Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Cine 758
- Películas de vídeo-Cine 253
- History 217
- Cine clásico 141
- Actors 137
- Politics and government 110
- Películas cinematográficas 92
- Social aspects 91
- Development 82
- Actors i actrius cinematogràfics 79
- Anglès 77
- Cinema per a estrangers 76
- Biografia 69
- Computer security 60
- Actores y actrices de cine 59
- Government policy 59
- Foreign relations 55
- Education 54
- Law and legislation 53
- International relations 50
- Technological innovations 49
- Economic conditions 48
- Cine melodramático 47
- Management 47
- Political aspects 46
- Història 45
- Security measures 45
- Social conditions 45
- Application software 44
- Sociology 43
-
7601por Valérian, Dominique“…El análisis de las fuentes árabes y latinas permite mostrar cómo los actores políticos y económicos contribuyen a la evolución de estas redes, primero en los países islámicos, y luego, a partir del siglo xi, en una economía mundial en desarrollo que conecta África, la Europa latina y Asia. …”
Publicado 2020
Electrónico -
7602por ajías de la Vega, Fernando C“…. - Proyectos, estructuras y modelos económicos en Bolivia y América Latina. - Movimientos, actores y estructuras sociales en Bolivia y America Latina. - Culturas hegemónicas y contraculturas en Bolivia y America Latina. …”
Publicado 2015
Electrónico -
7603Publicado 2016“…These essays in As If: As You Like It, originally commissioned as an introductory guide for students, actors, and admirers of the play, trace the force and virtue of some of the claims of the play that run counter to what is the case--its 'ifs.'…”
Libro electrónico -
7604Publicado 2019“…Sessions focused on machine learning, including Alina Matyukhina's (Canadian Institute for Cybersecurity) reveal of the methods dishonest actors use ML to mimic the coding style of software developers in open source projects; Chakri Cherukuri's (Bloomberg LP) discussion of how to apply machine learning and deep learning techniques in quantitative finance; and Cibele Montez Halasz's (Twitter) description of time..…”
-
7605Publicado 2021“…To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. …”
Libro electrónico -
7606Publicado 2022“…What you will learn Use Dapr to create services, invoking them directly and via pub/sub Discover best practices for working with microservice architectures Leverage the actor model to orchestrate data and behavior Expose API built with Dapr applications via NGINX and Azure API Management Use Azure Kubernetes Service to deploy a sample application Monitor Dapr applications using Zipkin, Prometheus, and Grafana Scale and load test Dapr applications on Kubernetes Get to grips with Azure Container Apps as you combine Dapr with a serverless platform Who this book is for This book is for developers looking to explore and implement microservices architectures in Dapr applications using .NET examples. …”
Libro electrónico -
7607por Whitehouse, Edward“…This demonstrates how it is impossible to make risks go away: it is only possible to reallocate the risk between different actors in the pension system…”
Publicado 2009
Capítulo de libro electrónico -
7608por Organisation for Economic Co-operation and Development.“…Se espera que las instituciones de educación superior se comprometan con otros actores en la región, incluyendo a las empresas privadas y a los pequeños negocios. …”
Publicado 2007
Libro electrónico -
7609Publicado 2016“…Then, you'll learn how to add details such as actors, animation, effects, and so on to the game. …”
Libro electrónico -
7610Publicado 2017“…Using real world examples, you will learn how to design scalable architecture to process and model data - starting from simple concurrency constructs and progressing to actor systems and Apache Spark. After this, you will also learn how to build interactive visualizations with web frameworks. …”
Libro electrónico -
7611Publicado 2016“…Then, you'll learn how to add details such as actors, animation, effects, and so on to the game. …”
Libro electrónico -
7612Publicado 2019“…You will then learn how to make your own Actors and Components through code and how to handle input and collision events. …”
Libro electrónico -
7613Publicado 2019“…You will also learn about several Reinforcement Learning algorithms, such as SARSA, Deep Q-Networks (DQN), Deep Deterministic Policy Gradients (DDPG), Asynchronous Advantage Actor-Critic (A3C), Trust Region Policy Optimization (TRPO), and Proximal Policy Optimization (PPO). …”
Libro electrónico -
7614Publicado 2018“…What you will learn Train and evaluate neural networks built using TensorFlow for RL Use RL algorithms in Python and TensorFlow to solve CartPole balancing Create deep reinforcement learning algorithms to play Atari games Deploy RL algorithms using OpenAI Universe Develop an agent to chat with humans Implement basic actor-critic algorithms for continuous control Apply advanced deep RL algorithms to games such as Minecraft Autogenerate an image classifier using RL Who this book is for Python Reinforcement Learning Projects is for data analysts, data scientists, and machine learning professionals, who have working knowledge of machine learning techniques and are looking to build better performing, automated, and optimized deep learning models. …”
Libro electrónico -
7615Publicado 2020“…What you will learn Understand the deep learning context of RL and implement complex deep learning models Evaluate RL methods including cross-entropy, DQN, actor-critic, TRPO, PPO, DDPG, D4PG, and others Build a practical hardware robot trained with RL methods for less than $100 Discover Microsoft's TextWorld environment, which is an interactive fiction games platform Use discrete optimization in RL to solve a Rubik's Cube Teach your agent to play Connect 4 using AlphaGo Zero Explore the very latest deep RL research on topics including AI chatbots Discover advanced exploration techniques, including noisy networks and network di..…”
Libro electrónico -
7616Publicado 2015“…What You Will Learn Get to know about functional programming and the value Scala's FP idioms bring to the table Solve day-to-day programming problems using functional programming idioms Cut down the boiler-plate and express patterns simply and elegantly using Scala's concise syntax Tame system complexity by reducing the moving parts Write easier to reason about concurrent code using the actor paradigm and the Akka library Apply recursive thinking and understand how to create solutions without mutation Reuse existing code to compose new behavior Combine the object-oriented and functional programming approaches for effective programming using Scala In Detail Scala is used to construct elegant class hierarchies for maximum code reuse and extensibility and to implement their behavior using higher-order functions. …”
Libro electrónico -
7617Publicado 2023“…El tercer capítol revela el paper de la materialitat en els processos institucionals i com els actors de la comunitat local intenten mantenir les institucions al llarg de les generacions. …”
Accés lliure
Tesis -
7618Publicado 2017“…Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn't protect against, and whether it would be useful in your environment. …”
Libro electrónico -
7619Publicado 2018“…By the end of this Linux security book, you will be able to confidently set up a Linux server that will be much harder for malicious actors to compromise. What you will learn Create locked-down user accounts with strong passwords Configure firewalls with iptables, UFW, nftables, and firewalld Protect your data with different encryption technologies Harden the secure shell service to prevent security break-ins Use mandatory access control to protect against system exploits Harden kernel parameters and set up a kernel-level auditing system Apply OpenSCAP security profiles and set up intrusion detection Configure securely the GRUB 2 bootloader and BIOS/UEFI Who this book is for This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. …”
Libro electrónico -
7620por Bouvier, Claire“…Esta investigación, que pretende revisitar la historia religiosa a través del prisma de la historia cultural y social, ilustra cómo la Compañía de Jesús, institución multipolar cuyo modo de articulación se basaba en la palabra escrita —a la vez medio de negociación y de ajuste constante—, fue capaz de adaptarse continuamente para convertirse en un actor clave de la modernidad temprana. Based on the particular trajectory of the Jesuit author Pedro de Ribadeneyra (1526-1611), both a central figure in the Society of Jesus and a renowned writer of his time, this book examines the complex relationship between writing, religious institution, and literary practices in order to interrogate the figure of the religious writer in the Golden Age. …”
Publicado 2023
Electrónico