Mostrando 2,881 - 2,900 Resultados de 2,927 Para Buscar '"Vector"', tiempo de consulta: 0.08s Limitar resultados
  1. 2881
    Publicado 2019
    “…You'll then use neural networks to extract sophisticated vector representations of words, before going on to cover various types of recurrent networks, such as LSTM and GRU. …”
    Libro electrónico
  2. 2882
    Publicado 2019
    “…In the concluding chapters, the book demonstrates how to use arrays, maps, enums, and vector operations. Finally, you'll learn how to build a basic VR game. …”
    Libro electrónico
  3. 2883
    Publicado 2020
    “…You'll then learn how to classify data using techniques such as k-nearest neighbor (KNN) and support vector machine (SVM) classifiers. As you progress, you'll explore various decision trees by learning how to build a reliable decision tree model that can help your company find cars that clients are likely to buy. …”
    Libro electrónico
  4. 2884
    Publicado 2019
    “…What you will learn Understand various preprocessing techniques for solving deep learning problems Build a vector representation of text using word2vec and GloVe Create a named entity recognizer and parts-of-speech tagger with Apache OpenNLP Build a machine translation model in Keras Develop a text generation application using LSTM Build a trigger word detection application using an attention model Who this book is for If you're an aspiring data scientist looking for an introduction to deep learning in the NLP domain, this is just the book for you. …”
    Libro electrónico
  5. 2885
    Publicado 2012
    “…Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security Use a layered (defense-in-depth) approach that builds on underlying network security design Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security Complete coverage of Cisco IP Telephony encryption and authentication fundamentals Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors Se..…”
    Libro electrónico
  6. 2886
    por Andurlekar, Hrishikesh
    Publicado 2023
    “…What you will learn Brush up your vector mathematics skills Access and create namespaces in Niagara Add a Niagara system to a Blueprint actor Create a particle system with dynamic inputs Publish a custom module for your team members to use Create Niagara Scratch modules Enable your particle emitters to communicate using event handlers Control Niagara systems using Blueprint public variables Who this book is for This book is for visual effects artists transitioning to real-time virtual production workflow as well as beginners looking to learn Niagara for games and other real-time applications. …”
    Libro electrónico
  7. 2887
    Publicado 2024
    “…What you will learn Find out non-functional requirements crucial for software security, performance, and reliability Develop the skills to identify and model vulnerabilities in software design and analysis Analyze and model various threat vectors that pose risks to software applications Acquire strategies to mitigate security threats specific to web applications Address threats to the database layer of an application Trace non-functional requirements through secure software design Who this book is for Many software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. …”
    Libro electrónico
  8. 2888
    Publicado 2024
    “…Written by a highly qualified professional with significant experience in the field, Stepping Through Cybersecurity Risk Management includes information on: Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards Cybersecurity measures and metrics, and corresponding key risk indicators The role of humans in security, including the "three lines of defense" approach, auditing, and overall human risk management Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, Stepping Through Cybersecurity Risk Management is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field. …”
    Libro electrónico
  9. 2889
    Publicado 2024
    “…What you will learn Understand how to use masks, layer adjustments, and work non-destructively with your images Use photo retouching techniques to enhance your images, revive old photos, and apply effects Use brushes effectively and learn how to create custom brushes for specific tasks and effects Apply different selections for removing backgrounds and objects from photos Utilize the principles of color theory to craft visually stunning compositions Draw stunning vector and bitmap formats for coloring, rendering, and finished illustrations Who this book is for This book is for photographers, illustrators, graphic designers, hobbyists, and students in need of alternative graphic design software suitable for digital imaging and more. …”
    Libro electrónico
  10. 2890
    por Institute of Medicine (U.S.)
    Publicado 2014
    “…The poorest people in the world are also the sickest; they are most exposed to disease vectors and infection. Nevertheless, they are less likely to access health services. …”
    Libro electrónico
  11. 2891
  12. 2892
    Publicado 2021
    Acceso restringido usuarios UPSA
    Libro electrónico
  13. 2893
    Publicado 2015
    “…Los capítulos del libro: Introducción - Parte 1: Un lenguaje jerárquico - Introducción al lenguaje XML - La importancia de la validación - Relax NG - Navegar en los documentos XML - Presentación de XQuery - SAML: intercambios seguros con XML - Optimización des XML: el EXI - Aplicación - Parte 2: Las aplicaciones del XML - Las transformaciones - CSS y XLS: aplicación - Parte 3: XLM y la Web - Los servicios web - El protocolo SOAP y los analizadores XML - Xforms - XML y JavaScript - El XML en las interfaces persona-máquina - WML, SMIL, RDF y RSS - Parte 4: Los lenguajes derivados del XML - SVG (Scalable Vector Graphics) - Otros lenguajes derivados del XML…”
    Acceso con credenciales UPSA.
    Libro electrónico
  14. 2894
    Publicado 2016
    “…Third generation psychiatric imaging studies including multimodal approaches, multi-center analyses, mega-analyses, effective connectivity, dynamic causal modelling, support vector machines, structural equation modelling, or graph theory analysis are highly appreciated. …”
    Libro electrónico
  15. 2895
    Publicado 2011
    “…This new edition features the following new techniques/methodologies:. Support Vector Machines (SVM)--developed based on statistical learning theory, they have a large potential for applications in predictive data mining. …”
    Libro electrónico
  16. 2896
    Publicado 2021
    “…Provides insights into the theory, algorithms, implementation, and application of deep-learning techniques for medical images such as transfer learning using pretrained CNNs, series networks, directed acyclic graph networks, lightweight CNN models, deep feature extraction, and conventional machine learning approaches for feature selection, feature dimensionality reduction, and classification using support vector machine, neuro-fuzzy classifiers Covers the various augmentation techniques that can be used with medical images and the CNN-based CAC system designs for binary classification of medical images focusing on chest radiographs Investigates the development of an optimal CAC system design with deep feature extraction and classification of chest radiographs by comparing the performance of 12 different CAC system designs…”
    Libro electrónico
  17. 2897
    Publicado 2024
    “…While basic knowledge of software and security is required to understand the attack vectors and defensive techniques explained in the book, a thorough understanding of API security is all you need to get started…”
    Libro electrónico
  18. 2898
    Publicado 2024
    “…What you will learn Explore Kubernetes Secrets, related API objects, and CRUD operations Understand the Kubernetes Secrets limitations, attack vectors, and mitigation strategies Explore encryption at rest and external secret stores Build and operate a production-grade solution with a focus on business continuity Integrate a Secrets Management solution in your CI/CD pipelines Conduct continuous assessments of the risks and vulnerabilities for each solution Draw insights from use cases implemented by large organizations Gain an overview of the latest and upcoming Secrets management trends Who this book is for This handbook is a comprehensive reference for IT professionals to design, implement, operate, and audit Secrets in applications and platforms running on Kubernetes. …”
    Libro electrónico
  19. 2899
    Publicado 2023
    “…By the end of the course, you will not only strengthen your C# scripting skills but also expand your knowledge across diverse areas, from data structures and object pooling to vectors, quaternions, and object-oriented programming in C#. …”
    Video
  20. 2900
    Publicado 2024
    “…It gradually transforms you into an adept strategist, providing insights into the attacker's mindset, revealing vulnerabilities from an adversarial perspective, and guiding the creation of a proactive defense strategy through meticulous mapping of attack vectors. Toward the end, the book addresses the ever-evolving threat landscape, exploring emerging dangers and emphasizing the crucial human factor in security awareness and training. …”
    Libro electrónico