Mostrando 1,001 - 1,020 Resultados de 1,368 Para Buscar '"Twitter"', tiempo de consulta: 0.10s Limitar resultados
  1. 1001
    por Brand, Alexander
    Publicado 2014
    “…Auch widerspricht er einer technologiefixierten Lesart, wie sie bei der Rede vom »CNN-Effekt« oder der »Twitter-Revolution« dominiert. Auf der Basis eines modifizierten konstruktivistischen Ansatzes für die Internationalen Beziehungen erläutert die Studie, wo genau sich Medieneffekte in internationalen politischen Dynamiken niederschlagen - und zeigt, dass dies weder einseitig gerichtet noch mit durchweg erwartbaren Konsequenzen geschieht »Eine detaillierte und fundierte Diskussion des aktuellen Theoriestandes zur Verknüpfung von Massenmedien und (internationaler) Politik bzw. …”
    Libro electrónico
  2. 1002
    por Michaelsen, Marcus
    Publicado 2014
    “…Ob »Twitter-Revolution« oder »Cyberdemokratie« - häufig prägen Schlagworte die Debatte zum politischen Potenzial des Internets. …”
    Libro electrónico
  3. 1003
    Publicado 2016
    Tabla de Contenidos: “…Chapter 12: Social Patterns -- Adding web pages -- Including a link -- Configuring WebSettings and JavaScript -- Writing HTML for WebViews -- Connecting with Facebook -- Adding the Facebook SDK -- Obtaining a Facebook App ID -- Adding a LikeView -- Content builders -- Integrating Twitter -- Sending tweets -- Summary -- Chapter 13: Distribution Patterns -- Extending platform scope -- Publishing apps -- Generating a signed APK -- Registering as a developer -- Publishing an app on the Google Play store -- Distributing by e-mail and on websites -- Promoting and monetizing apps -- Promoting an app -- Monetizing an app -- In-app billing -- Including an advertisement -- Summary -- Index…”
    Libro electrónico
  4. 1004
    Publicado 2018
    Tabla de Contenidos: “…Technical requirements -- Artificial neural network overview -- Implementing neural networks in Python -- Deep learning model using PE headers -- Deep learning model with convolutional neural networks and malware visualization -- Convolutional Neural Networks (CNNs) -- Recurrent Neural Networks (RNNs) -- Long Short Term Memory networks -- Hopfield networks -- Boltzmann machine networks -- Malware detection with CNNs -- Promises and challenges in applying deep learning to malware detection -- Summary -- Questions -- Further reading -- Chapter 5: Botnet Detection with Machine Learning -- Technical requirements -- Botnet overview -- Building a botnet detector model with multiple machine learning techniques -- How to build a Twitter bot detector -- Visualization with seaborn -- Summary -- Questions -- Further reading -- Chapter 6: Machine Learning in Anomaly Detection Systems -- Technical requirements -- An overview of anomaly detection techniques -- Static rules technique -- Network attacks taxonomy -- The detection of network anomalies -- HIDS -- NIDS -- Anomaly-based IDS -- Building your own IDS -- The Kale stack -- Summary -- Questions -- Further reading -- Chapter 7: Detecting Advanced Persistent Threats -- Technical requirements -- Threats and risk analysis -- Threat-hunting methodology -- The cyber kill chain -- The diamond model of intrusion analysis -- Threat hunting with the ELK Stack -- Elasticsearch -- Kibana -- Logstash -- Machine learning with the ELK Stack using the X-Pack plugin -- Summary -- Questions -- Chapter 8: Evading Intrusion Detection Systems -- Technical requirements -- Adversarial machine learning algorithms -- Overfitting and underfitting -- Overfitting and underfitting with Python -- Detecting overfitting -- Adversarial machine learning -- Evasion attacks -- Poisoning attacks -- Adversarial clustering -- Adversarial features…”
    Libro electrónico
  5. 1005
    Publicado 2016
    “…It's based on the experiences of the author, Yevgeniy (Jim) Brikman, as well as interviews with programmers from some of the most successful startups of the last decade, including Google, Facebook, LinkedIn, Twitter, GitHub, Stripe, Instagram, AdMob, Pinterest, and many others…”
    Libro electrónico
  6. 1006
    Publicado 2023
    Tabla de Contenidos: “…-- Single Sign-On: A Zero Trust Tactic -- OAuth Process -- SAML Process -- Two-Factor Authentication: A Tactic for Zero Trust -- Types of Two-Factor Authentication -- SMS Verification -- Email Verification -- Authenticator Soft Tokens (Like Google Authenticator, ID.me, Blizzard's Battlenet, and LastPass) -- Push Authentication (from Google, Apple, Microsoft, and Twitter) -- Universal 2nd Factor Authentication -- How Secure Is Two Factor Authentication? …”
    Libro electrónico
  7. 1007
    por Belew, Shannon
    Publicado 2012
    “…Covering everything from creating a business plan and building a customer-friendly site to marketing with Facebook and Twitter, this fun and friendly guide features eleven minibooks that cover online business basics, legal and accounting matters, website design, online and operating issues, Internet security, techniques for boosting…”
    Libro electrónico
  8. 1008
    por Spira, Jonathan B.
    Publicado 2011
    “…often in the form of e-mail messages, reports, news, Web sites, RSS feeds, blogs, wikis, instant messages, text messages, Twitter, and video con…”
    Libro electrónico
  9. 1009
    por Eduonix Learning Solutions
    Publicado 2017
    Tabla de Contenidos: “…Adding the footer -- Splitting the header and footer -- Changing the site name -- The post loop -- Adding the theme support function -- Passing the function into action -- Working on index.php for the content post -- Adding the while loop for the post -- Adding an else statement -- Displaying the post content -- Adding a regular post content -- Adding a title to the regular post content -- Adding metadata -- Checking the thumbnail in content post -- Adding a gallery post -- Checking the thumbnail in the gallery post -- Creating an array of attributes -- Adding a new post -- Adding proper proportions to the image -- Adding the category widget and search option -- Adding a function to use the category widget -- Specifying the widget locations -- Registering the widgets -- Styling our category widgets -- Adding the widget to the code -- Removing the title -- Adding the class -- Adding a link at the top of the widgets -- Changing the top margin of the page -- Making the search bar functional -- Working on the single post theme -- Creating a single HTML page -- Making metadata dynamic -- Changing the static image -- Changing the back button, title, and content -- Summary -- Chapter 4: Building a Twitter Bootstrap WordPress Theme -- Building a Bootstrap theme -- Adding the sidebar -- Adding the footer -- Header and footer -- The post loop -- The Featured Image area -- Creating categories -- Formatting the post -- Wrapping the post in an article tag -- Adding content to the post -- Adding a Read More button -- Dealing with post without an image -- Adding a bit of style -- Implementing Navbar -- Displaying menu -- Setting the sidebar -- Adding a search bar and single post page -- Dealing with the search box -- Dealing with the single post page -- The comment functionality -- Summary -- Chapter 5: The Foundation E-Commerce Theme…”
    Libro electrónico
  10. 1010
    Publicado 2015
    “…Major websites like GitHub, Hulu, and Twitter have run Rails under the hood, and if you know just enough HTML and CSS to be dangerous, Rails Crash Course will teach you to harness Rails for your own projects and create web applications that are fast, stable, and secure.In Part I, you'll learn Ruby and Rails fundamentals and then dive straight into models, controllers, views, and deployment. …”
    Libro electrónico
  11. 1011
    Publicado 2023
    Tabla de Contenidos: “…Hyperparameters of CNNs -- Image Classification Using a CNN Model Based on LeNet Architecture -- Summary -- Exercise -- References -- Chapter 10: Recurrent Neural Networks (RNNs) for Predictive Analytics -- Recurrent Neural Networks -- Long Short-Term Memory -- Forget Gate -- Input Gate -- Output Gate -- More Details of the LSTM -- Hyperparameters for RNNs -- Summary -- Exercise -- References -- Chapter 11: Recommender Systems for Predictive Analytics -- Content-Based Filtering -- Cosine Similarity -- Collaborative Filtering -- User-Based Collaborative Filtering (UBCF) -- Item-Based Collaborative Filtering (IBCF) -- Hybrid Recommendation Systems -- Examples of Using Hybrid Recommendation Systems -- Summary -- Exercise -- References -- Chapter 12: Architecting Big Data Analytical Pipeline -- Big Data Technology Landscape and Analytics Platform -- Data Pipeline Architecture -- Lambda Architecture -- Twitter and Pinterest's Data Pipeline Architecture -- Design Strategies for Building Customized Big Data Pipeline -- Design Patterns and Pattern Languages -- Summary -- Exercise -- References -- Glossary of Terms -- Index…”
    Libro electrónico
  12. 1012
    Publicado 2024
    Tabla de Contenidos: “…-- Junior CSA -- Senior CSA -- Principal CSA -- Understanding the market and your worth -- Making your resume stand out -- Summary section -- Skills section -- Achievements section -- Relevancy section -- LinkedIn -- Twitter -- GitHub -- Medium -- Preparing interview questions -- Summary -- Additional resources -- Chapter 7: Interviewing - Trust the Process -- Interview success strategies -- Common questions and scenarios worth preparing for -- What experience do you have with designing and implementing cloud-based solutions? …”
    Libro electrónico
  13. 1013
    Publicado 2020
    Tabla de Contenidos: “…Gran Bretaña acusa a Google, Facebook, Twitter y Microsoft deayudar a los terroristas yihadistas ; 3. …”
    Libro electrónico
  14. 1014
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Started with Data Science -- Problems solved using data science -- Understanding the data science problem - solving approach -- Using Java to support data science -- Acquiring data for an application -- The importance and process of cleaning data -- Visualizing data to enhance understanding -- The use of statistical methods in data science -- Machine learning applied to data science -- Using neural networks in data science -- Deep learning approaches -- Performing text analysis -- Visual and audio analysis -- Improving application performance using parallel techniques -- Assembling the pieces -- Summary -- Chapter 2: Data Acquisition -- Understanding the data formats used in data science applications -- Overview of CSV data -- Overview of spreadsheets -- Overview of databases -- Overview of PDF files -- Overview of JSON -- Overview of XML -- Overview of streaming data -- Overview of audio/video/images in Java -- Data acquisition techniques -- Using the HttpUrlConnection class -- Web crawlers in Java -- Creating your own web crawler -- Using the crawler4j web crawler -- Web scraping in Java -- Using API calls to access common social media sites -- Using OAuth to authenticate users -- Handing Twitter -- Handling Wikipedia -- Handling Flickr -- Handling YouTube -- Searching by keyword -- Summary -- Chapter 3: Data Cleaning -- Handling data formats -- Handling CSV data -- Handling spreadsheets -- Handling Excel spreadsheets -- Handling PDF files -- Handling JSON -- Using JSON streaming API -- Using the JSON tree API -- The nitty gritty of cleaning text -- Using Java tokenizers to extract words -- Java core tokenizers -- Third-party tokenizers and libraries…”
    Libro electrónico
  15. 1015
    por Ávalos, Mariano
    Publicado 2010
    Tabla de Contenidos: “…Redes sociales digitales; 3.6. Microblogging: Twitter; 3.7. Wikis; 4. Podcast; 5. Marcadores sociales: del.icio.us; 6. …”
    Libro electrónico
  16. 1016
    por McFedries, Paul
    Publicado 2012
    Tabla de Contenidos: “…Install a Program Using the App StoreWrite a Note; Pin a Note to the Desktop; Create a Reminder; Create a New Reminder List; Sign In to Your Twitter Account; Send a Tweet; Share Information with Other People; Work with the Notification Center; Connect to a Wireless Network; Chapter 10: Viewing and Editing Photos; View a Preview of a Photo; View a Slide Show of Your Photos; Open and Close iPhoto; Import Photos from a Digital Camera; View Your Photos; Create an Album; Crop a Photo; Rotate a Photo; Straighten a Photo; Remove Red Eye from a Photo; Add Names to Faces in Your Photos…”
    Libro electrónico
  17. 1017
    por McFedries, Paul
    Publicado 2014
    Tabla de Contenidos:
    Libro electrónico
  18. 1018
    por McFedries, Paul
    Publicado 2012
    Tabla de Contenidos: “…; Managing Your Contacts; Managing Your Appointments; Working with Notes and Reminders; Customizing the Notification Center; Chapter 5: How Do I Use MacBook Air to Set Up My Online Accounts?; Using Twitter; Working with Flickr; Setting Up Vimeo; Getting More Out of iCloud; Chapter 6: Can MacBook Air Help Me Communicate More Effectively?…”
    Libro electrónico
  19. 1019
    por Applegate, Jane
    Publicado 2011
    Tabla de Contenidos: “…Sell Your Company to an Industry Giant; Chapter 3: Technology and Telecommunications; 63. Twitter for Business: Tips from Guy Kawasaki; 64. …”
    Libro electrónico
  20. 1020
    por Hart-Davis, Guy
    Publicado 2014
    Tabla de Contenidos: “…Manage Your Instant MessagesShare Your Updates Using Twitter; Post Updates on Facebook; Chat Face to Face Using FaceTime; Chapter 6: Working with Apps; Customize the Home Screen; Organize Apps with Folders; Switch Quickly from One App to Another; Find the Apps You Need Using Your iPad; Find the Apps You Need Using Your Computer; Update and Remove Apps; Manage Automatic Downloads and Your Apple ID; Install an App Provided by an Administrator; Cut, Copy, and Paste Text; Bold, Italicize, Underline, and Replace Text; Chapter 7: Browsing the Web and Sending E-Mail; Browse the Web with Safari…”
    Libro electrónico