Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Artificial intelligence 2,340
- Machine learning 621
- Data processing 531
- Inteligencia artificial 489
- Computer programs 434
- Management 385
- Artificial Intelligence 299
- Technological innovations 284
- Computer security 282
- Engineering & Applied Sciences 281
- Python (Computer program language) 276
- Computer networks 270
- Information technology 253
- Business intelligence 251
- Security measures 234
- Computer Science 227
- Big data 212
- Data mining 212
- Natural language processing (Computer science) 208
- Development 199
- Application software 193
- Database management 181
- Inteligencia 179
- Business 176
- Computer programming 173
- Intel·ligència artificial 169
- Computer science 165
- Cloud computing 164
- Social aspects 158
- Neural networks (Computer science) 149
-
12441Publicado 2015“…What You Will Learn Efficiently collect data from a large variety of monitoring objects Organize your data in graphs, charts, maps, and slide shows Build intelligent triggers and alarms to monitor your network proactively Write your own custom probes and monitoring scripts to extend Zabbix Configure Zabbix and its database to be high available and fault-tolerant Automate repetitive procedures using Zabbix's API Integrate Zabbix with external systems Understand the protocol and how to interact with it by writing your own custom agent In Detail Nowadays monitoring systems play a crucial role in any IT environment. …”
Libro electrónico -
12442Publicado 2016“…This book aims to take your knowledge to next level and help you impart that knowledge to build advanced applications such as social media mining, intelligent news portals, and more. After a quick refresher on functional programming concepts using REPL, you will see some practical examples of setting up the development environment and tinkering with data. …”
Libro electrónico -
12443Publicado 2022“…This book prepares you for the current trends in the neuromorphic computing, hardware customization for artificial intelligence applications as well as circuit design for internet of things (IOT) will only increase the need for analog simulation modeling and make Verilog-A even more important as a multi-domain component-oriented modeling language. …”
Libro electrónico -
12444por Guisande, Alberto“…What you will learn Speed up the cleansing, data preparing, and shaping process Perform operations and transformations on the data to suit your needs Blend different types of data sources for analysis Pivot and un-pivot the data for easy manipulation Perform aggregations and calculations on the data Encapsulate reusable logic into macros Develop high-quality, data-driven reports to improve consistency Who this book is for This book is for data analysts, data professionals, and business intelligence professionals seeking to harness the full potential of the tool. …”
Publicado 2023
Libro electrónico -
12445Publicado 2023“…entrada per al motor de recomanacions.En aquesta tesi es proposa un sistema de recomanació final basat en el Processament del Llenguatge Natural (PNL), les principals contribucions del qual són: (1) la integració de professions multidisciplinàries com la psicologia, la literatura i la intel·ligència artificial; (2) un disseny d'un sistema intel·ligent que recomana basant-se en el comportament del lector i no només en les compres; i (3) impulsar la qualitat literària sense deixar d'atreure persones que no solen llegir…”
Tesis -
12446Publicado 2022“…Evolving forms of massive open online courses, hybrid learning environments combining online and face-to-face, collaborative synchronous and asynchronous learning activities, distributed as mobile and seamless learning applications, intelligent learning support or AI for education are examples of these evolving learning at scale environments, which combine innovative teaching and learning models with the latest technologies. …”
Libro electrónico -
12447Publicado 2019“…On one hand, Katja Hofmann, Senior Researcher and leader of the Game Intelligence group at Microsoft Research Cambridge. On the other hand, Adrián Cuevas, Co-Founder and Technical Director at Nomada Studio, and creator of the internationally acclaimed video game hit Gris. …”
Libro electrónico -
12448Publicado 2019“…On one hand, Katja Hofmann, Senior Researcher and leader of the Game Intelligence group at Microsoft Research Cambridge. On the other hand, Adrián Cuevas, Co-Founder and Technical Director at Nomada Studio, and creator of the internationally acclaimed video game hit Gris. …”
Libro electrónico -
12449Publicado 2022“…This includes a number of domains in which researchers are engendering significant innovations based on advances in the areas of user modeling and adaptation, recommender systems, adaptive educational systems, intelligent user interfaces, e-commerce, advertising, digital humanities, social networks, personalized health, entertainment, and many more…”
Libro electrónico -
12450Publicado 2022“…This includes a number of domains in which researchers are engendering significant innovations based on advances in the areas of user modeling and adaptation, recommender systems, adaptive educational systems, intelligent user interfaces, e-commerce, advertising, digital humanities, social networks, personalized health, entertainment, and many more…”
Libro electrónico -
12451Publicado 2016“…Most donne une nouvelle intelligence et qu’il rend accessibles à tous…”
991007185609706719 -
12452Publicado 2012“…Each section may have a different focus--a quantum, a star in a galaxy, a bee, or the seat of human intelligence, which some may call the soul--but the editors have done a great service to the reader by juxtaposing these subjects in a way that suggests how each one relates to other entities, including both its own kind and the wider global environment. …”
991005299789706719 -
12453por Hadjadj, Fabrice, 1971- aut“…Il ose prétendre que la différence des sexes est le socle de l'intelligence humaine, et que la naissance ordinaire est plus chargée d'avenir que tous les superbes futurs planifiés de la PMA. …”
Publicado 2014
Libro -
12454por Barnett, Ryan C.“…With this book, you will learn to Address the OS-related flaws most likely to compromise Web server security Perform security-related tasks needed to safely download, configure, and install Apache Lock down your Apache httpd.conf file and install essential Apache security modules Test security with the CIS Apache Benchmark Scoring Tool Use the WASC Web Security Threat Classification to identify and mitigate application threats Test Apache mitigation settings against the Buggy Bank Web application Analyze an Open Web Proxy Honeypot to gather crucial intelligence about attackers Master advanced techniques for detecting and preventing intrusions…”
Publicado 2005
Libro electrónico -
12455Publicado 2017“…Understand the operational architecture of the Cisco Firepower NGFW, NGIPS, and AMP technologies Deploy FTD on ASA platform and Firepower appliance running FXOS Configure and troubleshoot Firepower Management Center (FMC) Plan and deploy FMC and FTD on VMware virtual appliance Design and implement the Firepower management network on FMC and FTD Understand and apply Firepower licenses, and register FTD with FMC Deploy FTD in Routed, Transparent, Inline, Inline Tap, and Passive Modes Manage traffic flow with detect-only, block, trust, and bypass operations Implement rate limiting and analyze quality of service (QoS) Blacklist suspicious IP addresses via Security Intelligence Block DNS queries to the malicious domains Filter URLs based on category, risk, and reputation Discover a network and implement application visibility and control (AVC) Control file transfers and block malicious files using advanced malware protection (AMP) Halt cyber attacks using Snort-based intrusion rule Masquerade an internal host..…”
Libro electrónico -
12456Publicado 2018“…What You Will Learn Explore how a ML model can be trained, optimized, and evaluated Understand how to create and learn static and dynamic probabilistic models Successfully cluster high-dimensional data and evaluate model accuracy Discover how artificial neural networks work and how to train, optimize, and validate them Work with Autoencoders and Generative Adversarial Networks Apply label spreading and propagation to large datasets Explore the most important Reinforcement Learning techniques In Detail Machine learning is a subset of AI that aims to make modern-day computer systems smarter and more intelligent. The real power of machine learning resides in its algorithms, which make even the most difficult things capable of being handled by machines. …”
Libro electrónico -
12457Publicado 2017“…Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes About This Book Expose wireless security threats through the eyes of an attacker, Recipes to help you proactively identify vulnerabilities and apply intelligent remediation, Acquire and apply key wireless pentesting skills used by industry experts Who This Book Is For If you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. …”
Libro electrónico -
12458Publicado 2017“…You will be able to organize your data in the form of graphs and charts along with building intelligent triggers for monitoring your network proactively. …”
Libro electrónico -
12459Publicado 2016“…His enlightened approach to intelligence-based security infrastructure and risk mitigation is our best path forward if we are ever to realize the vast potential of the innovative digital world we are creating while reducing the threats to manageable levels. …”
Libro electrónico -
12460Publicado 2020“…What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is for This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field…”
Libro electrónico