Mostrando 641 - 660 Resultados de 833 Para Buscar '"bot"', tiempo de consulta: 0.09s Limitar resultados
  1. 641
    Publicado 2013
    “…Die KSZE-Schlussakte von 1975 markiert eine Zäsur in der Geschichte des Kalten Krieges. Sie bot einen stabilen Rahmen für die Ost-West-Entspannung und entfaltete zugleich enorme gesellschaftliche Wirkungen, da sich zahlreiche Bürger Osteuropas auf die Bestimmungen von Helsinki beriefen, um insbesondere die Einhaltung der Menschenrechte einzufordern. …”
    Libro electrónico
  2. 642
    Publicado 2022
    “…Die siebte Ausgabe der Tagungsreihe „Didattica e Inclusione Scolastica – Inklusion im Bildungsbereich“, welche erstmals unter der Leitung des Kompetenzzentrums für Inklusion im Bildungsbereich der Freien Universität Bozen veranstaltet wurde, bot einen Raum zur Auseinandersetzung mit den Prioritäten einer gerechten und inklusiven Bildung in dieser Zeit. …”
    Libro electrónico
  3. 643
    Publicado 2011
    Tabla de Contenidos: “…Tensiones entrelo público-privado y (...)El sistema de salud, la complementariedad terapéutica y la preeminencia del sector privado; Palabras finales; Bibliografía; Referencias desde Acu.. hasta Bor..; Referencias desde Bot.. hasta Min..; Refrencias desde Org.. hasta Vis..; CAPÍTULO 5; Dar, recibir y devolver a través de instituciones. …”
    Libro electrónico
  4. 644
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Understanding Microservices -- The origins of service-oriented architecture -- The monolithic approach -- The microservice approach -- Microservice benefits -- Separation of concerns -- Smaller projects -- Scaling and deployment -- Pitfalls of microservices -- Illogical splitting -- More network interactions -- Data storing and sharing -- Compatibility issues -- Testing -- Implementing microservices with Python -- How web services work -- The WSGI standard -- Workers, threads, and synchronicity -- A worker pool approach -- Being asynchronous -- Twisted, Tornado, Greenlets, and Gevent -- Asynchronous Python -- Language performance -- Summary -- Chapter 2: Discovering Quart -- Making sure we have Python -- How Quart handles requests -- Routing -- Variables and converters -- The url_for function -- Request -- Response -- Quart's built-in features -- The session object -- Globals -- Signals -- Extensions and middleware -- Templates -- Configuration -- Blueprints -- Error handling -- Custom error handler -- A microservice skeleton -- Summary -- Chapter 3: Coding, Testing, and Documentation: the Virtuous Cycle -- Different kinds of tests -- Unit tests -- Functional tests -- Integration tests -- Load tests -- End-to-end tests -- Using pytest and tox -- Developer documentation -- Tools for documentation -- Version control -- Continuous Integration and Continuous Deployment -- GitHub Actions -- Documentation -- Coveralls -- Badges -- Summary -- Chapter 4: Designing Jeeves -- The Jeeves bot -- User stories -- Monolithic design -- Model -- View and template -- A human-readable view -- Slack workspaces -- Taking actions -- OAuth tokens -- Authentication and authorization -- Background tasks -- Putting together the monolithic design -- Summary -- Chapter 5: Splitting the Monolith…”
    Libro electrónico
  5. 645
    Publicado 2021
    Tabla de Contenidos: “…Part 1 Getting Started with Microsoft Teams -- Chapter 1 Getting Up and Running with Microsoft Teams -- Wrapping Your Head Around Microsoft Teams -- Getting Familiar with Teams Terminology -- Getting Started with the Teams App -- Getting Teams for free -- Getting Teams through Microsoft 365 -- Chapter 2 Navigating Microsoft Teams -- Downloading, Installing, and Opening Teams -- Taking a Quick Spin Around Teams -- Activity -- Chat -- Teams -- Calendar -- Calls -- Files -- Using Teams Across Many Devices and Platforms -- Using Teams to Organize Your Life -- Chapter 3 Starting Your First Team and Managing Settings -- Creating a New Team -- Inviting People to Your Team -- Managing Your Team Settings -- Managing User Settings -- General -- Privacy -- Notifications -- Devices -- Permissions -- Calls -- Part 2 Exploring Chat, Teams, Channels, and Apps -- Chapter 4 Staying Connected to Others with Channels and Chat -- Instant Messaging in Teams -- Sending Messages in Channels -- Creating a New Channel -- Configuring a Channel -- Adding Moderators -- Moving from a Channel to a Chat -- Starting a private chat -- Adding multiple people to a chat -- Giving a chat a title -- Pinning a chat to the top of the list -- Sending More than Text When Chatting -- Adding emojis, GIFs, and stickers -- Adding a file -- Reacting to chat messages -- Chapter 5 Extending Teams with Apps, Bots, and Connectors -- Discovering Apps Already Installed -- The Files tab -- The Wiki tab -- Browsing and Adding Apps -- Exploring Popular Apps -- Popular apps from Microsoft -- Popular apps from third-party companies -- Integrating Teams with Microsoft Power Platform -- Power BI -- Power Apps…”
    Libro electrónico
  6. 646
  7. 647
    por López Villegas, Óscar
    Publicado 2018
    Tabla de Contenidos: “…Sistema móvil y web para el control y seguimiento prenatal de la mujer nicaragüense -- Internet de las Cosas y Roaming internacional -- Diseño e implementación de un prototipo de medición del nivel de agua mediante un sensor ultrasónico -- Kinder: Aplicación Móvil Android Educativa Para Niños de Preescolar -- Reflexión acerca de la Planificación de la Clase, através del Modelo TPACK -- Acercamiento al uso de Bots como interfaz para Internetde las Cosas -- Aplicación web para la gestión de proyectos -- Susurro Project -- BubbleTestChecker -- Infraestructura de acceso a internet en zonas de escaso despliegue -- Talleres -- Desarrollo de vídeo-juego 3D haciendo uso delibrerías de OpenGL -- Seguridad Informática Práctica -- Implementación de tecnologías para el desarrollo y diseño de aplicaciones empresariales mediante -- Publicación de datos geográficos desde bases dedatos relacionales y no relacionales -- Procedimientos -- Pruebas de Benchmark con Yahoo Cloud Serving -- Taller herramientas en la nube para el desarrollo -- Desarrollando una MEAN APP -- Introducción a Node-RED -- Introducción al uso de herramientas de software libre -- Taller de Actividades STEAM -- Introducción al análisis sintáctico con ANTLR4 -- Machine Learning con Python y Tensorflow -- Fundamentos sobre Seguridad Informática y Hacking -- Implementación conjunta de Arduino y AplicacionesXamarín -- Control de motor paso a paso con arduino -- Realidad Aumentada con Vuforia y Unity -- Internet de las Cosas con Angular -- Datawarehouse para Inteligencia de Negocios -- Computación Visual con Python y OpenCV -- Desarrollo de APIs RESTFful con Spring Boo…”
    Libro electrónico
  8. 648
    Publicado 2021
    Tabla de Contenidos: “…-- Creating scrapers -- Running scrapers in parallel -- How to avoid being detected as a bot…”
    Libro electrónico
  9. 649
    Publicado 2014
    “…Und der zweite deutsche Staat, die DDR, von der man in Frankreich lange Zeit außer dem Theater Brechts nicht viel kannte, bot eine ideale Projektionsfläche für Vorstellungen von einem besseren Deutschland. …”
    Tesis
  10. 650
    Publicado 2019
    Tabla de Contenidos: “…-- How to Read This Book -- PART I: ROOTKITS -- 1 WHAT'S IN A ROOTKIT: THE TDL3 CASE STUDY -- History of TDL3 Distribution in the Wild -- Infection Routine -- Controlling the Flow of Data -- The Hidden Filesystem -- Conclusion: TDL3 Meets Its Nemesis -- 2 FESTI ROOTKIT: THE MOST ADVANCED SPAM AND DDOS BOT -- The Case of Festi Botnet -- Dissecting the Rootkit Driver -- The Festi Network Communication Protocol -- Bypassing Security and Forensics Software -- The Domain Generation Algorithm for C&amp -- C Failure -- Malicious Functionality -- Conclusion -- 3 OBSERVING ROOTKIT INFECTIONS -- Methods of Interception -- Restoring the System Kernel -- The Great Rootkits Arms Race: A Nostalgic Note -- Conclusion -- PART II: BOOTKITS -- 4 EVOLUTION OF THE BOOTKIT -- The First Bootkits -- The Evolution of Bootkits -- Modern Bootkits -- Conclusion -- 5 OPERATING SYSTEM BOOT PROCESS ESSENTIALS -- High-Level Overview of the Windows Boot Process -- The Legacy Boot Process -- The Windows Boot Process -- Conclusion -- 6 BOOT PROCESS SECURITY -- The Early Launch Anti-Malware Module -- Microsoft Kernel-Mode Code Signing Policy -- Secure Boot Technology -- Virtualization-Based Security in Windows 10 -- Conclusion -- 7 BOOTKIT INFECTION TECHNIQUES -- MBR Infection Techniques -- VBR/IPL Infection Techniques -- Conclusion -- 8 STATIC ANALYSIS OF A BOOTKIT USING IDA PRO -- Analyzing the Bootkit MBR -- VBR Analysis Techniques -- Advanced IDA Pro Usage: Writing a Custom MBR Loader -- Conclusion -- Exercises -- 9 BOOTKIT DYNAMIC ANALYSIS: EMULATION AND VIRTUALIZATION -- Emulation with Bochs…”
    Libro electrónico
  11. 651
    Publicado 2018
    Tabla de Contenidos: “…Technical requirements -- Artificial neural network overview -- Implementing neural networks in Python -- Deep learning model using PE headers -- Deep learning model with convolutional neural networks and malware visualization -- Convolutional Neural Networks (CNNs) -- Recurrent Neural Networks (RNNs) -- Long Short Term Memory networks -- Hopfield networks -- Boltzmann machine networks -- Malware detection with CNNs -- Promises and challenges in applying deep learning to malware detection -- Summary -- Questions -- Further reading -- Chapter 5: Botnet Detection with Machine Learning -- Technical requirements -- Botnet overview -- Building a botnet detector model with multiple machine learning techniques -- How to build a Twitter bot detector -- Visualization with seaborn -- Summary -- Questions -- Further reading -- Chapter 6: Machine Learning in Anomaly Detection Systems -- Technical requirements -- An overview of anomaly detection techniques -- Static rules technique -- Network attacks taxonomy -- The detection of network anomalies -- HIDS -- NIDS -- Anomaly-based IDS -- Building your own IDS -- The Kale stack -- Summary -- Questions -- Further reading -- Chapter 7: Detecting Advanced Persistent Threats -- Technical requirements -- Threats and risk analysis -- Threat-hunting methodology -- The cyber kill chain -- The diamond model of intrusion analysis -- Threat hunting with the ELK Stack -- Elasticsearch -- Kibana -- Logstash -- Machine learning with the ELK Stack using the X-Pack plugin -- Summary -- Questions -- Chapter 8: Evading Intrusion Detection Systems -- Technical requirements -- Adversarial machine learning algorithms -- Overfitting and underfitting -- Overfitting and underfitting with Python -- Detecting overfitting -- Adversarial machine learning -- Evasion attacks -- Poisoning attacks -- Adversarial clustering -- Adversarial features…”
    Libro electrónico
  12. 652
    por Yescombe, E. R.
    Publicado 2014
    Tabla de Contenidos: “…5.5 Lenders' Due-Diligence and External Advisors5.5.1 Due Diligence; 5.5.2 Legal Advisors; 5.5.3 Lenders' Engineer; 5.5.4 Insurance Advisor; 5.5.5 Model Auditor; 5.5.6 Other Advisors; 5.5.7 Pre-appointment of Lenders' Advisors; 5.5.8 Use of Advisors' Time; 5.6 Lenders and the Public-Procurement Process; 5.6.1 Bank Debt; 5.6.2 Bonds; 6 Types of Project Agreement; 6.1 Introduction; 6.2 BOT, BTO et al.; 6.3 Offtake Contract; 6.3.1 Types of Offtake Contract; 6.3.2 PPA Structure; 6.3.3 Construction Phase; 6.3.4 Operation of the Plant; 6.3.5 Tariff; 6.3.6 Penalties…”
    Libro electrónico
  13. 653
    Publicado 2019
    Tabla de Contenidos: “…Case study: Supervision, failure, chat bots -- Summary -- Chapter 7. Scaling in reactive systems -- 7.1. …”
    Libro electrónico
  14. 654
    Publicado 2018
    Tabla de Contenidos:
    Libro electrónico
  15. 655
    por Bazyluk, Pawel
    Publicado 2024
    Tabla de Contenidos: “…. -- See also -- Adding a ChatBot -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Connecting an Azure OpenAI service to an existing data index -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  16. 656
    por Warren, John-David
    Publicado 2011
    “…The book starts with basic robots and moves into more complex projects, including a GPS-enabled robot, a robotic lawn mower, a fighting bot, and even a DIY Segway-clone. Introduction to the Arduino and other components needed for robotics Learn how to build motor controllers Build bots from simple line-following and bump-sensor bots to more complex robots that can mow your lawn, do battle, or even take you for a ride Please note: the print version of this title is black & white; the eBook is full color…”
    Libro electrónico
  17. 657
    Publicado 2014
    “…This serial is essential reading for all mechanical, chemical and industrial engineers working in the field of heat transfer, graduate schools or industry.Never before have so many authorities provided bot…”
    Libro electrónico
  18. 658
    Publicado 2024
    Tabla de Contenidos: “…Working with LLMs via the Hugging Face Hub -- Create a Hugging Face user access token -- Storing your secrets in an .env file -- Start using open-source LLMs -- Summary -- References -- Chapter 6: Building Conversational Applications -- Technical requirements -- Getting started with conversational applications -- Creating a plain vanilla bot -- Adding memory -- Adding non-parametric knowledge -- Adding external tools -- Developing the front-end with Streamlit -- Summary -- References -- Chapter 7: Search and Recommendation Engines with LLMs -- Technical requirements -- Introduction to recommendation systems -- Existing recommendation systems -- K-nearest neighbors -- Matrix factorization -- Neural networks -- How LLMs are changing recommendation systems -- Implementing an LLM-powered recommendation system -- Data preprocessing -- Building a QA recommendation chatbot in a cold-start scenario -- Building a content-based system -- Developing the front-end with Streamlit -- Summary -- References -- Chapter 8: Using LLMs with Structured Data -- Technical requirements -- What is structured data? …”
    Libro electrónico
  19. 659
  20. 660