Mostrando 25,701 - 25,720 Resultados de 26,559 Para Buscar '"performance"', tiempo de consulta: 0.13s Limitar resultados
  1. 25701
    Publicado 2016
    “…What You Will Learn Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book Acquire evidence using traffic acquisition software and know how to manage and handle the evidence Perform packet analysis by capturing and collecting data, along with content analysis Locate wireless devices, as well as capturing and analyzing wireless traffic data packets Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS Act upon the data and evidence gathered by being able to connect the dots and draw links between various events Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware In Detail We live in a highly networked world. …”
    Libro electrónico
  2. 25702
    Publicado 2017
    “…You will understand how to solve various ambiguities in processing human language and will come across various scenarios while performing text analysis. You will learn the very basics of getting the environment ready for natural language processing, move on to the initial setup, and then quickly understand sentences and language parts. …”
    Libro electrónico
  3. 25703
    Publicado 2017
    “…The CompTIA approved study guide helps you master all the topics on the CSA+ exam, including · Applying environmental reconnaissance · Analyzing results of network reconnaissance · Implementing responses and countermeasures · Implementing vulnerability management processes · Analyzing scan output and identifying common vulnerabilities · Identifying incident impact and assembling a forensic toolkit · Utilizing effective incident response processes · Performing incident recovery and post-incident response · Establishing framewo..…”
    Libro electrónico
  4. 25704
    Publicado 2015
    “…As a consultant, he specializes in Linux High Availability solutions and Performance Optimization. More information about Sander is on his website at www.sandervanvugt.com. …”
    Video
  5. 25705
    Publicado 2024
    “…You'll focus on structured data by performing essential tasks, such as cleaning and encoding datasets and handling missing values and outliers, before learning how to manipulate unstructured data with simple techniques. …”
    Libro electrónico
  6. 25706
    Publicado 2023
    “…What you will learn Craft detailed, lifelike game settings in Unreal Engine 5 using high-quality materials and textures Sculpt large-scale, immersive landscapes with realistic flora and terrain details Perfect seamless character animations with skeletal mesh and blend techniques Optimize game performance using world partitioning, LOD, and Nanite systems Improve character dynamics with animation blueprints, sockets, and state machines Audience This course is ideal for aspiring game developers who have a foundational understanding of Unreal Engine and are eager to deepen their knowledge. …”
    Video
  7. 25707
    por Ward, Hubert Henry
    Publicado 2024
    “…How to use binary numbers and how to perform all arithmetic operations Learn about the five basic logic gates; AND, NAND, OR, NOR and EXOR gates. …”
    Libro electrónico
  8. 25708
    Publicado 2004
    “…Pogue highlights the newest features and improvements, covers the capabilities and limitations of each program, and delivers, in one volume, countless goodies you won't find anywhere else: undocumented tips, tricks, and secrets for getting the very best performance out of each and all of these life-changing new applications. iLife '04: The Missing Manual : it's your guide to livin the iLife!…”
    Libro electrónico
  9. 25709
    Publicado 2003
    “…Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. …”
    Libro electrónico
  10. 25710
    por Tiwana, Amrit, 1974-
    Publicado 2000
    “…MindManager Personal for creating, organizing, and sharing knowledge maps Performance Now Enterprise, a trial version of the #1 change management tool FrontPage 2000 45-day trial Plus great tools for data mining, integrating mobile systems, workflow, modeling, and more!…”
    Libro electrónico
  11. 25711
    Publicado 2010
    “…When your employees are effectively on board and your system is supporting their success, your company is on track to even greater performance. visit author's website for more information http://onboardingmargin.com…”
    Libro electrónico
  12. 25712
    por Gress, Mark L., Johnson, Lee, 1972-
    Publicado 2010
    “…Efficiently install, configure, and troubleshoot Cisco Wireless LAN Controllers Move autonomous wireless network solutions to LWAPP/CAPWAP Integrate LWAPP/CAPWAP solutions into existing wired networks Understand the next-generation WLC architecture Use Hybrid REAP and Home AP solutions to centrally configure and control branch/remote access points without deploying controllers in every location Use Mobility Groups to provide system-wide mobility easily and cost-effectively Use Cisco WLC troubleshooting tools, and resolve client-related problems Maximize quality in wireless voice applications Build efficient wireless mesh networks Use RRM to manage RF in real-time, optimizing efficiency and performance Reference the comprehensive WLC and AP debugging guide Part of the CCIE Professional Development Series, this is the first book to offer authoritative training for the new CCIE Wireless Exam. …”
    Libro electrónico
  13. 25713
    Publicado 2019
    “…What you will learn Use cluster algorithms to identify and optimize natural groups of data Explore advanced non-linear and hierarchical clustering in action Soft label assignments for fuzzy c-means and Gaussian mixture models Detect anomalies through density estimation Perform principal component analysis using neural network models Create unsupervised models using GANs Who this book is for This book is intended for statisticians, data scientists, machine learning developers, and deep learning practitioners who want to build smart applications by implementing key building block unsupervised learning, and master all the new techniques and algorithms offered in machine learning and deep learning using real-world examples. …”
    Libro electrónico
  14. 25714
    Publicado 2019
    “…In FMR , you’ll learn: The Single Most Important Discipline in Military Recruiting How to Get Out of a Recruiting Slump The 30-Day Rule and Law of Replacement Powerful Time and Territory Management Strategies that Put You in Control of Your Day The 7 Step Telephone Prospecting Framework The 4 Step Email and Direct Messaging Framework The 5 C’s of Social Recruiting The 7 Step Text Message Prospecting Framework How to Leverage a Balanced Prospecting Methodology to Keep the Funnel Full of Qualified Applicants Powerful Human Influence Frameworks that Reduce Resistance and Objections The 3 Step Prospecting Objection Turn-Around Framework Mission Drive and the 5 Disciplines of Ultra-High Performing Military Recruiters In his signature right-to-the-point style that has made him the go-to trainer to a who’s who of the world’s most prestigious organizations, Jeb Blount pulls no punches. …”
    Libro electrónico
  15. 25715
    Publicado 2017
    “…Discover the physical topology for any network deployment Master Spanning Tree Protocol (STP) foundations and advanced features Deploy and optimize PPP and use its full set of capabilities Implement Dynamic Multipoint VPNs (DMVPNs) from start to finish Use IP Prefix lists in prefix filtration, packet filtering, and other applications Handle any RIPv2 deployment scenario n Implement EIGRP, including classical and named operation modes and interoperation Use advanced OSPF techniques, including route filtration, LSA operation, stub configurations, and update filtering Understand what happens when you perform redistribution, and manage problematic scenarios Manage complex BGP capabilities, including Adjacency State Machine Operate IPv6 in complex network environments, including DMVPN Focus on QoS mechanisms that CCIE still covers, including traffic marking, classification, policing, and shaping Deploy IPsec VPN solutions including GRE/IPSec tunnel mode, multi-site VPN technologies, and their encryption Implement multicasting in environments requiring end-to-end IPv4 and IPv6 transport Address operational and deployment issues involving MPLS VPNv4 tunnels…”
    Libro electrónico
  16. 25716
    Publicado 2015
    “…. - Chapter 7, “GRS EQDQ Monitor” on page 19 describes the monitor capture diagnostics for problem determination while minimizing the effect to system performance. - Chapter 8, “BCPii System Management Facilities recording” on page 23 describes the record changes to hardware. - Chapter 9, “Provisioning based on CPU consumption” on page 25 describes the provisioning that is dynamically based on CPU consumption. - Chapter 10, “System REXX enhancements” on page 31 describes the new functions and interfaces of System Rexx. …”
    Libro electrónico
  17. 25717
    Publicado 2017
    “…You will learn how to include existing high-performance web code into your VR app. This book will also take you through upgrading and publishing your app. …”
    Libro electrónico
  18. 25718
    Publicado 2017
    “…They are extensively used to not only measure your system's performance, but also to forecast capacity issues. This is where Zabbix, one of the most popular monitoring solutions for networks and applications, comes into the picture. …”
    Libro electrónico
  19. 25719
    Publicado 2017
    “…Its key strengths are its software infrastructure and resource-constrained applications, including desktop applications, servers, and performance-critical applications, not to forget its importance in game programming. …”
    Libro electrónico
  20. 25720
    Publicado 2017
    “…What You Will Learn Understand common security vulnerabilities and how to resolve them Learn to perform initial penetration testing to uncover common security vulnerabilities Implement authentication and authorization Learn to utilize existing corporate infrastructure such as LDAP, Active Directory, Kerberos, CAS, OpenID, and OAuth Integrate with popular frameworks such as Spring, Spring-Boot, Spring-Data, JSF, Vaaden, jQuery, and AngularJS. …”
    Libro electrónico