Mostrando 43,001 - 43,020 Resultados de 43,382 Para Buscar '"URL"', tiempo de consulta: 0.16s Limitar resultados
  1. 43001
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with JuliaImages -- Technical requirements -- Setting up your Julia -- Installing packages -- Reading images -- Reading a single image from disk -- Reading a single image from a URL -- Reading images in a folder -- Saving images -- Using test images -- Previewing images -- Cropping, scaling, and resizing -- Cropping an image -- Resizing an image -- Scaling an image -- Scaling by percentage -- Scaling to a specific dimension -- Scaling by two-fold -- Rotating images -- Summary -- Questions -- Chapter 2: Image Enhancement -- Technical requirements -- Images as arrays -- Accessing pixels -- Converting images into arrays of numbers -- Converting arrays of numbers into colors -- Changing color saturation -- Converting an image to grayscale -- Creating a custom color filter -- Applying image filters -- Padding images -- Padding with a constant value -- Padding by duplicating content from an image -- Blurring images -- Sharpening images -- Summary -- Questions -- Chapter 3: Image Adjustment -- Technical requirements -- Image binarization -- Fundamental operations -- Image erosion -- Object separation using erosion -- Image preparation for text recognition -- Image dilation -- Merging almost-connected objects -- Highlighting details -- Derived operations -- Image opening -- Image closing -- Top-hat and bottom-hat operation -- Adjusting image contrast -- Summary -- Questions -- Chapter 4: Image Segmentation -- Technical requirements -- Supervised methods -- Seeded region growing -- Identifying a simple object -- Identifying a complex object -- Unsupervised methods -- The graph-based approach -- The fast scanning approach -- Helper functions -- Summary -- Questions -- Further reading -- Chapter 5: Image Representation…”
    Libro electrónico
  2. 43002
    Publicado 2016
    Tabla de Contenidos: “…Simple search engine with result caching -- Cache basics -- Cache invalidation of Redis data -- Using browser localStorage as cache -- Working with streams -- Storing and searching XML documents using PHP -- Using Elasticsearch to search a social network database -- Displaying randomized search engine results -- Summary -- Chapter 5: Creating a RESTful Web Service -- RESTful basics -- REST architectures -- Common HTTP methods and response codes -- First steps with the Slim framework -- Installing Slim -- A small sample application -- Accepting URL parameters -- Accepting HTTP requests with a message body -- The PSR-7 standard -- Middleware -- Implementing the REST service -- Designing the service -- Bootstrapping the project -- Building the persistence layer with MongoDB -- Adding and retrieving users -- Listing and searching users -- Deleting profiles -- Validating input -- Streams and large files -- Profile image upload -- Using GridFS storage -- Summary -- Chapter 6: Building a Chat Application -- The WebSocket protocol -- First steps with Ratchet -- Architectural considerations -- Getting started -- Testing WebSocket applications -- Playing with the event loop -- Implementing the chat application -- Bootstrapping the project server-side -- Bootstrapping the HTML user interface -- Building a simple chat application -- Receiving messages -- Sending messages -- Testing the application -- Keeping the connection from timing out -- Deployment options -- Bridging Ratchet and PSR-7 applications -- Accessing your application via the web server -- Adding authentication -- Creating the login form -- Checking the authorization -- Connecting users and messages -- Summary -- Chapter 7: Building an Asynchronous Microservice Architecture -- The target architecture -- ZeroMQ patterns -- Request/reply pattern -- Publish/subscribe pattern -- Push/pull pattern…”
    Libro electrónico
  3. 43003
    Publicado 2014
    Tabla de Contenidos: “…-- 1.Trust: The Currency of Google -- PageRank -- TrustRank -- Google's Circus -- How to Mine TrustRank -- A Final Word on TrustRank -- 2.The Five Ingredients of Google Optimization -- Ingredient One Keyword Selection -- Take an Informal Survey -- Use the Google AdWords Keyword Planner -- Capitalize on Competitors' Work -- Spend a Few Bucks on a Pay-per-Click Campaign -- Ingredient Two The Meta Page Title -- Maximizing the Effectiveness of Your Meta Page Titles -- Case Study One The Baby Store -- Case Study Two Games -- Ingredient Three Links -- The Psychology of Link Building -- Ingredient Four URL Structure -- Ingredient Five Time -- Final Thoughts -- 3.How to Reel In Links -- Avoiding Bad Neighborhoods -- Link Building 101 -- The Bible of Link Acquisition -- Systematic Emailing -- Link Bait -- 4.Using Time to Gain Trust -- The Sandbox -- Prepublishing Period --…”
    Libro electrónico
  4. 43004
    por Wells, Christopher
    Publicado 2007
    Tabla de Contenidos: “…Cookies and HTTP headers; 3.2.3.3. URL rewriting…”
    Libro electrónico
  5. 43005
    por Kalbach, James
    Publicado 2007
    Tabla de Contenidos: “…LABELING SYSTEMS; 5.3.2. URLS; 5.3.3. PAGE TITLES; 5.3.4. CREATING A FLEXIBLE SCHEME; 5.3.4.2. …”
    Libro electrónico
  6. 43006
    por Wessels, Duane
    Publicado 2004
    Tabla de Contenidos: “…6.1.2.7. myport6.1.2.8. method; 6.1.2.9. proto; 6.1.2.10. time; 6.1.2.11. ident; 6.1.2.12. proxy_auth; 6.1.2.13. src_as; 6.1.2.14. dst_as; 6.1.2.15. snmp_community; 6.1.2.16. maxconn; 6.1.2.17. arp; 6.1.2.18. srcdom_regex; 6.1.2.19. dstdom_regex; 6.1.2.20. url_regex; 6.1.2.21. urlpath_regex; 6.1.2.22. browser; 6.1.2.23. req_mime_type; 6.1.2.24. rep_mime_type; 6.1.2.25. ident_regex; 6.1.2.26. proxy_auth_regex; 6.1.3. …”
    Libro electrónico
  7. 43007
    por Tate, Bruce, 1965-
    Publicado 2011
    Tabla de Contenidos: “…Redirects; 5.5.12. Nothing; 5.5.13. URL Routing; 5.5.14. Filter; 5.5.15. Session/Flash; 5.5.16. …”
    Libro electrónico
  8. 43008
    por Musciano, Chuck
    Publicado 2011
    Tabla de Contenidos: “…2.6.1 Appearance of Text2.6.1.1 Content-based text styles; 2.6.1.2 Physical styles; 2.6.1.3 Special text characters; 2.6.2 Text Structures; 2.6.2.1 Divisions, paragraphs, and line breaks; 2.6.2.2 Headings; 2.6.2.3 Horizontal rules; 2.6.2.4 Preformatted text; 2.7 Hyperlinks; 2.7.1 URLs; 2.7.2 Anchors; 2.7.3 Hyperlink Names and Navigation; 2.7.4 Anchors Beyond; 2.8 Images Are Special; 2.8.1 Inline Images; 2.8.2 Image Maps; 2.9 Lists, Searchable Documents, and Forms; 2.9.1 Unordered, Ordered, and Definition Lists; 2.9.2 Searchable Documents; 2.9.3 Forms; 2.10 Tables; 2.11 Frames…”
    Libro electrónico
  9. 43009
    por Musciano, Chuck
    Publicado 2011
    Tabla de Contenidos: “…2.5.3 Multimedia2.6 Text; 2.6.1 Appearance of Text; 2.6.1.1 Content-based text styles; 2.6.1.2 Physical styles; 2.6.1.3 Special text characters; 2.6.2 Text Structures; 2.6.2.1 Divisions, paragraphs, and line breaks; 2.6.2.2 Headings; 2.6.2.3 Horizontal rules; 2.6.2.4 Preformatted text; 2.7 Hyperlinks; 2.7.1 URLs; 2.7.2 Anchors; 2.7.3 Hyperlink Names and Navigation; 2.7.4 Anchors Beyond; 2.8 Images Are Special; 2.8.1 Inline Images; 2.8.2 Image Maps; 2.9 Lists, Searchable Documents, and Forms; 2.9.1 Unordered, Ordered, and Definition Lists; 2.9.2 Searchable Documents and Forms; 2.10 Tables…”
    Libro electrónico
  10. 43010
    Publicado 2013
    Tabla de Contenidos: “…Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture…”
    Libro electrónico
  11. 43011
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- How to Use This Book -- Chapter 1: Working with Data -- Conversion Between Data Types -- Safe Number Conversion -- Conversion from Number to String and Back -- Boolean Conversions -- String to Data and Back -- Dates, Timestamps, and ISO 8601 Format -- Extracting Data from Dictionaries and Arrays -- Complex Data Types -- Extracting Data from Dictionary -- Extracting Data from Array -- Summary -- Chapter 2: Working with JSON and Other Popular Formats -- How Devices Exchange Data -- What Are Serialization and Deserialization -- Working with JSON -- Parsing JSON to Dictionary or Array -- Generating JSON from Dictionary or Array -- Working with XML -- Parsing XML -- Generating XML -- Working with YAML -- URL-Encoded Strings -- Serialization and Deserialization -- Serializing an Object -- Deserializing an Object -- Coding Keys -- Using @propertyWrapper -- Unit Conversion -- Distance and Length Units -- Area Units -- Volume Units -- Weight Units -- Summary -- Chapter 3: Working with Strings -- Analyzing String Content -- First, Last, and Other Names -- Email Address -- Password -- Phone Number -- Gender -- Date of Birth -- Credit Card Information -- Base64 and Hex Encoding -- Base64 Encoding -- Hex Encoding -- MD5, SHA, and Other Hashes -- MD5 Hash -- SHA Hashes -- Hashable Protocol and Swift Hashes -- Salt -- Integer Indexing -- Localization -- NSLocalizedString Macro -- Files with Translations -- LocalizedStringKey Struct -- Syntactic Sugar -- Summary -- Chapter 4: UIKit and Storyboards -- Navigation Between App Screens -- Screens, Windows, and Views -- Navigation in iOS Apps -- Scenes -- Going Back -- Replacing Root View -- Modifying UINavigationController Stack -- Removing Elements from the Navigation Stack…”
    Libro electrónico
  12. 43012
    Publicado 2023
    Tabla de Contenidos: “…Creating the Exam App Frame and Views -- Connecting Django Views and URLs -- Developing Django Templates -- Running Your Django Application -- Integrating ChatGPT and Django for Quiz Generation -- Building the Quiz Generation Text Area and Submit Button -- Creating ChatGPT API Views with Django -- Storing and Downloading Generated Quizzes -- Saving the Quizzes in an SQLite Database -- Building the Download Quiz View -- Designing the Download Template -- Summary -- Part 3: The ChatGPT, DALL-E, and Whisper APIs for Desktop Apps Development -- Chapter 6: Language Translation Desktop App with the ChatGPT API and Microsoft Word -- Technical Requirements -- Integrating ChatGPT API with Microsoft Office -- Building a User Interface with Tkinter -- Integrating Microsoft Word Text with the ChatGPT API -- Translating a Word Text with ChatGPT 3.5 Turbo -- Summary -- Chapter 7: Building an Outlook Email Reply Generator -- Technical Requirements -- Passing Outlook Data to the ChatGPT API -- Setting Up the Outlook Email -- Accessing Email Data with the win32com Client -- Generating automatic email replies -- Summary -- Chapter 8: Essay Generation Tool with PyQt and the ChatGPT API -- Technical Requirements -- Building a Desktop Application with PyQT -- Setting Up the Essay Generation Tool Project -- Building the Application GUI with PyQt -- Creating Essay Generation Methods with the ChatGPT API -- Controlling the ChatGPT API Tokens -- Summary -- Chapter 9: Integrating ChatGPT and DALL-E API: Build End-to-End PowerPoint Presentation Generator -- Technical Requirements -- Using DALL-E and the DALL-E API -- Building PowerPoint Apps with the PPTX Python Framework -- Generating Art with the DALL-E API -- Finalizing and Testing the AI Presentation Generator -- Summary -- Chapter 10: Speech Recognition and Text-to-Speech with the Whisper API -- Technical Requirements…”
    Libro electrónico
  13. 43013
    Publicado 2010
    Libro
  14. 43014
  15. 43015
  16. 43016
  17. 43017
  18. 43018
  19. 43019
  20. 43020