Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Artificial intelligence 72
- Botany 68
- Development 43
- Application software 41
- Robots 33
- Botánica 30
- Python (Computer program language) 28
- Programming 26
- Computer programs 23
- Computer security 22
- Design and construction 22
- Computer networks 21
- Computer programming 21
- Security measures 19
- Botanica Fisiologia Publicaciones periodicas 18
- Cloud computing 16
- Data processing 16
- Natural language processing (Computer science) 16
- History 15
- Botanica Publicaciones periodicas 14
- Machine learning 14
- Robotics 14
- Management 13
- Computer software 12
- Artificial Intelligence 11
- Historia 11
- Information technology 11
- LEGO Mindstorms toys 11
- Microsoft .NET Framework 11
- Automation 10
-
601Publicado 2004“…Welche Möglichkeiten und Grenzen bot die ""Umsiedlerpolitik"" der Sowjets und der KDP/SED in einer weithin entsolidarisierten Nachkriegs-Gesellschaft? …”
Tesis -
602Publicado 2017“…Die Macher des StreetScooter sind anders herangegangen, sie haben den Status quo, der sich ihnen bot, in Frage gestellt. Der herkömmliche Innovationsprozess bei der Entwicklung neuer, nachhaltiger Produkte war in ihren Augen viel zu aufwendig und zu teuer. …”
Libro electrónico -
603
-
604Publicado 2018Tabla de Contenidos: “…Azure Key Vault secrets in ARM templates -- Azure Storage Service Encryption -- Azure Disk Encryption -- Azure SQL Database Security -- Azure Active Directory Managed Service Identity -- Summary -- Questions -- Further reading -- Chapter 11: Governance and Policies -- Technical requirements -- Azure Role-Based Access Control -- Built-in Roles -- Custom Roles -- Creating a Custom Role -- Azure Resource Policies -- Azure AD Privileged Identity Management -- Azure AD Identity Protection -- Azure Security Center -- Advanced Threat Detection -- Azure Endpoint Protection -- Operations Management Suite - Security and Compliance -- Summary -- Questions -- Further reading -- Chapter 12: Artificial Intelligence, IoT, and Media Services -- Technical requirements -- Azure Cognitive Services -- Available services and APIs -- Using the Computer Vision API -- Azure Bot Service -- Creating a Bot from the Azure Portal -- Azure Machine Learning -- Azure IoT Hub -- Azure Event Hub -- Azure IoT Edge -- Azure Stream Analytics -- Azure Time Series Insights -- Azure Media Services -- Azure Media Analytics -- Using the Azure Media Analytics Indexer -- Summary -- Questions -- Further reading -- Chapter 13: Implementing Messaging Solutions -- Technical requirements -- Azure Queue Storage -- Azure Service Bus -- Azure Event Grid -- Routing Events with Azure Event Grid -- Notification Hubs -- Designing an effective messaging architecture -- Summary -- Questions -- Further reading -- Chapter 14: Application Monitoring and Alerting Strategies -- Azure Log Analytics -- Creating a Log Analytics Workspace -- Azure Monitor -- Application Insights -- Azure Service Health -- Azure Advisor -- Address Recommendation from Azure Advisor -- Azure Network Watcher -- Summary -- Questions -- Further reading -- Chapter 15: Exploring Operations Automation Strategies…”
Libro electrónico -
605Publicado 2016“…Armee mit hunderten ehemaligen Wehrmachtsoffizieren eine wichtige Rolle, in deren Rahmen die Deutschen tausende Studien zum Zweiten Weltkrieg verfassten. Dabei bot die sogenannte Historical Division den deutschen Militärs ein sinnstiftendes Betätigungsfeld und äußerst günstige Rahmenbedingungen für die Formulierung einer apologetischen Geschichtsdeutung. …”
Tesis -
606Publicado 1995“…Wiederkehr von Martin Luthers Geburtsjahr bot 1983 Anlaß, sich mit seiner Zeit und den von ihm in Gang gebrachten Entwicklungen, die die Welt so nachhaltig verändert haben, kritisch auseinanderzusetzen. …”
Libro electrónico -
607
-
608por Martínez, Manuel Silvestre
Publicado 1774Biblioteca Episcopal de Plasencia (Otras Fuentes: Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Central de Capuchinos de España)Libro -
609Publicado 2018Tabla de Contenidos: “…. -- See also -- Chapter 7: Natural Language Processing with TF-IDF -- Introduction -- Downloading the therapy bot session text dataset -- Getting ready -- How it works... -- How to do it... -- There's more... -- Analyzing the therapy bot session dataset -- Getting ready -- How to do it... -- How it works... -- Visualizing word counts in the dataset -- Getting ready -- How to do it... -- How it works... -- See also -- Calculating sentiment analysis of text -- Getting ready -- How to do it... -- How it works... -- See also -- Removing stop words from the text -- Getting ready -- How to do it... -- How it works... -- See also -- Training the TF-IDF model -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Evaluating TF-IDF model performance -- Getting ready -- How to do it... -- How it works... -- See also -- Comparing model performance to a baseline score -- How to do it... -- How it works... -- See also -- Chapter 8: Real Estate Value Prediction Using XGBoost -- Downloading the King County House sales dataset -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Performing exploratory analysis and visualization -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Plotting correlation between price and other features -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Predicting the price of a house -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
Libro electrónico -
610por Valk, LaurensTabla de Contenidos: “…; Discovery #3: Move That Bot!; Discovery #4: RoboSpeller!; the sound block; understanding the sound block settings; seeing the sound block in action; Discovery #5: Which Direction Did You Say?!…”
Publicado 2014
Enlace al texto completo en streaming en EBSCOhost
Libro electrónico -
611Publicado 2022Tabla de Contenidos: “…Conventional -- Sole Dependency on Text-Based Bots -- Implementation Scenario: Voice-Based Conversational AI Platform -- Component Process Flow -- Constructed Interaction -- Note -- Appendix C SAS Patents in Text Analytics -- Glossary -- Index -- EULA…”
Libro electrónico -
612Publicado 2016Tabla de Contenidos: “…; Continuous integration; Installing and setting up Xcode Server; Adding bots; Automatic deployment with fastlane; Installing fastlane; Setting up; Summary; Chapter 8: Where to Go from Here; What we have learned so far; Integration tests; UI tests; Behavior-Driven Development; TDD in existing projects; More information about TDD; Summary; Index…”
Libro electrónico -
613Publicado 2015Tabla de Contenidos: “…Open the SimpleBGC GUIAdd the Battery; Connect and Begin Calibration; Modify the Controller Settings; Chapter 4. BubbleBot; Parts, Tools, and Files; Fabricate the Chassis; Assemble the Chassis; Paint the Chassis; Assemble the Fan Mount; Attach Fan to Chassis; Attach the Stepper; Attach the Shaft Coupler to the Axle; Make the Bubble Solution Reservoir; Print the Bubble Wand; Assemble the Bubble Wand; Attach the Bubble Wand; Solder the Headers; Solder the Stepper Wires; Add Power Connections; Connect the Sensor; Add the Fan; Download and Customize the Code…”
Libro electrónico -
614por Schiller, Craig A.Tabla de Contenidos: “…Using Sandbox Tools for Botnets; Introduction; Describing CWSandbox; Examining a Sample Analysis Report; Interpreting an Analysis Report; Bot-Related Findings of Our Live Sandbox; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. …”
Publicado 2007
Libro electrónico -
615Publicado 2009Tabla de Contenidos: “…Tools of the trade; 6. Bots; 7. Symptoms of intrusions; 8. What can you do?…”
Libro electrónico -
616Publicado 2007Tabla de Contenidos: “…Chapter 3: A Tangled WebIntroduction; Attacks on the Web; Hacking into Web Sites; Index Hijacking; DNS Poisoning (Pharming); Malware and the Web: What, Where, and How to Scan; What to Scan; Where to Scan; How to Scan; Parsing and Emulating HTML; Browser Vulnerabilities; Testing HTTP-scanning Solutions; Tangled Legal Web; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Big Bad Botnets; Introduction; Bot Taxonomy; How Botnets are Used; DoS and DDoS ATTACKS; SYNs and Sensibility; UDP Flooding; ICMP Attacks; DNS Reflector Attacks; Managing DoS and DDoS Attacks…”
Libro electrónico -
617Publicado 2008Tabla de Contenidos: “…Chapter 3: Maliciou Macs: Malware and the MacIntroduction; Taxonomy of Malware; Viruses; Worms; Trojan Horses; Rootkits and Stealthkits; Bots and Botnets; Memetic Malware; Pre-OS X Mac Malware; HyperCard Infectors; Application and System Viruses; Trojans; Macro Malware; Heterogeneous Malware Transmission; Worms: AutoStart and After; OS X and Malware; Case Study-OSX/DNSChanger; Self-launching vs. …”
Libro electrónico -
618por Rappin, Noel, 1971-Tabla de Contenidos: “…; Resources; Summary; Chapter 3: Adding Users; Creating Users; User Creation Form; Refactoring Forms Using A FormBuilder; Storing Encrypted Passwords; Authentication; Bot Protection via Authorization Email; CAPTCHA; Sessions and Cookies; Resources; Summary; Chapter 4: Build Tools and Automation; What Rake Can Do for You; What You Can Do for Rake; Continuous Integration; Resources; Summary; Chapter 5: Navigation and Social Networking; Menus and Sidebars; Tagging; Searching; Pagination; Resources; Summary…”
Publicado 2008
Libro electrónico -
619por Thomases, Hollis, 1965-Tabla de Contenidos: “…; Demographics; Individual Users; Bots, Games, and Memes; Small and Home-Based Businesses; Not-for-Profits: Charities, Causes, the Arts, Houses of Worship, and Associations; Academia and Higher Education…”
Publicado 2010
Libro electrónico -
620Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineerspor O'Connor, T. J.Tabla de Contenidos: “…; Building a Port Scanner; TCP Full Connect Scan; Application Banner Grabbing; Threading the Scan; Integrating the Nmap Port Scanner; Building an SSH BotNet with Python; Interacting with SSH Through Pexpect; Brute Forcing SSH Passwords with Pxssh; Exploiting SSH Through Weak Private Keys; Constructing the SSH Botnet; Mass Compromise by Bridging FTP and Web; Building an Anonymous FTP Scanner with Python…”
Publicado 2013
Libro electrónico