Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFC 5,514
- PFC 2,817
- TFM 2,674
- Empreses 1,796
- TFG 1,791
- Direcció i administració 1,507
- Gestió de projectes 1,411
- Arquitectura 1,410
- Història 1,175
- Planificació estratègica 1,024
- Planificació 944
- Sistemes d'informació per a la gestió 831
- PFG 772
- TFMP 735
- Arquitectura domèstica 728
- Ensenyament 685
- Innovacions tecnològiques 659
- Llibres de text 593
- Habitatges 550
- Congressos 546
- Edificis 534
- Aspectes socials 490
- Política i govern 453
- Comerç electrònic 452
- Disseny 450
- Pàgines web 428
- Revistes 414
- Educació primària 413
- Xarxes d'ordinadors 401
- Màrqueting 385
-
43001Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with JuliaImages -- Technical requirements -- Setting up your Julia -- Installing packages -- Reading images -- Reading a single image from disk -- Reading a single image from a URL -- Reading images in a folder -- Saving images -- Using test images -- Previewing images -- Cropping, scaling, and resizing -- Cropping an image -- Resizing an image -- Scaling an image -- Scaling by percentage -- Scaling to a specific dimension -- Scaling by two-fold -- Rotating images -- Summary -- Questions -- Chapter 2: Image Enhancement -- Technical requirements -- Images as arrays -- Accessing pixels -- Converting images into arrays of numbers -- Converting arrays of numbers into colors -- Changing color saturation -- Converting an image to grayscale -- Creating a custom color filter -- Applying image filters -- Padding images -- Padding with a constant value -- Padding by duplicating content from an image -- Blurring images -- Sharpening images -- Summary -- Questions -- Chapter 3: Image Adjustment -- Technical requirements -- Image binarization -- Fundamental operations -- Image erosion -- Object separation using erosion -- Image preparation for text recognition -- Image dilation -- Merging almost-connected objects -- Highlighting details -- Derived operations -- Image opening -- Image closing -- Top-hat and bottom-hat operation -- Adjusting image contrast -- Summary -- Questions -- Chapter 4: Image Segmentation -- Technical requirements -- Supervised methods -- Seeded region growing -- Identifying a simple object -- Identifying a complex object -- Unsupervised methods -- The graph-based approach -- The fast scanning approach -- Helper functions -- Summary -- Questions -- Further reading -- Chapter 5: Image Representation…”
Libro electrónico -
43002Publicado 2016Tabla de Contenidos: “…Simple search engine with result caching -- Cache basics -- Cache invalidation of Redis data -- Using browser localStorage as cache -- Working with streams -- Storing and searching XML documents using PHP -- Using Elasticsearch to search a social network database -- Displaying randomized search engine results -- Summary -- Chapter 5: Creating a RESTful Web Service -- RESTful basics -- REST architectures -- Common HTTP methods and response codes -- First steps with the Slim framework -- Installing Slim -- A small sample application -- Accepting URL parameters -- Accepting HTTP requests with a message body -- The PSR-7 standard -- Middleware -- Implementing the REST service -- Designing the service -- Bootstrapping the project -- Building the persistence layer with MongoDB -- Adding and retrieving users -- Listing and searching users -- Deleting profiles -- Validating input -- Streams and large files -- Profile image upload -- Using GridFS storage -- Summary -- Chapter 6: Building a Chat Application -- The WebSocket protocol -- First steps with Ratchet -- Architectural considerations -- Getting started -- Testing WebSocket applications -- Playing with the event loop -- Implementing the chat application -- Bootstrapping the project server-side -- Bootstrapping the HTML user interface -- Building a simple chat application -- Receiving messages -- Sending messages -- Testing the application -- Keeping the connection from timing out -- Deployment options -- Bridging Ratchet and PSR-7 applications -- Accessing your application via the web server -- Adding authentication -- Creating the login form -- Checking the authorization -- Connecting users and messages -- Summary -- Chapter 7: Building an Asynchronous Microservice Architecture -- The target architecture -- ZeroMQ patterns -- Request/reply pattern -- Publish/subscribe pattern -- Push/pull pattern…”
Libro electrónico -
43003Publicado 2014Tabla de Contenidos: “…-- 1.Trust: The Currency of Google -- PageRank -- TrustRank -- Google's Circus -- How to Mine TrustRank -- A Final Word on TrustRank -- 2.The Five Ingredients of Google Optimization -- Ingredient One Keyword Selection -- Take an Informal Survey -- Use the Google AdWords Keyword Planner -- Capitalize on Competitors' Work -- Spend a Few Bucks on a Pay-per-Click Campaign -- Ingredient Two The Meta Page Title -- Maximizing the Effectiveness of Your Meta Page Titles -- Case Study One The Baby Store -- Case Study Two Games -- Ingredient Three Links -- The Psychology of Link Building -- Ingredient Four URL Structure -- Ingredient Five Time -- Final Thoughts -- 3.How to Reel In Links -- Avoiding Bad Neighborhoods -- Link Building 101 -- The Bible of Link Acquisition -- Systematic Emailing -- Link Bait -- 4.Using Time to Gain Trust -- The Sandbox -- Prepublishing Period --…”
Libro electrónico -
43004por Wells, ChristopherTabla de Contenidos: “…Cookies and HTTP headers; 3.2.3.3. URL rewriting…”
Publicado 2007
Libro electrónico -
43005por Kalbach, JamesTabla de Contenidos: “…LABELING SYSTEMS; 5.3.2. URLS; 5.3.3. PAGE TITLES; 5.3.4. CREATING A FLEXIBLE SCHEME; 5.3.4.2. …”
Publicado 2007
Libro electrónico -
43006por Wessels, DuaneTabla de Contenidos: “…6.1.2.7. myport6.1.2.8. method; 6.1.2.9. proto; 6.1.2.10. time; 6.1.2.11. ident; 6.1.2.12. proxy_auth; 6.1.2.13. src_as; 6.1.2.14. dst_as; 6.1.2.15. snmp_community; 6.1.2.16. maxconn; 6.1.2.17. arp; 6.1.2.18. srcdom_regex; 6.1.2.19. dstdom_regex; 6.1.2.20. url_regex; 6.1.2.21. urlpath_regex; 6.1.2.22. browser; 6.1.2.23. req_mime_type; 6.1.2.24. rep_mime_type; 6.1.2.25. ident_regex; 6.1.2.26. proxy_auth_regex; 6.1.3. …”
Publicado 2004
Libro electrónico -
43007por Tate, Bruce, 1965-Tabla de Contenidos: “…Redirects; 5.5.12. Nothing; 5.5.13. URL Routing; 5.5.14. Filter; 5.5.15. Session/Flash; 5.5.16. …”
Publicado 2011
Libro electrónico -
43008por Musciano, ChuckTabla de Contenidos: “…2.6.1 Appearance of Text2.6.1.1 Content-based text styles; 2.6.1.2 Physical styles; 2.6.1.3 Special text characters; 2.6.2 Text Structures; 2.6.2.1 Divisions, paragraphs, and line breaks; 2.6.2.2 Headings; 2.6.2.3 Horizontal rules; 2.6.2.4 Preformatted text; 2.7 Hyperlinks; 2.7.1 URLs; 2.7.2 Anchors; 2.7.3 Hyperlink Names and Navigation; 2.7.4 Anchors Beyond; 2.8 Images Are Special; 2.8.1 Inline Images; 2.8.2 Image Maps; 2.9 Lists, Searchable Documents, and Forms; 2.9.1 Unordered, Ordered, and Definition Lists; 2.9.2 Searchable Documents; 2.9.3 Forms; 2.10 Tables; 2.11 Frames…”
Publicado 2011
Libro electrónico -
43009por Musciano, ChuckTabla de Contenidos: “…2.5.3 Multimedia2.6 Text; 2.6.1 Appearance of Text; 2.6.1.1 Content-based text styles; 2.6.1.2 Physical styles; 2.6.1.3 Special text characters; 2.6.2 Text Structures; 2.6.2.1 Divisions, paragraphs, and line breaks; 2.6.2.2 Headings; 2.6.2.3 Horizontal rules; 2.6.2.4 Preformatted text; 2.7 Hyperlinks; 2.7.1 URLs; 2.7.2 Anchors; 2.7.3 Hyperlink Names and Navigation; 2.7.4 Anchors Beyond; 2.8 Images Are Special; 2.8.1 Inline Images; 2.8.2 Image Maps; 2.9 Lists, Searchable Documents, and Forms; 2.9.1 Unordered, Ordered, and Definition Lists; 2.9.2 Searchable Documents and Forms; 2.10 Tables…”
Publicado 2011
Libro electrónico -
43010Publicado 2013Tabla de Contenidos: “…Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture…”
Libro electrónico -
43011Publicado 2022Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- How to Use This Book -- Chapter 1: Working with Data -- Conversion Between Data Types -- Safe Number Conversion -- Conversion from Number to String and Back -- Boolean Conversions -- String to Data and Back -- Dates, Timestamps, and ISO 8601 Format -- Extracting Data from Dictionaries and Arrays -- Complex Data Types -- Extracting Data from Dictionary -- Extracting Data from Array -- Summary -- Chapter 2: Working with JSON and Other Popular Formats -- How Devices Exchange Data -- What Are Serialization and Deserialization -- Working with JSON -- Parsing JSON to Dictionary or Array -- Generating JSON from Dictionary or Array -- Working with XML -- Parsing XML -- Generating XML -- Working with YAML -- URL-Encoded Strings -- Serialization and Deserialization -- Serializing an Object -- Deserializing an Object -- Coding Keys -- Using @propertyWrapper -- Unit Conversion -- Distance and Length Units -- Area Units -- Volume Units -- Weight Units -- Summary -- Chapter 3: Working with Strings -- Analyzing String Content -- First, Last, and Other Names -- Email Address -- Password -- Phone Number -- Gender -- Date of Birth -- Credit Card Information -- Base64 and Hex Encoding -- Base64 Encoding -- Hex Encoding -- MD5, SHA, and Other Hashes -- MD5 Hash -- SHA Hashes -- Hashable Protocol and Swift Hashes -- Salt -- Integer Indexing -- Localization -- NSLocalizedString Macro -- Files with Translations -- LocalizedStringKey Struct -- Syntactic Sugar -- Summary -- Chapter 4: UIKit and Storyboards -- Navigation Between App Screens -- Screens, Windows, and Views -- Navigation in iOS Apps -- Scenes -- Going Back -- Replacing Root View -- Modifying UINavigationController Stack -- Removing Elements from the Navigation Stack…”
Libro electrónico -
43012Publicado 2023Tabla de Contenidos: “…Creating the Exam App Frame and Views -- Connecting Django Views and URLs -- Developing Django Templates -- Running Your Django Application -- Integrating ChatGPT and Django for Quiz Generation -- Building the Quiz Generation Text Area and Submit Button -- Creating ChatGPT API Views with Django -- Storing and Downloading Generated Quizzes -- Saving the Quizzes in an SQLite Database -- Building the Download Quiz View -- Designing the Download Template -- Summary -- Part 3: The ChatGPT, DALL-E, and Whisper APIs for Desktop Apps Development -- Chapter 6: Language Translation Desktop App with the ChatGPT API and Microsoft Word -- Technical Requirements -- Integrating ChatGPT API with Microsoft Office -- Building a User Interface with Tkinter -- Integrating Microsoft Word Text with the ChatGPT API -- Translating a Word Text with ChatGPT 3.5 Turbo -- Summary -- Chapter 7: Building an Outlook Email Reply Generator -- Technical Requirements -- Passing Outlook Data to the ChatGPT API -- Setting Up the Outlook Email -- Accessing Email Data with the win32com Client -- Generating automatic email replies -- Summary -- Chapter 8: Essay Generation Tool with PyQt and the ChatGPT API -- Technical Requirements -- Building a Desktop Application with PyQT -- Setting Up the Essay Generation Tool Project -- Building the Application GUI with PyQt -- Creating Essay Generation Methods with the ChatGPT API -- Controlling the ChatGPT API Tokens -- Summary -- Chapter 9: Integrating ChatGPT and DALL-E API: Build End-to-End PowerPoint Presentation Generator -- Technical Requirements -- Using DALL-E and the DALL-E API -- Building PowerPoint Apps with the PPTX Python Framework -- Generating Art with the DALL-E API -- Finalizing and Testing the AI Presentation Generator -- Summary -- Chapter 10: Speech Recognition and Text-to-Speech with the Whisper API -- Technical Requirements…”
Libro electrónico -
43013Publicado 2010Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro
-
43014por Arendt, Hannah, 1906-1975
Publicado 2015Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto, Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
43015
-
43016Ignacio de Loyola y la espiritualidad oriental guía para la lectura de los "Ejercicios Espirituales"por Spidlík, Tomás, 1919-2010
Publicado 2008Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad de Deusto, Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz)Libro -
43017
-
43018
-
43019
-
43020por Rodríguez Arribas, Josefina
Publicado 2011Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad de Deusto)Libro