Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
2941Publicado 2016Tabla de Contenidos: “…Generic Experimental Issues and Model Validation -- 3. Emerging Research Case-Study Areas -- 3.1. …”
Libro electrónico -
2942por Shaik, BajiTabla de Contenidos: “…Preventing SQL Injection -- 2. Sanitizing and Validating Inputs -- 3. Security Concerns -- 4. Performance Optimization -- Summary -- What's Next -- Chapter 12: Building Functions and Procedures -- Functions -- Defining Functions -- Calling Functions -- Categories -- Immutable Functions -- STABLE Functions -- VOLATILE Functions -- Procedures -- Temporary Functions/Procedures -- VARIADIC Functions/Procedures -- Best Practices -- Summary -- What's Next -- Chapter 13: Return Values and Parameters -- Return Values -- Simple Example -- Different Ways to Return Values -- RETURNS -- RETURNS SETOF -- RETURNS TABLE -- OUT -- Simple Difference Matrix…”
Publicado 2023
Libro electrónico -
2943Publicado 2024Tabla de Contenidos: “…-- MongoDB is a NoSQL database -- Setting up MongoDB -- Optional: creating a paid cluster for production databases -- Creating a database user -- Setting up our MongoDB cluster for Django -- Creating a Database -- Creating documents inside a collection -- Updating documents -- Deleting documents and collections -- Mapping CRUD operations to HTTP methods -- CRUD operations on MongoDB with Django ORM -- CRUD operations on MongoDB with pymongo -- Cleaning up -- Summary -- Chapter 5: Creating RESTful APIs for Microservices -- Technical requirements -- Introducing RESTful APIs -- Benefits of RESTful APIs -- The RESTful API architecture -- Building RESTful APIs with DRF -- Setting up DRF -- Creating a model and a serializer -- Creating a view and the URL endpoints -- Browsing a DRF RESTful API -- Error handling -- Handling wrong-formatted requests -- Handling validation errors -- Summary -- Chapter 6: Orchestrating Microservices with Celery and RabbitMQ -- Technical requirements -- Introducing task queues -- Implementing the work queue scenario -- Implementing the Publish-Subscribe scenario -- Implementing the Request-Response scenario -- Exploring Celery and RabbitMQ -- Celery -- RabbitMQ -- Creating and running asynchronous tasks -- Creating and running a Celery-based task -- Creating and running a RabbitMQ-based task -- Monitoring tasks and task queues -- Monitoring Celery tasks with Flower -- Monitoring RabbitMQ tasks -- Summary -- Chapter 7: Testing Microservices -- Technical requirements…”
Libro electrónico -
2944Publicado 2023Tabla de Contenidos: “…-- Types of dataset and splits -- Cross-validation -- Common evaluation metrics -- Confusion matrix -- ROC -- Precision-Recall curve -- Relation between the ROC curve and PR curve -- Challenges and considerations when dealing with imbalanced data -- When can we have an imbalance in datasets? …”
Libro electrónico -
2945VBScript, WMI and ADSI unleashed : using VBSscript, WMI, and ADSI to automate Windows administrationPublicado 2007Tabla de Contenidos: “…-- How to Use This Book -- Part I: Introduction to Windows Administrative Scripting -- Part II: VBScript Tutorial -- Part III: Windows Management Instrumentation and Active Directory Services Interface -- Part IV: Advanced Scripting Techniques -- Part V: Ready-to-Run Examples -- Appendix -- Preparing to Use This Book -- Typographical Elements -- Sample Scripts -- Sample Scripts-Explained -- Part I: Introduction to Windows Administrative Scripting -- 1 Scripting Concepts and Terminology -- Overview of Scripting -- Script Hosts -- ActiveX Scripting Languages -- The Component Object Model (COM) -- Critical Scripting Security Issues -- VBScript Versus Windows PowerShell -- Summary -- 2 Running Scripts -- Windows Script Host -- Command-Line Scripts -- Notepad and Script Editors -- Writing Your First Script -- Running Your First Script -- Debugging Your First Script -- Summary -- 3 The Components of a Script -- A Typical VBScript -- Functions -- Subroutines -- Main Script -- Comments and Documentation -- Summary -- 4 Designing a Script -- Creating a Task List -- Selecting the Appropriate Tools -- Creating Modules to Perform Tasks -- Validating User Input -- Planning for Errors -- Creating Script Libraries -- Summary -- Part II: VBScript Tutorial -- 5 Functions, Objects, Variables, and More -- Variables Defined -- Functions Defined -- Statements and Subroutines Defined -- Objects Defined -- Summary -- 6 Input and Output -- Displaying Messages -- Asking for Input -- Command-Line Parameters as Input -- Summary -- 7 Manipulating Numbers -- Numbers in VBScript -- Basic Arithmetic -- Advanced Arithmetic -- Boolean Math -- Converting Numeric Data Types -- Converting Other Data Types to Numeric Data -- Summary -- 8 Manipulating Strings -- Strings in VBScript -- Working with Substrings…”
Libro electrónico -
2946Publicado 2008Tabla de Contenidos: “…-- 4.6 The Take-Home Message -- 4.7 Project Ideas -- 5 Network Security -- 5.1 Basic Framework -- 5.2 Protocols -- 5.3 The Network as a Battlefield -- 5.4 The Brave New World -- 5.5 The Take-Home Message -- 5.6 Project Ideas -- 6 Implementation Security -- 6.1 Buffer Overflow -- 6.2 Argument Validation and Other Mishaps -- 6.3 TOCTOU -- 6.4 Malware -- 6.5 Programming Language Security -- 6.6 Security in the Development Lifecycle -- 6.7 The Take-Home Message -- 6.8 Project Ideas -- Part III: Building Blocks for Secure Systems -- 7 Using Cryptography -- 7.1 Framework and Terminology -- 7.2 Randomness -- 7.3 Symmetric Cryptography -- 7.4 Applications of Symmetric Cryptography -- 7.5 Public-Key Cryptography -- 7.6 Hash Functions -- 7.7 Practical Issues: Public Key -- 7.8 Past and Future -- 7.9 The Take-Home Message -- 7.10 Project Ideas -- 8 Subverting Cryptography -- 8.1 Breaking Symmetric Key without Brute Force…”
Libro electrónico -
2947Publicado 2003Tabla de Contenidos: “…Implementing a Web solution using Web Access -- 4.1 Data model record overview -- 4.2 BLQPARMS definitions needed to support a record type -- 4.3 Business logic -- 4.3.1 Predisplay user exit -- 4.3.2 Validation user exit -- 4.3.3 Post-file update and create user exits -- 4.3.4 TSXs and TSPs used by business logic -- 4.3.5 JavaScript in HTML -- 4.3.6 The home page -- Chapter 5. …”
Libro electrónico -
2948Publicado 2001Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
Libro electrónico -
2949Publicado 2014Tabla de Contenidos: “…-- Extending an Extension Point -- Examining the Sample Extension -- Modifying the Sample Extension -- Extension UI Configuration -- Configuration File Conventions -- Configuration UI Rendering -- Interaction Between UI and Model -- UI Validation -- Global UI Configuration -- Summary -- Part III: The Hudson Lifestyle -- Chapter 9: Advanced Plugin Development -- Extending Various Aspects of Hudson Dashboards -- Creating a Custom Rendered Jobs Status View -- Using the Custom Rendered View -- Adding a Custom Column to the Default View -- Adding an Action to the Action Panel of the Main Dashboard -- Custom Decoration of Hudson Pages -- Extending Various Aspects of a Hudson Job -- Adding a Custom Notifier to a Job -- Adding a Custom Link to a Job Dashboard -- Creating a Custom Build Wrapper -- Summary -- Chapter 10: Hudson Best Practices -- Manage the Hudson Resources Effectively -- Tune Memory -- Restrict Job History Depth -- Monitor the Disk Space -- Put Your Hudson Behind a Web Proxy -- Do Not Use Your Hudson as a File Server -- Periodically Back Up Your Hudson Contents -- Set Up a Fail-Safe Mode for Your Hudson -- Redundant Hudson Server Setup -- Monitoring Hudson Setup -- Server Switch on Failure -- Redirecting HTTP Traffic to a Redundant Server -- Scale Up the Security of Your Hudson -- Restrict Job Access to Certain Users -- Add Roles to the Authorization Matrix -- Upgrade Your Hudson Diligently -- Understand the Hudson Versioning Scheme -- Upgrade in a Sandbox First -- Summary -- Part IV: Appendixes -- Appendix A: Widely Used Hudson Plugins -- Appendix B: Personal Hudson Instance -- Hudson-as-Valet -- Optimal Hudson-as-Valet Setup -- Hudson for Work Area Maintenance -- The Open-Source Liaison Role -- The Committer Role -- Hudson as General-Purpose Scheduler…”
Libro electrónico -
2950Publicado 2018Tabla de Contenidos: “…Chapter 15: Introducing Neural Networks -- Deep learning at a glance -- Artificial neural networks -- MLPs with Keras -- Interfacing Keras to scikit-learn -- Summary -- Chapter 16: Advanced Deep Learning Models -- Deep model layers -- Fully connected layers -- Convolutional layers -- Dropout layers -- Batch normalization layers -- Recurrent Neural Networks -- An example of a deep convolutional network with Keras -- An example of an LSTM network with Keras -- A brief introduction to TensorFlow -- Computing gradients -- Logistic regression -- Classification with a multilayer perceptron -- Image convolution -- Summary -- Chapter 17: Creating a Machine Learning Architecture -- Machine learning architectures -- Data collection -- Normalization and regularization -- Dimensionality reduction -- Data augmentation -- Data conversion -- Modeling/grid search/cross-validation -- Visualization -- GPU support -- A brief introduction to distributed architectures -- Scikit-learn tools for machine learning architectures -- Pipelines -- Feature unions -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
2951Publicado 2022Tabla de Contenidos: “…A Short Story About Human-Level Performance -- Human-Level Performance on MNIST -- Bias -- Metric Analysis Diagram -- Training Set Overfitting -- Test Set -- How to Split Your Dataset -- Unbalanced Class Distribution: What Can Happen -- Datasets with Different Distributions -- k-fold Cross Validation -- Manual Metric Analysis: An Example -- Exercises -- References -- Chapter 11: Generative Adversarial Networks (GANs) -- Introduction to GANs -- Training Algorithm for GANs -- A Practical Example with Keras and MNIST -- A Note on Training -- Conditional GANs -- Conclusion -- Appendix A: Introduction to Keras -- Some History -- Understanding the Sequential Model -- Understanding Keras Layers -- Setting the Activation Function -- Using Functional APIs -- Specifying Loss Functions and Metrics -- Putting It All Together and Training -- Modeling evaluate() and predict () -- Using Callback Functions -- Saving and Loading Models -- Saving Your Weights Manually -- Saving the Entire Model -- Conclusion -- Appendix B: Customizing Keras -- Customizing Callback Classes -- Example of a Custom Callback Class -- Custom Training Loops -- Calculating Gradients -- Custom Training Loop for a Neural Network -- Index…”
Libro electrónico -
2952por Schreurs, A.Tabla de Contenidos: “…-- 2 Illumination as intuitive experiential knowledge -- 3 'Religious experience' research -- 4 The validity of religious experience -- 5 'Broad theism' -- 6 Extrasensory perception or special spiritual powers? …”
Publicado 2002
Libro electrónico -
2953Publicado 2023Tabla de Contenidos: “…-- The low-level API -- Content entities -- TypedData recap -- Interacting with the Entity API -- Querying entities -- Loading entities -- Reading entities -- Manipulating entities -- Creating entities -- Rendering content entities -- Pseudo-fields -- Entity validation -- Summary -- Chapter 7: Your Own Custom Entity and Plugin Types -- Our custom content entity type -- Entity updates -- Our custom plugin type -- Our custom configuration entity type -- The Importer plugin -- Content entity bundles -- Our own Drush command -- Summary -- Chapter 8: The Database API -- The Schema API -- Running queries -- Select queries -- Pagers -- Insert queries -- Update queries -- Delete queries -- Transactions -- Query alters -- Update hooks -- Post update hooks -- Summary -- Chapter 9: Custom Fields -- A recap of Field type plugins -- Field type -- Field widget -- Field formatter -- Field settings -- Using our custom field type as a base field -- Summary -- Chapter 10: Access Control -- Introduction to the Drupal access system -- Roles and permissions under the hood -- Defining permissions -- Checking the user credentials -- Route access -- Custom route access -- Programmatically checking access on routes…”
Libro electrónico -
2954por Organization for Economic Co-operation and Development (OECD)Tabla de Contenidos: “…-- Modularising VET programmes -- Modularisation can be beneficial to adults, employers and VET providers -- Modularisation in VET can be challenging -- Microcredentials can make modularisation more effective -- Recognising and validating prior learning -- Recognition of prior learning can make VET more accessible…”
Publicado 2023
Libro electrónico -
2955por National Research Council (U.S.).Tabla de Contenidos: “…QUESTIONS OF METHODOLOGY -- The Issue of Validity -- PATTERNS OF SEXUAL ACTIVITY -- Sexual Initiation and Premarital Intercourse -- Sex Within Marriage or a Stable Union -- Extramarital and Casual Sex -- Commercial Sex -- SEX-RELATED RISK FACTORS -- High Number of Partners/Commercial Sex -- Perceived Risk -- Age -- Education -- Marital Status -- Residence -- Migration -- Sexually Transmitted Diseases -- Circumcision and Traditional Medical Practices -- Alcohol -- SEXUAL PRACTICES AND BELIEFS -- The Notion That Men Need Sex -- Coercive Sex -- Health Beliefs -- Dry Sex -- Oral/Anal Sex -- Homosexuality -- Postpartum and Other Abstinence -- Levirate Marriage -- AIDS AWARENESS -- Modes of Transmission -- Asymptomatic Transmission -- Severity and Perceived Threat -- Attitudes Toward Sufferers -- Testing -- THE ROLE OF CONDOMS -- Condom Use -- Condoms and STD and HIV Prevention -- Attitudes Toward Condoms -- BEHAVIOR CHANGE -- CONCLUSIONS -- RECOMMENDATIONS -- 5 Primary HIV-Prevention Strategies -- BEHAVIOR-CHANGE INTERVENTION PROGRAM DESIGN AND EVALUATION -- Guiding Principles for Behavior-Change Interventions -- INTERVENTION EVALUATION -- A TYPOLOGY OF INTERVENTION PROGRAMS -- Institution-based Programs -- Community-based Programs -- Population-based Programs -- INTERVENTIONS TARGETING SEXUALLY ACTIVE MEN -- Issues -- Target Population -- Types of Strategies and Programs -- Case Study -- Lessons Learned -- INTERVENTIONS TARGETING SEXUALLY ACTIVE WOMEN -- Issues -- Target Population -- Types of Strategies and Programs -- Case Study: An Intervention Targeted to Commercial Sex Workers -- Case Study: A Community-based Intervention -- Lessons Learned -- INTERVENTIONS TARGETING YOUTH -- Issues -- Target Population -- Types of Strategies and Programs -- Case Study -- Lessons Learned -- PERINATAL TRANSMISSION -- RECOMMENDATIONS…”
Publicado 1996
Libro electrónico -
2956Publicado 2019Tabla de Contenidos: “…4.4.6 MAC Design/Selection and Implementation -- 4.4.6.1 Real-time/deterministic MACs -- 4.4.6.2 Low-power MACs -- 4.4.6.3 High level protocols for error mitigation -- 4.4.7 System Validation -- 4.4.7.1 Channel emulation -- 4.4.7.2 Performance tests -- 4.5 Intelligent Functions in the Sensors and Edge Servers -- 4.5.1 Intelligent Function: Self-Calibration -- 4.5.1.1 Practical application: Press machine torque sensor -- 4.5.1.2 Practical application: X-ray tube cathode filament monitoring -- 4.5.1.3 Practical application: Compressed air system -- 4.5.2 Intelligent Function: Self-Testing (Self-Validating) -- 4.5.2.1 Practical application: Oil tank system -- 4.5.2.2 Practical application: Air and water flow and temperature sensor -- 4.5.2.3 Practical application: Sensors for the photovoltaic plants -- 4.5.3 Intelligent Function: Self-Diagnostics -- 4.5.3.1 Practical application: Environmental parameters -- 4.5.3.2 Practical application: Intelligent process performance indicator -- 4.5.4 Smart Function: Formatting -- 4.5.4.1 Practical applications: Compressed air system -- 4.5.5 Smart Function: Enhancement -- 4.5.5.1 Practical application: Air and water flow and temperature -- 4.5.5.2 Practical application: Railway strain sensor -- 4.5.5.3 Practical application: Conventional energy production -- 4.5.6 Smart Function: Transformation -- 4.5.6.1 Practical application: Pressure drop estimation -- 4.5.7 Smart Function: Fusion -- 4.5.7.1 Practical application: Off-road and special purpose vehicle -- 4.5.7.2 Practical application: MR magnet monitoring (e-Alert sensor) -- 4.5.7.3 Practical application: MR critical components -- References -- Chapter 5 - Providing Proactiveness: Data Analysis Techniques Portfolios -- 5.1 Introduction -- 5.2 Root Cause Failure Analysis -- 5.2.1 Theoretical Background -- 5.2.2 Techniques Catalogue -- 5.2.2.1 Support vector machine…”
Libro electrónico -
2957por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Cadre de compétence ou de qualifications -- 4.5.2. Validation des acquis non formels -- Encadré 4.1. Validation de la formation non formelle -- 4.5.3. …”
Publicado 2002
Libro electrónico -
2958Publicado 2025Tabla de Contenidos: “…-- 9.2 Hyperparameter Optimization Techniques -- 9.2.1 Model-Free Algorithms -- 9.2.1.1 Trial-and-Error (Manual Testing) -- 9.2.1.2 Grid Search -- 9.2.1.3 Random Search -- 9.2.2 Gradient-Based Optimization -- 9.2.3 Bayesian Optimization -- 9.2.4 Multifidelity Optimization -- 9.2.4.1 Successive Halving -- 9.2.4.2 Hyperband -- 9.2.5 Metaheuristic Algorithms -- 9.2.5.1 Genetic Algorithm -- 9.2.5.2 Particle Swarm Optimization -- 9.3 Challenges in Hyperparameter Optimization -- 9.4 Concluding Remarks -- References -- Chapter 10 Accuracy Assessment and Model Explainability -- 10.1 Accuracy Assessment -- 10.1.1 Sampling Scheme and Spatial Autocorrelation -- 10.1.2 Sample Size, Scale, and Spatial Variability -- 10.1.3 Adequacy of Training and Testing Data -- 10.1.4 Conventional Accuracy Analysis -- 10.1.5 Accuracy Analysis for Machine Learning -- 10.1.6 Fuzzy Accuracy Assessment -- 10.1.7 Object-Based Accuracy Assessment -- 10.2 Comparison of Thematic Maps -- 10.2.1 McNemar's Test -- 10.2.2 z-Test -- 10.2.3 Wilcoxon Signed-Ranks Test -- 10.2.4 5×2-Cross-Validation t-Test -- 10.2.5 Friedman Test -- 10.3 Explainability Methods -- 10.3.1 SHapley Additive exPlanations -- 10.3.2 Partial Dependence Plot -- 10.3.3 Pairwise Interaction Importance -- 10.3.4 Permutation-Based Feature Importance…”
Libro electrónico -
2959Publicado 2003Tabla de Contenidos: “…8.1 Introduction to globalization -- 8.2 Globalization in WebSphere Commerce -- 8.3 Cultural considerations -- 8.3.1 Date and time formatting -- 8.3.2 Currency and number formatting -- 8.3.3 Name and address formatting -- 8.4 WebSphere Commerce application model -- 8.4.1 Language table -- 8.4.2 Introduction to encoding -- 8.4.3 Unicode -- 8.4.4 WebSphere Commerce data model: input -- 8.4.5 WebSphere Commerce data model: output -- 8.5 Globalized catalog content -- 8.6 Globalized store design -- 8.6.1 Globalized page framework: one template for stores/languages -- 8.6.2 Support for bi-directional languages -- 8.6.3 Understanding the localized store assets -- 8.6.4 Creating a new display format for WebSphere Commerce -- 8.6.5 Adding a new currency to WebSphere Commerce -- 8.6.6 How to add/delete a language/currency for a store archive -- 8.7 Globalized tools framework -- 8.8 Globalization in the messaging system -- 8.9 Globalization tips -- 8.9.1 Handling apostrophes and special characters -- 8.9.2 Using locale-dependent Cascading Style Sheets (CSS) -- 8.9.3 National language-enabled alert/confirm/prompt boxes -- 8.9.4 Input field validation: UTF-8 Input validation -- 8.9.5 Submit NL command parameters using hidden forms -- Part 3 ITSO B2B working example -- Chapter 9. …”
Libro electrónico -
2960por McLean, Doug, 1943-Tabla de Contenidos: “…Continuum fluid mechanics and the Navier-Stokes equations 3.1 The continuum formulation and its range of validity 3.2 Mathematical formalism 3.3 Kinematics: streamlines, streaklines, timelines, and vorticity 3.3.1 ... …”
Publicado 2013
Libro electrónico