Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
5341
-
5342Publicado 2008“…New performance of the old Vs. young drama…”
Libro -
5343Publicado 2022“…Process tabular data and build high-performance query engines on modern CPUs and GPUs using Apache Arrow, a standardized language-independent memory format, for optimal performance Key Features Learn about Apache Arrow's data types and interoperability with pandas and Parquet Work with Apache Arrow Flight RPC, Compute, and Dataset APIs to produce and consume tabular data Reviewed, contributed, and supported by Dremio, the co-creator of Apache Arrow Book Description Apache Arrow is designed to accelerate analytics and allow the exchange of data across big data systems easily. …”
Libro electrónico -
5344por Seemann, MarkTabla de Contenidos: “…14.1.4 Blindschreiben -- 14.2 Team-Rhythmus -- 14.2.1 Regelmäßige Aktualisierung der Abhängigkeiten -- 14.2.2 Andere Dinge planen -- 14.2.3 Gesetz von Conway -- 14.3 Fazit -- Kapitel 15: Die üblichen Verdächtigen -- 15.1 Performance -- 15.1.1 Altlast -- 15.1.2 Verständlichkeit -- 15.2 Security -- 15.2.1 STRIDE -- 15.2.2 Spoofing -- 15.2.3 Tampering -- 15.2.4 Repudiation -- 15.2.5 Information Disclosure -- 15.2.6 Denial of Service -- 15.2.7 Elevation of Privilege -- 15.3 Andere Verfahren -- 15.3.1 Eigenschaft-basiertes Testen -- 15.3.2 Verhaltensbezogene Codeanalyse -- 15.4 Fazit -- Kapitel 16: Tour -- 16.1 Navigation -- 16.1.1 Das Gesamtbild erkennen -- 16.1.2 Organisation der Dateien -- 16.1.3 Details aufspüren -- 16.2 Architektur -- 16.2.1 Monolith -- 16.2.2 Zyklen -- 16.3 Verwendung -- 16.3.1 Aus Tests lernen -- 16.3.2 Schenken Sie den Tests Beachtung -- 16.4 Fazit -- Anhang A: Liste der Verfahren -- A.1 50/72-Regel -- A.2 80/24-Regel -- A.3 Abhängigkeiten regelmäßig aktualisieren -- A.4 Advokat des Teufels -- A.5 Arrange, Act, Assert -- A.6 Ausnahmen von der Regel begründen -- A.7 Bedrohungsmodell -- A.8 Bisektion -- A.9 Checkliste für eine neue Codebasis -- A.10 Code-Reviews -- A.11 Decorators für Cross-Cutting Concerns -- A.12 Feature-Flag -- A.13 Fehler als Tests reproduzieren -- A.14 Functional Core, Imperative Shell -- A.15 Kommunikationshierarchie -- A.16 Namen ausixen -- A.17 Parsen, nicht überprüfen -- A.18 Robustheitsgrundsatz -- A.19 Rot-Grün-Refactor -- A.20 Refactoring von Test- und Produktionscode trennen -- A.21 Semantische Versionierung -- A.22 Slice -- A.23 Strangler -- A.24 Prämisse der Priorität der Transformation -- A.25 Trennung von Befehlen und Abfragen -- A.26 X-getriebene Entwicklung -- A.27 Zählen der Variablen -- A.28 Zyklomatische Komplexität -- Anhang B: Bibliografie…”
Publicado 2022
Libro electrónico -
5345Publicado 2018“…By the end of this book, you will be in a position to handle the growing amounts of data and perform everyday activities that a data science professional performs. …”
Libro electrónico -
5346Publicado 2017“…Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guide About This Book Master powerful Kali Linux tools for digital investigation and analysis Perform evidence acquisition, preservation, and analysis using various tools within Kali Linux Implement the concept of cryptographic hashing and imaging using Kali Linux Perform memory forensics with Volatility and internet forensics with Xplico. …”
Libro electrónico -
5347Publicado 2021Tabla de Contenidos: “…. -- How it works... -- Performing a manual switchover using Patroni -- Getting ready... -- How to do it... -- How it works... -- Chapter 6: Connection Pooling and Load Balancing -- Technical requirements -- Installing pgBouncer on a Linux server -- Getting ready... -- How to do it... -- How it works... -- Creating a pgBouncer configuration file -- Getting ready... -- How to do it... -- How it works... -- Configuring the pool settings on pgBouncer -- Getting ready... -- How to do it... -- How it works... -- Starting and stopping the pgBouncer service -- Getting ready... -- How to do it... -- How it works... -- Installing HAProxy on Linux servers -- Getting ready... -- How to do it... -- How it works... -- Using xinetd to detect a primary or a standby -- Getting ready... -- How to do it... -- How it works... -- Creating an HAProxy configuration file -- Getting ready... -- How to do it... -- How it works... -- Starting and stopping the HAProxy service -- Getting ready... -- How to do it... -- How it works... -- Building a robust HA cluster using Patroni, pgBouncer, and HAProxy -- Getting ready... -- How to do it... -- How it works... -- Chapter 7: Securing through Authentication -- Technical requirements -- Securing client connections using the pg_hba.conf file -- Categories in the pg_hba.conf file -- Getting ready -- How to do it..…”
Libro electrónico -
5348Publicado 2021“…Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breachesKey Features:Understand the different Azure attack techniques and methodologies used by hackersFind out how you can ensure end-to-end cybersecurity in the Azure ecosystemDiscover various tools and techniques to perform successful penetration tests on your Azure infrastructureBook Description:Security professionals working with Azure will be able to put their knowledge to work with this practical guide to penetration testing. …”
Libro electrónico -
5349
-
5350por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…A profile of student performance in reading -- Chapter 5. A profile of student performance in science -- Chapter 6. …”
Publicado 2013
Libro electrónico -
5351por Seidman, William Henry“…In every company, a select few produce more, sell more, and deliver better results. These stellar performers consistently outshine their peers-and achieve more than most would believe possible. …”
Publicado 2014
Libro electrónico -
5352Publicado 2018Tabla de Contenidos: “…-- I've timed it, and I know it takes 5 seconds for the page to load -- Machine specification -- Server specification -- JavaScript engine performance -- Networks -- So, what do we do? -- I just want Selenium to do it for me -- Page load timeout -- Script timeout -- Implicitly wait timeout -- It can slow my tests down? …”
Libro electrónico -
5353Publicado 2018Tabla de Contenidos: “…-- Preparing for a performance benchmark -- Performance with BLAS and LAPACK -- Performance with OpenBLAS -- Performance with ATLAS -- Performance with Intel MKL -- Results -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
5354Publicado 2019“…Learn dynamic programming with Julia to build apps for data analysis, visualization, machine learning, and the web Key Features Leverage Julia's high speed and efficiency to build fast, efficient applications Perform supervised and unsupervised machine learning and time series analysis Tackle problems concurrently and in a distributed environment Book Description Julia offers the high productivity and ease of use of Python and R with the lightning-fast speed of C++. …”
Libro electrónico -
5355Publicado 2023Tabla de Contenidos: “…-- The API design process -- API security risks and their mitigations -- On-premises APIs versus cloud APIs -- API development in C# -- Web API security with OWASP -- Importance of OWASP adherence in C# API development -- Creating an OWASP-compliant API -- Implementing OWASP-compliant two-factor authentication (2FA) -- OpenID Connect (OIDC) and OAuth 2.0 (OAuth2) -- Summary -- Questions -- Further reading -- Chapter 8: Addressing Cross-Cutting Concerns -- A definition of cross-cutting concerns -- Importance and impact on software development -- Common examples of cross-cutting concerns -- Logging -- Error handling and exception management -- Caching -- Performance optimization -- Transaction management -- Validation -- Auditing and compliance -- Localization and internationalization -- Logging and monitoring…”
Libro electrónico -
5356Publicado 2020Libro electrónico
-
5357Publicado 2018Tabla de Contenidos: “…Object-oriented interface -- Common customizations -- Colors -- Colornames -- Setting axis limits -- Setting ticks and tick labels -- Legend -- Annotations -- Producing grids, horizontal, and vertical lines -- EDA with seaborn and pandas -- Understanding the seaborn library -- Performing exploratory data analysis -- Key objectives when performing data analysis -- Types of variable -- Analyzing variables individually -- Understanding the main variable -- Numerical variables -- Categorical variables -- Relationships between variables -- Scatter plot -- Box plot -- Complex conditional plots -- Summary -- Chapter 5: Statistical Computing with Python -- Introduction to SciPy -- Statistics subpackage -- Confidence intervals -- Probability calculations -- Hypothesis testing -- Performing statistical tests -- Summary -- Chapter 6: Introduction to Predictive Analytics Models -- Predictive analytics and machine learning -- Understanding the scikit-learn library -- scikit-learn -- Building a regression model using scikit-learn -- Regression model to predict house prices -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
5358
-
5359Publicado 2017Tabla de Contenidos: “…Technology for the Stage ManagerWorking with the Crew; The Preset List; The Shift Plot; Paperwork Variations; The Costume Plot; Cueing; Stepping Up to Run the Show; Rehearsal Reports during the Tech Period; Chapter 7: Performances; Previews; Refining Your Routine; Opening Night; Working with Front-of-House; The Performance Report; Changing Personnel; Maintaining the Artistic Integrity of Your Show; Working with Understudies; Emergency Plans and Problem-Solving; Chapter 8: Next Steps; Moving the Production; The End of the Line-Or Is It?…”
Libro electrónico -
5360Publicado 2015Tabla de Contenidos: “…Front Cover; Contents; Preface; Author; Acknowledgments; Annotated Table of Contents; Executive Summary; Chapter 1: Creating a Project Plan; Chapter 2: Requirements Generation; Chapter 3: Senior Leadership Collaboration Workshop; Chapter 4: The Information Workmanship Standard; Chapter 5: The Conference Room Pilot; Chapter 6: Education, Training, and Implementation Framework; Chapter 7: Project Management; Chapter 8: Process Performance Management; Chapter 9: Snags, Traps, and Black Holes; Chapter 10: Conclusion; Appendix A (Chapter 1); Appendix B (Chapter 4); Appendix C (Chapter 5)…”
Libro electrónico