a customer-friendly site to marketing with Facebook and Twitter, this fun and friendly guide features eleven minibooks that cover online business basics, legal and accounting matters, website design, online and operating issues, Internet security, techniques for boosting…”
Publicado 2012
Libro electrónico -
1008por Spira, Jonathan B.“…often in the form of e-mail messages, reports, news, Web sites, RSS feeds, blogs, wikis, instant messages, text messages, Twitter, and video con…”
Publicado 2011
Libro electrónico -
1009por Eduonix Learning SolutionsTabla de Contenidos: “…Adding the footer -- Splitting the header and footer -- Changing the site name -- The post loop -- Adding the theme support function -- Passing the function into action -- Working on index.php for the content post -- Adding the while loop for the post -- Adding an else statement -- Displaying the post content -- Adding a regular post content -- Adding a title to the regular post content -- Adding metadata -- Checking the thumbnail in content post -- Adding a gallery post -- Checking the thumbnail in the gallery post -- Creating an array of attributes -- Adding a new post -- Adding proper proportions to the image -- Adding the category widget and search option -- Adding a function to use the category widget -- Specifying the widget locations -- Registering the widgets -- Styling our category widgets -- Adding the widget to the code -- Removing the title -- Adding the class -- Adding a link at the top of the widgets -- Changing the top margin of the page -- Making the search bar functional -- Working on the single post theme -- Creating a single HTML page -- Making metadata dynamic -- Changing the static image -- Changing the back button, title, and content -- Summary -- Chapter 4: Building a Twitter Bootstrap WordPress Theme -- Building a Bootstrap theme -- Adding the sidebar -- Adding the footer -- Header and footer -- The post loop -- The Featured Image area -- Creating categories -- Formatting the post -- Wrapping the post in an article tag -- Adding content to the post -- Adding a Read More button -- Dealing with post without an image -- Adding a bit of style -- Implementing Navbar -- Displaying menu -- Setting the sidebar -- Adding a search bar and single post page -- Dealing with the search box -- Dealing with the single post page -- The comment functionality -- Summary -- Chapter 5: The Foundation E-Commerce Theme…”
Publicado 2017
Libro electrónico -
1010Publicado 2015“…Major websites like GitHub, Hulu, and Twitter have run Rails under the hood, and if you know just enough HTML and CSS to be dangerous, Rails Crash Course will teach you to harness Rails for your own projects and create web applications that are fast, stable, and secure.In Part I, you'll learn Ruby and Rails fundamentals and then dive straight into models, controllers, views, and deployment. …”
Libro electrónico -
1011Publicado 2023Tabla de Contenidos: “…Hyperparameters of CNNs -- Image Classification Using a CNN Model Based on LeNet Architecture -- Summary -- Exercise -- References -- Chapter 10: Recurrent Neural Networks (RNNs) for Predictive Analytics -- Recurrent Neural Networks -- Long Short-Term Memory -- Forget Gate -- Input Gate -- Output Gate -- More Details of the LSTM -- Hyperparameters for RNNs -- Summary -- Exercise -- References -- Chapter 11: Recommender Systems for Predictive Analytics -- Content-Based Filtering -- Cosine Similarity -- Collaborative Filtering -- User-Based Collaborative Filtering (UBCF) -- Item-Based Collaborative Filtering (IBCF) -- Hybrid Recommendation Systems -- Examples of Using Hybrid Recommendation Systems -- Summary -- Exercise -- References -- Chapter 12: Architecting Big Data Analytical Pipeline -- Big Data Technology Landscape and Analytics Platform -- Data Pipeline Architecture -- Lambda Architecture -- Twitter and Pinterest's Data Pipeline Architecture -- Design Strategies for Building Customized Big Data Pipeline -- Design Patterns and Pattern Languages -- Summary -- Exercise -- References -- Glossary of Terms -- Index…”
Libro electrónico -
1012Publicado 2024Tabla de Contenidos: “…-- Junior CSA -- Senior CSA -- Principal CSA -- Understanding the market and your worth -- Making your resume stand out -- Summary section -- Skills section -- Achievements section -- Relevancy section -- LinkedIn -- Twitter -- GitHub -- Medium -- Preparing interview questions -- Summary -- Additional resources -- Chapter 7: Interviewing - Trust the Process -- Interview success strategies -- Common questions and scenarios worth preparing for -- What experience do you have with designing and implementing cloud-based solutions? …”
Libro electrónico -
1013Publicado 2020Tabla de Contenidos: “…Gran Bretaña acusa a Google, Facebook, Twitter y Microsoft deayudar a los terroristas yihadistas ; 3. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1014Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Started with Data Science -- Problems solved using data science -- Understanding the data science problem - solving approach -- Using Java to support data science -- Acquiring data for an application -- The importance and process of cleaning data -- Visualizing data to enhance understanding -- The use of statistical methods in data science -- Machine learning applied to data science -- Using neural networks in data science -- Deep learning approaches -- Performing text analysis -- Visual and audio analysis -- Improving application performance using parallel techniques -- Assembling the pieces -- Summary -- Chapter 2: Data Acquisition -- Understanding the data formats used in data science applications -- Overview of CSV data -- Overview of spreadsheets -- Overview of databases -- Overview of PDF files -- Overview of JSON -- Overview of XML -- Overview of streaming data -- Overview of audio/video/images in Java -- Data acquisition techniques -- Using the HttpUrlConnection class -- Web crawlers in Java -- Creating your own web crawler -- Using the crawler4j web crawler -- Web scraping in Java -- Using API calls to access common social media sites -- Using OAuth to authenticate users -- Handing Twitter -- Handling Wikipedia -- Handling Flickr -- Handling YouTube -- Searching by keyword -- Summary -- Chapter 3: Data Cleaning -- Handling data formats -- Handling CSV data -- Handling spreadsheets -- Handling Excel spreadsheets -- Handling PDF files -- Handling JSON -- Using JSON streaming API -- Using the JSON tree API -- The nitty gritty of cleaning text -- Using Java tokenizers to extract words -- Java core tokenizers -- Third-party tokenizers and libraries…”
Libro electrónico -
1015por Ávalos, MarianoTabla de Contenidos: “…Redes sociales digitales; 3.6. Microblogging: Twitter; 3.7. Wikis; 4. Podcast; 5. Marcadores sociales: del.icio.us; 6. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1016por McFedries, PaulTabla de Contenidos: “…Install a Program Using the App StoreWrite a Note; Pin a Note to the Desktop; Create a Reminder; Create a New Reminder List; Sign In to Your Twitter Account; Send a Tweet; Share Information with Other People; Work with the Notification Center; Connect to a Wireless Network; Chapter 10: Viewing and Editing Photos; View a Preview of a Photo; View a Slide Show of Your Photos; Open and Close iPhoto; Import Photos from a Digital Camera; View Your Photos; Create an Album; Crop a Photo; Rotate a Photo; Straighten a Photo; Remove Red Eye from a Photo; Add Names to Faces in Your Photos…”
Publicado 2012
Libro electrónico -
1017
-
1018por McFedries, PaulTabla de Contenidos: “…; Managing Your Contacts; Managing Your Appointments; Working with Notes and Reminders; Customizing the Notification Center; Chapter 5: How Do I Use MacBook Air to Set Up My Online Accounts?; Using Twitter; Working with Flickr; Setting Up Vimeo; Getting More Out of iCloud; Chapter 6: Can MacBook Air Help Me Communicate More Effectively?…”
Publicado 2012
Libro electrónico -
1019por Applegate, JaneTabla de Contenidos: “…Sell Your Company to an Industry Giant; Chapter 3: Technology and Telecommunications; 63. Twitter for Business: Tips from Guy Kawasaki; 64. …”
Publicado 2011
Libro electrónico -
1020por Hart-Davis, GuyTabla de Contenidos: “…Manage Your Instant MessagesShare Your Updates Using Twitter; Post Updates on Facebook; Chat Face to Face Using FaceTime; Chapter 6: Working with Apps; Customize the Home Screen; Organize Apps with Folders; Switch Quickly from One App to Another; Find the Apps You Need Using Your iPad; Find the Apps You Need Using Your Computer; Update and Remove Apps; Manage Automatic Downloads and Your Apple ID; Install an App Provided by an Administrator; Cut, Copy, and Paste Text; Bold, Italicize, Underline, and Replace Text; Chapter 7: Browsing the Web and Sending E-Mail; Browse the Web with Safari…”
Publicado 2014
Libro electrónico