Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Ensenyament 379
- Mss 291
- Educació 211
- Educació infantil 194
- Revistes 168
- Experiències 138
- Personajes célebres 129
- Historia 122
- Música 105
- Educació primària 81
- Educació física 80
- History 79
- Biblia 71
- Artificial intelligence 70
- Matemàtica 70
- Derecho 68
- Història 64
- Mestres 63
- Derecho internacional 62
- Infants 50
- Llenguatge i llengües 50
- Escoles bressol 49
- Escoles 47
- Educació infantil (Primer cicle) 44
- Intervius 44
- Bíblia 43
- Formació 42
- Innovacions 42
- Lectura 42
- Avaluació educativa 37
-
4981por Pérez Chávez, JoséTabla de Contenidos: “….) -- SECCIÓN II PERMISOS PRE VIOS, CUPOS Y MARCADO DE PAÍS DE ORI GEN -- SECCIÓN III OTRAS ME DI DAS DE RE GU LA CIÓN AL CO MER CIO EX TE RIOR Y NOR (...) -- TITULO V PRÁC TI CAS DES LEA LES DE CO MER CIO IN TER NA CIO NAL CAPITULO I (...) -- CAPITULO II DIS CRI MI NA CIÓN DE PRE CIOS -- CAPITULO III SUB VEN CIO NES -- CAPITULO IV DAÑO A UNA RAMA DE PRO DUCCIÓN NACIONAL -- TITULO VI ME DI DAS DE SAL VA GUAR DA CAPITULO UNICO -- TITULO VII PRO CE DI MIEN TOS EN MA TE RIA DE PRÁC TI CAS DES LEA LES DE CO (...) -- CAPITULO II PRO CE DI MIEN TO EN MA TE RIA DE PRÁC TI CAS DES LEA LES DE CO (...) -- SECCIÓN II RE SO LU CIÓN FINAL -- SECCIÓN III AU DIEN CIA CON CI LIA TO RIA -- SECCIÓN IV CUO TAS COM PEN SA TO RIAS -- SECCIÓN V COM PRO MI SOS DE EX POR TA DO RES Y GO BIER NOS -- CAPITULO III PRO CE DI MIEN TO EN MA TE RIA DE ME DI DAS DE SAL VA GUAR DA (...) -- SECCIÓN II CIR CUNS TAN CIAS CRÍ TI CAS -- CAPITULO IV OTRAS DIS PO SI CIO NES CO MU NES A LOS PRO CE DI MIEN TOS -- CAPITULO V PRO CE DI MIEN TOS ESPE CIA LES -- TITULO VIII PRO MO CIÓN DE EXPOR TA CIO NES CAPITULO I DIS PO SI CIO NES GE (...) -- CAPITULO II INSTRU MEN TOS DE PRO MO CIÓN -- TITULO IX INFRAC CIO NES, SAN CIO NES Y RE CUR SOS CAPITULO I INFRAC CIO NES (...) -- CAPITULO II RE CUR SO DE RE VO CA CIÓN -- REGLAMENTO DE LA LEY DE COMERCIO EXTERIOR -- TITULO I DIS PO SI CIO NES PRE LI MI NA RES CAPITULO UNICO -- TITULO II CO MI SIÓN DE CO MER CIO EX TE RIOR CAPITULO I ES TRUC TU RA…”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4982Publicado 2023Tabla de Contenidos: “…-- Posting and Algorithmic Hacks -- Automating Your Content -- Chapter 18 Key Points -- Chapter 19 Handling Online Criticism and Hate -- Step 1: Anticipating the Hate -- Step 2: Filtering the Hate -- Step 3: Learning to Love Your Haters -- Chapter 19 Key Points -- Chapter 20 TikTok Goes the Clock -- Fierce Loyalty and a Forgiving Algorithm -- Gen Z's "Come as You Are" Comfort -- The Odds Are in Your Favor -- Chapter 20 Key Points -- Chapter 21 A Crash Course on Virality -- Conducting Viral Research -- Creating Viral-Worthy Content -- Maintaining Viral Momentum -- Monetizing the Virality -- Chapter 21 Key Points -- Part IV Financial Freedom -- Chapter 22 Key Concepts for Investing Your Money -- Investing Is Personal -- If You Can Make It, You Can Invest It -- The World of Investing Is Gate-Kept with Intimidation Tactics -- Chapter 22 Key Points -- Chapter 23 Seeing Yourself as a Financially Free Person -- Step 1: Acknowledging Your Current Wealth Roadblocks -- Step 2: Using Manifestation and Affirmations -- Step 3: Having Gratitude -- Chapter 23 Key Points -- Chapter 24 The Benefits of Systems That Work in Your Place -- Believing You Can Make the Switch to Passive Income -- The Point of Passive No Return -- The Money-Retention Balancing Act -- Chapter 24 Key Points -- Chapter 25 The "Seven Streams of Income" Rule -- How Do We Know the Average Millionaire Has Seven Streams of Income? …”
Libro electrónico -
4983Publicado 2014“…The focus is on Business Agility Readiness in terms of the five major changes affecting the information technology landscape, and how data-driven delivery platforms and decision-making processes are being reinvented using digital relationships with a social business model as the consumer world of technology drives innovation and collaboration.Cloud computing, social media, next-gen mobility, streaming video, and big data with predictive analytics are major forces now for a competitive advantage, and Creating Business Agility provides leaders with a roadmap for readiness. …”
Libro electrónico -
4984Publicado 2023“…This book helps you explore Detectron2, Facebook's next-gen library providing cutting-edge detection and segmentation algorithms. …”
Libro electrónico -
4985Publicado 2018Libro electrónico
-
4986Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: An Introduction to Microsoft Fabric -- Chapter 1: Overview of Microsoft Fabric and Understanding Its Different Concepts -- Introduction to Microsoft Fabric -- Reviewing the core capabilities of Microsoft Fabric -- Complete analytics platform -- Lake-centric and open -- Empower every business user -- AI powered -- Unified business model with universal compute capacity -- Summary -- Chapter 2: Understanding Different Workloads and Getting Started with Microsoft Fabric -- Getting started with Microsoft Fabric -- Enabling Microsoft Fabric -- Checking your access to Microsoft Fabric -- Creating your first Fabric-enabled workspace -- Data Factory -- Pipelines -- Activities -- Connections -- Dataflow Gen2 -- Loading data -- Data engineering -- Lakehouse -- Spark Job Definition -- Data Warehouse -- Simplifying the Data Warehouse experience -- Open and lake-centric -- Combining the lakehouse and data warehouse -- Loading data -- Querying the warehouse -- Data Science -- SynapseML -- MLflow integration -- FLAML integration for automated ML (AutoML) -- Data Wrangler -- Semantic Link -- Real-Time Analytics -- Eventstreams -- KQL databases -- KQL queryset -- Power BI -- Reports -- Datasets -- Direct Lake -- Summary -- Part 2: Building End-to-End Analytics Systems -- Chapter 3: Building an End-to-End Analytics System - Lakehouse -- Technical requirements -- Understanding end-to-end scenarios -- Understanding the end-to-end architecture -- Understanding sample data and data models -- Understanding data and transformation flow -- Storage -- Ingestion -- Transformation -- Importing notebooks -- Creating a shortcut (for Files): Silver zone -- Opening notebook and executing commands (loading to the Silver zone) -- Incremental data load…”
Libro electrónico -
4987A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024Tabla de Contenidos: “…Artificial intelligence (AI) -- Machine learning (ML) -- Natural language processing (NLP) -- Deep learning (DL) -- Generative AI (Gen AI) -- What is responsible AI? -- EU AI Act -- Secure AI framework (SAIF) -- AI and cybersecurity - The good, the bad, and the ugly -- The good -- The bad -- The ugly -- AI bias -- Systematic bias -- Statistical bias -- Human bias -- NIST AI RMF -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
4988Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Preface -- Acknowledgment -- Acronyms -- About the Companion Website -- Part I Transforming Engineering Through Digital and Model-Based Methods -- Chapter 1 Fundamentals of Digital Engineering -- Background -- Surrogate Pilot Experiment Called Skyzer -- Problem -- New Approach -- Skyzer Pilot Context -- Results -- NAVAIR and Skyzer -- Interoperability and Integration Framework (IoIF) -- Related Chapters -- Chapter 2: Mission and Systems Engineering Methods -- Chapter 3: Transforming Systems Engineering Through Integrating M& -- S and Digital Thread -- Chapter 4: Digital Engineering Visualization Technologies and Techniques -- Chapter 5: Interactive Model-Centric Systems Engineering -- Future Work -- Notes -- References -- Biographical Sketches -- Chapter 2 Mission and Systems Engineering Methods -- Problem -- Background -- New Approach -- Skyzer Surrogate Pilot Experiment -- OpenMBEE, DocGen, and View Editor -- NAVSEM -- Model Management and Modularization -- Digital Signoff -- How to Create Digital Signoffs -- Multidisciplinary Design Analysis and Optimization (MDAO) -- Collaborative Management of Research Projects in SysML -- Ontologies -- Results -- Application of DE Metrics to Skyzer Pilot Lessons Learned -- Future Work -- Notes -- References -- Biographical Sketches -- Chapter 3 Transforming Systems Engineering Through Integrating Modeling and Simulation and the Digital Thread -- Introduction -- Background and Motivating Use Case -- Integration Methodology -- Digital Engineering Framework for Integration and Interoperability -- Reasoning and Rules -- Assessment Flow Diagram -- Interoperability and Integration Framework -- Discussion -- Conclusion -- Future Expansion -- Final Thoughts -- Notes -- References -- Biographical Sketches…”
Libro electrónico -
4989Publicado 2022Tabla de Contenidos: “…Further reading -- Chapter 15: Ransomware Investigations -- Ransomware initial access and execution -- Initial access -- Execution -- Discovering credential access and theft -- ProcDump -- Mimikatz -- Investigating post-exploitation frameworks -- Command and Control -- Security Onion -- RITA -- Arkime -- Investigating lateral movement techniques -- Summary -- Questions -- Further reading -- Part 5: Threat Intelligence and Hunting -- Chapter 16: Malware Analysis for Incident Response -- Malware analysis overview -- Malware classification -- Setting up a malware sandbox -- Local sandbox -- Cloud sandbox -- Static analysis -- Static properties analysis -- Dynamic analysis -- Process Explorer -- Process Spawn Control -- Automated analysis -- ClamAV -- YARA -- YarGen -- Summary -- Questions -- Further reading -- Chapter 17: Leveraging Threat Intelligence -- Threat intelligence overview -- Threat intelligence types -- The Pyramid of Pain -- The threat intelligence methodology -- Sourcing threat intelligence -- Internally developed sources -- Commercial sourcing -- Open source intelligence -- The MITRE ATT& -- CK framework -- Working with IOCs and IOAs -- Threat intelligence and incident response -- Autopsy -- Maltego -- YARA and Loki -- Summary -- Questions -- Further reading -- Chapter 18: Threat Hunting -- Threat hunting overview -- Threat hunt cycle -- Threat hunt reporting -- Threat hunting maturity model -- Crafting a hypothesis -- MITRE ATT& -- CK -- Planning a hunt -- Digital forensic techniques for threat hunting -- EDR for threat hunting -- Summary -- Questions -- Further reading -- Appendix -- Assessments -- Index -- About Packt -- Other Books You May Enjoy…”
Libro electrónico -
4990
-
4991Publicado 2017Tabla de Contenidos: “…-- As Andy Greenawalt Says, "You Are Misusing Your Humans -- Do Not Let Sacred Geese Live -- Market Your Market -- Purpose Can Drive Change, Too -- Shift to a Digital Community -- Price Is Only a Concern in the Absence of Value -- Overcoming the Challenges of the Digital Branch Starts with You -- Welcome to Digital Community Banking -- Move over Millennials -- Make Way for iGen -- Beware the Culture Danger -- Understand Your Technology -- Your Foundation Could Be a Bit Shaky -- And So, the Story Goes, "Free Your Data -- A Reliance on Professional Services Means You Get to Focus While Your End Users Get Best-of-Breed Offerings -- It's Not about Having Access to "Data," It's about Focused Direction -- Partner, Don't Incubate -- Skip the Writhing, Pleading, Grasping at Straws Thing -- Be Interested, Not Desperate -- Some Thoughts about Working with Fintech Startups -- Get More Efficient and More Proficient with Partners -- Scale Delivers Results -- For about Fifty Years, the Most Convenient Bank in the United States Was the US Postal Savings System -- Brand Power -- The Average Consumer Cares Very Little about Your Customer Service -- Which Takes Us Back to the Scale of Brands…”
Libro electrónico -
4992Publicado 2012Tabla de Contenidos: “…Columnar Databases -- SQL Accelerators -- Early Adoption Challenges and Benefits -- Architectural Trends for Enterprise Integration -- Concluding Remarks -- References -- Authors -- Chapter 6: Enterprise Mobility Adoption Strategy -- Introduction to Enterprise Mobility -- Need for an Enterprise Mobility Roadmap -- Defining Enterprise Mobility Adoption Strategy -- Business Needs Mobility Roadmap -- Multi Platform Support -- Leverage Mobile Capabilities -- Right Partner -- Technology Options Application Type -- COTS vs Custom Development -- Deployment -- Mandatory Capabilities Smooth Integration -- Comprehensive Security -- Well Designed UI -- Functionalities -- Robust Solutions System Scalability -- Device Diversity Testing -- Network Optimization -- On Demand Scaling -- Major Influencers from Emerging Trends -- Concluding Remarks -- References -- Authors -- Chapter 7: Web as a Platform Patterns and Practices -- Cloud Computing - the Web Platform Enabler -- Internet Integration -- VPN based Integration -- Controlled Integration with Gateways -- A well thought out service Design -- Identity Management and Access Control -- A Business-To-Business scenario -- Social Network scenario -- Data Security -- Encryption during transfer -- Encryption at rest -- Backend data integration -- Business Intelligence -- (Complement in-house BI with web based BI platforms) -- Conclusion -- References -- Authors -- Chapter 8: Self-Management - The Defining Attribute of Next-Gen Architectures -- Self-management - Characteristics and Approaches -- Architecture of self-managing systems -- Component Monitoring and Control -- Component Configuration Management -- Autonomic Goal and Policy Management -- Self-managing Systems - Current State and Emerging Trends -- Conclusion -- References -- Authors -- Chapter 9: Applying Virtualization Concepts in Enterprise IT -- Introduction…”
Libro electrónico -
4993por National Research Council (U.S.).Tabla de Contenidos: “…. -- DNA Sequence Determinations Require Quality Control -- REFERENCES -- 6 The Collection, Analysis, and Distribution of Information and Materials -- PRESENT INFORMATION-HANDLING ORGANIZATIONS -- GenBank/EMBL…”
Publicado 1988
Libro electrónico -
4994Publicado 2023Tabla de Contenidos: “…-- Different types of phishing attacks -- Statistics on the frequency of phishing attacks -- Challenges in detecting phishing emails -- Role of automated detection -- Augmenting existing techniques with natural language processing -- Introducing ELSER -- The role of ELSER in GenAI -- Introduction to the Enron email dataset (ham or spam) -- Seeing ELSER in action -- Hardware consideration -- Downloading the ELSER model in Elastic -- Setting up the index and ingestion pipeline -- Semantic search with ELSER -- Limitations of ELSER -- Summary -- Part 4: Innovative Integrations and Future Directions -- Chapter 9: Retrieval Augmented Generation with Elastic -- Preparing for RAG-enhanced search with ELSER and RRF -- Semantic search with ELSER -- A recap of essential considerations for RAG -- Integrating ELSER with RRF -- Language models and RAG -- In-depth case study-implementing a RAG-enhanced CookBot -- Dataset overview - an introduction to the Allrecipes.com dataset…”
Libro electrónico -
4995Publicado 2015“…« Farah Lenser, Oya, 1/2 (2016) »Ein Standardwerk.« enorm, 6 (2015/16) Besprochen in: www.keimform.de, 21.11.2015, Stefan Meretz Portal für Politikwissenschaft, 04.02.2016, Christian Heuser Gen-ethischer Informationsdienst, 235 (2016), Christof Potthof…”
Libro electrónico -
4996Publicado 2025Tabla de Contenidos: “…The Tradeoffs of Uncensored Models -- Weaponizing Innocent Outputs -- An Inconvenient Truth About Digital Deceptions -- Takeaways -- Chapter 7 The Now and Future of AI-Driven Deception -- Whispers from the Static -- Into the Exploitation Zone -- The Pillars of Deception, Scams, and Crime -- Facts and Frames -- Sometimes They Just Gotta Break Stuff -- AI-Powered Scams: Old Tricks, New Tools -- A Small Tasting Menu of AI-Powered Deceptions -- Emerging Threats -- Existential Threats -- App/System-Based problems -- A Personal Story: How I Created Multiple GenAI-Powered ScamBots -- Finding Hope -- Takeaways -- Chapter 8 Media Literacy in the Age of AI: Your First Line of Defense -- Whispers from the Static -- The Fight for Truth -- A Quick Note before We Jump In -- Means, Motive, and Opportunity -- Media Literacy in the Digital Age: Your Survival Guide to the Information Jungle -- The Four Horsemen of Online Vulnerability: Know Your Enemy -- Your Digital Defense Toolkit: The SIFT Method -- The Emotion Commotion: Taming the Tempest Within -- Deepfakes and Cheapfakes: When Seeing Isn't Believing -- Navigating Out of the Crosshairs -- Your Mission, Should You Choose to Accept It -- The Fact-Checking Paradox: Seeking Truth in a World of Lies -- Why Fact Checking Matters -- The Anatomy of a Good Fact-Check -- The Fact-Checking Ecosystem -- The Challenges and Criticisms -- Navigating the Fact-Checking Minefield -- The Fact-Checking Challenge -- Your Call to Action: Become the Hero of Your Digital Story -- Let's Make it Fun: Digital Literacy Challenges -- Mastering the Art of SIFT -- Emotional Intelligence and Bias Busting -- Deepfakes and Visual Verification -- Collaborative Fact-Checking Challenges -- Takeaways -- Chapter 9 Cognitive and Technical Defense Strategies: Tools for Protection -- Whispers from the Static -- Building Our Cognitive Defenses…”
Libro electrónico -
4997Publicado 2017Tabla de Contenidos:Libro electrónico
-
4998Publicado 2020Tabla de Contenidos: “…GIMP - kostenlose Bildbearbeitung -- Landscape - Bilder auf die passende Breite × Höhe bringen -- Pablo - einfach & -- kostenlos -- PaintShop Pro - der Klassiker -- PicMonkey - Bildbearbeitung & -- Design -- PolyGen - Bilder im Polygonlook -- RelayThat - Automatisierung von Bildgrößen -- Remove.bg - Bildhintergründe entfernen -- Snagit - Screenshots, Screencasts & -- mehr -- Stencil - Templates, Bilder & -- Icons für Social Media und WordPress -- Visme - Infografiken 1, 2, 3 fertig! …”
Libro electrónico -
4999Publicado 2024Tabla de Contenidos: “…Optimizing dataflows -- Gen2 destinations -- Summary -- Chapter 9: Report and Dashboard Design -- Technical requirements -- Optimizing report layout -- Too many elements in a report -- Reduce a busy report -- Reducing queries to the semantic model -- Using the small multiples option -- Interaction optimization for slicing and dicing -- Selecting a value for a slicer -- Disabling interaction when necessary -- Using Top N to limit data -- Moving slicers to the filter pane -- Optimization for dashboard and paginated reports -- Following best practices for dashboards -- Optimizing paginated reports -- Summary -- Part 4: Data Models, Calculations, and Large Semantic Models -- Chapter 10: Dimensional Modeling and Row Level Security -- Technical requirements -- Building efficient models -- The Kimball dimensional model theory -- Designing a basic star schema -- Building a single source of truth -- Reducing dataset size -- Considering many-to-many relationships and bi-directional filtering -- Using bi-directional relationships carefully -- Avoiding pitfalls with row-level security -- General guidance for RLS configuration -- Optimize relationships -- Guidance that applies to dynamic RLS -- Summary -- Chapter 11: Improving DAX -- Technical requirements -- Understanding row and filter context -- Calculated column -- Measure -- Dissecting row context -- Discovering filter context -- Improving the performance of a calculated column -- Improving filter context for a measure -- Understanding DAX pitfalls and optimizations -- Tuning DAX -- DAX guidance -- Summary -- Chapter 12: High Scale Patterns -- Technical requirements -- Scaling with capacities and Azure Analysis Services -- Leveraging Fabric for data scale -- Throttling and smoothing in Fabric capacity -- Leveraging AAS for data and user scale -- Using QSO to achieve higher user concurrency…”
Libro electrónico -
5000Publicado 1991Libro electrónico