Mostrando 58,241 - 58,260 Resultados de 60,628 Para Buscar '"legal"', tiempo de consulta: 0.24s Limitar resultados
  1. 58241
    Publicado 2022
    Tabla de Contenidos: “…NLP tasks and examples -- Comparing the output of GPT-2 and GPT-3 -- Fine-tuning GPT-3 -- Preparing the data -- Step 1: Installing OpenAI -- Step 2: Entering the API key -- Step 3: Activating OpenAI's data preparation module -- Fine-tuning GPT-3 -- Step 4: Creating an OS environment -- Step 5: Fine-tuning OpenAI's Ada engine -- Step 6: Interacting with the fine-tuned model -- The role of an Industry 4.0 AI specialist -- Initial conclusions -- Summary -- Questions -- References -- Chapter 8: Applying Transformers to Legal and Financial Documents for AI Text Summarization -- Designing a universal text-to-text model -- The rise of text-to-text transformer models -- A prefix instead of task-specific formats -- The T5 model -- Text summarization with T5 -- Hugging Face -- Hugging Face transformer resources -- Initializing the T5-large transformer model -- Getting started with T5 -- Exploring the architecture of the T5 model -- Summarizing documents with T5-large -- Creating a summarization function -- A general topic sample -- The Bill of Rights sample -- A corporate law sample -- Summarization with GPT-3 -- Summary -- Questions -- References -- Chapter 9: Matching Tokenizers and Datasets -- Matching datasets and tokenizers -- Best practices -- Step 1: Preprocessing -- Step 2: Quality control -- Continuous human quality control -- Word2Vec tokenization -- Case 0: Words in the dataset and the dictionary -- Case 1: Words not in the dataset or the dictionary -- Case 2: Noisy relationships -- Case 3: Words in the text but not in the dictionary -- Case 4: Rare words -- Case 5: Replacing rare words -- Case 6: Entailment -- Standard NLP tasks with specific vocabulary -- Generating unconditional samples with GPT-2 -- Generating trained conditional samples -- Controlling tokenized data -- Exploring the scope of GPT-3 -- Summary -- Questions -- References…”
    Libro electrónico
  2. 58242
    Publicado 2020
    Tabla de Contenidos: “…13.1 Pufferüberlauf -- 13.2 Out-of-Bounds -- 13.3 Integer-Überlauf bei PHP-ftp_genlist() -- 13.4 Pythons hotshot-Modul -- 13.5 Libcurl-Out-of-Bounds -- 13.6 Zusammenfassung -- Kapitel 14: Übernahme von Subdomains -- 14.1 Domainnamen verstehen -- 14.2 Wie Subdomain-Übernahmen funktionieren -- 14.3 Subdomain-Übernahme bei Ubiquiti -- 14.4 Scan.me verweist auf Zendesk -- 14.5 Windsor-Subdomain-Übernahme bei Shopify -- 14.6 Fastly-Übernahme bei Snapchat -- 14.7 Legal Robot-Übernahme -- 14.8 SendGrid-Mail-Übernahme bei Uber -- 14.9 Zusammenfassung -- Kapitel 15: Race Conditions -- 15.1 HackerOne-Einladungen mehrfach akzeptieren -- 15.2 Überschreiten des Keybase-Einladungs-Limits -- 15.3 Race Condition bei HackerOne-Zahlungen -- 15.4 Race Condition bei Shopify-Partnern -- 15.5 Zusammenfassung -- Kapitel 16: Insecure Direct Object References -- 16.1 Einfache IDORs aufspüren -- 16.2 Komplexere IDORs aufspüren -- 16.3 Rechte-Ausweitung (Privilege Escalation) bei Binary.com -- 16.4 App-Erzeugung bei Moneybird -- 16.5 API-Token-Diebstahl bei Twitter Mopub -- 16.6 Preisgabe von Kundeninformationen bei ACME -- 16.7 Zusammenfassung -- Kapitel 17: OAuth-Schwachstellen -- 17.1 Der OAuth-Workflow -- 17.2 Slack-OAuth-Token stehlen -- 17.3 Umgehen der Authentifizierung mit Standard-Passwörtern -- 17.4 Microsoft-Log-in-Token stehlen -- 17.5 Offizielle Facebook-Access-Token stehlen -- 17.6 Zusammenfassung -- Kapitel 18: Schwachstellen in Anwendungslogik und -konfiguration -- 18.1 Shopify-Administrator-Rechte umgehen -- 18.2 Account-Schutz bei Twitter umgehen -- 18.3 Signal-Manipulation bei HackerOne -- 18.4 Fehlerhafte S3-Bucket-Rechte bei HackerOne -- 18.5 GitLabs Zwei-Faktor-Authentifizierung umgehen -- 18.6 Preisgabe der PHP-Info bei Yahoo! …”
    Libro electrónico
  3. 58243
    Publicado 2020
    “…The book coversallthe crucial topics required to understand the fundamentals of the industry, including: Strategies for different types of risk management: market, credit, operating, reputation, legal, and funding The key investment banking operations: venture capital, buyouts, M&A, equity underwriting, debt, and more The relationship between leverages buyout funds, hedge funds, and corporate and institutional clients Investment Banking For Dummies, 2ndEditionoffers, for the first time, a brand-new chapter devoted to cryptocurrencies, and new content on "unicorn" IPOs, including Uber, Lyft, and Airbnb…”
    Libro electrónico
  4. 58244
    Publicado 2021
    Tabla de Contenidos: “…Forging the link among shape, formwork, and mortar assemblies in Guastavino vaulting -- 1 INTRODUCTION -- 2 NO TWO ARE ALIKE -- 3 VAULT FORM -- 4 CASE STUDIES -- 5 DISCUSSION -- 6 CONCLUSION -- ACKNOWLEDGEMENTS -- REFERENCES -- Thematic session: Understanding the culture of building expertise in situations of uncertainty (Middle Age-Modern times) -- A building expert without building training: The city of Lisbon vedor of works (14th-19th centuries) -- 1 INTRODUCTION -- 2 THE DUTIES -- 3 THE MEN -- 4 CONCLUSION -- ACKNOWLEDGEMENTS -- REFERENCES -- Maintaining/repairing Paris through expertise (1690-1790) -- 1 INTRODUCTION -- 2 THE TECHNICAL DIMENSION -- 3 THE ECONOMIC VALUE OF REPAIRS -- 4 THE LEGAL REGULATION OF REPAIRS -- REFERENCES -- To repair, renovate, or replace: A maintenance history of Virginia's state buildings -- 1 INTRODUCTION -- 2 METHODOLOGY -- 3 TO REPLACE -- 4 TO REPAIR -- 5 TO RENOVATE -- 6 CONCLUSION -- REFERENCES -- Conflicts in the Brussels construction sector (1957-59): Judicial expertise of architects, engineers and contractors -- 1 STUDYING CONFLICTS IN THE CONSTRUCTION SECTOR -- 2 CONSTRUCTION CONFLICTS: CATEGORIES, REASONS AND ACTORS -- 3 BACKGROUND OF CONSTRUCTION EXPERTS -- 4 EXPERT PROCEDURE: BUILDING AND TRANSFER OF KNOWLEDGE -- 5 CONCLUSIONS -- REFERENCES -- Thematic session: Historical timber constructions between regional tradition and supra-regional influences -- Timber floors made with elements shorter than the span covered in treatises and technical literature -- 1 INTRODUCTION -- 2 FIRST REFERENCES TO FLOORS MADE WITH BEAMS SHORTER THAN THE SPAN TO BE COVERED -- 3 "IL PRIMO LIBRO DI ARCHITETTURA" BY SEBASTIANO SERLIO -- 4 INTEREST IN THE SERLIO FLOOR BETWEEN 17TH AND 18TH CENTURIES -- 5 APPLICATIONS OF SHORT BEAM FLOORS BETWEEN THE END OF THE 18TH AND THE BEGINNING OF THE 19TH CENTURIES…”
    Libro electrónico
  5. 58245
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…USB-based authentication -- Chapter 9 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- Part 4 Cybersecurity for Businesses, Organizations, and Government -- Chapter 10 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network…”
    Libro electrónico
  6. 58246
    Publicado 2023
    Tabla de Contenidos: “…The properties of sound -- Microphone types -- Microphone pickup patterns -- Microphone placement -- Syncing audio -- Auto-syncing audio to video -- Manually syncing audio to video -- Fixing sound -- De-Esser -- Removing hum -- Changing stereo to mono -- Noise reduction -- Voice isolation -- Summary -- Questions -- Further reading -- Chapter 4: Adding Narration, Voice Dubbing, and Subtitles -- Technical requirements -- Welcome to the Edit page -- Edit Index -- Sound Library -- Metadata -- Mixer -- Importance of subtitles and closed captions -- Legal requirements to add subtitles to your video -- Subtitling and SEO -- Lower thirds -- Subtitles versus closed captions -- Creating and working with subtitles -- Creating your own subtitles -- Adding a new subtitle clip -- Adding a new subtitle track -- Renaming a subtitle track -- Changing default subtitle settings -- Formatting our subtitles -- Exporting and importing subtitles -- Exporting subtitles to upload to YouTube or Vimeo -- Exporting subtitles in the File menu -- Exporting subtitles in the Subtitle track header -- Exporting subtitles on the Deliver page -- Importing subtitles into Resolve -- Positioning subtitle clips on the Timeline -- Welcome to the Fairlight page -- Index -- Meters -- ADR -- Creating a new audio track -- Patching, arming, and recording -- Patching tracks -- Arming tracks -- Recording audio -- Voice dubbing in Fairlight using ADR -- Creating a new Timeline using selected footage -- Adding scene cuts -- Scene Detect -- Ripple deleting clips on the Edit page -- Ripple-deleting clips on the Cut page -- Smooth Cut -- The ADR interface -- Summary -- Questions -- Further reading -- Chapter 5: Creating Additional Sound -- Technical requirements -- Enhancing the vocals -- Pitch -- Vocal Channel -- Dialogue Processor -- Importing audio effects plug-ins…”
    Libro electrónico
  7. 58247
    Publicado 2023
    Tabla de Contenidos: “…Figuring out your organization's values -- Workforce Planning: Aligning Talent Needs with Business Strategy -- Being strategic with workforce planning -- Developing potential within the current team -- Finding Inner Peace: Filling Jobs from within the Organization -- Recognizing the pros (and cons) -- Creating a successful internal hiring process -- Developing an employee skills inventory -- Knowing where to look for internal talent -- New Horizons: Attracting Talent from Outside Your Organization -- A Wide World of Talent: Understanding Worker Classification -- Employees -- Contingent workers -- Independent contractors -- Benefitting from Contingent Workers -- Noting the pros to contingent workers -- Determining whether they're the right fit -- Asking the right questions -- Engaging a contingent workforce -- Documenting performance and offering feedback to the staffing firm -- Looking at your legal responsibility -- Equal coverage -- Workplace injuries -- Chapter 5 Kicking Off the Hiring Process -- Engaging the Hiring Manager -- Creating the Position Success Profile -- Laying the foundation: Why you need to create a position success profile -- Knowing what to include -- Looking ahead, not behind -- Considering educational requirements and qualifications -- Making sure that outcomes are doable -- Accurately describing success outcomes -- Being specific -- Setting a salary range -- Being Clear When Writing Job Titles -- Defining Core Competencies for Success -- Chapter 6 Attracting Great Talent -- Being Intentional throughout the Process -- Kicking Off the Process -- Identifying Key Considerations for the Job Posting -- Implementing Sourcing Strategies -- Current team members/employee referrals -- Online job boards -- Your company website -- Social media and online networking -- Making info available to candidates in the early stages…”
    Libro electrónico
  8. 58248
    Publicado 2023
    Tabla de Contenidos: “…4.1.7 Management by Project -- 4.1.8 Laws for Project Management -- 4.2 Project Management in the Home -- 4.3 Project Planning -- 4.4 Criteria for Project Planning -- 4.5 Tactical Levels of Planning -- 4.6 Components of a Good Plan -- 4.7 Team Motivation -- 4.8 Hierarchy of Needs in Project Planning -- 4.9 Classical Management by Objective -- 4.10 Classical Management by Exception -- 4.11 Feasibility Study -- 4.12 Elements of a Project Proposal -- 4.13 Proposal Incentives -- 4.14 Budget Planning -- 4.15 Applying 5S Methodology to Research -- 4.16 Applying Plan-Do-Check-Act Methodology to Research -- References -- Chapter 5 Research Work Breakdown Structure -- 5.1 Introduction -- 5.2 Project Organization Chart -- 5.3 Traditional Formal Organization Structures -- 5.4 Functional Organization -- 5.5 Product Organization -- 5.6 Matrix Organization Structure -- 5.7 Project Feasibility Analysis -- 5.8 Work Accountability and Legal Considerations -- 5.9 Information Flow in Work Breakdown Structure -- 5.10 Value of Information in Work Breakdown Structure -- 5.11 Communication within Work Breakdown Structure -- 5.11.1 Communication -- 5.11.2 Complexity of Multi-person Communication -- References -- Chapter 6 Research Foundation for the 14 Grand Challenges -- 6.1 Introduction -- 6.2 The Grand Challenges with Overlapping Integration -- References -- Chapter 7 Cost Concepts in Research Management -- 7.1 Introduction -- 7.1.1 Project Cost Estimation -- 7.1.2 Optimistic and Pessimistic Cost Estimates -- 7.1.3 Cost Monitoring -- 7.2 Project Balance Technique -- 7.2.1 Cost and Schedule Control Systems Criteria -- 7.2.2 Sources of Capital -- 7.2.3 Commercial Loans -- 7.2.4 Bonds and Stocks -- 7.2.5 Interpersonal Loans -- 7.2.6 Foreign Investment -- 7.2.7 Investment Banks -- 7.2.8 Mutual Funds -- 7.2.9 Supporting Resources -- 7.2.10 Activity-Based Costing -- References…”
    Libro electrónico
  9. 58249
    por Rajendran, Sathiyaraj
    Publicado 2024
    Tabla de Contenidos: “…5.4 Results and Analysis -- 5.5 Conclusion -- References -- Chapter 6 AI-Powered Drones for Healthcare Applications -- 6.1 Introduction -- 6.1.1 Role of Artificial Intelligence in Drone Technology -- 6.1.2 Unmanned Aerial Vehicle-Drone Technology -- 6.2 Kinds of Drones Used by Medical Professionals -- 6.2.1 Multirotor -- 6.2.2 Only One Rotor -- 6.2.3 Permanent-Wing Drones -- 6.2.4 Drones for Passenger Ambulances -- 6.3 Medical and Public Health Surveillance -- 6.3.1 Telemedicine -- 6.3.2 Drones as Medical Transportation Devices -- 6.3.3 Advanced System for First Aid for the Elderly People -- 6.4 Potential Benefits of Drones in the Healthcare Industry -- 6.4.1 Top Medical Drone Delivery Services -- 6.4.2 Limitations of Drones in Healthcare -- 6.4.3 The Influence of COVID on Drones -- 6.4.4 Limitations of Drone Technology in the Healthcare Industry -- 6.4.4.1 Privacy -- 6.4.4.2 Legal Concerns -- 6.4.4.3 Rapid Transit-One of the Biggest Drawbacks of Drones is Time -- 6.4.4.4 Bugs in the Technology -- 6.4.4.5 Dependence on Weather -- 6.4.4.6 Hackable Drone Technology -- 6.5 Conclusion -- References -- Chapter 7 An Approach for Avoiding Collisions with Obstacles in Order to Enable Autonomous Cars to Travel Through Both Static and Moving Environments -- 7.1 Introduction -- 7.1.1 A Brief Overview of Driverless Cars -- 7.1.2 Objectives -- 7.1.3 Possible Uses for a Car Without a Driver -- 7.2 Related Works -- 7.3 Methodology of the Proposed Work -- 7.4 Experimental Results and Analysis -- 7.5 Results and Analysis -- 7.6 Conclusion -- References -- Chapter 8 Drivers' Emotions' Recognition Using Facial Expression from Live Video Clips in Autonomous Vehicles -- 8.1 Introduction -- 8.2 Related Work -- 8.2.1 Face Detection -- 8.2.2 Facial Emotion Recognition -- 8.3 Proposed Method -- 8.3.1 Dataset -- 8.3.2 Preprocessing -- 8.3.3 Grayscale Equalization…”
    Libro electrónico
  10. 58250
    por Brooks, Raymond
    Publicado 2022
    Tabla de Contenidos: “…Financial Management -- 1.1 The Cycle of Money -- 1.2 Overview of Finance Areas -- 1.3 Financial Markets -- 1.4 The Finance Manager and Financial Management -- 1.5 Objective of the Finance Manager -- Profit Maximization -- 1.6 Internal and External Players -- 1.7 The Legal Forms of Business -- Sole Proprietorship -- Partnership -- Corporations -- Hybrid Corporations -- Not-for-Profit Corporations -- 1.8 The Financial Management Setting: The Agency Model -- 1.9 Corporate Governance and Business Ethics -- Finance Follies The Financial Meltdown of 2008 -- 1.10 Why Study Finance? …”
    Libro electrónico
  11. 58251
    Publicado 2023
    Tabla de Contenidos: “…-- 6.3 Theory of CSR -- 6.3.1 Economic Responsibilities -- 6.3.2 Legal Responsibilities -- 6.3.3 Ethical Responsibilities -- 6.3.4 Philanthropic Responsibilities -- 6.4 Types of CSR -- 6.4.1 Environmental CSR -- 6.4.2 Ethical CSR -- 6.4.3 Philanthropic CSR -- 6.4.4 Economic CSR -- 6.5 From CSR to ESG -- 6.6 Conclusion -- 6.7 For Discussion -- References -- 7. …”
    Libro electrónico
  12. 58252
    Publicado 2023
    Tabla de Contenidos: “…Smart contracts -- 7.5. Legal issues -- 7.6. Consensus -- 8. Future applications with Blockchain technology -- 9. …”
    Libro electrónico
  13. 58253
    por Blyth, Andrew
    Publicado 2024
    Tabla de Contenidos: “…-- Stakeholders -- Ethical, legal, and regulatory requirements -- Managing and executing a penetration test -- Using the cyber kill chain -- Standards in penetration testing -- Report writing -- Summary -- Chapter 2: Programming Principles in PowerShell -- Basic concepts of PowerShell and pipelines in PowerShell -- JSON in PowerShell -- Retrieving JSON data from web APIs -- Parsing JSON data -- JSON manipulation for payloads -- Interacting with JSON from files -- Web scraping and data extraction -- XML in PowerShell -- Reading and parsing XML files -- Extracting information from XML nodes -- Modifying XML data -- Crafting XML payloads -- XML injection testing -- COM, WMI, and .NET in PowerShell -- Using WMI for system information gathering -- Querying WMI for network information -- Interacting with COM objects -- Using .NET for cryptographic operations -- Using .NET for network operations -- Analyzing .NET assemblies for vulnerabilities -- Summary -- Part 2: Identification and Exploitation -- Chapter 3: Network Services and DNS -- Network services -- TCP/IP network services -- The IP addresses -- The TCP/UDP port numbers -- The OSI stack -- DNS and types of DNS queries -- DNS overview -- Types of DNS queries -- DNS and PowerShell -- Summary -- Chapter 4: Network Enumeration and Port Scanning -- Network enumeration using PowerShell -- TCP port scanning using PowerShell -- Single port scanning with Test-NetConnection -- Multiple port scanning with Test-NetConnection -- Enumerating open ports with Test-NetConnection -- Single port scanning with .NET -- Multiple port scanning with .NET…”
    Libro electrónico
  14. 58254
  15. 58255
  16. 58256
  17. 58257
  18. 58258
  19. 58259
  20. 58260