Mostrando 3,061 - 3,080 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.57s Limitar resultados
  1. 3061
    Publicado 2024
    Tabla de Contenidos: “…Cover -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Machine Learning Fundamentals -- Making the Most Out of this Book - Your Certification and Beyond -- Comparing AI, ML, and DL -- Examining ML -- Examining DL -- Classifying supervised, unsupervised, and reinforcement learning -- Introducing supervised learning -- The CRISP-DM modeling life cycle -- Data splitting -- Overfitting and underfitting -- Applying cross-validation and measuring overfitting -- Bootstrapping methods -- The variance versus bias trade-off -- Shuffling your training set -- Modeling expectations -- Introducing ML frameworks -- ML in the cloud -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 2: AWS Services for Data Storage -- Technical requirements -- Storing Data on Amazon S3 -- Creating buckets to hold data -- Distinguishing between object tags and object metadata -- Controlling access to buckets and objects on amazon s3 -- S3 bucket policy -- Protecting data on amazon s3 -- Applying bucket versioning -- Applying encryption to buckets -- Securing s3 objects at rest and in transit -- Using other types of data stores -- Relational Database Service (RDS) -- Managing failover in Amazon RDS -- Taking automatic backups, RDS snapshots, and restore and read replicas -- Writing to Amazon Aurora with multi-master capabilities -- Storing columnar data on Amazon Redshift -- Amazon DynamoDB for NoSQL Database-as-a-Service -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 3: AWS Services for Data Migration and Processing -- Technical requirements -- Creating ETL jobs on AWS Glue -- Features of AWS Glue -- Getting hands-on with AWS Glue Data Catalog components -- Getting hands-on with AWS Glue ETL components -- Querying S3 data using Athena -- Processing real-time data using Kinesis Data Streams…”
    Libro electrónico
  2. 3062
    por Chapple, Mike
    Publicado 2024
    Tabla de Contenidos: “…Building an Incident Response Team -- Team Composition -- Training and Testing -- Incident Communications Plan -- Internal Communications -- External Communications -- Secure Communications -- Incident Identification and Response -- Security Data Sources -- Correlating Security Information -- Receiving Incident Reports -- Responding to Incidents -- Part III Domain 3: Access Controls Concepts -- Chapter 11 Physical Access Controls: Objective 3.1 Understand Physical Access Controls -- Physical Facilities -- Data Centers -- Server Rooms -- Media Storage Facilities -- Evidence Storage Rooms -- Wiring Closets -- Designing for Security -- Visitor Management -- Physical Security Personnel -- Security Personnel -- Security Protocols -- Chapter 12 Logical Access Controls: Objective 3.2 Understand Logical Access Controls -- Authorization -- Least Privilege -- Segregation of Duties -- Authorization Models -- Account Types -- User Accounts -- Administrator Accounts -- Guest Accounts -- Shared/Generic Accounts -- Service Accounts -- Non-repudiation -- Part IV Domain 4: Network Security -- Chapter 13 Computer Networking: Objective 4.1 Understand Computer Networking -- Network Types -- TCP/IP Networking -- Internet Protocol -- Transmission Control Protocol -- User Datagram Protocol -- Internet Control Message Protocol -- OSI Model -- IP Addressing -- Identifying Valid IPv4 Addresses -- Domain Name System -- Network Ports and Applications -- Securing Wi-Fi Networks -- Disable SSID Broadcasting -- Change Default Passwords -- Authenticate Wi-Fi Users -- Wireless Encryption -- Chapter 14 Network Threats and Attacks: Objective 4.2 Understand Network Threats and Attacks -- Malware -- Viruses -- Worms -- Trojan Horses -- Eavesdropping Attacks -- On-Path Attacks -- Denial-of-Service Attacks -- Side-Channel Attacks…”
    Libro electrónico
  3. 3063
    Publicado 2015
    Tabla de Contenidos: “…Applying Critical Thinking to Nursing Practice -- Problem-Solving -- Attitudes That Foster Critical Thinking -- Independence -- Fair-Mindedness -- Insight into Egocentricity -- Intellectual Humility -- Intellectual Courage to Challenge the Status Quo and Rituals -- Integrity -- Perseverance -- Confidence -- Curiosity -- Components of Clinical Reasoning -- Setting Priorities -- Developing Rationales -- Learning How to Act -- Clinical Reasoning-in-Transition -- Responding to Changes in the Client's Condition -- Reflection -- Integration of Critical Thinking and Clinical Reasoning -- Concept Mapping -- Concept Mapping and Enhancing Critical Thinking and Clinical Reasoning -- CHAPTER 10 Assessing -- Introduction -- Overview of the Nursing Process -- Phases of the Nursing Process -- Characteristics of the Nursing Process -- Assessing -- Collecting Data -- Types of Data -- Sources of Data -- Data Collection Methods -- Organizing Data -- Conceptual Models and Frameworks -- Wellness Models -- Nonnursing Models -- Validating Data -- Documenting Data -- CHAPTER 11 Diagnosing -- Introduction -- Nursing Diagnoses -- Definitions -- Status of the Nursing Diagnoses -- Components of a Nursing Diagnosis -- Differentiating Nursing Diagnoses from Medical Diagnoses -- Differentiating Nursing Diagnoses from Collaborative Problems -- The Diagnostic Process -- Analyzing Data -- Identifying Health Problems, Risks, and Strengths -- Formulating Diagnostic Statements -- Avoiding Errors in Diagnostic Reasoning -- CHAPTER 12 Planning -- Introduction -- Types of Planning -- Initial Planning -- Ongoing Planning -- Discharge Planning -- Developing Nursing Care Plans -- Standardized Approaches to Care Planning -- Formats for Nursing Care Plans -- Multidisciplinary (Collaborative) Care Plans -- Guidelines for Writing Nursing Care Plans -- The Planning Process -- Setting Priorities…”
    Libro electrónico
  4. 3064
    Publicado 2022
    Tabla de Contenidos: “…Applying Critical Thinking to Nursing Practice -- Problem-Solving -- Attitudes That Foster Critical Thinking -- Independence -- Fair-Mindedness -- Insight into Egocentricity -- Intellectual Humility -- Intellectual Courage to Challenge the Status Quo and Rituals -- Integrity -- Perseverance -- Confidence -- Curiosity -- Components of Clinical Reasoning -- Setting Priorities -- Developing Rationales -- Learning How to Act -- Clinical Reasoning-in-Transition -- Responding to Changes in the Client's Condition -- Reflection -- Integration of Critical Thinking and Clinical Reasoning -- Concept Mapping -- Concept Mapping and Enhancing Critical Thinking and Clinical Reasoning -- Chapter 10: Assessing -- Introduction -- Overview of the Nursing Process -- Phases of the Nursing Process -- Characteristics of the Nursing Process -- Assessing -- Collecting Data -- Types of Data -- Sources of Data -- Data Collection Methods -- Organizing Data -- Conceptual Models and Frameworks -- Wellness Models -- Nonnursing Models -- Validating Data -- Documenting Data -- Chapter 11: Diagnosing -- Introduction -- Nursing Diagnoses -- Definitions -- Status of the Nursing Diagnoses -- Components of a Nursing Diagnosis -- Differentiating Nursing Diagnoses from Medical Diagnoses -- Differentiating Nursing Diagnoses from Collaborative Problems -- The Diagnostic Process -- Analyzing Data -- Identifying Health Problems, Risks, and Strengths -- Formulating Diagnostic Statements -- Avoiding Errors in Diagnostic Reasoning -- Chapter 12: Planning -- Introduction -- Types of Planning -- Initial Planning -- Ongoing Planning -- Discharge Planning -- Developing Nursing Care Plans -- Standardized Approaches to Care Planning -- Formats for Nursing Care Plans -- Multidisciplinary (Collaborative) Care Plans -- Guidelines for Writing Nursing Care Plans -- The Planning Process -- Setting Priorities…”
    Libro electrónico
  5. 3065
    Publicado 2023
    Tabla de Contenidos: “…-- Creating tests for a simple ETL pipeline -- Unit testing -- Validation testing -- Integration testing -- End-to-end testing -- Performance testing -- Resilience testing -- Best practices for a testing environment for ETL pipelines -- Defining testing objectives -- Establishing a testing framework -- Automating ETL tests -- Monitoring ETL pipelines -- ETL testing challenges -- Data privacy and security -- Environment parity -- Top ETL testing tools -- Summary -- Chapter 14: Best Practices for ETL Pipelines -- Technical requirements -- Data quality -- Poor scalability -- Lack of error-handling and recovery methods -- ETL logging in Python -- Debugging and issue resolution -- Auditing and compliance -- Performance monitoring -- Including contextual information -- Handling exceptions and errors -- The Goldilocks principle -- Implementing logging in Python -- Checkpoint for recovery -- Avoiding SPOFs -- Modularity and auditing -- Modularity -- Auditing -- Summary -- Chapter 15: Use Cases and Further Reading -- Technical requirements…”
    Libro electrónico
  6. 3066
    Publicado 2023
    Tabla de Contenidos: “…-- Summary -- Chapter 3: Triggers and Managing Trigger Execution -- The Salesforce order of execution -- An example scenario -- The save order of execution -- Clicks and code -- Trigger architecture -- Using trigger handler frameworks -- Controlling trigger execution -- Summary -- Chapter 4: Exceptions and Exception Handling -- Understanding the different types of exceptions -- Expected exceptions -- Unexpected exceptions -- Unknown exceptions -- Catching errors -- Using the finally block -- Exception logging -- Capturing state -- Using custom exception types -- Summary -- Chapter 5: Testing Apex Code -- Understanding the importance of testing -- Using a test data factory to create data -- Loading test data using Test.loadData -- The TestSetup annotation -- Mocking test data -- Testing RESTful web services with static resources -- Testing RESTful web services with a custom mock -- Testing best practices -- Using Test.startTest and Test.stopTest to demarcate the code under test -- Using assertions to validate behavior -- Writing a test for any bug that occurs -- Summary -- Chapter 6: Secure Apex Programming…”
    Libro electrónico
  7. 3067
    por Justus, Roy
    Publicado 2022
    Tabla de Contenidos: “…Releasing often (minimizing impacts) -- Considering external dependencies -- Planning for data migration and validation -- Considering testing and training -- Structuring the implementation team -- Examining major project functions -- Examining team leads and their skill sets -- Can't I just hire a consultant for all this? …”
    Libro electrónico
  8. 3068
    por Hirsch, E. D. 1928-
    Publicado 1973
    Libro
  9. 3069
    Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
    Libro electrónico
  10. 3070
    Publicado 2013
    Tabla de Contenidos: “…See -- Archimedean Axiom -- ARIMA -- See -- Army Operations Research -- Arrival Process -- See -- Arrival-Point Distribution -- Arrow Diagram -- See -- Artificial Intelligence -- Introduction -- AI as Search -- AI as Logic -- Further Reading -- See -- References -- Artificial Variables -- See -- Assignment Problem -- See -- References -- Auction and Bidding Models -- Introduction -- Environments Modeled -- Auction Forms -- Revenue Maximization -- Concluding Remarks -- See -- References -- Automation in Manufacturing and Services -- Introduction -- Automated Manufacturing -- Services -- Implementation: Human and Organizational Dimensions -- Concluding Remarks -- See -- References -- Availability -- See -- References -- Averch-Johnson Hyphothesis -- B -- Backward Chaining -- See -- Backward Kolmogorov Equations -- See -- Backward-Recurrence Time -- Balance Equations -- See -- Balking -- See -- Bandit Model -- Banking -- Introduction -- Pricing Contingent Cashflows -- Portfolio Immunization -- Portfolio Diversification -- See -- References -- Bar Chart -- Barrier Functions and their Modifications -- Introduction -- Barrier Functions -- Modified Barrier Functions -- See -- References -- Basic Feasible Solution -- See -- Basic Solution -- See -- Basic Variables -- See -- Basis -- See -- Basis Inverse -- See -- Basis Vector -- See -- Batch Shops -- Battle Modeling -- Introduction -- Battle Model Classification -- Attrition Laws -- Dimension, Data, and Output -- Verification, Validation, and Accreditation -- Other Controversies -- Concluding Remarks -- See -- References -- Bayes Rule -- See -- Bayesian Decision Theory, Subjective Probability, and Utility -- Introduction -- Subjective Probability -- Bayes Rule -- Other Interpretations of The Probability Calculus -- Utility Theory -- Concluding Remarks -- See -- References -- Beale Tableau -- See…”
    Libro electrónico
  11. 3071
    Publicado 2018
    Tabla de Contenidos: “…A continuum damage model for the simulation of concrete under cyclic loading -- From slender columns to branching structures -- Aging concrete: From very early ages to decades-long durability -- Assessing the flow characteristics of self-compacting concrete via numerical simulations of flow tests -- Mixing and extrusion of printing concrete -- Formulation, validation and application of a new shotcrete model -- Aging behavior of normal and high strength concretes -- A multiscale framework for the prediction of concrete self-desiccation -- Effect of drying on the mechanical performances of concrete -- Temperature and humidity-driven ageing of the VeRCoRs mock-up -- Reassessment of the very long term basic creep of concrete -- Interaction between damage and time-dependent deformation of mortar in concrete: 3D FE parametric study at meso-scale -- Prediction of air permeability in large RC structures using a stochastic FE THM modeling strategy -- Simplified modelling strategy for the thermos-mechanical analysis of massive reinforced structures at early age -- Multiscale quantification of thermal expansion of concrete and thermal stresses of concrete structures -- Translating environmentally-induced eigenstresses to risk of fracture for design of durable concrete pavements -- Simulation of permeable concrete to assess interrelationship between strength and permeability -- A coupled chemo-mechanical damage-healing model for cementitious materials -- Flow in fibrous composite materials: Numerical simulations -- Modeling water absorption in cement-based composites with SAP additions -- Full coupling between diffusion and mechanical analysis in a discrete computational framework -- Alternative parameter to characterize pore distribution in cement paste, and its relation to mechanical properties…”
    Libro electrónico
  12. 3072
    Publicado 2018
    Tabla de Contenidos: “…-- Recognizing Groovy errors -- Groovy policy illustration -- Addressing a problem with a simple Groovy policy -- Building our API -- Run the test -- Implementing a Groovy policy for an API response -- A closer look at Groovy language limitations -- Custom Java policies -- Composition of a custom Java policy -- Creating a custom policy for MRA -- Getting geolocation information -- Simplifying the development process -- Using an IDE -- Build properties -- Build process -- Presentation definition -- Supporting JavaScript -- Localization of the UI -- UI Backend for validating configuration -- Backend implementation -- API runtime…”
    Libro electrónico
  13. 3073
    Publicado 2021
    Tabla de Contenidos: “…9.3 Testing top-down versus testing bottom-up -- 9.3.1 What bottom-up and top-down testing mean -- 9.3.2 How top-down and bottom-up approaches impact a test-driven workflow -- 9.3.3 The pros and cons of bottom-up versus top-down approaches -- 9.4 Balancing maintenance costs, delivery speed, and brittleness -- 9.4.1 Test-driven implementation -- 9.4.2 Test-driven maintenance -- 9.5 Setting up an environment for TDD to succeed -- 9.5.1 Teamwide adoption -- 9.5.2 Keeping distinct lanes -- 9.5.3 Pairing -- 9.5.4 Supplementary testing -- 9.6 TDD, BDD, validations, and specificationsBDD (behavior-driven development) -- Summary -- 10 UI-based end-to-end testing -- 10.1 What are UI-based end-to-end tests? …”
    Libro electrónico
  14. 3074
    por Gomez-Mejia, Luis R.
    Publicado 2016
    Tabla de Contenidos: “…-- Meeting the Challenge of Effective Staffing -- Recruitment -- Sources of Recruiting -- Selection -- Reliability and Validity -- Selection Tools as Predictors of Job Performance -- Combining Predictors -- Selection and Person/Organization Fit -- Reactions to Selection Devices -- Legal Issues in Staffing -- Discrimination Laws -- Affirmative Action -- Negligent Hiring -- Summary and Conclusions -- Key Terms -- Discussion Questions -- YOU MANAGE IT! …”
    Libro electrónico
  15. 3075
    por Guthrie Caitlyn, Caitlyn
    Publicado 2022
    Tabla de Contenidos: “…Developing the capacity of teachers to use assessment formatively -- Policy issue 2.3. Enhancing the validity and fairness of examination and selection processes into and out of upper secondary education -- Policy issue 3.1. …”
    Libro electrónico
  16. 3076
    Publicado 2017
    Tabla de Contenidos: “…Training a classification model on the Kaggle/StumbleUpon evergreen classification dataset -- Using classification models -- Generating predictions for the Kaggle/StumbleUpon evergreen classification dataset -- Evaluating the performance of classification models -- Accuracy and prediction error -- Precision and recall -- ROC curve and AUC -- Improving model performance and tuning parameters -- Feature standardization -- Additional features -- Using the correct form of data -- Tuning model parameters -- Linear models -- Iterations -- Step size -- Regularization -- Decision trees -- Tuning tree depth and impurity -- The naà ̄ve Bayes model -- Cross-validation -- Summary -- Chapter 7: Web Application Vulnerability Assessment -- Introduction -- Running vulnerable web applications in Docker -- Getting ready -- How to do it... -- How it works... -- Using W3af for vulnerability assessment -- Getting ready -- How to do it... -- How it works... -- Using Nikto for web server assessment -- Getting ready -- How to do it... -- How it works... -- Using Skipfish for vulnerability assessment -- Getting ready -- -- How it works... -- Using Burp Proxy to intercept HTTP traffic -- Getting ready -- How to do it... -- How it works... -- Using Burp Intruder for customized attack automation -- Getting ready -- How to do it... -- How it works... -- Using Burp Sequencer to test the session randomness -- Getting ready -- How to do it... -- How it works... -- Chapter 8: Web Application Exploitation -- Introduction -- Using Burp for active/passive scanning -- Getting ready -- How to do it... -- How it works... -- Using sqlmap to find SQL Injection on the login page -- Getting ready -- How to do it... -- How it works... -- Exploiting SQL Injection on URL parameters using SQL Injection -- Getting ready -- How to do it... -- How it works... -- Getting ready -- How to do it…”
    Libro electrónico
  17. 3077
    Publicado 2016
    Tabla de Contenidos: “…-- What does the architecture compliance review checklists consist of and what metrics are used to validate compliance? -- How can one evaluate if the solution conforms to enterprise architecture? …”
    Libro electrónico
  18. 3078
    Publicado 2018
    Tabla de Contenidos: “…Twitter Sign-in -- Twitter Api key -- Project Configuration -- Phone number sign-in -- Project configuration -- Firebase SDK social networking site authentication -- Google sign-in -- Facebook login -- Twitter sign-in -- Phone number sign-in -- Anonymous Authentication -- Link multiple Auth providers -- Firebase Authentication failures -- Firebase Authentication exceptions -- Summary -- Chapter 3: Safe and Sound - Firebase Crashlytics -- Firebase Crash Reporting and Crashlytics -- Firebase Crash Reporting setup -- Creating crash reports -- Creating custom logs -- Deobfuscating ProGuard labels -- Crash Report support for multiple APK -- Disabling Crash Reporting -- Firebase Crashlytics -- Firebase Crashlytics setup and upgrading from Crash Reporting -- Migrating from Firebase Crash Reporting to Crashlytics -- Validating Crashlytics implementation -- Enabling Crashlytics debug mode -- Customizing Crashlytics reports -- Crashlytics and functions -- Summary -- Chapter 4: Genie in the Cloud - Firebase Cloud Functions -- Firebase Cloud Functions -- Set up the development environment -- Project structure -- Required modules -- Deploying Cloud functions project -- Custom logs and reviewing functions -- Trigger functions -- Cloud Firestore Triggers -- Specific documents -- Creating a document -- Updating documents -- Deleting a document -- Changes in a document -- Realtime Database Triggers -- Firebase Authentication Triggers -- Analytics and Crashlytics Triggers -- Cloud Storage Triggers -- HTTP Triggers -- Cloud Pub/Sub Triggers -- Writing Firebase functions -- Cloud Functions to fire a push notification -- Summary -- Chapter 5: Arsenal for Your Files - Firebase Cloud Storage -- Firebase a Cloud Storage -- Creating storage reference -- Storage reference properties -- Limitations of reference -- Uploading and downloading files -- Uploading files…”
    Libro electrónico
  19. 3079
    por Clarke, Glen E.
    Publicado 2012
    Tabla de Contenidos: “…Cover -- CompTIA Network+® Certification Study Guide -- About the Author -- About the Technical Editor -- About LearnKey -- Contents at A Glance -- Contents -- Preface -- Acknowledgments -- Introduction -- Chapter 1: Basic Network Concepts -- Identifying Characteristics of a Network -- Servers, Workstations, and Hosts -- Identifying Network Topologies -- Network Media and Connectors -- Exercise 1-1 Crimping a Category 5 Cable -- Access Methods -- Network Architectures -- Exercise 1-2 Identifying the Different Network Architectures -- Network Operating Systems -- Exercise 1-3 Installing DNS on a Windows Server -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 2: Network Protocols and Standards -- Network Protocols -- The OSI Model -- Exercise 2-1 Mixing and Matching OSI Model Definitions -- Exercise 2-2 Viewing Protocol Information with Network Monitor -- Exercise 2-3 Analyzing Network Traffic -- 802 Project Standards -- Certification Sumary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Capter 3: Networking Components -- Network Interface Cards -- Exercise 3-1 Configuring a Network Card -- Exercise 3-2 Determining Your Local Machine's MAC Address -- Hubs, MAU s, and Repeaters -- Bridges and Switches -- Routers and Brouters -- Gateways and Security Devices -- Exercise 3-3 Identifying Network Components -- Other Networking Devices -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 4: TCP/IP Fundamentals -- TCP/IP Protocol Suite -- Exercise 4-1 Identifying TCP/IP Protocols -- TCP/IP Fundamentals -- Exercise 4-2 Identifying Remote Systems -- TCP/IP Addressing -- Exercise 4-3 Converting Decimal to Binary -- Exercise 4-4 Converting Binary to Decimal -- Exercise 4-5 Identifying Address Classes -- Exercise 4-6 Understanding Valid Addresses…”
    Libro electrónico
  20. 3080
    Publicado 2023
    Tabla de Contenidos:
    Libro electrónico