Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Science: general issues 924
- Medicine 368
- History 283
- Neurosciences 177
- Psychology 171
- Education 136
- Immunology 133
- Law 125
- Economics 122
- Historia 99
- Botany & plant sciences 93
- Medical microbiology & virology 89
- Microbiology (non-medical) 89
- Physiology 89
- Management 85
- Study and teaching 79
- Philosophy 78
- Pharmacology 71
- Research 66
- History and criticism 65
- Civil engineering, surveying & building 64
- Development 61
- Social aspects 61
- Economic conditions 56
- Medical genetics 56
- Mathematics 50
- Politics and government 50
- Zeitschrift 48
- Application software 47
- Périodiques 45
-
7401Publicado 2016“…Its applications are as broad and varied as mobile smartphone applications themselves. …”
Libro electrónico -
7402Publicado 2016“…What You Will Learn Explore big data technologies and frameworks Work through practical challenges and use cases of real-time analytics versus batch analytics Develop real-word use cases for processing and analyzing data in real-time using the programming paradigm of Apache Storm Develop real-word use cases for processing and analyzing data in real-time using the programming paradigm of Apache Storm Optimize and tune Apache Storm for varied workloads and production deployments Process and stream data with Amazon Kinesis and Elastic MapReduce Perform interactive and exploratory data analytics using Spark SQL Develop common enterprise architectures/applications for real-time and batch analytics In Detail Enterprise has been striving hard to deal with the challenges of data arriving in real time or near real time. …”
Libro electrónico -
7403Publicado 2017“…What You Will Learn Build end-to-end predictive analytics systems in R Build an experimental design to gather your own data and conduct analysis Build a recommender system from scratch using different approaches Use and leverage RShiny to build reactive programming applications Build systems for varied domains including market research, network analysis, social media analysis, and more Explore various R Packages such as RShiny, ggplot, recommenderlab, dplyr, and find out how to use them effectively Communicate modeling results using Shiny Dashboards Perform multi-variate time-series analysis prediction, supplemented with sensitivity analysis and risk modeling In Detail R offers a large variety of packages and libraries for fast and accurate data analysis and visualization. …”
Libro electrónico -
7404Publicado 2019“…By the end of this book, you'll be able to accomplish a varied range of assignments ranging from identifying the most suitable type of NLP task for solving a problem to using a tool like spacy or gensim for performing sentiment analysis. …”
Libro electrónico -
7405Publicado 2019“…What you will learn Understand the important concepts in machine learning and data science Use Python to explore the world of data mining and analytics Scale up model training using varied data complexities with Apache Spark Delve deep into text and NLP using Python libraries such NLTK and gensim Select and build an ML model and evaluate and optimize its performance Implement ML algorithms from scratch in Python, TensorFlow, and scikit-learn Who this book is for If you're a machine learning aspirant, data analyst, or data engineer highly passionate about machine learning and want to begin working on ML assignments, this book is for you. …”
Libro electrónico -
7406Publicado 2013“…Keep in mind that results vary from person to person. This book is not intended as a substitute for medical or nutritional advice from a healthcare provider or dietician. …”
Libro electrónico -
7407Publicado 2016“…R being the most widely used programming language when used with data science can be a powerful combination to solve complexities involved with varied data sets in the real world. The book will provide a computational and methodological framework for statistical simulation to the users. …”
Libro electrónico -
7408Publicado 2015“…What Designers and Data Scientists Can Learn from Each Other Danyel Fisher (Microsoft Research), Miriah Meyer (University of Utah) Why do designers and data scientists vary in the ways that they create visualizations? …”
-
7409Publicado 2015“…Skill Level Intermediate Advanced What You Will Learn The varied pieces of Git's repository Basic Git commands and how to use those pieces The design and performance of Git versus its VCS progenitors Design parallels between Git and Linux How to experiment when Git does something unexpected How to extend Git with new commands Who Should Take This Course For software developers with some experience using a version control system. …”
-
7410Publicado 2024“…What you will learn Distinguish edge concepts, recognizing that definitions vary among different audiences Explore industry-specific architecture patterns that shape custom solutions Analyze three proven edge computing archetypes for real-world scalability Apply best practices judiciously, adapting patterns to meet specific requirements Evaluate data for storage or discarding based on compliance and industry norms Advance from the foundational basics to complex end-to-end edge configurations Gain practical insights for achieving low-latency, high-bandwidth edge solutions Who this book is for Ideal for VPs of IT infrastructure, enterprise architects, solution architects, and SRE professionals with a background in cloud computing, this book is for individuals involved in crafting edge reference architectures and tailored solutions across diverse industries. …”
Libro electrónico -
7411por Hibbeler, Russell“…The text provides a large variety of problems, 30% of which are new, with varying levels of difficulty that cover a broad range of engineering disciplines and stress practical, realistic situations. …”
Publicado 2022
Libro electrónico -
7412WordPress Plugin development cookbook create powerful plugins to extend the world's most popular CMSPublicado 2017“…With new recipes and materials updated for the latest versions of WordPress 4.x, this second edition teaches you how to create plugins of varying complexity ranging from a few lines of code to complex extensions that provide intricate new capabilities. …”
Libro electrónico -
7413Publicado 2017“…Build a variety of awesome robots that can see, sense, move, and do a lot more using the powerful Robot Operating System About This Book Create and program cool robotic projects using powerful ROS libraries Work through concrete examples that will help you build your own robotic systems of varying complexity levels This book provides relevant and fun-filled examples so you can make your own robots that can run and work Who This Book Is For This book is for robotic enthusiasts and researchers who would like to build robot applications using ROS. …”
Libro electrónico -
7414por Hernández, Eleazar. author“…He details how creative teams vary in their concepts and principles, composition, objectives, and processes according to their specific industries and project requirements. …”
Publicado 2017
Libro electrónico -
7415Publicado 2017“…Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control,..…”
Libro electrónico -
7416Publicado 2018“…Throughout the book, you will obtain hands-on experience with varied datasets, such as MNIST, CIFAR-10, PTB, text8, and COCO-Images. …”
Libro electrónico -
7417por Hamilton, J. P.“…Each major type of shell extension gets attention, including: Context menu handlers that can add items to the popup menu that appears when the user right clicks a file. con handlers for displaying per instance icons that, like the standard Recycle Bin icon, vary depending on some condition Property sheet pages, which appear when the user selects the Properties option from a file's context menu. …”
Publicado 2000
Libro electrónico -
7418Publicado 2008“…I believe that Intelligent Mentoring has done a phenomenal job of capturing the innovative and varied mentoring initiatives that IBM has used over the years. …”
Libro electrónico -
7419Publicado 2019“…By the end of this book, you'll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity. What you will learn Explore the fundamentals of ethical hacking Learn how to install and configure Kali Linux Get up to speed with performing wireless network pentesting Gain insights into passive and active information gathering Understand web application pentesting Decode WEP, WPA, and WPA2 encryptions using a variety of methods, such as the fake authentication attack, the ARP request replay attack, and the dictionary attack Who this book is for If you are an IT security professional or a security consultant who wants to get started with penetration testing using Kali Linux 2019.2, then this book is for you. …”
Libro electrónico -
7420Publicado 2020“…It starts with the basics and gradually covers advanced concepts to make it easy to follow for readers with varying levels of NLP proficiency. This comprehensive guide will help you develop a thorough..…”
Libro electrónico