Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,383
- Application software 1,224
- Microsoft .NET Framework 806
- Management 671
- Engineering & Applied Sciences 599
- Web site development 516
- Taxation 482
- Computer Science 473
- Java (Computer program language) 407
- Law and legislation 385
- Computer networks 337
- Economics 330
- Design 329
- Computer programming 326
- Artificial intelligence 318
- Computer software 316
- Microsoft software 312
- Security measures 308
- Web sites 308
- JavaScript (Computer program language) 306
- Python (Computer program language) 300
- Web applications 293
- Computer security 291
- Information technology 272
- Data processing 264
- Programming 261
- Cloud computing 258
- Computer programs 252
- Economic conditions 242
- History 238
-
17741Publicado 2016“…What You Will Learn Write and read a variety of popular file formats used to store scientific data Use Breeze for linear algebra, optimization, and digital signal processing Gain insight into Saddle for data analysis Use ScalaLab for interactive computing Quickly and conveniently write safe parallel applications using Scala's parallel collections Implement and deploy concurrent programs using the Akka framework Use the Wisp plotting library to produce scientific plots Visualize multivariate data using various visualization techniques In Detail Scala is a statically typed, Java Virtual Machine (JVM)-based language with strong support for functional programming. …”
Libro electrónico -
17742Publicado 2017“…Use Java to create a diverse range of Data Science applications and bring Data Science into production About This Book An overview of modern Data Science and Machine Learning libraries available in Java Coverage of a broad set of topics, going from the basics of Machine Learning to Deep Learning and Big Data frameworks. Easy-to-follow illustrations and the running example of building a search engine. …”
Libro electrónico -
17743Publicado 2016“…In Detail Python is one of the most widely used dynamic programming languages, supported by a rich set of libraries and frameworks that enable rapid development. But fast paced development often comes with its own baggage that could bring down the quality, performance, and extensibility of an application. …”
Libro electrónico -
17744por Cohan, Peter S. author“…These courses are based on an original framework for evaluating why a few cities host most startup creation and the rest fail to do so. …”
Publicado 2018
Libro electrónico -
17745Publicado 2017“…Featuring exclusive case studies, unique frameworks, and never before seen research, The Employee Experience Advantage guides readers on a journey of creating a place where people actually want to show up to work. …”
Libro electrónico -
17746Publicado 2016“…What You Will Learn Write Xtext grammar for a DSL; Use Xtend as an alternative to Java to write cleaner, easier-to-read, and more maintainable code; Build your Xtext DSLs easily with Maven/Tycho and Gradle; Write a code generator and an interpreter for a DSL; Explore the Xtext scoping mechanism for symbol resolution; Test most aspects of the DSL implementation with JUnit; Understand best practices in DSL implementations with Xtext and Xtend; Develop your Xtext DSLs using Continuous Integration mechanisms; Use an Xtext editor in a web application In Detail Xtext is an open source Eclipse framework for implementing domain-specific languages together with IDE functionalities. …”
Libro electrónico -
17747Publicado 2015“…Visualisieren Sie das Problem, das Sie zu lösen versuchen, und fokussieren Sie Ihr Team auf die »richtigen« Ergebnisse Vermitteln Sie dem gesamten Produktteam das Designer Toolkit Lassen Sie Ihr Team sehr viel früher als üblich an Ihren Erkenntnissen teilhaben Erstellen Sie MVPs (Minimum Viable Products), um in Erfahrung zu bringen, welche Ideen und Konzepte funktionieren Beziehen Sie die »Stimme des Kunden« in den gesamten Projektzyklus mit ein Kombinieren Sie Lean UX mit dem agilen Scrum-Framework und steigern Sie so die Produktivität Ihres Teams Setzen Sie sich mit den organisatorischen Veränderungen auseinander, die zur Anwendung und Integration der Lean-UX-Methode erforderlich sind…”
Libro electrónico -
17748Publicado 2016“…When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement. …”
Libro electrónico -
17749Publicado 2016“…A review of the Akka framework and Apache Spark clusters concludes the tutorial. …”
Libro electrónico -
17750Publicado 2016“…You will also get information on how to debug and troubleshoot Particle Photon and Electron and set up your own debugging framework for any IoT board. Finally, ..…”
Libro electrónico -
17751Publicado 2016“…What You Will Learn Extract, clean, and transform data Validate the quality of the data and variables in datasets Learn exploratory data analysis Build regression models Implement popular data-mining algorithms Visualize results using popular graphs Publish the results as a dashboard through Interactive Web Application frameworks In Detail Explore the world of Business Intelligence through the eyes of an analyst working in a successful and growing company. …”
Libro electrónico -
17752Publicado 2017“…At the end of the book, other orchestration frameworks, such as Docker Swarm mode, Amazon ECS, and Apache Mesos will be discussed. …”
Libro electrónico -
17753Publicado 2019“…This Learning Path includes content from the following Packt books: Network Scanning Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar Rahalkar What you will learn Explore various standards and frameworks for vulnerability assessments and penetration testing Gain insight into vulnerability scoring and reporting Discover the importance of patching and security hardening Develop metrics to measure the success of a vulnerability management program Perform configuration audits for various platforms using Nessus Write custom Nessus and Nmap scripts on your own Install and configure Nmap and Nessus in your network infrastructure Perform host discovery to identify network devices Who this book is for This Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. …”
Libro electrónico -
17754Publicado 2018“…What You Will Learn Configure a local instance of PySpark in a virtual environment Install and configure Jupyter in local and multi-node environments Create DataFrames from JSON and a dictionary using pyspark.sql Explore regression and clustering models available in the ML module Use DataFrames to transform data used for modeling Connect to PubNub and perform aggregations on streams In Detail Apache Spark is an open source framework for efficient cluster computing with a strong interface for data parallelism and fault tolerance. …”
Libro electrónico -
17755Publicado 2016“…Authors Rich Girgenti and Tim Hedley--two highly experienced professionals at KPMG who daily work with organizations around the globe to help them understand and manage these challenges--draw upon their years of experience in both the private and public sector to provide an overview of the new regulatory and enforcement landscape and a framework for compliance. Assisted by a team of subject matter professionals, the book covers a broad range of topics including: · bribery and corruption · money laundering and trade sanctions · market manipulation · financial reporting fraud · off-shore tax evasion · unfair and abusive consumer finance practices, and · fraud and misconduct in the Healthcare and Life Sciences industries Prudent and diligent organizations must take the necessary steps to preserve the hard-earned value of their companies. …”
Libro electrónico -
17756Publicado 2017“…This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional. …”
Libro electrónico -
17757Publicado 2018“…What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is for This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linu..…”
Libro electrónico -
17758Publicado 2018“…This book will take you on a step-by-step practical journey, covering everything from the mathematical and theoretical aspects of neural networks, to building your own deep neural networks into your applications with the C# and .NET frameworks. This book begins by giving you a quick refresher of neural networks. …”
Libro electrónico -
17759Publicado 2018“…ICOs and the creation of tokens during the craze of 2017 needed a lot of preparation, an understanding of cryptocurrencies and of emerging legal frameworks, but this has spurred a new movement to tokenize the world. …”
Libro electrónico -
17760Publicado 2017“…Next, you’ll find recipes on Authentication, Authorization, and Accounting (AAA) and open and proprietary SDN approaches and frameworks. You will also le..…”
Libro electrónico