Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Artificial intelligence 72
- Botany 68
- Development 43
- Application software 41
- Robots 33
- Botánica 30
- Python (Computer program language) 28
- Programming 26
- Computer programs 23
- Computer security 22
- Design and construction 22
- Computer networks 21
- Computer programming 21
- Security measures 19
- Botanica Fisiologia Publicaciones periodicas 18
- Cloud computing 16
- Data processing 16
- Natural language processing (Computer science) 16
- History 15
- Botanica Publicaciones periodicas 14
- Machine learning 14
- Robotics 14
- Management 13
- Computer software 12
- Artificial Intelligence 11
- Historia 11
- Information technology 11
- LEGO Mindstorms toys 11
- Microsoft .NET Framework 11
- Automation 10
-
441
-
442Publicado 2016“…In Anknüpfung an die vielfältige historische Erforschung der Kommemorierung von Kriegen sowie der damit einhergehenden Formen von Erinnerungspolitik widmet sich dieser Sammelband einer Thematisierung des Völkerschlachtereignisses in den Gedächtniskulturen Ost(mittel)europas. Konkreten Anlass dazu bot das Leipziger Doppeljubiläum: jenes der Schlacht im Jahre 1813 sowie das der Einweihung des Völkerschlachtdenkmals im Jahre 1913. …”
Libro electrónico -
443
-
444
-
445
-
446por Rouxel Dolivet, Sylvie
Publicado 2004Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad de Navarra)Libro -
447Tabla de Contenidos: “…Chapter 1: The Three Pillars of Cybersecurity -- Chapter 2: A Nuance on Lateral Movement -- Chapter 3: The Five A’s of Enterprise IAM -- Chapter 4: Understanding Enterprise Identity -- Chapter 5: BOTS -- Chapter 6: Identity Governance Defined -- Chapter 7: The Identity Governance Process -- Chapter 8: Meeting Regulatory Compliance Mandates -- Chapter 9: Indicators of Compromise -- Chapter 10: Identity Attack Vectors -- Chapter 11: Identity Management Controls in the Cyber Kill Chain -- Chapter 12: Identity Management Program Planning -- Chapter 13: Privileged Access Management -- Chapter 14: Just-In-Time Access Management -- Chapter 15: Identity Obfuscation -- Chapter 16: System for Cross-domain Identity Management (SCIM) -- Chapter 17: Remote Access -- Chapter 18: Identity-Based Threat Response -- Chapter 19: Biometric Risks Related to Identities -- Chapter 20: Blockchain and Identity Management -- Chapter 21: Conclusion…”
Libro electrónico -
448Publicado 2019Tabla de Contenidos: “…Part III The Future Rules Chapter 11 Predicting Future Trends Chapter 12 Don't Become a Human Bot! Part IV Their Rules (Case Studies) Chapter 13 Case Studies Final Word Your Business Story…”
Libro electrónico -
449por Griffin, Terry, 1962-Tabla de Contenidos: “…The Record/Play BlockThe Remote Control Tool; Conclusion; 5: Sensors; Using the Sensors; The Touch Sensor; The BumperBot Program; The Sound Sensor; BumperBot with Sound; The Light and Color Sensors; The RedOrBlue Program; The Ultrasonic Sensor; Door Chime; The Rotation Sensor; The BumperBot2 Program; Conclusion; 6: Program Flow; The Sequence Beam; The Switch Block; The Loop Block; The Keep Alive Block; The Stop Block; Conclusion; 7: The WallFollower Program: Navigating a Maze; Pseudocode; Solving a Maze; Program Requirements; Assumptions; Initial Design; Following a Straight Wall…”
Publicado 2010
Libro electrónico -
450
-
451
-
452
-
453por Abélès, Marc“…Joseph, B. Lassus, M. Le Bot, J.C. Lefeuvre, S. Le Poulichet, J.P. Milot, J. de Montgolfier, K. …”
Publicado 2015
Electrónico -
454Publicado 2020Tabla de Contenidos: “…-- Using an API to Get Data -- Answering a Research Question Using Data -- Summary -- 3 GETTING DATA WITH CODE -- Writing Your First Script -- Running a Script -- Planning Out a Script -- Libraries and pip -- Creating a URL-based API Call -- Storing Data in a Spreadsheet -- Running the Finished Script -- Dealing with API Pagination -- Templates: How to Make Your Code Reusable -- Summary -- 4 SCRAPING YOUR OWN FACEBOOK DATA -- Your Data Sources -- Downloading Your Facebook Data -- Reviewing the Data and Inspecting the Code -- Analyzing HTML Code to Recognize Patterns -- Writing Data into a Spreadsheet -- Running the Script -- Summary -- 5 SCRAPING A LIVE SITE -- Messy Data -- Scraping from a Live Website -- Summary -- PART II: DATA ANALYSIS -- 6 INTRODUCTION TO DATA ANALYSIS -- The Process of Data Analysis -- Bot Spotting -- Getting Started with Google Sheets -- Modifying and Formatting the Data -- Aggregating the Data -- Sorting and Filtering the Data -- Merging Data Sets -- Other Ways to Use Google Sheets -- Summary -- 7 VISUALIZING YOUR DATA -- Understanding Our Bot Through Charts -- Conditional Formatting -- Summary -- 8 ADVANCED TOOLS FOR DATA ANALYSIS -- Using Jupyter Notebook -- What Is pandas? …”
Libro electrónico -
455
-
456Publicado 2021“…Next, you will understand how to build bots and integrate them within the Teams environment for internal users. …”
Libro electrónico -
457
-
458
-
459
-
460