Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
19961Adobe Photoshop Lightroom Classic for dummiesAdobe Photoshop Lightroom Classic For DummiesPublicado 2022Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- How This Book Is Organized -- Part 1: Getting Started with Lightroom Classic -- Part 2: Managing Your Photos with Lightroom Classic -- Part 3: Working in Lightroom Classic's Digital Darkroom -- Part 4: Sharing Your Work with the World -- Part 5: The Part of Tens -- Conventions Used in This Book -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1: Getting Started with Lightroom Classic -- Chapter 1: Getting to Know Adobe Photoshop Lightroom Classic -- The Two Versions of Lightroom -- Understanding the Creative Cloud -- Creative Cloud Photography Plan -- Figuring out whether Lightroom Classic is right for you -- Knowing whether you need the new Lightroom -- Introducing the Lightroom Classic Interface -- Getting what makes each module unique -- What the Lightroom Classic modules have in common -- Controlling the Lightroom Classic interface -- Using Lightroom Classic's secondary display view -- Getting Up and Running -- Preparing for installation -- Chapter 2: Working with Catalogs -- Understanding How the Catalog Works -- One catalog to rule them all -- Knowing where the catalog is located -- Choosing which catalog to open -- Caring for the Catalog -- Backing up your catalog -- Optimizing your catalog -- Managing the preview cache files -- Exploring the Metadata options -- Working with Multiple Catalogs -- Transferring data between catalogs -- Chapter 3: Lightroom Classic Basics That You Should Know -- Configuring Lightroom Classic Preferences -- General preferences -- The Presets preferences -- The External Editing preferences -- Setting up additional external editors -- The File Handling preferences -- The Interface preferences -- The Performance preferences -- The Lightroom Sync preferences -- The Display preferences…”
Libro electrónico -
19962Publicado 2024Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- Introduction -- Part I: Initial Connection -- Chapter 1: DNS Lookup Time -- What DNS Lookup Time Measures -- DNS Resolution Steps -- How a Visitor's Geographic Location Affects DNS Lookup Time -- DNS TTL: IP Address Cache Duration -- Optimal DNS TTL Value -- Implications of Third-party Resources -- Measuring DNS Lookup Time -- DNS Lookup Time Benchmarks -- Global DNS Lookup Time: DNS Speed Benchmark -- Domain Connections: WebPageTest -- Dig Test: DiG GUI -- Ways to Improve DNS Lookup Time -- Select Faster DNS Provider -- Prefetch Third-Party Domains: dns-prefetch and preconnect -- Recap: When to Use DNS Lookup Time -- Chapter 2: Time to First Byte (TTFB) -- What Time to First Byte Measures -- Process Before the Server Sends the First Byte -- How Servers Build a Response -- How Redirects Impact TTFB -- Scenario 1: Redirect Destination URL on the Same Domain -- Scenario 2: Redirect Destination URL on Another Domain -- Implications of Third-party Resources -- Measuring Time to First Byte -- TTFB Benchmarks -- TTFB by Location: KeyCDN Performance Test -- TTFB Details: Byte Check -- TTFB Additional Details: WebPageTest -- Ways to Improve Time to First Byte -- Caching Internal Resources -- Choose Faster Hosting Provider -- Recap: When to Use Time to First Byte -- Part II: Displaying the Page -- Chapter 3: DOMContentLoaded Time -- What DOMContentLoaded Measures -- HTML Parsing -- Document Object Model (DOM) -- How CSS Affects Parsing -- How JavaScript Affects Parsing -- Measuring DOMContentLoaded -- DCL Time Benchmarks -- DOM Size Benchmarks -- Browser Timings: GTmetrix -- DOM Elements: PageSpeed Insights -- DOM Nodes: Google Chrome DevTools -- Ways to Improve DOMContentLoaded -- HTML Reduction -- Changing How JavaScript Loads: Async and Defer -- Asynchronous Loading -- Deferring JavaScript Load…”
Libro electrónico -
19963Publicado 2024Tabla de Contenidos: “…Storing and transforming real-time data using Kinesis Data Firehose -- Different ways of ingesting data from on-premises into AWS -- AWS Storage Gateway -- Snowball, Snowball Edge, and Snowmobile -- AWS DataSync -- AWS Database Migration Service -- Processing stored data on AWS -- AWS EMR -- AWS Batch -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 4: Data Preparation and Transformation -- Identifying types of features -- Dealing with categorical features -- Transforming nominal features -- Applying binary encoding -- Transforming ordinal features -- Avoiding confusion in our train and test datasets -- Dealing with numerical features -- Data normalization -- Data standardization -- Applying binning and discretization -- Applying other types of numerical transformations -- Understanding data distributions -- Handling missing values -- Dealing with outliers -- Dealing with unbalanced datasets -- Dealing with text data -- Bag of words -- TF-IDF -- Word embedding -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 5: Data Understanding and Visualization -- Visualizing relationships in your data -- Visualizing comparisons in your data -- Visualizing distributions in your data -- Visualizing compositions in your data -- Building key performance indicators -- Introducing QuickSight -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 6: Applying Machine Learning Algorithms -- Introducing this chapter -- Storing the training data -- A word about ensemble models -- Supervised learning -- Working with regression models -- Introducing regression algorithms -- Least squares method -- Creating a linear regression model from scratch -- Interpreting regression models -- Checking adjusted R squared -- Regression modeling on AWS -- Working with classification models -- Forecasting models…”
Libro electrónico -
19964Þáttasyrpa – Studien zu Literatur, Kultur und Sprache in Nordeuropa Festschrift für Stefanie GropperPublicado 2022Tabla de Contenidos: “…Repetitive und schematische Narration in Reykdœla saga und Harðar saga im Spiegel von Forschungsgeschichte und Narratologie -- Bibliographie -- Primärliteratur -- Handschriften -- Sekundärliteratur -- Misplaced Trust and Failed/False Friendship - Betraying the Poet in Gunnlaugs saga ormstungu and Bjarnar saga Hítdœlakappa -- Bibliography -- Primary Sources -- Secondary Sources -- Wooden Performances: Carving and Versifying níð and Idolatry -- Bibliography -- Primary Sources -- Secondary Sources -- Þuríðr Barkardóttir and the Poetry of Eyrbyggja saga -- The stanzas quoted in Eyrbyggja saga…”
Libro electrónico -
19965Publicado 2023Tabla de Contenidos: “…Secure coding practices versus safe coding techniques -- Synergies and differences in the testing phase -- Summary -- References -- Part 3: Executing the Process to Engineer a Secure Automotive Product -- Chapter 7: A Practical Threat Modeling Approach for Automotive Systems -- The fundamentals of performing an effective TARA -- Assets -- Damage scenarios -- Threat scenarios -- Attacker model and threat types -- Attack paths -- Risk assessment methods -- Risk treatment -- Common pitfalls when preparing a TARA -- Defining the appropriate TARA scope -- The practical approach -- Know your system -- Make your assumptions known -- Use case-driven analysis -- Prepare context and data flow diagrams -- Damages versus assets - where to start -- Identifying assets with the help of asset categories -- Building threat catalogs -- Creating attack paths using a system flow diagram -- Risk prioritization -- Defining cybersecurity goals -- Choosing security controls and operational environment (OE) requirements -- Tracking shared and accepted risks -- Review and signoff -- Case study using a digital video recorder (DVR) -- Assumptions -- Context diagram -- Identifying the assets -- Damage scenarios -- Cybersecurity requirements and controls -- Summary -- References -- Chapter 8: Vehicle-Level Security Controls -- Choosing cybersecurity controls -- Challenging areas -- Vehicle-level versus ECU-level controls -- Policy controls -- Secure manufacturing -- Challenges -- Secure off-board network communication -- Wi-Fi -- Bluetooth -- Cellular -- Host-based intrusion detection -- Network intrusion detection and prevention (NIDP) -- Domain separation and filtering -- Sensor authentication -- Secure software updates -- In-vehicle network protection -- CAN message authentication -- Ethernet -- Securing diagnostic abilities -- Security access control via UDS service 0x27…”
Libro electrónico -
19966Publicado 2023Tabla de Contenidos: “…Planning considerations -- Reviewing the marketing plan -- Global cultural considerations -- Global cultural groupings -- The role of direct marketing in IMC -- Difference between direct marketing and traditional advertising -- When to use direct marketing -- Market characteristics that influence IMC effectiveness -- Product differentiation -- Market position -- Poor performance -- Competitive activity -- Relative advertising versus promotion strengths -- Category need -- Brand awareness -- Brand attitude -- Brand purchase intention -- Advantages of using advertising and promotion together -- The advertising and promotion 'ratchet effect' -- The impact of demand elasticity -- Summary -- Review questions -- References -- 12. …”
Libro electrónico -
19967Publicado 2023Tabla de Contenidos: “…Using Power Analyses 4.1 Estimating the Effect Size 4.2 Using the One-Stop Tables and the R Code/Shiny Web app to Perform Power Analyses 4.2.1 Worked Example: Calculating F-equivalents and Power 4.3 Four Applications of Statistical Power Analysis 4.4 Calculating Power 4.5 Determining Sample Sizes 4.6 A Few Simple Approximations for Determining Sample Size Needed 4.7 Determining the Sensitivity of Studies 4.8 Determining Appropriate Decision Criteria 4.8.1 Finding a Sensible Alpha 4.9 Post-Hoc Power Analysis Should be Avoided 4.10 Summary 5. …”
Libro electrónico -
19968por Flora, S. J. S.Tabla de Contenidos: “…-- Principles of body and respiratory protection -- Individual protection -- Respiratory protection -- Gas filter -- Air-supplying devices -- Body protection -- NBC suit -- Impermeable NBC suit: -- Permeable NBC suit: -- Recent developments in IPE: -- Integrated hood mask -- Facelet mask -- Impermeable overboots -- Impermeable gloves -- Testing and classification of commercially available BWA suits -- Collective protection -- Level of protection -- Performance requirement of protective clothing and facemask against BWA -- Protection through vaccine and antibiotics -- Materials used for the fabrication of IPEs -- State-of-the-art products available for protection…”
Publicado 2020
Libro electrónico -
19969por OECDTabla de Contenidos: “…Addressing the challenge of VAT collection on imports of "low-value" goods -- 2.9. Measuring performance of VAT: The VAT Revenue Ratio -- 2.9.1. …”
Publicado 2022
Libro electrónico -
19970Publicado 2022Tabla de Contenidos: “…-- From the top-down to the bottom-up -- Benefits and challenges of risk management -- Building and implementing a risk management plan -- Qualitative risk analysis -- Quantitative risk analysis -- Difference between qualitative and quantitative risk analysis -- When to perform a qualitative and quantitative risk analysis -- Summary -- Part 3: Escape from Chaos -- Chapter 6: Define ISO 27001 Mandatory Requirements -- ISO 27001 operations -- The ISO 27001 standard - what it is and what requirements it establishes -- How to structure an iSMS -- ISO 27001 support requirements (or Clause 7) -- 7.1 - Resources required to establish and operate an iSMS -- 7.2 - Competency -- 7.3 - Awareness -- 7.4 - Communication -- 7.5 - Documented information -- Summary -- Chapter 7: Risk Management, Controls, and Policies -- Elements of project risk management -- The risk management plan -- Fundamental notions -- Risk evaluation -- Risk characteristics -- Risk heatmaps -- Risk mitigation -- Best risk mitigation strategies -- How to establish risk mitigation strategies -- Data classification -- Why is the classification of data important? …”
Libro electrónico -
19971Publicado 2022Tabla de Contenidos: “…Setting Fieldselector Using the Fields Package -- Assembling One Term Selectors -- Parsing a FieldSelector String -- Using a Set of Key-Value Pairs -- Deleting a Resource -- Deleting a Collection of Resources -- Updating a Resource -- Using a Strategic Merge Patch to Update a Resource -- Applying Resources Server-side with Patch -- Server-side Apply Using Apply Configurations -- Building an ApplyConfiguration from Scratch -- Building an ApplyConfiguration from an Existing Resource -- Watching Resources -- Errors and Statuses -- Definition of the metav1.Status Structure -- Error Returned by Clientset Operations -- RESTClient -- Building the Request -- Executing the Request -- Exploiting the Result -- Getting Result as a Table -- Discovery Client -- RESTMapper -- PriorityRESTMapper -- DeferredDiscoveryRESTMapper -- Conclusion -- Chapter 7: Testing Applications Using Client-go -- Fake Clientset -- Checking the Result of the Function -- Reacting to Actions -- Checking the Actions -- Fake REST Client -- FakeDiscovery Client -- Stubbing the ServerVersion -- Actions -- Mocking Resources -- Conclusion -- Chapter 8: Extending Kubernetes API with Custom Resources Definitions -- Performing Operations in Go -- The CustomResourceDefinition in Detail -- Naming the Resource -- Definition of the Resource Versions -- Converting Between Versions -- Schema of the Resource -- Deploying a Custom Resource Definition -- Additional Printer Columns -- Conclusion -- Chapter 9: Working with Custom Resources -- Generating a Clientset -- Using deepcopy-gen -- Installing deepcopy-gen -- Adding Annotations -- Running deepcopy-gen -- Using client-gen -- Installing client-go -- Adding Annotations -- Adding AddToScheme Function -- Running client-go -- Using the Generated Clientset -- Using the Generated fake Clientset -- Using the Unstructured Package and Dynamic Client…”
Libro electrónico -
19972por Institute of Medicine (U.S.).Tabla de Contenidos: “…Reasons for Using Cost-Effectiveness Analysis -- Limits of Cost-Effectiveness Analysis -- Ethical Issues -- Analytic Perspectives -- Time Horizon and Discounting -- MODEL OVERVIEW -- Health Benefits: The Denominator -- Quality Adjustments: Weighting -- Morbidity Scenarios -- Quality Adjustments for Average Population Health States -- Disease Incidence and Death Rates -- Time Intervals -- QALYs Gained with Vaccine Use -- Costs: The Numerator -- Cost of Research and Development -- Cost of Vaccine Use -- Health Care Costs -- Vaccine Efficacy and Utilization -- Cost-Effectiveness Ratios -- Exclusions from the Analysis -- EXAMPLES: HYPOTHETICAL VACCINE X -- Target Population -- Program Considerations -- Disease Severity -- Discounting -- An Idealized Scenario -- Summary -- RESULTS -- Challenges -- 5 Review of the Analytic Model -- UNIT OF ANALYSIS -- IMPLEMENTING THE ANALYSIS -- Basic Model -- Performing the Analysis -- CALCULATION OF HEALTH BENEFITS -- Quality-Adjusted Life Years -- Quality-Adjustment Weights Based on the Health Utilities Index -- Steps in the Calculation of Anticipated Health Benefits from Vaccine Use -- Develop Morbidity Scenarios -- Calculate Quality-Adjustment Weights -- Calculate Discounted Quality-Adjusted Life Expectancies -- Establish Age-Specific Incidence and Death Rates -- Calculate Time Intervals for Discounting Future Health Benefits -- Calculate Condition-Related Life Expectancies -- Adjust for the Underlying Health Status of the Population -- Calculate Discounted QALYs for Each Health State -- Calculate Total QALYs Gained with Vaccine Use -- COST FACTORS -- Vaccine Development -- Vaccine Use -- Cost of Care -- VACCINE EFFICACY AND UTILIZATION -- COST-EFFECTIVENESS RATIOS -- 6 Ethical Considerations and Caveats -- ETHICAL AND VALUE JUDGMENTS BUILT INTO THE MODEL -- All QALYs Count Equally…”
Publicado 2000
Libro electrónico -
19973por Institute of Medicine (U.S.).Tabla de Contenidos: “…-- Evaluating and Improving Categorical Funding -- Strengthening Global STD Prevention Efforts -- Improving Surveillance and Other Information Systems -- Enhancing the Current System -- Utilizing Health Services Performance Measures -- STRATEGY 3 FOCUS ON ADOLESCENTS AND UNDERSERVED POPULATIONS -- Focusing On Prevention -- Expanding Prevention-Related Research -- Developing Female-Controlled Methods for Protecting Against STDs -- Focusing On Adolescents -- Ensuring Effective, Early Interventions and Confidentiality…”
Publicado 1997
Libro electrónico -
19974por Rao , K. Rama MohanaTabla de Contenidos: “…-- Steps in the Development of a New Service -- Success Factors for a New Product -- Service-line Decisions -- The Service Product Mix -- Service-line Decisions -- Service Differentiation -- Service Life-cycle Management -- Summary -- Key Terms -- Brief Questions -- Essay Questions -- Assignments -- References -- Chapter 12: Service Branding and Positioning -- Introduction -- Service Branding -- Goods Branding Versus Services Branding -- Choosing Brand Elements -- Benefits of Branding -- The Brand Value Chain -- Corporate Branding for Services -- Indian Consumers' Brand Loyalty and Performance Rating of Select Service Brands -- Brand Equity -- Service Positioning -- Frame of Reference -- Positioning Strategies -- Summary -- Key Terms -- Brief Questions -- Essay Questions -- Assignments -- References -- Chapter 13: Physical Evidence…”
Publicado 2011
Libro electrónico -
19975por Knights, DavidTabla de Contenidos: “…Critical leadership dialectics -- Introduction -- Leadership and power -- Dialectics -- Performativity -- Critical dialectical leadership studies -- Power as dialectical struggle -- Power as gendered/intersectional -- Power as (im)moral, (un)survivable, (un)reflexive, (un)discussable -- Concluding discussion -- Notes -- References -- 10. …”
Publicado 2024
Libro electrónico -
19976Publicado 2014“…By "image analysis" we understand, however, all kinds of operation performed on images (or sequences of images) in order to extract qualitative or quantitative data, perform measurements and apply statistical analysis. …”
Libro electrónico -
19977
-
19978por Blanchard, Kenneth H.
Publicado 1992Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
19979Publicado 2016“…JMP 13 Basic Analysis covers the initial types of analyses that you often perform in JMP, such as univariate, bivariate, and oneway analyses. …”
Libro electrónico -
19980Publicado 2018“…5+ Hours of Video Instruction More than 5 hours of video instruction to help you perform ethical hacking, penetration testing, and security posture assessment through compromising, analyzing, and mitigating web application vulnerabilities. …”