Mostrando 4,981 - 5,000 Resultados de 5,410 Para Buscar '"gen"', tiempo de consulta: 0.12s Limitar resultados
  1. 4981
    por Pérez Chávez, José
    Publicado 2022
    Tabla de Contenidos: “….) -- SECCIÓN II PERMISOS PRE VIOS, CUPOS Y MARCADO DE PAÍS DE ORI GEN -- SECCIÓN III OTRAS ME DI DAS DE RE GU LA CIÓN AL CO MER CIO EX TE RIOR Y NOR (...) -- TITULO V PRÁC TI CAS DES LEA LES DE CO MER CIO IN TER NA CIO NAL CAPITULO I (...) -- CAPITULO II DIS CRI MI NA CIÓN DE PRE CIOS -- CAPITULO III SUB VEN CIO NES -- CAPITULO IV DAÑO A UNA RAMA DE PRO DUCCIÓN NACIONAL -- TITULO VI ME DI DAS DE SAL VA GUAR DA CAPITULO UNICO -- TITULO VII PRO CE DI MIEN TOS EN MA TE RIA DE PRÁC TI CAS DES LEA LES DE CO (...) -- CAPITULO II PRO CE DI MIEN TO EN MA TE RIA DE PRÁC TI CAS DES LEA LES DE CO (...) -- SECCIÓN II RE SO LU CIÓN FINAL -- SECCIÓN III AU DIEN CIA CON CI LIA TO RIA -- SECCIÓN IV CUO TAS COM PEN SA TO RIAS -- SECCIÓN V COM PRO MI SOS DE EX POR TA DO RES Y GO BIER NOS -- CAPITULO III PRO CE DI MIEN TO EN MA TE RIA DE ME DI DAS DE SAL VA GUAR DA (...) -- SECCIÓN II CIR CUNS TAN CIAS CRÍ TI CAS -- CAPITULO IV OTRAS DIS PO SI CIO NES CO MU NES A LOS PRO CE DI MIEN TOS -- CAPITULO V PRO CE DI MIEN TOS ESPE CIA LES -- TITULO VIII PRO MO CIÓN DE EXPOR TA CIO NES CAPITULO I DIS PO SI CIO NES GE (...) -- CAPITULO II INSTRU MEN TOS DE PRO MO CIÓN -- TITULO IX INFRAC CIO NES, SAN CIO NES Y RE CUR SOS CAPITULO I INFRAC CIO NES (...) -- CAPITULO II RE CUR SO DE RE VO CA CIÓN -- REGLAMENTO DE LA LEY DE COMERCIO EXTERIOR -- TITULO I DIS PO SI CIO NES PRE LI MI NA RES CAPITULO UNICO -- TITULO II CO MI SIÓN DE CO MER CIO EX TE RIOR CAPITULO I ES TRUC TU RA…”
    Libro electrónico
  2. 4982
    Publicado 2023
    Tabla de Contenidos: “…-- Posting and Algorithmic Hacks -- Automating Your Content -- Chapter 18 Key Points -- Chapter 19 Handling Online Criticism and Hate -- Step 1: Anticipating the Hate -- Step 2: Filtering the Hate -- Step 3: Learning to Love Your Haters -- Chapter 19 Key Points -- Chapter 20 TikTok Goes the Clock -- Fierce Loyalty and a Forgiving Algorithm -- Gen Z's "Come as You Are" Comfort -- The Odds Are in Your Favor -- Chapter 20 Key Points -- Chapter 21 A Crash Course on Virality -- Conducting Viral Research -- Creating Viral-Worthy Content -- Maintaining Viral Momentum -- Monetizing the Virality -- Chapter 21 Key Points -- Part IV Financial Freedom -- Chapter 22 Key Concepts for Investing Your Money -- Investing Is Personal -- If You Can Make It, You Can Invest It -- The World of Investing Is Gate-Kept with Intimidation Tactics -- Chapter 22 Key Points -- Chapter 23 Seeing Yourself as a Financially Free Person -- Step 1: Acknowledging Your Current Wealth Roadblocks -- Step 2: Using Manifestation and Affirmations -- Step 3: Having Gratitude -- Chapter 23 Key Points -- Chapter 24 The Benefits of Systems That Work in Your Place -- Believing You Can Make the Switch to Passive Income -- The Point of Passive No Return -- The Money-Retention Balancing Act -- Chapter 24 Key Points -- Chapter 25 The "Seven Streams of Income" Rule -- How Do We Know the Average Millionaire Has Seven Streams of Income? …”
    Libro electrónico
  3. 4983
    Publicado 2014
    “…The focus is on Business Agility Readiness in terms of the five major changes affecting the information technology landscape, and how data-driven delivery platforms and decision-making processes are being reinvented using digital relationships with a social business model as the consumer world of technology drives innovation and collaboration.Cloud computing, social media, next-gen mobility, streaming video, and big data with predictive analytics are major forces now for a competitive advantage, and Creating Business Agility provides leaders with a roadmap for readiness. …”
    Libro electrónico
  4. 4984
    Publicado 2023
    “…This book helps you explore Detectron2, Facebook's next-gen library providing cutting-edge detection and segmentation algorithms. …”
    Libro electrónico
  5. 4985
    Publicado 2018
    Libro electrónico
  6. 4986
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: An Introduction to Microsoft Fabric -- Chapter 1: Overview of Microsoft Fabric and Understanding Its Different Concepts -- Introduction to Microsoft Fabric -- Reviewing the core capabilities of Microsoft Fabric -- Complete analytics platform -- Lake-centric and open -- Empower every business user -- AI powered -- Unified business model with universal compute capacity -- Summary -- Chapter 2: Understanding Different Workloads and Getting Started with Microsoft Fabric -- Getting started with Microsoft Fabric -- Enabling Microsoft Fabric -- Checking your access to Microsoft Fabric -- Creating your first Fabric-enabled workspace -- Data Factory -- Pipelines -- Activities -- Connections -- Dataflow Gen2 -- Loading data -- Data engineering -- Lakehouse -- Spark Job Definition -- Data Warehouse -- Simplifying the Data Warehouse experience -- Open and lake-centric -- Combining the lakehouse and data warehouse -- Loading data -- Querying the warehouse -- Data Science -- SynapseML -- MLflow integration -- FLAML integration for automated ML (AutoML) -- Data Wrangler -- Semantic Link -- Real-Time Analytics -- Eventstreams -- KQL databases -- KQL queryset -- Power BI -- Reports -- Datasets -- Direct Lake -- Summary -- Part 2: Building End-to-End Analytics Systems -- Chapter 3: Building an End-to-End Analytics System - Lakehouse -- Technical requirements -- Understanding end-to-end scenarios -- Understanding the end-to-end architecture -- Understanding sample data and data models -- Understanding data and transformation flow -- Storage -- Ingestion -- Transformation -- Importing notebooks -- Creating a shortcut (for Files): Silver zone -- Opening notebook and executing commands (loading to the Silver zone) -- Incremental data load…”
    Libro electrónico
  7. 4987
    Publicado 2024
    Tabla de Contenidos: “…Artificial intelligence (AI) -- Machine learning (ML) -- Natural language processing (NLP) -- Deep learning (DL) -- Generative AI (Gen AI) -- What is responsible AI? -- EU AI Act -- Secure AI framework (SAIF) -- AI and cybersecurity - The good, the bad, and the ugly -- The good -- The bad -- The ugly -- AI bias -- Systematic bias -- Statistical bias -- Human bias -- NIST AI RMF -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  8. 4988
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Preface -- Acknowledgment -- Acronyms -- About the Companion Website -- Part I Transforming Engineering Through Digital and Model-Based Methods -- Chapter 1 Fundamentals of Digital Engineering -- Background -- Surrogate Pilot Experiment Called Skyzer -- Problem -- New Approach -- Skyzer Pilot Context -- Results -- NAVAIR and Skyzer -- Interoperability and Integration Framework (IoIF) -- Related Chapters -- Chapter 2: Mission and Systems Engineering Methods -- Chapter 3: Transforming Systems Engineering Through Integrating M&amp -- S and Digital Thread -- Chapter 4: Digital Engineering Visualization Technologies and Techniques -- Chapter 5: Interactive Model-Centric Systems Engineering -- Future Work -- Notes -- References -- Biographical Sketches -- Chapter 2 Mission and Systems Engineering Methods -- Problem -- Background -- New Approach -- Skyzer Surrogate Pilot Experiment -- OpenMBEE, DocGen, and View Editor -- NAVSEM -- Model Management and Modularization -- Digital Signoff -- How to Create Digital Signoffs -- Multidisciplinary Design Analysis and Optimization (MDAO) -- Collaborative Management of Research Projects in SysML -- Ontologies -- Results -- Application of DE Metrics to Skyzer Pilot Lessons Learned -- Future Work -- Notes -- References -- Biographical Sketches -- Chapter 3 Transforming Systems Engineering Through Integrating Modeling and Simulation and the Digital Thread -- Introduction -- Background and Motivating Use Case -- Integration Methodology -- Digital Engineering Framework for Integration and Interoperability -- Reasoning and Rules -- Assessment Flow Diagram -- Interoperability and Integration Framework -- Discussion -- Conclusion -- Future Expansion -- Final Thoughts -- Notes -- References -- Biographical Sketches…”
    Libro electrónico
  9. 4989
    Publicado 2022
    Tabla de Contenidos: “…Further reading -- Chapter 15: Ransomware Investigations -- Ransomware initial access and execution -- Initial access -- Execution -- Discovering credential access and theft -- ProcDump -- Mimikatz -- Investigating post-exploitation frameworks -- Command and Control -- Security Onion -- RITA -- Arkime -- Investigating lateral movement techniques -- Summary -- Questions -- Further reading -- Part 5: Threat Intelligence and Hunting -- Chapter 16: Malware Analysis for Incident Response -- Malware analysis overview -- Malware classification -- Setting up a malware sandbox -- Local sandbox -- Cloud sandbox -- Static analysis -- Static properties analysis -- Dynamic analysis -- Process Explorer -- Process Spawn Control -- Automated analysis -- ClamAV -- YARA -- YarGen -- Summary -- Questions -- Further reading -- Chapter 17: Leveraging Threat Intelligence -- Threat intelligence overview -- Threat intelligence types -- The Pyramid of Pain -- The threat intelligence methodology -- Sourcing threat intelligence -- Internally developed sources -- Commercial sourcing -- Open source intelligence -- The MITRE ATT&amp -- CK framework -- Working with IOCs and IOAs -- Threat intelligence and incident response -- Autopsy -- Maltego -- YARA and Loki -- Summary -- Questions -- Further reading -- Chapter 18: Threat Hunting -- Threat hunting overview -- Threat hunt cycle -- Threat hunt reporting -- Threat hunting maturity model -- Crafting a hypothesis -- MITRE ATT&amp -- CK -- Planning a hunt -- Digital forensic techniques for threat hunting -- EDR for threat hunting -- Summary -- Questions -- Further reading -- Appendix -- Assessments -- Index -- About Packt -- Other Books You May Enjoy…”
    Libro electrónico
  10. 4990
  11. 4991
    Publicado 2017
    Tabla de Contenidos: “…-- As Andy Greenawalt Says, "You Are Misusing Your Humans -- Do Not Let Sacred Geese Live -- Market Your Market -- Purpose Can Drive Change, Too -- Shift to a Digital Community -- Price Is Only a Concern in the Absence of Value -- Overcoming the Challenges of the Digital Branch Starts with You -- Welcome to Digital Community Banking -- Move over Millennials -- Make Way for iGen -- Beware the Culture Danger -- Understand Your Technology -- Your Foundation Could Be a Bit Shaky -- And So, the Story Goes, "Free Your Data -- A Reliance on Professional Services Means You Get to Focus While Your End Users Get Best-of-Breed Offerings -- It's Not about Having Access to "Data," It's about Focused Direction -- Partner, Don't Incubate -- Skip the Writhing, Pleading, Grasping at Straws Thing -- Be Interested, Not Desperate -- Some Thoughts about Working with Fintech Startups -- Get More Efficient and More Proficient with Partners -- Scale Delivers Results -- For about Fifty Years, the Most Convenient Bank in the United States Was the US Postal Savings System -- Brand Power -- The Average Consumer Cares Very Little about Your Customer Service -- Which Takes Us Back to the Scale of Brands…”
    Libro electrónico
  12. 4992
    Publicado 2012
    Tabla de Contenidos: “…Columnar Databases -- SQL Accelerators -- Early Adoption Challenges and Benefits -- Architectural Trends for Enterprise Integration -- Concluding Remarks -- References -- Authors -- Chapter 6: Enterprise Mobility Adoption Strategy -- Introduction to Enterprise Mobility -- Need for an Enterprise Mobility Roadmap -- Defining Enterprise Mobility Adoption Strategy -- Business Needs Mobility Roadmap -- Multi Platform Support -- Leverage Mobile Capabilities -- Right Partner -- Technology Options Application Type -- COTS vs Custom Development -- Deployment -- Mandatory Capabilities Smooth Integration -- Comprehensive Security -- Well Designed UI -- Functionalities -- Robust Solutions System Scalability -- Device Diversity Testing -- Network Optimization -- On Demand Scaling -- Major Influencers from Emerging Trends -- Concluding Remarks -- References -- Authors -- Chapter 7: Web as a Platform Patterns and Practices -- Cloud Computing - the Web Platform Enabler -- Internet Integration -- VPN based Integration -- Controlled Integration with Gateways -- A well thought out service Design -- Identity Management and Access Control -- A Business-To-Business scenario -- Social Network scenario -- Data Security -- Encryption during transfer -- Encryption at rest -- Backend data integration -- Business Intelligence -- (Complement in-house BI with web based BI platforms) -- Conclusion -- References -- Authors -- Chapter 8: Self-Management - The Defining Attribute of Next-Gen Architectures -- Self-management - Characteristics and Approaches -- Architecture of self-managing systems -- Component Monitoring and Control -- Component Configuration Management -- Autonomic Goal and Policy Management -- Self-managing Systems - Current State and Emerging Trends -- Conclusion -- References -- Authors -- Chapter 9: Applying Virtualization Concepts in Enterprise IT -- Introduction…”
    Libro electrónico
  13. 4993
    Tabla de Contenidos: “…. -- DNA Sequence Determinations Require Quality Control -- REFERENCES -- 6 The Collection, Analysis, and Distribution of Information and Materials -- PRESENT INFORMATION-HANDLING ORGANIZATIONS -- GenBank/EMBL…”
    Libro electrónico
  14. 4994
    Publicado 2023
    Tabla de Contenidos: “…-- Different types of phishing attacks -- Statistics on the frequency of phishing attacks -- Challenges in detecting phishing emails -- Role of automated detection -- Augmenting existing techniques with natural language processing -- Introducing ELSER -- The role of ELSER in GenAI -- Introduction to the Enron email dataset (ham or spam) -- Seeing ELSER in action -- Hardware consideration -- Downloading the ELSER model in Elastic -- Setting up the index and ingestion pipeline -- Semantic search with ELSER -- Limitations of ELSER -- Summary -- Part 4: Innovative Integrations and Future Directions -- Chapter 9: Retrieval Augmented Generation with Elastic -- Preparing for RAG-enhanced search with ELSER and RRF -- Semantic search with ELSER -- A recap of essential considerations for RAG -- Integrating ELSER with RRF -- Language models and RAG -- In-depth case study-implementing a RAG-enhanced CookBot -- Dataset overview - an introduction to the Allrecipes.com dataset…”
    Libro electrónico
  15. 4995
    Publicado 2015
    “…« Farah Lenser, Oya, 1/2 (2016) »Ein Standardwerk.« enorm, 6 (2015/16) Besprochen in: www.keimform.de, 21.11.2015, Stefan Meretz Portal für Politikwissenschaft, 04.02.2016, Christian Heuser Gen-ethischer Informationsdienst, 235 (2016), Christof Potthof…”
    Libro electrónico
  16. 4996
    Publicado 2025
    Tabla de Contenidos: “…The Tradeoffs of Uncensored Models -- Weaponizing Innocent Outputs -- An Inconvenient Truth About Digital Deceptions -- Takeaways -- Chapter 7 The Now and Future of AI-Driven Deception -- Whispers from the Static -- Into the Exploitation Zone -- The Pillars of Deception, Scams, and Crime -- Facts and Frames -- Sometimes They Just Gotta Break Stuff -- AI-Powered Scams: Old Tricks, New Tools -- A Small Tasting Menu of AI-Powered Deceptions -- Emerging Threats -- Existential Threats -- App/System-Based problems -- A Personal Story: How I Created Multiple GenAI-Powered ScamBots -- Finding Hope -- Takeaways -- Chapter 8 Media Literacy in the Age of AI: Your First Line of Defense -- Whispers from the Static -- The Fight for Truth -- A Quick Note before We Jump In -- Means, Motive, and Opportunity -- Media Literacy in the Digital Age: Your Survival Guide to the Information Jungle -- The Four Horsemen of Online Vulnerability: Know Your Enemy -- Your Digital Defense Toolkit: The SIFT Method -- The Emotion Commotion: Taming the Tempest Within -- Deepfakes and Cheapfakes: When Seeing Isn't Believing -- Navigating Out of the Crosshairs -- Your Mission, Should You Choose to Accept It -- The Fact-Checking Paradox: Seeking Truth in a World of Lies -- Why Fact Checking Matters -- The Anatomy of a Good Fact-Check -- The Fact-Checking Ecosystem -- The Challenges and Criticisms -- Navigating the Fact-Checking Minefield -- The Fact-Checking Challenge -- Your Call to Action: Become the Hero of Your Digital Story -- Let's Make it Fun: Digital Literacy Challenges -- Mastering the Art of SIFT -- Emotional Intelligence and Bias Busting -- Deepfakes and Visual Verification -- Collaborative Fact-Checking Challenges -- Takeaways -- Chapter 9 Cognitive and Technical Defense Strategies: Tools for Protection -- Whispers from the Static -- Building Our Cognitive Defenses…”
    Libro electrónico
  17. 4997
    Publicado 2017
    Tabla de Contenidos:
    Libro electrónico
  18. 4998
    Publicado 2020
    Tabla de Contenidos: “…GIMP - kostenlose Bildbearbeitung -- Landscape - Bilder auf die passende Breite × Höhe bringen -- Pablo - einfach &amp -- kostenlos -- PaintShop Pro - der Klassiker -- PicMonkey - Bildbearbeitung &amp -- Design -- PolyGen - Bilder im Polygonlook -- RelayThat - Automatisierung von Bildgrößen -- Remove.bg - Bildhintergründe entfernen -- Snagit - Screenshots, Screencasts &amp -- mehr -- Stencil - Templates, Bilder &amp -- Icons für Social Media und WordPress -- Visme - Infografiken 1, 2, 3 fertig! …”
    Libro electrónico
  19. 4999
    Publicado 2024
    Tabla de Contenidos: “…Optimizing dataflows -- Gen2 destinations -- Summary -- Chapter 9: Report and Dashboard Design -- Technical requirements -- Optimizing report layout -- Too many elements in a report -- Reduce a busy report -- Reducing queries to the semantic model -- Using the small multiples option -- Interaction optimization for slicing and dicing -- Selecting a value for a slicer -- Disabling interaction when necessary -- Using Top N to limit data -- Moving slicers to the filter pane -- Optimization for dashboard and paginated reports -- Following best practices for dashboards -- Optimizing paginated reports -- Summary -- Part 4: Data Models, Calculations, and Large Semantic Models -- Chapter 10: Dimensional Modeling and Row Level Security -- Technical requirements -- Building efficient models -- The Kimball dimensional model theory -- Designing a basic star schema -- Building a single source of truth -- Reducing dataset size -- Considering many-to-many relationships and bi-directional filtering -- Using bi-directional relationships carefully -- Avoiding pitfalls with row-level security -- General guidance for RLS configuration -- Optimize relationships -- Guidance that applies to dynamic RLS -- Summary -- Chapter 11: Improving DAX -- Technical requirements -- Understanding row and filter context -- Calculated column -- Measure -- Dissecting row context -- Discovering filter context -- Improving the performance of a calculated column -- Improving filter context for a measure -- Understanding DAX pitfalls and optimizations -- Tuning DAX -- DAX guidance -- Summary -- Chapter 12: High Scale Patterns -- Technical requirements -- Scaling with capacities and Azure Analysis Services -- Leveraging Fabric for data scale -- Throttling and smoothing in Fabric capacity -- Leveraging AAS for data and user scale -- Using QSO to achieve higher user concurrency…”
    Libro electrónico
  20. 5000
    Publicado 1991
    Libro electrónico