Mostrando 61 - 80 Resultados de 170 Para Buscar '"stride"', tiempo de consulta: 0.10s Limitar resultados
  1. 61
    Publicado 2018
    Tabla de Contenidos: “…Threat modeling practices -- Threat modeling with STRIDE -- Diagram designer tool -- Card games -- Threat library references -- Case study - formal documents or not? …”
    Libro electrónico
  2. 62
    Publicado 2020
    Tabla de Contenidos: “…7 Dokumentenmanagement -- 7.1 Einführung -- 7.2 Allgemeine Anforderungen an Dokumente -- 7.3 Geforderte Dokumentation -- 7.3.1 Qualitätsmanagement -- 7.3.2 Risikomanagementakte -- 7.3.3 Gebrauchstauglichkeitsakte -- 7.3.4 Dokumentation der Softwareentwicklung -- 7.3.5 Technische Dokumentation -- 7.3.6 Sonstige Dokumente -- 7.3.7 Übersicht über geforderte Dokumente -- 7.4 Umgang mit Dokumenten -- 7.5 Zusammenfassung -- 8 Medizinische Informatik -- 8.1 Einführung -- 8.1.1 Gesundheitswesen -- 8.1.2 Informationssysteme -- 8.2 Interoperabilität -- 8.2.1 Interoperabilitätsebenen -- 8.2.2 Kommunikationsstandards -- 8.2.3 Semantische Standards -- 8.3 Zusammenfassung -- 9 IT-Sicherheit bei Medizinprodukten -- 9.1 Einführung -- 9.1.1 Probleme mit der IT-Sicherheit -- 9.1.2 IT-Sicherheit: Begriffsdefinition und Ziele -- 9.1.3 Das STRIDE-Modell -- 9.2 Regulatorische Rahmen -- 9.2.1 MDR und IVDR -- 9.2.2 Normen -- 9.2.3 MDCG 2019-16 -- 9.2.4 Nationale Vorgaben für Medizinprodukte -- 9.2.5 Vorgaben an die IT-Sicherheit, die nicht spezifisch für Medizinprodukte gelten -- 9.3 IT-Sicherheit im Produktlebenszyklus -- 9.3.1 Allgemeines -- 9.3.2 Zweckbestimmung und Stakeholder-Anforderungen -- 9.3.3 System- und Softwareanforderungen -- 9.3.4 System- und Softwarearchitektur -- 9.3.5 Testaktivitäten -- 9.3.6 Softwarefreigabe -- 9.3.7 Überwachung des Produktes im Markt nach dem Inverkehrbringen -- 9.4 Produktanforderungen -- 9.4.1 Authentifizierung und Autorisierung -- 9.4.2 Daten und Kommunikation -- 9.4.3 Audit-Log -- 9.4.4 Begleitmaterialien -- 9.5 Zusammenfassung -- Anhang -- Abkürzungsverzeichnis -- Quellenverzeichnis -- Index…”
    Libro electrónico
  3. 63
    Publicado 2022
    Tabla de Contenidos: “…Objective -- Strategy -- Example -- Case study 3 - CTI for Level 3 organizations -- Objective -- Strategy -- Example -- Installing the MISP platform (optional) -- Summary -- Section 2: Cyber Threat Analytical Modeling and Defensive Mechanisms -- Chapter 6: Cyber Threat Modeling and Adversary Analysis -- Technical requirements -- The strategic threat modeling process -- Identifying and decomposing assets -- Adversaries and threat analysis -- Attack surfaces and threat vectors -- Adversary analysis use case - Twisted Spider -- Identifying countermeasures -- System re-evaluation -- Threat modeling methodologies -- Threat modeling with STRIDE -- Threat modeling with NIST -- Threat modeling use case -- Equifax data breach summary -- Threat modeling for ABCompany -- Advanced threat modeling with SIEM -- User behavior logic -- Benefits of UBA -- UBA selection guide - how it works -- Adversary analysis techniques -- Adversary attack preparation -- Attack preparation countermeasures -- Adversary attack execution -- Attack execution mitigation procedures -- Summary -- Chapter 7: Threat Intelligence Data Sources -- Technical requirements -- Defining the right sources for threat intelligence -- Internal threat intelligence sources -- External threat intelligence sources -- Organization intelligence profile -- Threat feed evaluation -- Threat data quality assessment -- Open Source Intelligence Feeds (OSINT) -- Benefits of open source intelligence -- Open source intelligence portals -- OSINT platform data insights (OSINT framework) -- OSINT limitations and drawbacks -- Malware data for threat intelligence -- Benefits of malware data collection -- Malware components -- Malware data core parameters -- Other non-open source intelligence sources -- Benefits of paid intelligence -- Paid threat intelligence challenges -- Some paid intelligence portals…”
    Libro electrónico
  4. 64
    Publicado 2022
    Tabla de Contenidos: “…Cryptographic Life Cycle -- Cryptographic Methods -- Symmetric Key Cryptography -- Asymmetric Key Cryptography -- Elliptic Curve Cryptography -- Quantum Cryptography -- Hybrid Encryption Methods -- Integrity -- Hashing Functions -- Message Integrity Verification -- Public Key Infrastructure -- Digital Certificates -- Certificate Authorities -- Registration Authorities -- PKI Steps -- Key Management -- Attacks Against Cryptography -- Key and Algorithm Attacks -- Implementation Attacks -- Other Attacks -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 9 Security Architectures -- Threat Modeling -- Attack Trees -- STRIDE -- The Lockheed Martin Cyber Kill Chain -- The MITRE ATT&amp -- CK Framework -- Why Bother with Threat Modeling -- Secure Design Principles -- Defense in Depth -- Zero Trust -- Trust But Verify -- Shared Responsibility -- Separation of Duties -- Least Privilege -- Keep It Simple -- Secure Defaults -- Fail Securely -- Privacy by Design -- Security Models -- Bell-LaPadula Model -- Biba Model -- Clark-Wilson Model -- Noninterference Model -- Brewer and Nash Model -- Graham-Denning Model -- Harrison-Ruzzo-Ullman Model -- Security Requirements -- Security Capabilities of Information Systems -- Trusted Platform Module -- Hardware Security Module -- Self-Encrypting Drive -- Bus Encryption -- Secure Processing -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 10 Site and Facility Security -- Site and Facility Design -- Security Principles -- The Site Planning Process -- Crime Prevention Through Environmental Design -- Designing a Physical Security Program -- Site and Facility Controls -- Work Area Security -- Data Processing Facilities -- Distribution Facilities -- Storage Facilities -- Utilities -- Fire Safety -- Environmental Issues -- Chapter Review -- Quick Review -- Questions -- Answers…”
    Libro electrónico
  5. 65
    Publicado 2024
    Tabla de Contenidos: “…-- Port scanning issues -- Scanning countermeasures -- Introducing the Nmap network scanning tool -- Controlling Nmap scan speeds -- Outputting results -- The NSE -- The Nmap GUI -- Mapping the network -- Lab - Scanning and enumeration -- Summary -- Assessment -- Answer -- Chapter 4: Ethical Hacking Vulnerability Assessments and Threat Modeling -- Vulnerability assessment concepts -- Explaining vulnerability assessments -- Types of vulnerability assessments -- Vulnerability assessment life cycle -- Vulnerability scanning tools -- Introducing the Nessus vulnerability scanner -- Best practices for vulnerability assessments -- Vulnerability assessment reports -- The elements of threat modeling -- The finding -- The kill chain -- The single asset value -- The organizational asset value -- The estimated risk -- Threat modeling frameworks -- STRIDE -- PASTA -- VAST -- Attack trees -- CVSS -- Threat modeling tools -- Threat forecasting -- Phase 1 - Research -- Phase 2 - Implementation and analysis -- Phase 3 - Information sharing and building -- Threat model lab - personal computer security -- Summary -- Assessment -- Answer -- Part 2: Hacking Tools and Techniques -- Chapter 5: Hacking the Windows Operating System -- Technical requirements -- Exploiting the Windows OS -- Exploiting Windows device drivers -- Exploiting Windows networking -- Address Resolution Protocol -- Simple network management protocol -- Server Message Block -- NetBIOS -- Exploiting Windows authentication -- User authentication and movement -- Obtaining and extracting passwords -- Exploring password-cracking techniques -- Authentication spoofing -- Pulling Windows account names via null sessions -- Tools for pulling account names via null sessions -- Privilege elevation…”
    Libro electrónico
  6. 66
    Publicado 2018
    Tabla de Contenidos: “…-- Threat modeling techniques -- STRIDE -- DREAD -- Threat modeling tools -- Microsoft Threat Modeling Tool -- SeaSponge -- Summary -- Chapter 12: Patching and Security Hardening -- Defining patching?…”
    Libro electrónico
  7. 67
    Publicado 2017
    Tabla de Contenidos: “…. -- Understanding padding and strides -- How to do it... -- Experimenting with different types of initialization -- How to do it... -- Implementing a convolutional autoencoder -- How to do it... -- Applying a 1D CNN to text -- How to do it... -- Chapter 4: Recurrent Neural Networks -- Introduction -- Implementing a simple RNN -- How to do it... -- Adding Long Short-Term Memory (LSTM) -- How to do it... -- Using gated recurrent units (GRUs) -- How to do it... -- Implementing bidirectional RNNs -- How to do it... -- Character-level text generation -- How to do it... -- Chapter 5: Reinforcement Learning -- Introduction -- Implementing policy gradients -- Getting ready -- How to do it... -- Implementing a deep Q-learning algorithm -- Getting ready -- How to do it... -- Chapter 6: Generative Adversarial Networks -- Introduction -- Understanding GANs -- How to do it... -- Implementing Deep Convolutional GANs&amp -- #160 -- (DCGANs)&amp -- #160 -- -- How to do it... -- Upscaling the resolution of images with Super-Resolution GANs (SRGANs) -- How to do it... -- Chapter 7: Computer Vision -- Introduction -- Augmenting images with computer vision techniques -- How to do it... -- Classifying objects in images -- How to do it... -- Localizing an object in images -- How to do it... -- Real-time detection frameworks -- Segmenting classes in images with U-net -- How to do it... -- Scene understanding (semantic segmentation) -- How to do it... -- Finding facial key points -- How to do it... -- Recognizing faces -- How to do it... -- Transferring styles to images -- How to do it... -- Chapter 8: Natural Language Processing…”
    Libro electrónico
  8. 68
    Publicado 2023
    Tabla de Contenidos: “…Further reading -- Part 2 - Image Classification with TensorFlow -- Chapter 5: Image Classification with Neural Networks -- Technical requirements -- The anatomy of neural networks -- Forward propagation -- Activation functions -- Backward propagation -- Learning rate -- Building an image classifier with a neural network -- Loading the data -- Performing exploratory data analysis -- Building the model -- Compiling the model -- Model visualization -- Model fitting -- Training monitoring -- Evaluating the model -- Model prediction -- Summary -- Questions -- Further reading -- Chapter 6: Improving the Model -- Technical requirements -- Data is key -- Fine-tuning hyperparameters of a neural network -- Increasing the number of epochs -- Early stopping using callbacks -- Adding neurons in the hidden layer -- Changing the optimizers -- Changing the learning rate -- Summary -- Questions -- Further reading -- Chapter 7: Image Classification with Convolutional Neural Networks -- Challenges of image recognition with fully connected networks -- Anatomy of CNNs -- Convolutions -- Impact of the number of filters -- Impact of the size of the filter -- Impact of stride -- The boundary problem -- Impact of padding -- Putting it all together -- Pooling -- The fully connected layer -- Fashion MNIST 2.0 -- Working with real-world images -- Weather dataset classification -- Image data preprocessing -- Summary -- Questions -- Further reading -- Chapter 8: Handling Overfitting -- Technical requirements -- Overfitting in ML -- What triggers overfitting -- Detecting overfitting -- Baseline model -- Early stopping -- Model simplification -- L1 and L2 regularization -- Dropout regularization -- Adjusting the learning rate -- Error analysis -- Data augmentation -- Summary -- Questions -- Further reading -- Chapter 9: Transfer Learning -- Technical requirements…”
    Libro electrónico
  9. 69
    Publicado 2019
    Tabla de Contenidos: “…2.4.6.6 Principle 6b: The Optimal Path to Intrinsic Value Creation Is a Combination of Human and Machine Intelligence -- 3 Cyber Risk Management: A New Era of Enterprise Risk Management -- 3.1 History and Definitions of Risk -- 3.1.1 History of Risk -- 3.1.2 Definitions of Risk as a Multidimensional Concept -- 3.1.3 Risk in Computer Science and Engineering -- 3.1.4 Risk Can Only Be Relatively Objective -- 3.1.5 Decision Theory and Acceptable Risk -- 3.2 Enterprise Risk Management -- 3.2.1 The Discipline of Enterprise Risk Management -- 3.2.2 Cyber Risk Management: A New Era of Enterprise Risk Management -- 3.3 Risk Analysis -- 3.4 Risk Management -- 3.4.1 Risk Assessment -- 3.4.1.1 Define the Risk Assessment Process -- 3.4.1.2 System Characterization -- 3.4.1.3 Risk Classification -- 3.4.1.4 Threat Identification -- 3.4.1.4.1 STRIDE -- 3.4.1.4.2 Process for Attack Simulation and Threat Analysis -- 3.4.1.4.3 Trike -- 3.4.1.4.4 Visual, Agile, and Simple Threat (VAST) Modelling -- 3.4.1.5 Vulnerability Assessment -- 3.4.1.5.1 The Common Vulnerability Scoring System -- 3.4.1.5.2 The Open Web Application Security Project Top 10 -- 3.4.1.5.3 The Open Web Application Security Project 2017 -- 3.4.1.6 Likelihood Determination -- 3.4.1.7 Impact Analysis -- 3.4.1.8 Risk Determination -- 3.4.2 Risk Mitigation -- 3.4.3 Effectiveness Assessment -- 3.4.4 Continuous Monitoring -- 3.5 Risk Models -- 3.5.1 Qualitative and Quantitative Models -- 3.5.2 Quantitative Assessment -- 3.5.3 Qualitative Assessment -- 3.5.4 Other Models -- 3.5.4.1 Perspective: Asset-driven, Service-driven, or Business driven -- 3.5.4.2 Resource Valuation: Vertical or Horizontal -- 3.5.4.3 Risk Measurement: Propagated or Nonpropagated -- 4 Cyber Risk Measurement in the Hyperconnected World -- 4.1 Cyber Risk as a Critical Business Risk -- 4.2 The Uniqueness of Cyber Risk…”
    Libro electrónico
  10. 70
    Publicado 2018
    Tabla de Contenidos: “…Chapter 8: Ensemble Learning -- Ensemble learning fundamentals -- Random forests -- Example of random forest with Scikit-Learn -- AdaBoost -- AdaBoost.SAMME -- AdaBoost.SAMME.R -- AdaBoost.R2 -- Example of AdaBoost with Scikit-Learn -- Gradient boosting -- Example of gradient tree boosting with Scikit-Learn -- Ensembles of voting classifiers -- Example of voting classifiers with Scikit-Learn -- Ensemble learning as model selection -- Summary -- Chapter 9: Neural Networks for Machine Learning -- The basic artificial neuron -- Perceptron -- Example of a perceptron with Scikit-Learn -- Multilayer perceptrons -- Activation functions -- Sigmoid and hyperbolic tangent -- Rectifier activation functions -- Softmax -- Back-propagation algorithm -- Stochastic gradient descent -- Weight initialization -- Example of MLP with Keras -- Optimization algorithms -- Gradient perturbation -- Momentum and Nesterov momentum -- SGD with momentum in Keras -- RMSProp -- RMSProp with Keras -- Adam -- Adam with Keras -- AdaGrad -- AdaGrad with Keras -- AdaDelta -- AdaDelta with Keras -- Regularization and dropout -- Dropout -- Example of dropout with Keras -- Batch normalization -- Example of batch normalization with Keras -- Summary -- Chapter 10: Advanced Neural Models -- Deep convolutional networks -- Convolutions -- Bidimensional discrete convolutions -- Strides and padding -- Atrous convolution -- Separable convolution -- Transpose convolution -- Pooling layers -- Other useful layers -- Examples of deep convolutional networks with Keras -- Example of a deep convolutional network with Keras and data augmentation -- Recurrent networks -- Backpropagation through time (BPTT) -- LSTM -- GRU -- Example of an LSTM network with Keras -- Transfer learning -- Summary -- Chapter 11: Autoencoders -- Autoencoders -- An example of a deep convolutional autoencoder with TensorFlow…”
    Libro electrónico
  11. 71
    por OECD
    Publicado 2024
    Tabla de Contenidos: “…Introduction -- 3.2. Despite great strides, policy settings can be made more pro-competitive -- 3.2.1. …”
    Libro electrónico
  12. 72
    por Seemann, Mark
    Publicado 2022
    Tabla de Contenidos: “…14.1.4 Blindschreiben -- 14.2 Team-Rhythmus -- 14.2.1 Regelmäßige Aktualisierung der Abhängigkeiten -- 14.2.2 Andere Dinge planen -- 14.2.3 Gesetz von Conway -- 14.3 Fazit -- Kapitel 15: Die üblichen Verdächtigen -- 15.1 Performance -- 15.1.1 Altlast -- 15.1.2 Verständlichkeit -- 15.2 Security -- 15.2.1 STRIDE -- 15.2.2 Spoofing -- 15.2.3 Tampering -- 15.2.4 Repudiation -- 15.2.5 Information Disclosure -- 15.2.6 Denial of Service -- 15.2.7 Elevation of Privilege -- 15.3 Andere Verfahren -- 15.3.1 Eigenschaft-basiertes Testen -- 15.3.2 Verhaltensbezogene Codeanalyse -- 15.4 Fazit -- Kapitel 16: Tour -- 16.1 Navigation -- 16.1.1 Das Gesamtbild erkennen -- 16.1.2 Organisation der Dateien -- 16.1.3 Details aufspüren -- 16.2 Architektur -- 16.2.1 Monolith -- 16.2.2 Zyklen -- 16.3 Verwendung -- 16.3.1 Aus Tests lernen -- 16.3.2 Schenken Sie den Tests Beachtung -- 16.4 Fazit -- Anhang A: Liste der Verfahren -- A.1 50/72-Regel‌ -- A.2 80/24-Regel‌ -- A.3 Abhängigkeiten regelmäßig aktualisieren -- A.4 Advokat des Teufels‌ -- A.5 Arrange, Act, Assert‌ -- A.6 Ausnahmen von der Regel begründen -- A.7 Bedrohungsmodell‌ -- A.8 Bisektion‌ -- A.9 Checkliste für eine neue Codebasis‌ -- A.10 Code-Reviews -- A.11 Decorators‌ für Cross-Cutting Concerns -- A.12 Feature-Flag‌‌ -- A.13 Fehler als Tests reproduzieren -- A.14 Functional Core, Imperative Shell‌ -- A.15 Kommunikationshierarchie‌ -- A.16 Namen ausixen‌ -- A.17 Parsen, nicht überprüfen‌ -- A.18 Robustheitsgrundsatz‌ -- A.19 Rot-Grün-Refactor‌ -- A.20 Refactoring‌ von Test- und Produktionscode trennen -- A.21 Semantische Versionierung -- A.22 Slice -- A.23 Strangler‌ -- A.24 Prämisse der Priorität der Transformation‌ -- A.25 Trennung von Befehlen und Abfragen -- A.26 X-getriebene Entwicklung‌ -- A.27 Zählen der Variablen -- A.28 Zyklomatische Komplexität‌ -- Anhang B: Bibliografie…”
    Libro electrónico
  13. 73
    Publicado 2023
    Tabla de Contenidos: “…Overview of building an AppSec program -- Understanding your security needs -- Identifying threats and risks in cloud-native environments -- Bug bounty -- Evaluating compliance requirements and regulations -- Building an effective AppSec program for cloud-native -- Security tools for software in development -- Threat modeling -- Providing security training and awareness to all stakeholders -- Developing policies and procedures -- Incident response and disaster recovery -- Cloud security policy -- Identity and access management policies -- Continuous monitoring and improvement -- Summary -- Quiz -- Further readings -- Chapter 5: Threat Modeling for Cloud Native -- Technical requirements -- Developing an approach to threat modeling -- An overview of threat modeling for cloud native -- Integrating threat modeling into Agile and DevOps processes -- Developing a threat matrix -- Cultivating critical thinking and risk assessment -- Fostering a critical thinking mindset -- Developing risk assessment skills -- Threat modeling frameworks -- STRIDE -- PASTA -- LINDDUN -- Kubernetes threat matrix -- Initial Access -- Execution -- Persistence -- Privilege Escalation -- Defense Evasion -- Credential Access -- Discovery -- Lateral Movement -- Impact -- Summary -- Quiz -- Further readings -- Chapter 6: Securing the Infrastructure -- Technical requirements -- Approach to object access control -- Kubernetes network policies -- Calico -- Using Calico with Kubernetes -- Principles for authentication and authorization -- Authentication -- Authorization -- Importance of authentication and authorization -- Kubernetes authentication and authorization mechanisms -- Defense in depth -- Infrastructure components in cloud-native environments -- Compute components - virtual machines, containers, and serverless computing…”
    Libro electrónico
  14. 74
    Publicado 2024
    Tabla de Contenidos: “…Fingers, faces, and other accessories -- Creating a library of poses -- The Asset Browser -- Creating a pose asset -- Practicing poses -- Summary -- Questions -- Chapter 7: Basic Character Animation -- Technical requirements -- Preparing Rain in a new scene -- A brief recap on linking Rain into a new project -- Using a pose asset -- Setting bone relationships for an animation -- Hiding bones -- Keying pose bones -- Blocking or roughing the animation -- Reviewing our key poses -- The Dope Sheet -- Introduction to the Dope Sheet -- Organizing the Dope Sheet -- Going further into animating this character -- Two more in-between poses -- In-between operators for posing -- Waving -- Polishing the animation -- Using the Graph Editor on bones -- Animating Rain's accessories -- Summary -- Questions -- Chapter 8: The Walk Cycle -- Technical requirements -- Preparing the walk cycle scene -- The timeline of a walk cycle -- Timeline markers -- Getting Rain ready to walk -- Moving forward on the Y axis -- Establishing the stride length -- Looping the animation -- Putting Rain on a treadmill -- Using a preview playback range -- Adding more periodic motion -- Torso movement -- Swaying from side to side -- The Action Editor -- More torso animation with sine waves -- Advanced footwork -- Rolling the foot -- Picking up the feet -- Correcting the motion of the legs -- Copying animation from the left foot to the right foot -- Finishing the walk cycle -- FK toes -- FK arms -- Final touches? …”
    Libro electrónico
  15. 75
    Publicado 2022
    Tabla de Contenidos: “…Threats and vulnerabilities -- 6.1. STRIDE threat modeling process -- 6.2. More attacks and vulnerabilities -- 7. …”
    Libro electrónico
  16. 76
    Publicado 2020
    Tabla de Contenidos: “…3.8 Tensor metadata: Size, offset, and stride -- 3.8.1 Views of another tensor's storage -- 3.8.2 Transposing without copying -- 3.8.3 Transposing in higher dimensions -- 3.8.4 Contiguous tensors -- 3.9 Moving tensors to the GPU -- 3.9.1 Managing a tensor's device attribute -- 3.10 NumPy interoperability -- 3.11 Generalized tensors are tensors, too -- 3.12 Serializing tensors -- 3.12.1 Serializing to HDF5 with h5py -- 3.13 Conclusion -- 3.14 Exercises -- 3.15 Summary -- 4 Real-world data representation using tensors -- 4.1 Working with images -- 4.1.1 Adding color channels -- 4.1.2 Loading an image file -- 4.1.3 Changing the layout -- 4.1.4 Normalizing the data -- 4.2 3D images: Volumetric data -- 4.2.1 Loading a specialized format -- 4.3 Representing tabular data -- 4.3.1 Using a real-world dataset -- 4.3.2 Loading a wine data tensor -- 4.3.3 Representing scores -- 4.3.4 One-hot encoding -- 4.3.5 When to categorize -- 4.3.6 Finding thresholds -- 4.4 Working with time series -- 4.4.1 Adding a time dimension -- 4.4.2 Shaping the data by time period -- 4.4.3 Ready for training -- 4.5 Representing text -- 4.5.1 Converting text to numbers -- 4.5.2 One-hot-encoding characters -- 4.5.3 One-hot encoding whole words -- 4.5.4 Text embeddings -- 4.5.5 Text embeddings as a blueprint -- 4.6 Conclusion -- 4.7 Exercises -- 4.8 Summary -- 5 The mechanics of learning -- 5.1 A timeless lesson in modeling -- 5.2 Learning is just parameter estimation -- 5.2.1 A hot problem -- 5.2.2 Gathering some data -- 5.2.3 Visualizing the data -- 5.2.4 Choosing a linear model as a first try -- 5.3 Less loss is what we want -- 5.3.1 From problem back to PyTorch -- 5.4 Down along the gradient -- 5.4.1 Decreasing loss -- 5.4.2 Getting analytical -- 5.4.3 Iterating to fit the model -- 5.4.4 Normalizing inputs -- 5.4.5 Visualizing (again)…”
    Libro electrónico
  17. 77
    por Konheim, Alan G., 1934-
    Publicado 2010
    Tabla de Contenidos: “…Double Hashing -- 14.1: Formulation of Double Hashing -- 14.2: Progressions and Strides -- 14.3: The Number of Progressions Which Fill a Hash-Table Cell -- 14.3.1: Progression Graphs -- 14.4: Dominance -- 14.5: Insertion-Cost Bounds Relating Uniform and Double Hashing -- 14.6: UsuallyDoubleHash -- 14.7: The UDH Chance Experiment and the Cost to Insert the Next Key by Double Hashing -- 14.8: Proof of Equation (14.12a) -- 14.9: UsuallyDoubleHash -- 14.10: Proof of Equation (14.12b) -- 15. …”
    Libro electrónico
  18. 78
    por OECD
    Publicado 2020
    Tabla de Contenidos:
    Libro electrónico
  19. 79
    Publicado 2018
    Tabla de Contenidos: “…-- Hyperparameters of the neural network -- Automatic hyperparameter tuning -- Grid search -- Summary -- Chapter 3: Understanding Deep Learning Architectures -- Neural network architecture -- Why different architectures are needed -- Various architectures -- MLPs and deep neural networks -- Autoencoder neural networks -- Variational autoencoders -- Generative Adversarial Networks -- Text-to-image synthesis using the GAN architecture -- CNNs -- The convolution operator -- Stride and padding mode in convolution -- The convolution layer -- LeNet architecture -- AlexNet -- ZFNet -- GoogLeNet (inception network) -- VGG -- Residual Neural Networks -- Capsule networks -- Recurrent neural networks -- LSTMs -- Stacked LSTMs -- Encoder-decoder - Neural Machine Translation -- Gated Recurrent Units -- Memory Neural Networks…”
    Libro electrónico
  20. 80
    Publicado 2022
    Tabla de Contenidos: “…Part 3 Expanding our test strategy -- 8 Advanced web API automation -- 8.1 Acceptance test-driven development -- 8.1.1 Setting up an automated acceptance testing framework -- 8.1.2 Creating our failing automated check -- 8.1.3 Getting our automated check to pass -- 8.1.4 Beware of traps -- 8.2 Web API mocking -- 8.2.1 Getting set up -- 8.2.2 Building our mocked check -- 8.3 Running as part of a pipeline -- 8.3.1 Integrated with codebase -- 8.3.2 Separate to codebase -- Summary -- 9 Contract testing -- 9.1 What contract testing is and how can it help -- 9.2 Setting up a contract testing framework -- 9.2.1 Introducing Pact -- 9.3 Building a consumer contract test -- 9.3.1 Adding Pact to our class -- 9.3.2 Building the consumer check -- 9.3.3 Setting up and publishing to a Pact Broker -- 9.4 Building a provider contract test -- 9.4.1 Building the provider contract test -- 9.4.2 Testing out a change -- 9.5 Contract testing as part of a testing strategy -- Summary -- 10 Performance testing -- 10.1 Planning a performance test -- 10.1.1 Types of performance tests -- 10.1.2 Types of measurements for performance tests -- 10.1.3 Establishing performance testing goals and key performance indicators (KPIs) -- 10.1.4 Creating user flows -- 10.2 Implementing a performance test -- 10.2.1 Setting our performance testing tool -- 10.2.2 Building our performance test script -- 10.3 Executing and measuring a performance test -- 10.3.1 Preparing and executing our performance test -- 10.3.2 Analyzing results -- 10.4 Setting performance testing expectations -- Summary -- 11 Security testing -- 11.1 Working with threat models -- 11.1.1 Creating a model -- 11.1.2 Discovering threats with STRIDE -- 11.1.3 Creating threat trees -- 11.1.4 Mitigating threats -- 11.2 Applying a security mindset to our testing -- 11.2.1 Security testing in testing API design sessions…”
    Libro electrónico