Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
25681Publicado 2020“…Skill Level Intermediate Learn How To Preprocess natural language data for use in machine learning applications Transform natural language into numerical representations with word2vec Make predictions with Deep Learning models trained on natural language Apply state-of-the-art NLP approaches with Keras, the high-level API for TensorFlow 2 Improve Deep Learning model performance by selecting appropriate model architectures and tuning model hyperparameters Who Should Take This Course These LiveLessons are perfectly suited to software engineers, data scientists, analysts, and statisticians with an interest in applying Deep Learning to natural language data. …”
-
25682Publicado 2020“…Skill Level Intermediate Learn How To Build deep learning models in all the major libraries: TensorFlow, Keras, and PyTorch Understand the language and theory of artificial neural networks Excel across a broad range of computational problems including machine vision, natural language processing, and reinforcement learning Create algorithms with state-of-the-art performance by fine-tuning model architectures Self-direct and complete your own Deep Learning projects Who Should Take This Course Software engineers, data scientists, analysts, and statisticians with an interest in deep learning. …”
-
25683Publicado 2018“…As a consultant, he is specialized in Linux High Availability solutions and Performance Optimization. More information about Sander is on his website at www.sandervanvugt.com . …”
-
25684Publicado 2015“…As Ansel Adams said, “The negative is comparable to the composer's score and the print to its performance.” In that same spirit, The Visual Palette considers both image capture and post-processing as equal partners in the creation of the image and the expression of one’s vision. …”
Libro electrónico -
25685Publicado 2024“…Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. …”
Libro electrónico -
25686Publicado 2006“…A comprehensive introduction to the theory and practical applications of content networking Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and streaming media Master the application-layer protocols, including HTTP, SSL, RSTP, RTP and FTP Design redundancy and high availability by using server load balancing, Domain Name System (DNS) directory services, Cisco DistributedDirector software, proximity-based load balancing, and global sticky databases Learn to switch and offload encrypted content by importing, creating, and configuring certificates and keys in Secure Sockets Layer (SSL) termination devices Examine how to configure routers with Web Cache Communication Protocol (WCCP) and to switch content requests to content engines for serving frequently requested objects Learn how to configure caching, live push- and pull-splitting, content acquisitioning, and pre-positioning using Cisco Application and Content Networking System (ACNS) software Content networking is the most popular technology used to enhance network and application performance. The growth of content networking has been driven by end-user demands for richer content and lowered response times. …”
Libro electrónico -
25687Publicado 2008“…Plan and migrate from Windows 2000/2003 to Windows 2008 Leverage new tools and utilities that simplify system and network administration functions Enable the latest security technologies to improve secured enterprise computing Better manage a Windows 2008 Active Directory environment Optimize a Windows 2008 environment for better scalability and enhanced performance Implement Windows 2008 for better branch office and remote office integration Design a Windows 2008 environment to support the latest in clustering, stretched clusters, fault tolerance, and redundant systems technologies Take advantage of add-on technologies available for Windows 2008, including Windows SharePoint Services, Microsoft Hyper-V virtualization, Windows Media Services, and IIS 7 web server solutions Rand, Michael, Ross, and Chris work for Convergent Computing, an IT consulting firm in the San Francisco Bay area that has three and a half years of early adopter experience with Windows 2008. …”
Libro electrónico -
25688Publicado 2005“…Meant to be used in a hands-on capacity, this transportable guide is a practical tool when performing a variety of tasks on your wireless network. …”
Libro electrónico -
25689Publicado 2007“…Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. …”
Libro electrónico -
25690Publicado 2007“…This guide takes you from the absolute basics through advanced techniques, such as measures of performance and change control. You’ll learn how to • Accurately scope projects and build workable timetables • Create trustworthy budgets and use them to manage your project • Organize work assignments for maximum efficiency • Build project teams, and keep them motivated • Intelligently assess quality goals, an..…”
Libro electrónico -
25691Publicado 2007“…Install and configure Ubuntu Get all your system’s devices and peripherals up and running Configure and use the X Window System Manage Linux services and users Run a printer server Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Learn shell scripting Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Create and maintain a MySQL database Configure a firewall Set up an FTP server Use Ubuntu’s development and programming tools Tune your Ubuntu system for maximum performance Learn to manage and compile the kernel and modules Andrew Hudson is a regular freelance contributor to Linux Format magazine, the UK’s largest Linux magazine. …”
Libro electrónico -
25692Publicado 2008“…In this book, you’ll learn how to: • Identify key differences between ESX v3.x.y and ESX v2.5.x and their implications • Perform a complete installation–with automated scripting techniques and samples • Efficiently audit, monitor, and secure ESX Server • Discover SAN storage pitfalls and solutions–with detailed guidance for specific SANs, switches, and fibre-channel adapters • Understand ESX Server networking: NIC teaming, vSwitches, network lag, and troubleshooting • Configure ESX Server via the Management User Interface, Virtual Center client, and command line interface • Install Windows, Linux, and NetWare VMs: prepare media images, place configuration files, handle sizing and swap files, and more • Use Dynamic Resource Load Balancing to consistently achieve utilization goals • Implement effective backup and disaster recovery procedures Edward L. …”
Libro electrónico -
25693Publicado 2003“…Software architects and project managers will discover how SyncML components can be integrated into complete solutions; and developers will learn how to maximize the performance, reliability, and scalability of those solutions. …”
Libro electrónico -
25694por Poniatowski, Marty“…You'll find fast, easy answers for all this and more: Getting started: login, mail, Internet access, and key UNIX file management commands All basic UNIX commands and a complete UNIX file system overview (cd, cp, file, ls, mv, pwd, rm, rmdir, cut, paste, split, sort, diff, and more) Key UNIX tools—including in-depth coverage of find, vi, find, grep, sed, and awk Shells and shell programming: Bash, Korn, and C Full programming section—including a NEW user-centered introduction to C/C++ and Java End-user administration: processes, startup, shutdown, users/groups, backup, software management, printing, and more Networking and Internet protocols UNIX/Windows interoperability: Samba, X Window, NFS, Posix, Windows 2000 Services for UNIX, and other alternatives Performance and monitoring This new edition has been updated throughout and redesigned for even faster, easier access to information. …”
Publicado 2002
Libro electrónico -
25695por Shalloway, Alan“…Design Patterns Explained complements the existing design patterns texts and may perform a very useful role, fitting between introductory texts such as UML Distilled and the more advanced patterns books." …”
Publicado 2004
Libro electrónico -
25696por Dowd, Mark“…Coverage includes • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike. …”
Publicado 2007
Libro electrónico -
25697por Chand, Mahesh“…The core of the book is a hands-on guide to practical topics, including how to use Windows Forms and optimize GDI+ performance. Chapters demonstrate how to develop real-world tools such as GDI+Painter, GDI+Editor, ImageViewer, and ImageAnimator. …”
Publicado 2004
Libro electrónico -
25698Publicado 2008“…He joined Microsoft as a User Researcher after completing his Ph.D. in Experimental Psychology at Brown University with a research focus on human timing and information theory models of human performance. Seow holds Bachelor’s and Master’s Degrees in Forensic Psychology from John Jay College of Criminal Justice, and wrote his master’s thesis on distortions in..…”
Libro electrónico -
25699Publicado 2006“…In-depth coverage of all the new and improved Windows Vista tools and technologies A tour of the new Windows Vista interface, including Aero Glass What hardware you need to get the most out of Windows Vista Vista’s file system improvements, including tags, Quick Search, and virtual folders A review of Vista’s new performance and stability features A critical look at the beefed-up security features, including Windows Defender, the new Firewall, and User Account Control A complete look at Vista’s totally redesigned networking tools In-depth coverage of Vista’s new and improved tools for notebooks and Tablet PCs, digital media, and gaming Paul McFedries is the president of Logophilia Limited, a technical writing company. …”
Libro electrónico -
25700por Ballad, Tricia“…The authors explode the myths that discourage PHP programmers from attempting to secure their code and teach you how to instinctively write more secure code without compromising your software’s performance or your own productivity. Coverage includes Designing secure applications from the very beginning–and plugging holes in applications you can’t rewrite from scratch Defending against session hijacking, fixation, and poisoning attacks that PHP can’t resist on its own Securing the servers your PHP code runs on, including specific guidance for Apache, MySQL, IIS/SQL Server, and more Enforcing strict authentication and making the most of encryption Preventing dangerous cross-site scripting (XSS) attacks Systematically testing yourapplications for security, including detailed discussions of exploit testing and PHP test automation Addressing known vulnerabilities in the third-party applications you’re already running Tricia and William Ballad demystify PHP security by presenting realistic scenarios and code examples, practical checklists, detailed visuals, and more. …”
Publicado 2009
Libro electrónico