Mostrando 2,601 - 2,620 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.61s Limitar resultados
  1. 2601
    Publicado 2017
    Tabla de Contenidos: “…. -- There's more... -- Collecting valid e-mail accounts and IP addresses from web servers -- How to do it... -- How it works... -- There's more... -- Discovering hostnames pointing to the same IP address -- How to do it... -- How it works... -- There's more... -- Discovering hostnames by brute forcing DNS records -- How to do it... -- How it works... -- There's more... -- Customizing the dictionary -- Adjusting the number of threads -- Specifying a DNS server -- Using the NSE library target -- Obtaining profile information from Google's People API -- Getting ready -- How to do it... -- How it works... -- There's more... -- Matching services with public vulnerability advisories -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 4: Scanning Web Servers -- Introduction -- Listing supported HTTP methods -- How to do it... -- How it works... -- There's more... -- Interesting HTTP methods -- Checking whether a web server is an open proxy -- How to do it... -- How it works... -- There's more... -- Discovering interesting files and folders in web servers -- How to do it... -- How it works... -- There's more... -- Using a Nikto database -- Abusing mod_userdir to enumerate user accounts -- How to do it... -- How it works... -- There's more... -- Brute forcing HTTP authentication -- How to do it... -- How it works... -- There's more... -- Brute modes -- Brute forcing web applications -- How to do it... -- How it works... -- There's more... -- Brute forcing WordPress installations -- Brute forcing WordPress installations -- Detecting web application firewalls -- How to do it... -- How it works... -- There's more... -- Detecting possible XST vulnerabilities -- How to do it... -- How it works…”
    Libro electrónico
  2. 2602
    Publicado 2018
    Tabla de Contenidos: “…-- Source Code for the Detect English Module -- Sample Run of the Detect English Module -- Instructions and Setting Up Constants -- The Dictionary Data Type -- Implementing the Dictionary File -- Counting the Number of English Words in message -- Removing Non-Letter Characters -- Detecting English Words -- Summary -- Practice Questions -- Chapter 12: Hacking the Transposition Cipher -- Source Code of the Transposition Cipher Hacker Program -- Sample Run of the Transposition Cipher Hacker Program -- Importing the Modules -- Multiline Strings with Triple Quotes -- Displaying the Results of Hacking the Message -- Getting the Hacked Message -- Calling the main() Function -- Summary -- Practice Questions -- Chapter 13: A Modular Arithmetic Module for the Affine Cipher -- Modular Arithmetic -- The Modulo Operator -- Finding Factors to Calculate the Greatest Common Divisor -- Multiple Assignment -- Euclid's Algorithm for Finding the GCD -- Understanding How the Multiplicative and Affine Ciphers Work -- Source Code for the Cryptomath Module -- Summary -- Practice Questions -- Chapter 14: Programming the Affine Cipher -- Source Code for the Affine Cipher Program -- Sample Run of the Affine Cipher Program -- Setting Up Modules, Constants, and the main() Function -- Calculating and Validating the Keys -- Writing the Encryption Function…”
    Libro electrónico
  3. 2603
    Publicado 2016
    Tabla de Contenidos: “…Customizing a TOC -- Changing the structure of a TOC -- Indexing a Document -- Marking index items in the document -- Generating the index -- Editing an index -- Putting Cross‐References in a Document -- Putting Footnotes and Endnotes in Documents -- Entering a footnote or endnote -- Choosing the numbering scheme and position of notes -- Deleting, moving, and editing notes -- Compiling a Bibliography -- Inserting a citation for your bibliography -- Editing a citation -- Changing how citations appear in text -- Generating the bibliography -- Book III Excel 2016 -- Chapter 1 Up and Running with Excel -- Creating a New Excel Workbook -- Getting Acquainted with Excel -- Rows, columns, and cell addresses -- Workbooks and worksheets -- Entering Data in a Worksheet -- The basics of entering data -- Entering text labels -- Entering numeric values -- Entering date and time values -- Quickly Entering Lists and Serial Data with the AutoFill Command -- Formatting Numbers, Dates, and Time Values -- Establishing Data-Validation Rules -- Chapter 2 Refining Your Worksheet -- Editing Worksheet Data -- Moving Around in a Worksheet -- Getting a Better Look at the Worksheet -- Freezing and splitting columns and rows -- Hiding columns and rows -- Comments for Documenting Your Worksheet -- Selecting Cells in a Worksheet -- Deleting, Copying, and Moving Data -- Handling the Worksheets in a Workbook -- Keeping Others from Tampering with Worksheets -- Hiding a worksheet -- Protecting a worksheet -- Chapter 3 Formulas and Functions for Crunching Numbers -- How Formulas Work -- Referring to cells in formulas -- Referring to formula results in formulas -- Operators in formulas -- The Basics of Entering a Formula -- Speed Techniques for Entering Formulas -- Clicking cells to enter cell references -- Entering a cell range -- Naming cell ranges so that you can use them in formulas…”
    Libro electrónico
  4. 2604
    Publicado 2022
    Tabla de Contenidos: “…Tip 26: Distinguish Technical Significance from Business Significance -- Tip 27: Give the Audience Your Headlines -- Tip 28: Start with Your Recommended Actions -- Tip 29: Don't Focus on the "What" -- Section 3 Developing: Wording and Text -- Tip 30: Minimize the Number of Words on Your Slides -- Tip 31: Use Simple Terms and Definitions -- Tip 32: Don't Use Technical Terms -- Tip 33: Clarify Your Definitions -- Tip 34: Provide Layperson and System Labels -- Tip 35: Use Consistent Phrasing -- Tip 36: If It Can't Be Read, Don't Display It -- Tip 37: Don't Shrink Your Font, Shorten Your Text -- Tip 38: Use Appropriate Spacing -- Tip 39: Use the Same Font throughout Your Presentation -- Tip 40: Beware the Missing Font -- Tip 41: Address Every Agenda Item Listed -- Tip 42: Identify When an Agenda Item Is Covered -- Tip 43: Spellcheck Is Not Always Your Friend -- Tip 44: Charts and Images Are Misspelling Factories -- Tip 45: Beware the Right Word, Wrong Place -- Tip 46: Keep Your Text Horizontal -- Section 4 Developing: Numbers and Labels -- Tip 47: Use Consistent Precision -- Tip 48: Use Only the Precision Required to Make Your Point -- Tip 49: Match Precision to Accuracy Level -- Tip 50: Always Format Numbers -- Tip 51: Always Show Percentages as a Percentage -- Tip 52: Provide Quantities and Percentages -- Tip 53: Never Use Scientific Notation -- Tip 54: Use Names, Not Numbers, for Categories -- Tip 55: Watch for Truncated Labels -- Tip 56: Define All Acronyms and Abbreviations -- Tip 57: Use Dedicated Definitions Slides -- Tip 58: Clarify Aggregations Applied -- Tip 59: Focus on the Outcome of Interest -- Tip 60: Validate That Your Numbers Make Sense -- Tip 61: Add a Scale to Every Chart -- Tip 62: Ensure Your Charts Have Consistent Scaling -- Tip 63: An Axis Usually Should Start at 0 -- Tip 64: Number Your Slides…”
    Libro electrónico
  5. 2605
    por Simpson, Alan
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  6. 2606
    Publicado 2021
    Tabla de Contenidos: “…Common Pitfalls -- Common Cloud Vulnerabilities -- Describe the Secure Software Development Lifecycle Process -- NIST Secure Software Development Framework -- OWASP Software Assurance Security Model -- Business Requirements -- Phases and Methodologies -- Apply the Secure Software Development Lifecycle -- Avoid Common Vulnerabilities During Development -- Cloud-Specific Risks -- Quality Assurance -- Threat Modeling -- Software Configuration Management and Versioning -- Apply Cloud Software Assurance and Validation -- Functional Testing -- Security Testing Methodologies -- Use Verified Secure Software -- Approved Application Programming Interfaces -- Supply-Chain Management -- Third-Party Software Management -- Validated Open-Source Software -- Comprehend the Specifics of Cloud Application Architecture -- Supplemental Security Components -- Cryptography -- Sandboxing -- Application Virtualization and Orchestration -- Design Appropriate Identity and Access Management Solutions -- Federated Identity -- Identity Providers -- Single Sign-On -- Multifactor Authentication -- Cloud Access Security Broker -- Summary -- Domain 5 Cloud Security Operations -- Implement and Build Physical and Logical Infrastructure for Cloud Environment -- Hardware-Specific Security Configuration Requirements -- Installation and Configuration of Virtualization Management Tools -- Virtual Hardware-Specific Security Configuration Requirements -- Installation of Guest Operating System Virtualization Toolsets -- Operate Physical and Logical Infrastructure for Cloud Environment -- Configure Access Control for Local and Remote Access -- Secure Network Configuration -- Operating System Hardening through the Application of Baselines -- Availability of Stand-Alone Hosts -- Availability of Clustered Hosts -- Availability of Guest Operating Systems…”
    Libro electrónico
  7. 2607
    Publicado 2022
    Tabla de Contenidos: “…Limitations -- Configure NLB -- Create NLB Cluster -- Add Cluster Nodes -- Server Core -- External Load Balancer -- External Load Balancer Configuration -- NPS High Availability -- Prerequisites -- Update Client Configuration -- Update VPN Configuration -- NPS Load Balancing -- DNS Alias -- External Load Balancer -- Certificate Configuration -- Geographic Load Balancing -- Azure Traffic Manager -- Azure Traffic Manager and IKEv2 -- Azure Traffic Manager Profile -- Validation Testing -- DNS Alias -- Summary -- Chapter 11: Monitor and Report -- RRAS Management Console -- Adding Servers -- Firewall Requirements -- System Health -- User Activity -- Remote Access Management Console -- Overview -- System Health -- User Activity -- Customize Headings -- Reporting -- PowerShell -- System Health -- User Activity -- Log Files -- Disconnecting Sessions -- Management Consoles -- PowerShell -- Permanent Disconnects -- User Connections -- Device Connections -- Summary -- Chapter 12: Troubleshooting -- Common Error Codes -- 809 -- Common Causes -- Testing -- Port Probe -- Network Trace -- 812 -- Group Membership -- Authentication Type -- NPS Communication -- Azure Conditional Access -- Event Logs -- Other Causes -- 13801 -- Testing -- 13806 -- Missing Client Certificate -- Missing Server Certificate -- 13868 -- VPN Server -- VPN Client -- Registry Setting -- NPS Configuration -- 853 -- Missing Certificate -- 858 -- 864 -- Certificate Assignment -- Root Certificate -- 798 -- Permissions -- TPM -- Other Known Issues -- Clients Prompted for Authentication -- RRAS Service Won't Start -- Load Balancing and NAT -- SSTP Connect/Disconnect -- Custom Cryptography Settings Ignored -- Summary -- Index…”
    Libro electrónico
  8. 2608
    Publicado 2022
    Tabla de Contenidos: “…Business Requirements -- Phases and Methodologies -- Apply the Secure Software Development Life Cycle -- Cloud-Specific Risks -- Threat Modeling -- Avoid Common Vulnerabilities during Development -- Secure Coding -- Software Configuration Management and Versioning -- Apply Cloud Software Assurance and Validation -- Functional and Non-functional Testing -- Security Testing Methodologies -- Quality Assurance -- Abuse Case Testing -- Use Verified Secure Software -- Securing Application Programming Interfaces -- Supply-Chain Management -- Third-Party Software Management -- Validated Open-Source Software -- Comprehend the Specifics of Cloud Application Architecture -- Supplemental Security Components -- Cryptography -- Sandboxing -- Application Virtualization and Orchestration -- Design Appropriate Identity and Access Management Solutions -- Federated Identity -- Identity Providers -- Single Sign-on -- Multifactor Authentication -- Cloud Access Security Broker -- Summary -- Chapter 5 Cloud Security Operations -- Build and Implement Physical and Logical Infrastructure for Cloud Environment -- Hardware-Specific Security Configuration Requirements -- Installation and Configuration of Virtualization Management Tools -- Virtual Hardware-Specific Security Configuration Requirements -- Installation of Guest Operating System Virtualization Toolsets -- Operate Physical and Logical Infrastructure for Cloud Environment -- Configure Access Control for Local and Remote Access -- Secure Network Configuration -- Operating System Hardening through the Application of Baselines -- Availability of Stand-Alone Hosts -- Availability of Clustered Hosts -- Availability of Guest Operating Systems -- Manage Physical and Logical Infrastructure for Cloud Environment -- Access Controls for Remote Access -- Operating System Baseline Compliance Monitoring and Remediation…”
    Libro electrónico
  9. 2609
    por Cabestany, Joan
    Publicado 2022
    Tabla de Contenidos: “…6.5.3 Protocol, Script and Metrics -- 6.5.4 Results -- 6.5.4.1 Appointment test -- 6.5.4.2 Medication test -- 6.6 Conclusions after the User-Centred Process -- 6.7 Characteristics of REMPARK Smartphone Applications -- 6.8 Some Concluding Remarks -- References -- Chapter 7 - Actuator Sub-System: The Auditory Cueing -- 7.1 Introduction -- 7.2 Cueing Strategies for Gait in Parkinson's Disease -- 7.3 State of the Art: Competitive Analysis -- 7.4 REMPARK Auditory Cueing System (ACS) -- 7.5 Outcomes from Field Trials: Future Considerations -- 7.6 A Step Further in REMPARK: Automatic Drug Administration -- 7.7 Conclusion -- References -- Chapter 8 - Disease Management System (DMS) -- 8.1 Introduction -- 8.2 Disease Management System Application -- 8.3 DMS Functional Organization -- 8.4 Advantages Using the Disease Management System (DMS) -- 8.4.1 Advantages for the Clinical Team -- 8.4.2 Advantages for the Patients -- 8.4.3 Advantages for the Organization -- 8.5 Conclusions, Discussion and Vision -- References -- Chapter 9 - REMPARK System Assessment: Main Results -- 9.1 Introduction -- 9.2 Description of Main Communication Flows -- 9.2.1 Type of Transmitted Information -- 9.2.2 Security Aspects -- 9.2.3 Final Deployment and Implementation of the REMPARK Platform -- 9.3 Pilot for the REMPARK System Assessment: Description -- 9.3.1 Definition of the Pilots' Objectives and Eligibility Criteria -- 9.3.2 Design of the Study -- 9.3.3 Pre-Pilot Conclusions -- 9.4 REMPARK Pilots' Execution and Obtained Results -- 9.4.1 Performance of the System -- 9.4.2 Validity of the ON-OFF Detection Algorithm -- 9.4.2.1 The methodology -- 9.4.2.2 Validation of the ON-OFF diaries: available data -- 9.4.2.3 Results of the ON/OFF state detection -- 9.4.3 Non-Motor Symptoms Descriptive Analysis -- 9.4.4 Efficacy and Effectiveness of the Cueing System…”
    Libro electrónico
  10. 2610
    Publicado 2018
    Tabla de Contenidos: “…Cerebral Angioplasticity: The Anatomical Contribution to Ensuring Appropriate Oxygen Transport to Brain -- Changes in Cytochrome-C-Oxidase Account for Changes in Attenuation of Near-Infrared Light in the Healthy Infant Brain -- Hyperspectral Imaging of the Hemodynamic and Metabolic States of the Exposed Cortex: Investigating a Commercial Snapshot Solution -- Impact of Aging on Metabolic Changes in the Ketotic Rat Brain: Glucose, Oxidative and 4-HNE Metabolism -- Increases in Microvascular Perfusion and Tissue Oxygenation via Vasodilatation after Anodal Transcranial Direct Current Stimulation in the Healthy and Traumatized Mouse Brain -- Fluctuations of Nutrition-associated Markers After Decompressive Hemicraniectomy in Middle Cerebral Artery Occlusion Patients -- Resuscitation Fluid with Drag Reducing Polymer Enhances Cerebral Microcirculation and Tissue Oxygenation after Traumatic Brain Injury Complicated by Hemorrhagic Shock -- Comparison of Quantitative and Qualitative Oxygen Extraction Fraction (OEF) in Acute Stroke Patients with Large Vessel Occlusion -- Relation Between Asymmetry of Prefrontal Activity and Autonomic Nervous System in Post-stroke Patients with a Disorder of Consciousness -- Cerebral Hemodynamics after Transcranial Direct Current Stimulation (tDCS) in Patients with Consequences of Traumatic Brain Injury -- Differences in Tissue Oxygenation, Perfusion and Optical Properties in Brain Areas Affected by Stroke: A Time-resolved NIRS Study -- Changes of Doublecortin-immunoreactive Cells from the Acute Phase to Chronic Phase after Transient Global Brain Ischemia in Rat Cingulate Cortex -- Post-resuscitation Arterial Blood Pressure on Survival and Change of Capillary Density following Cardiac Arrest and Resuscitation in Rats -- Monitoring of Brain Oxygenation During and After Cardiopulmonary Resuscitation: A Prospective Porcine Study -- Effects of Aerobic Cycling Training on O2 Dynamics in Several Leg Muscles in Early Post-Myocardial Infarction -- Evaluation of Functional Hyperemia using NIRTRS without the Influence of Fat Layer Thickness -- Changes in Spinal Muscle Oxygenation and Perfusion during the Biering-Sørensen Test: Preliminary Results of a Study Employing NIRS-based Muscle Oximetry -- Near Infrared Spectroscopy (NIRS) Observation of Vastus Lateralis (muscle) and Prefrontal Cortex (brain) Tissue Oxygenation during Synchronised Swimming Routines in Elite Athletes -- Impact of Changes in Systemic Physiology on fNIRS/NIRS Signals: Analysis Based on Oblique Subspace Projections Decomposition -- Changes in Cerebral Oxyhaemoglobin Levels During and After a Single 20-minute Bout of Moderate-intensity Cycling -- Changes in the Prefrontal Cortex Oxygenation Levels during Cycling in the Supine and Upright Positions -- Trail Making Test Induces Prefrontal Cortex Activation as Revealed by a cw Wearable-Wireless fNIRS/DOT Imager -- Prediction of MMSE Score Using Time-resolved Near-infrared Spectroscopy -- Broadband NIRS Cerebral Cytochrome-C-Oxidase Response to Anoxia Before and After Hypoxic-Ischaemic Injury in Piglets -- Synchronized Oscillations of Arterial Oxygen Saturation, Cerebral Tissue Oxygenation and Heart Rate in Preterm Neonates: Investigation of Long-Term Measurements with Multiple Einstein’s Cross Wavelet Analysis -- Multispectral Near-Infrared Optical Tomography for Cancer Hypoxia Study in Mice -- Hypoxia-/HIF-1α-Driven Factors of the Tumor Microenvironment Impeding Antitumor Immune Responses and Promoting Malignant Progression -- Differential Expression of PGC1α in Intratumor Redox Subpopulations of Breast Cancer -- Accounting for Two Forms of Hypoxia for Predicting Tumour Control Probability in Radiotherapy: An In Silico Study -- Impact of Temporal Heterogeneity of Acute Hypoxia on the Radiation Response of Experimental Tumors -- Mathematical Description of Changes in Tumour Oxygenation from Repeated Functional Imaging -- An In Vitro Model for Determining Tumor Cell Migration Under Metabolic Gradients -- Expression of MicroRNAs in Fibroblasts and Macrophages Is Regulated by Hypoxia-Induced Extracellular Acidosis -- Influence of Extracellular Acidosis on Matrix Protein Homeostasis in Tumour Cells and Fibroblasts -- Novel Redox Active Tyrosine Mutations Enhance the Regeneration of Functional Oxyhemoglobin from Methemoglobin: Implications for Design of Blood Substitutes -- Septic-induced microRNA Expression Modulations are linked to Angiogenesis, Vasomotion, and Hypoxia-induced Processes -- Guidance to Transfer ‘Bench-ready’ Medical Technology into Usual Clinical Practice - Case Study: Sensors and Spectrometer used in EPR Oximetry -- Regulation of Oxygen Tension in the Mammalian Retina During Systemic Hyperoxia is Species Dependent -- Intravital Observation of Microvascular Remodeling during Chronic Exposure to Hypoxia in Mice -- Analysis of Aortic Remodeling and Stiffness in Patients with Obstructive Sleep Apnea Syndrome: Preliminary Results -- Does Vascular Endothelial Cell or Smooth Muscle affect the Decrease in Oxygen Consumption of Arteriolar Wall during Vasodilation -- Hyperbaric Oxygen Therapy in Necrotizing Soft Tissue Infections: A Retrospective Study -- Dynamic Exercise Elicits Dissociated Changes between Tissue Oxygenation and Cerebral Blood Flow in the Prefrontal Cortex: A Study using NIRS and PET -- Mucine-1 is Related to Cell-Mediated Immunoexpression and Blood Pressure in Pulmonary Artery in Pulmonary Arterial Hypertension (PAH): Preliminary Results -- The Mitochondrial Na+/Ca2+ Exchanger is Necessary but not Sufficient for Ca2+ Homeostasis and Viability -- Hemoglobin Dynamics in the Skeletal Muscle of Patients with Malignant Hematopoietic Disease -- Fatigue, Muscle Oxygen Consumption and Blood Flow to the Skeletal Muscle after Allogeneic Hematopoietic Stem Cell Transplantation -- Reliability of Wearable Two Channel CW-NIRS in Measurements of Brain Function -- Investigation of Confounding Factors in Measuring Tissue Saturation with NIRS Spatially Resolved Spectroscopy -- Discrimination of Complex Activation Patterns in Near Infrared Optical Tomography with Artificial Neural Networks -- ABroAD: A Machine Learning Based Approach to Detect Broadband NIRS Artefacts -- Absolute Values of Optical Properties (μa, μs', μeff and DPF) of Human Head Yissue: Dependence on Head Region and Individual -- Long-term Changes in Optical Properties (μa, μs', μeff and DPF) of Human Head Tissue during Functional Neuroimaging Experiments -- A Fibreless Multiwavelength NIRS System for Imaging Localised Changes in Cerebral Oxidised Cytochrome C Oxidase -- Use of a Turn Coil and Channel above a GMR-SV Device to Observe and Measure the Properties of Deoxidized Red Blood Cells Coupled to Magnetic Beads -- Long-term in vivo Oxygen Sensors for Peripheral Artery Disease Monitoring -- A New Method Based on Virtual Fluence Detectors and Software Toolbox for Handheld Spectral Optoacoustic Tomography -- Computerized Video-capillaroscopy Alteration Related to Diabetes Mellitus and its Complications -- Contrast Ratio Quantification during Visualization of Microvasculature -- In vitro Comparisons of Near-Infrared Spectroscopy Oximeters: Impact of Slow Changes in Scattering of Liquid Phantoms -- Liquid Blood Phantoms to Validate NIRS Oximeters: Yeast versus Nitrogen for Deoxygenation -- Visualization of Methemoglobin Distribution in Tissues: Phantom Validation -- Polyunsaturated Fatty Acids induce ROS Synthesis in Microvascular Endothelial Cells -- Effect of Chain Unsaturation and Temperature on Oxygen Diffusion through Lipid Membranes from Simulations -- Reduced Oxygen Permeability upon Protein Incorporation within Phospholipid Bilayers -- Sanal-Cell Cycle and Primo Vascular System: Regeneration via Sanals -- Role of CXCR4 antagonist in Megakaryocyte Reinstatement with Increased Sinusoidal Vessel Density -- Solid-phase Extraction with Packed-Fiber is a Biological Sample Preparation Tool for Neuro-active Molecule Detection -- Salivary Alpha-amylase and Behavior Reaction in Acute Stress and the Impact of Tridimensional Personality…”
    Libro electrónico
  11. 2611
    Publicado 2023
    Tabla de Contenidos: “…Part 3: Deep Dive into Key Metrics for API Products -- Chapter 10: Infrastructure Metrics -- Key success factors (KSFs) for APIs -- Infrastructure as the foundation for API analytics -- Performance metrics -- Uptime and availability -- Errors per minute -- Average and maximum latency -- 90th-percentile latency by customer -- Usage metrics -- Requests Per Minute (RPM) -- CPU usage -- Memory usage -- Error code distribution -- Concurrent connections -- Top endpoints -- Usage by segments -- Reliability metrics -- Mean Time to Failure (MTTF) -- MTTR -- MTBR -- The Rate of Occurrence of Failure (ROCOF) -- Probability of Failure on Demand (POFOD) -- Summary -- Chapter 11: API Product Metrics -- Defining product metrics -- Discovery -- Unique visitors -- Page views -- Sign-ups by channel -- Reading level or text complexity analysis -- Link validation -- Search keyword Analysis -- Engagement -- Average time on page -- Bounce rate -- Engagement with homegrown tools -- Customer engagement score (CES) -- Acquisition -- Daily user sign-ups - new users -- Time to first hello world (TTFHW) -- Software development kit and version adoption -- Activation -- Time to first transaction (TFT) -- Time to value (TTV) -- Cohort analysis -- DAU/MAU/WAU -- Retention -- Recurring daily, weekly, and monthly usage -- Customer retention -- API calls per business transaction -- Experience -- Unique API consumers -- Top customers by API usage -- Conversion rate -- Daily support tickets per active users -- CSAT -- Net Promoter Score (NPS) -- Summary -- Chapter 12: Business Metrics -- Defining business metrics -- Measuring revenue -- MRR -- Revenue versus forecast -- ARPA -- Average transaction value (ATV) -- Revenue by acquisition channel -- Adoption tracking -- SDK adoption -- Feature adoption -- Churn analysis -- Churn rate -- Cohort retention -- Optimizing for growth…”
    Libro electrónico
  12. 2612
    por Costa, Nelson, 1975-
    Publicado 2010
    Tabla de Contenidos: “…5.3.3 Narrowband MIMO Channel Sounding -- 5.4 Wideband Sounding: Correlative Sounding -- 5.4.1 ML-sequences -- 5.4.2 Cross-Correlation Using the FFT -- 5.4.3 Digital Matched Filters -- 5.5 Wideband Sounding: Sampled Spectrum Channel Sounding -- 5.6 Switched-array Architectures -- 5.7 Timing and Carrier Recovery -- 5.7.1 Digital Timing Recovery Methods -- 5.7.2 Phase Recovery Using a Decision Directed Feedback Loop -- 5.8 Summary and Discussion -- 5.9 Notes and References -- Chapter 6: Experimental Verifications -- 6.1 Validation Metrics -- 6.1.1 Channel Capacity -- 6.1.2 The Diversity and Correlation Metrics -- 6.1.3 The Demmel Condition Number -- 6.1.4 The Environmental Characterization Metric -- 6.1.5 Correlation Matrix Difference Metric -- 6.2 WMSDR Experimental Setup -- 6.2.1 Terminology -- 6.2.2 Measurement Description -- 6.3 BYU Wideband Channel Sounder Experimental Setup -- 6.3.1 BYU Transmitter Set -- 6.3.2 BYU Receiver Set -- 6.3.3 Measurement Description -- 6.4 Experimental Results -- 6.4.1 Capacity Measure: Methodology -- 6.4.2 Results: MIMO APS and Spatial Structure -- 6.4.3 Results: Wideband Correlation Matrices -- 6.5 Discussion -- 6.5.1 Accuracy of the Results -- 6.5.2 Sources of Error -- 6.6 Summary and Discussion -- 6.7 Notes and References -- Appendix A: An Introduction to Tensor Algebra -- Appendix B: Proof of Theorems from Chapter 3 -- Appendix C: COST 273 Model Summary -- Glossary -- Bibliography -- Index…”
    Libro electrónico
  13. 2613
    Publicado 2017
    Tabla de Contenidos: “…-- I don't need your validation…”
    Libro electrónico
  14. 2614
    por Klidas, Angelika
    Publicado 2022
    Tabla de Contenidos: “…-- The process -- Summary -- Further reading -- Chapter 11: Defining a Data Literacy Competency Framework -- Data literacy competency framework -- Identifying problems and interpreting requirements -- Understanding, acquiring, and preparing relevant data -- Turning data into insights -- Validating the insights -- Transforming insights into decisions -- Communicating decisions with data -- Evaluating the outcome of a decision -- Understanding data -- Data literacy skills…”
    Libro electrónico
  15. 2615
    Publicado 2024
    Tabla de Contenidos: “…. -- How it works... -- Chapter 10: Validating and Editing Data with Topologies -- Creating a new geodatabase topology -- Getting ready -- How to do it... -- How it works... -- Validating spatial data using a geodatabase topology -- Getting ready -- How to do it... -- How it works... -- Correcting spatial features with topology tools -- Getting ready -- How to do it... -- How it works... -- Editing data with a map topology -- Getting ready -- How to do it... -- How it works... -- Chapter 11: Converting Data -- Converting shapefiles to a geodatabase feature class -- Getting ready -- How to do it... -- How it works... -- There's more... -- Merging multiple shapefiles into a single geodatabase feature class -- Getting ready -- How to do it... -- How it works... -- There's more... -- Exporting tabular data to an Excel spreadsheet -- Getting ready -- How to do it... -- How it works... -- Importing an Excel spreadsheet into ArcGIS Pro -- Getting ready -- How to do it... -- How it works... -- There's more...…”
    Libro electrónico
  16. 2616
    Publicado 2018
    Tabla de Contenidos: “…-- The evolution of machine learning -- Factors that led to the success of machine learning -- Machine learning, statistics, and AI -- Categories of machine learning -- Supervised and unsupervised machine learning -- Supervised machine learning -- Vehicle Mileage, Number Recognition and other examples -- Unsupervised machine learning -- Subdividing supervised machine learning -- Common terminologies in machine learning -- The core concepts in machine learning -- Data management steps in machine learning -- Pre-processing and feature selection techniques -- Centering and scaling -- The near-zero variance function -- Removing correlated variables -- Other common data transformations -- Data sampling -- Data imputation -- The importance of variables -- The train, test splits, and cross-validation concepts -- Splitting the data into train and test sets -- The cross-validation parameter -- Creating the model -- Leveraging multicore processing in the model -- Summary -- Chapter 8: Machine Learning Deep Dive -- The bias, variance, and regularization properties -- The gradient descent and VC Dimension theories -- Popular machine learning algorithms -- Regression models -- Association rules -- Confidence -- Support -- Lift -- Decision trees -- The Random forest extension -- Boosting algorithms -- Support vector machines -- The K-Means machine learning technique -- The neural networks related algorithms -- Tutorial - associative rules mining with CMS data -- Downloading the data -- Writing the R code for Apriori -- Shiny (R Code) -- Using custom CSS and fonts for the application -- Running the application -- Summary -- Chapter 9: Enterprise Data Science -- Enterprise data science overview…”
    Libro electrónico
  17. 2617
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with Python Machine Learning -- Machine learning and Python - a dream team -- What the book will teach you - and what it will not -- How to best read this book -- What to do when you are stuck -- Getting started -- Introduction to NumPy, SciPy, Matplotlib, and TensorFlow -- Installing Python -- Chewing data efficiently with NumPy and intelligently with SciPy -- Learning NumPy -- Indexing -- Handling nonexistent values -- Comparing the runtime -- Learning SciPy -- Fundamentals of machine learning -- Asking a question -- Getting answers -- Our first (tiny) application of machine learning -- Reading in the data -- Preprocessing and cleaning the data -- Choosing the right model and learning algorithm -- Before we build our first model -- Starting with a simple straight line -- Toward more complex models -- Stepping back to go forward - another look at our data -- Training and testing -- Answering our initial question -- Summary -- Chapter 2: Classifying with Real-World Examples -- The Iris dataset -- Visualization is a good first step -- Classifying with scikit-learn -- Building our first classification model -- Evaluation - holding out data and cross-validation -- How to measure and compare classifiers -- A more complex dataset and the nearest-neighbor classifier -- Learning about the seeds dataset -- Features and feature engineering -- Nearest neighbor classification -- Looking at the decision boundaries -- Which classifier to use -- Summary -- Chapter 3: Regression -- Predicting house prices with regression -- Multidimensional regression -- Cross-validation for regression -- Penalized or regularized regression -- L1 and L2 penalties -- Using Lasso or ElasticNet in scikit-learn -- Visualizing the Lasso path…”
    Libro electrónico
  18. 2618
    Publicado 1999
    Tabla de Contenidos: “…-- DTSC'S CURRENT CLASSIFICATION SYSTEM -- DTSC'S PROPOSED CLASSIFICATION SYSTEM -- THE NRC COMMITTEE'S FINDINGS AND RECOMMENDATIONS -- Risk-Based Waste Classification -- Exposure Pathway Integration -- Protection Goals and Exposure Scenarios -- Model Components and Parameters -- Model Performance -- Analytical Issues -- Risk for Entire Waste -- Chronic Toxicity Data and Irritation Testing -- Transparency of the Proposed Approach -- Flexibility Goals -- CONCLUSIONS -- 1 Introduction -- THE COMMITTEE'S TASK AND APPROACH -- REPORT ORGANIZATION -- OVERVIEW OF CALIFORNIA'S APPROACH TO CLASSIFYING HAZARDOUS WASTE -- Statutory Framework -- Current Waste-Classification System -- Need for Change in Waste-Classification System -- Proposed Waste-Classification System -- Toxicity Criteria -- Total Threshold Limit Concentrations -- Soluble or Extractable Regulatory Thresholds -- Other Toxicity Criteria -- Exposure Models -- CalTOX Model -- Preliminary Endangerment Assessment Model -- Lead Risk-Assessment Spreadsheet Model -- Potential Regulatory Impacts -- 2 DTSC's Proposed Overall Approach -- STATEMENT OF GOALS -- MULTIMEDIA AND MULTIPATHWAY RISK ASSESSMENT -- REALISTIC EXPOSURE SCENARIOS -- VALID SCIENCE -- TRANSPARENCY -- FLEXIBILITY -- IMPLEMENTATION PRACTICALITY AND EVALUATION -- 3 Scenario Selection and Modeling -- EXPOSURE SCENARIOS: PURPOSE -- MODELING: PURPOSE -- SUMMARY OF DTSC EXPOSURE SCENARIOS -- Adjacent Resident Scenario -- Waste Worker Scenario -- Land Conversion Scenario -- Ecological Effects Scenario -- MODELING USED IN THE SCENARIOS…”
    Libro electrónico
  19. 2619
    Publicado 2022
    Tabla de Contenidos: “…-- Reading forms, query arguments, files, JSON, and more -- Query arguments -- Forms and files -- Consuming JSON data -- Getting streaming data -- Validating data -- Step 1-getting started and making a decorator -- Step 2-reading the handler signature -- Step 3-modeling -- Step 4-model hydration -- Step 5-performing validations -- Taking it to the next level with third-party packages -- Summary -- Chapter 5: Building Response Handlers -- Technical requirements -- Examining the HTTP response structure -- The HTTP response status -- Response groupings -- A response through exceptions -- Custom status -- Headers -- The response body -- Rendering HTML content -- Delivering HTML files -- Basic templating -- Using a templating engine -- Serializing JSON content -- Choosing a serializer -- Serializing custom objects -- Best practices -- Streaming data -- File streaming -- Server-sent events for push communication -- Starting with the basics -- Building some SSE objects -- Websockets for two-way communication -- Setting response headers and cookies -- Responding with a request ID -- Setting response cookies -- Summary -- Chapter 6: Operating Outside the Response Handler -- Technical requirements -- Making use of ctx -- Altering requests and responses with middleware -- Request middleware -- Response middleware -- Responding early (or late) with middleware -- Middleware and streaming responses -- Leveraging signals for intra-worker communication -- Signal definitions -- Using built-in signals -- Custom signals -- Waiting on events -- Mastering HTTP connections -- Keep-Alive within Sanic -- Caching data per connection -- Handling exceptions like a pro -- Implementing proper exception handling -- Bad exception messages -- Misusing statuses -- Responses through raising an exception…”
    Libro electrónico
  20. 2620
    Publicado 2023
    Tabla de Contenidos: “…-- Configuring deployment with the web.xml file -- Summary -- Further reading -- Chapter 15: Jakarta Faces Application -- Technical requirements -- Configuring a Faces application -- Creating an object managed by Context Dependency Injection and validated with Bean Validation -- FinanceBean -- Scopes -- Calculations -- Using XHTML, Facelets, and Expression Language for rendering pages -- Deploying a Faces web application -- Understanding the life cycle of a Faces page -- Summary -- Further reading -- Part 4: Packaging Java Code -- Chapter 16: Deploying Java in Standalone Packages and Containers -- Technical requirements -- Exploring what modular Java is -- Creating a custom JRE with jlink -- Packaging with an installer using jpackage -- Using the Docker container system -- Working with Docker images -- Creating a Docker image -- Publishing an image -- Summary -- Further reading -- Index…”
    Libro electrónico