Mostrando 70,321 - 70,340 Resultados de 79,719 Para Buscar '"real"', tiempo de consulta: 0.31s Limitar resultados
  1. 70321
    Publicado 2012
    “… Provides an accessible foundation to Bayesian analysis using real world models This book aims to present an introduction to Bayesian modelling and computation, by considering real case studies drawn from diverse fields spanning ecology, health, genetics and finance. …”
    Libro electrónico
  2. 70322
    Publicado 2014
    Tabla de Contenidos: “…8 Challenges and Countermeasures8.1 Real-Time Challenges; 8.1.1 Persisting False Sense of Security; 8.1.2 Myths About Malware Infections and Protection; 8.2 Countermeasures and Future Developments; 8.2.1 Building a Strong Response Plan; 8.2.2 End System Security; 8.2.3 User Centric Security; 8.2.4 Network Level Security; 8.2.5 Security Assessment and Patch Management; 8.2.6 Next-generation Defenses; References; 9 Conclusion; References; Abbreviations…”
    Libro electrónico
  3. 70323
    por Fernando, A. C.
    Publicado 2011
    Tabla de Contenidos: “…-- Economic Activity -- Wants: The Basis of All Economic Activities -- Circular Flow of Economic Activity -- Real Flows -- Money Flows -- Production -- Definition -- Consumers' Goods and Producers' Goods -- Utility -- Goods -- Free Goods and Economic Goods -- Consumption Goods and Capital Goods -- Value -- Wealth -- Classes -- Wealth and Welfare -- Consumption -- Human Wants -- Formation -- Categories -- Characteristics -- Standard of Living -- Factors Affecting the Standard of Living -- The Standard of Living in India -- Engel'S Law of Family Expenditure -- Scales of Preferences -- Savings and Investment -- Summary -- Notes -- Key Words -- Discussion Questions -- Suggested Readings -- Chapter 2: National Income -- Definitions -- Marshall's Production-Based Definition -- Pigou's Income-Based Definition -- Fisher's Consumption-Based Definition -- Concepts in National-Income Analysis -- Gross National Product -- Net National Product -- National Income At Factor Cost -- Personal Income -- Personal Disposable Income -- Per Capita Income -- Measurement of National Income -- The Product Method -- The Income-Received Method -- The Consumption-Savings Method -- A Comparison of the Three Methods -- The Sectoral Composition of National Income -- Estimates of the National Income of India -- Post-Independence Background -- Special Features of the 1980-81 Series -- RBI's Role in National Income Accounting -- Advance Estimates and Quick Estimates of National Income -- Difficulties in the Measurement of National Income -- National Income Data and the Changing Profile of the Indian Economy -- Characteristics of the Indian Economy -- The National Statistical Commission…”
    Libro electrónico
  4. 70324
    Publicado 2012
    Tabla de Contenidos: “…35 Small economies won't make you wealthy but they will make you miserable -- 36 Real wealth comes from deals not fees -- 37 Understand that working for others won't necessarily make you rich - but it might -- 38 Don't waste time procrastinating - make money decisions quickly -- 39 Work as if you didn't need the money -- 40 Spend less than you earn -- 41 Don't borrow money - unless you really, really have to -- 42 Consider consolidating debts -- 43 Cultivate a skill and it'll repay you over and over again -- 44 Pay off your loans and debts as a priority -- 45 Don't be too busy earning a living to make some money -- 46 Save in big chunks - or should you? …”
    Libro electrónico
  5. 70325
    por Applegate, Jane
    Publicado 2011
    Tabla de Contenidos: “…Find the Right Office Space; 58. Hire a Savvy Real Estate Broker…”
    Libro electrónico
  6. 70326
    Publicado 2017
    Tabla de Contenidos: “…in Poker -- The Good Chasing the Bad -- Zombies Make you Skinnier -- Flipping other Core Drives Off -- Ultimate Loss vs Executable Loss -- A Caveat: Avoiding the Avoidance -- Game Techniques in Loss and Avoidance -- Core Drive 8: The Big Picture -- Chapter 13: Left Brain vs Right Brain Core Drives -- Using Octalysis in the Real World -- Left Brain vs. Right Brain Core Drives -- Extrinsic vs Intrinsic Motivation -- Slight Semantic Differences with the Self-Determination Theory -- Motivation Traps in Gamification Campaigns -- The Problem with Educational Systems -- Pay to Not Play -- How Market Settings Reverse Social Settings -- The Advantages of Extrinsic Motivation Design -- How to Make an Experience More Intrinsic -- Left Brain vs Right Brain Core Drives: the Bigger Picture -- Chapter 14: The Mysteries of White Hat and Black Hat Gamification -- Origins of the Theory -- The Nature of White Hat vs Black Hat Core Drives -- Zynga and Black Hat Gamification -- Black Hat with a Clear Conscious -- Gamification, Manipulation, and Ethics -- When to Use White Hat Gamification Design -- Careful Transitioning between White Hat and Black Hat -- No Buyer's Remorse from TOMS -- What about Core Drives 4 and 5? …”
    Libro electrónico
  7. 70327
    Publicado 2018
    Tabla de Contenidos: “…Managing packages -- Dependencies -- Bootstrap dependency -- A better Hello World -- Modules -- Components -- Handling events -- Data binding -- One way -- Two way -- Services -- Routes -- routerLinkActive -- Building a project -- Setup and run sample -- Introduction to PrimeNG -- Summary -- Chapter 10: Angular Forms -- Two approaches to forms -- Template-driven forms -- Reactive forms -- Understanding forms with an example -- Building custom forms with validations -- Checking the state of a form -- Forms with NgModel -- Reactive forms -- Setting up forms with FormBuilder -- Adding validations -- Creating a custom validator -- Grouping controls -- Setting and patching values -- Handling forms in Angular -- Gaining more control with reactive forms -- Summary -- Chapter 11: Building a Real-World Application -- Building an Issue Management System frontend -- Setup -- Structuring the project -- Working independently of the backend -- Data models -- Securing the application -- Issue lists and details -- Rendering data with templates -- Injectable service -- Issue creation and updates -- Reactive forms -- Validation -- Issue comments -- Chatting on an issue -- Production-ready build -- Summary -- Chapter 12: Connecting Angular to Java EE Microservices -- Integration with microservices -- Docker - focusing made easy -- Verifying the running services -- Cross Origin Resource Sharing (CORS) -- JSON communication -- Observables in Angular -- Dynamic updates using Observables -- Going to production -- Deploying on the cloud using AWS -- Launching the Amazon EC2 instance -- Installing Docker on Amazon EC2 -- Docker release -- Summary -- Chapter 13: Testing Java EE Services -- Testing strategies for microservices -- Understanding the testing pyramid -- Unit testing -- Integration testing -- End-End testing -- Microservice testing challenges -- Contract testing…”
    Libro electrónico
  8. 70328
    Publicado 2017
    “…Learn the fundamentals of vue.js by creating complex SPAs with Vuex, vue-router and more About This Book We bridge the gap between "learning" and "doing" by providing real-world examples that will improve your web development skills with Vue.js Explore the exciting features of Vue.js 2 through practical and interesting examples Explore modern development tools and learn how to utilize them by building applications with Vue.js Who This Book Is For This book is for developers who know the basics of JavaScript and are looking to learn Vue.js with real examples. …”
    Libro electrónico
  9. 70329
    Publicado 2010
    Tabla de Contenidos: “…Intro -- Cover -- Table of Contents -- Introduction -- About This Book -- About You -- About Objective-C -- What You Need -- How to Read This Book -- Conventions Used in This Book -- PART I: Understanding the Objective-C Language -- HOUR 1: Starting Your First Application: A Calculator -- Setting Up Your Development Tools -- Using Xcode -- Using Interface Builder -- Summary -- Workshop -- Exercise -- HOUR 2: Handling Interaction -- Objective-C -- Binding an Object to the User Interface -- Basic Memory Management -- Invoking Methods on nil -- Type Checking Rules -- Type Equivalence -- Type Checking -- Summary -- Q&amp -- A -- Workshop -- Exercise -- HOUR 3: Simplifying Your Code -- Managing Memory with NSAutoReleasePools -- Objective-C Strings -- Introducing the Debugger -- Understanding Messaging -- Debugging a Real Bug -- Using Shorthands -- Summary -- Q&amp -- A -- Workshop -- Exercises -- HOUR 4: Making the Calculator Calculate -- A Simple Calculator -- Mutable Classes: Making a "Printing" Calculator -- Dynamic Objective-C -- Summary -- Q&amp -- A -- Workshop -- Exercises -- HOUR 5: Adding Variables to the Calculator -- A Better Model/Controller Split -- Using an NSDictionary to Add Variables to the Calculator -- The Key-Value Coding and Observing Protocols -- Summary -- Workshop -- Exercise -- PART II: User-Interface Foundations -- HOUR 6: Understanding How the User Interface Is Built -- User-Interface Building-Blocks: Views -- Building the UI from Views -- Summary -- Q&amp -- A -- Workshop -- Exercise -- HOUR 7: Understanding How Events Are Processed -- Run Loops and Core Foundation -- How Cocoa Uses the Run Loop -- Touch Event Dispatching -- Summary -- Q&amp -- A -- Workshop -- Exercises -- HOUR 8: Drawing User-Interface Elements -- Adding Images to UIButton -- Core Graphics -- Drawing Your Own Button -- Summary -- Q&amp -- A -- Workshop…”
    Libro electrónico
  10. 70330
    Publicado 2012
    Tabla de Contenidos: “…Intro -- Reverse Deception -- About the Authors -- About the Technical Editor -- Contents -- Foreword -- Cyberspace Is the Wild West -- Definition of Deception -- The Real Purpose of Deception -- Costs and Risks? -- Who Should Deceive? …”
    Libro electrónico
  11. 70331
    Publicado 2024
    Tabla de Contenidos: “…-- Zero Trust in security operations -- Zero Trust principles and architecture -- Zero Trust pillars -- A real-life example -- Case study analysis -- Future of Zero Trust -- Summary -- Further reading -- Chapter 2: Introduction to XDR and SIEM -- Understanding XDR and SIEM -- What is XDR and how did it start? …”
    Libro electrónico
  12. 70332
    por Ramos, Brais Brenlla
    Publicado 2023
    “…Since the launch of the first edition of this book, based on the Unreal Engine 5 technology, real-time rendering has only grown in popularity. …”
    Libro electrónico
  13. 70333
    Publicado 2024
    “…In the book, you'll see real in-the-field examples of researchers using AI with replicable methods and reusable AI code to inspire your own uses. …”
    Libro electrónico
  14. 70334
    por Singh, Paul
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  15. 70335
    Publicado 2024
    Tabla de Contenidos: “…Centralizing Engagement in the Customer Hub -- Customer Hub Supports the Full Product Management Workflow -- Closing the Loop -- Finding a Balance -- All-in-One Customer Education -- Customer Hub in Your Tech Stack -- Looking Ahead -- Chapter 13 Law 9: Community Should Drive Real Business Outcomes: Don't Get Fooled by Vanity Metrics-Demand Real Business MetricsBy Bas van Leeuwen, Valerie Molina, and Kenneth Refsgaard -- A Reporting Framework Based on Value -- Prioritizing Business Outcomes Over Outputs -- Start from the Top and Work Your Way Down -- Leading and Lagging Indicators -- Calculating Direct Correlations -- Community Health and Operational Metrics -- Proving Value Drives Executive Buy-in -- Chapter 14 Law 10: Bring Your Culture and Values to Your Community: Build with a Human-First MindsetBy Nick Mehta -- Company Culture -- Breaking the Walls: Company Culture = Brand = Community Culture -- Principles of Community Culture -- Define Your Values: What Is Common About Your Tribe -- Determine What Your Community Stands For -- Identify and Embrace Your Community's Authentic Quirks -- Build a Brand and Voice for Your Community -- Use Vulnerability to Open People Up -- Conclusion -- Part III How to Get Started -- Chapter 15 Building Blocks to Successfully Starting a Community: Putting Together a Strong Strategy in Five Steps -- Step 1: Determine Your Goals and Priorities and Map Them to Community Use Cases -- Step 2: Understand Your Audience and Key Personas -- Step 3: Reflect on Your Organization and Culture -- Step 4: Consider Your Ecosystem -- Step 5: Compile Your Learnings into a Community Strategy and Action Plan -- What to Expect in Your First Year -- The Four Quadrants of Community Maturity -- You're Excited to Get Started but Someone Else Isn't? …”
    Libro electrónico
  16. 70336
    por Oner, Vedat Ozan
    Publicado 2023
    “…Starting with IoT essentials supported by real-world use cases, this book takes you through the entire process of constructing an IoT device using ESP32. …”
    Libro electrónico
  17. 70337
    Publicado 2024
    Tabla de Contenidos: “…Part 3: Math and Cryptography in Malware -- Chapter 9: Exploring Hash Algorithms -- Technical requirements -- Understanding the role of hash algorithms in malware -- Cryptographic hash functions -- Applying hashing in malware analysis -- A deep dive into common hash algorithms -- MD5 -- SHA-1 -- Bcrypt -- Practical use of hash algorithms in malware -- Hashing WINAPI calls -- MurmurHash -- Summary -- Chapter 10: Simple Ciphers -- Technical requirements -- Introduction to simple ciphers -- Caesar cipher -- ROT13 cipher -- ROT47 cipher -- Decrypting malware - a practical implementation of simple ciphers -- Caesar cipher -- ROT13 -- ROT47 -- The power of the Base64 algorithm -- Base64 in practice -- Summary -- Chapter 11: Unveiling Common Cryptography in Malware -- Technical requirements -- Overview of common cryptographic techniques in malware -- Encryption resources such as configuration files -- Practical example -- Cryptography for secure communication -- Practical example -- Payload protection - cryptography for obfuscation -- Practical example -- Summary -- Chapter 12: Advanced Math Algorithms and Custom Encoding -- Technical requirements -- Exploring advanced math algorithms in malware -- Tiny encryption algorithm (TEA) -- A5/1 -- Madryga algorithm -- Practical example -- The use of prime numbers and modular arithmetic in malware -- Practical example -- Implementing custom encoding techniques -- Practical example -- Elliptic curve cryptography (ECC) and malware -- Practical example -- Summary -- Part 4: Real-World Malware Examples -- Chapter 13: Classic Malware Examples -- Historical overview of classic malware -- Early malware -- The 1980s-2000s - the era of worms and mass propagation -- Malware of the 21st century -- Modern banking Trojans -- The evolution of ransomware -- Analysis of the techniques used by classic malware…”
    Libro electrónico
  18. 70338
    por Aravilli, Srinivas Rao
    Publicado 2023
    Tabla de Contenidos: “…Privacy-enhancing technologies -- Differential privacy -- Federated learning -- Secure multi-party computation (SMC) -- Homomorphic encryption -- Anonymization -- De-identification -- Differential privacy -- Summary -- Chapter 4: Overview of Differential Privacy Algorithms and Applications of Differential Privacy -- Differential privacy algorithms -- Laplace distribution -- Gaussian distribution -- Comparison of noise-adding algorithms to apply differential privacy -- Generating aggregates using differential privacy -- Sensitivity -- Queries that use differential privacy -- Clipping -- Overview of real-life applications of differential privacy -- Differential privacy usage at Uber -- Differential privacy usage at Apple -- Differential privacy usage in the US Census -- Differential privacy at Google -- Summary -- Chapter 5: Developing Applications with Differential Privacy Using Open Source Frameworks -- Open source frameworks to implement differential privacy -- Introduction to the PyDP framework and its key features -- Examples and demonstrations of PyDP in action -- Developing a sample banking application with PyDP to showcase differential privacy techniques -- Protecting against membership inference attacks -- Applying differential privacy to large datasets -- Use case - generating differentially private aggregates on a large dataset -- PipelineDP high-level architecture -- Tumult Analytics -- Machine learning using differential privacy -- Synthetic Dataset Generation: Introducing Fraudulent Transactions -- Develop a classification model using scikit-learn -- High-level implementation of the SGD algorithm -- Applying differential privacy options using machine learning -- Generating gradients using differential privacy -- Clustering using differential privacy -- Deep learning using differential privacy -- Fraud detection model using PyTorch…”
    Libro electrónico
  19. 70339
  20. 70340
    “…La cuestión del dominio que ejerce el ser humano sobre lo real revela el elemento constitutivo del ser humano como realidad que, por ser dueño de su existencia. …”
    Libro