Mostrando 3,101 - 3,120 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.52s Limitar resultados
  1. 3101
    Publicado 2012
    Tabla de Contenidos: “…Federated Identity Management -- eXtensible Access Control Markup Language (XACML) -- Simple Object Access Protocol (SOAP) -- Single Sign On (SSO) -- Service Provisioning Markup Language (SPML) -- Certificate-based Authentication -- Attestation -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 18 Security Activities Across the Technology Life Cycle -- End-to-End Solution Ownership -- Understanding the Results of Solutions in Advance -- Systems Development Life Cycle -- Adapt Solutions to Address Emerging Threats and Security Trends -- Validate the System Design -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- Appendix: About the Download -- Downloading the ISO File -- System Requirements -- Installing and Running MasterExam -- MasterExam -- LearnKey Online Training -- Help -- Removing Installations -- Technical Support -- LearnKey Technical Support -- Glossary…”
    Libro electrónico
  2. 3102
    Publicado 2022
    Tabla de Contenidos: “…6.2.4 Distribution of word suffixes as features -- 6.2.5 Unique words as features -- 6.3 Practical use of authorship attribution and user profiling -- Summary -- 7 Your first sentiment analyzer using sentiment lexicons -- 7.1 Use cases -- 7.2 Understanding your task -- 7.2.1 Aggregating sentiment score with the help of a lexicon -- 7.2.2 Learning to detect sentiment in a data-driven way -- 7.3 Setting up the pipeline: Data loading and analysis -- 7.3.1 Data loading and preprocessing -- 7.3.2 A closer look into the data -- 7.4 Aggregating sentiment scores with a sentiment lexicon -- 7.4.1 Collecting sentiment scores from a lexicon -- 7.4.2 Applying sentiment scores to detect review polarity -- Summary -- Solutions to exercises -- 8 Sentiment analysis with a data-driven approach -- 8.1 Addressing multiple senses of a word with SentiWordNet -- 8.2 Addressing dependence on context with machine learning -- 8.2.1 Data preparation -- 8.2.2 Extracting features from text -- 8.2.3 Scikit-learn's machine-learning pipeline -- 8.2.4 Full-scale evaluation with cross-validation -- 8.3 Varying the length of the sentiment-bearing features -- 8.4 Negation handling for sentiment analysis -- 8.5 Further practice -- Summary -- 9 Topic analysis -- 9.1 Topic classification as a supervised machine-learning task -- 9.1.1 Data -- 9.1.2 Topic classification with Naïve Bayes -- 9.1.3 Evaluation of the results -- 9.2 Topic discovery as an unsupervised machine-learning task -- 9.2.1 Unsupervised ML approaches -- 9.2.2 Clustering for topic discovery -- 9.2.3 Evaluation of the topic clustering algorithm -- Summary -- Solutions to miscellaneous exercises -- 10 Topic modeling -- 10.1 Topic modeling with latent Dirichlet allocation -- 10.1.1 Exercise 10.1: Question 1 solution -- 10.1.2 Exercise 10.1: Question 2 solution -- 10.1.3 Estimating parameters for the LDA…”
    Libro electrónico
  3. 3103
    Publicado 2022
    Tabla de Contenidos: “…Incidents -- Understand the Risk Management Process -- Risk Visibility and Reporting -- Risk Management Concepts -- Risk Management Frameworks -- Risk Treatment -- Perform Security Assessment Activities -- Security Assessment Workflow Management -- Participate in Security Testing -- Interpretation and Reporting of Scanning and Testing Results -- Remediation Validation -- Audit Finding Remediation -- Manage the Architectures: Asset Management and Configuration Control -- Operate and Maintain Monitoring Systems -- Events of Interest -- Logging -- Source Systems -- Legal and Regulatory Concerns -- Analyze Monitoring Results -- Security Baselines and Anomalies -- Visualizations, Metrics, and Trends…”
    Libro electrónico
  4. 3104
    Publicado 2023
    Tabla de Contenidos: “…Automating compliance and security in pipelines -- Library age -- Application security testing -- Dynamic Application Security Testing (DAST) -- Static Application Security Testing (SAST) -- Secrets scanning -- Automated linting for code quality and standards -- Compiling with linting feedback -- Validating functionality during deployment with automated testing -- Why is testing so important to reliability? …”
    Libro electrónico
  5. 3105
    Tabla de Contenidos: “…Civic integration trajectories remain mostly sequential, protracting the time migrants spent outside of the labour market, and a stronger involvement of the PES at early stages would help in addressing this shortcoming -- Responsibilities for integration are shared by many actors, highlighting the need for more effective co-operation and co-ordination in integration efforts -- The data infrastructure is highly developed -- Difficult access to housing complicates newcomers' integration pathways -- Flanders' emphasis on rapid labour market integration can create a conflict with the goal of sustainable employment -- The public employment service offers various activation measures to support jobseekers' employment entry, but immigrants and their children benefit less from the measures that work best -- Participation in vocational language training should be further expanded -- Given the low education levels of many new arrivals, adult education needs to be more central to integration efforts -- Further improvements in the recognition process of foreign qualifications are needed -- Validation of professional qualifications is a promising pathway, but needs to be expanded and better targeted at migrants -- Bridging offers need to be streamlined and scaled up -- Migrant women are struggling to integrate, and many remain locked in inactivity, pointing to the need for second chance offers -- Family policies should be made more accessible for migrant mothers -- Wage subsidies form an important element in Flanders' approach to tackle demand-side barriers to employment, but immigrants are underrepresented -- The service voucher scheme gradually became an important employer of migrant women, but traps many highly qualified migrant women in subsidised domestic work…”
    Libro electrónico
  6. 3106
    Publicado 2016
    Tabla de Contenidos: “…Hoekstra Application of a Remote Sensing Method for Estimating Monthly Blue Water Evapotranspiration in Irrigated Agriculture Reprinted from: Remote Sens. 2014, 6(10), 10033-10050 http://www.mdpi.com/2072-4292/6/10/10033 -- Rim Amri, Mehrez Zribi, Zohra Lili-Chabaane, Camille Szczypta, Jean Christophe Calvet and Gilles Boulet FAO-56 Dual Model Combined with Multi-Sensor Remote Sensing for Regional Evapotranspiration Estimations Reprinted from: Remote Sens. 2014, 6(6), 5387-5406 http://www.mdpi.com/2072-4292/6/6/5387 -- Abel Ramoelo, Nobuhle Majozi, Renaud Mathieu, Nebo Jovanovic, Alecia Nickless and Validation of Global Evapotranspiration Product (MOD16) using Flux Tower Data in the Sebinasi Dzikiti African Savanna, South Africa Reprinted from: Remote Sens. 2014, 6(8), 7406-7423 http://www.mdpi.com/2072-4292/6/8/7406 -- Mireia Romaguera, Mhd. …”
    Libro electrónico
  7. 3107
    por Joe Valacich
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Brief Contents -- Contents -- Preface -- PART ONE Foundations for Systems Development -- AN OVERVIEW OF PART ONE -- 1 The Systems Development Environment -- Learning Objectives -- Introduction -- A Modern Approach to Systems Analysis and Design -- Developing Information Systems and the Systems Development Life Cycle -- The Heart of the Systems Development Process -- The Traditional Waterfall SDLC -- Agile Methodologies -- eXtreme Programming -- Scrum -- Agile in Practice -- Object-Oriented Analysis and Design -- Our Approach to Systems Development -- Summary -- Key Terms -- Review Questions -- Problems and Exercises -- Field Exercises -- References -- 2 The Origins of Software -- Learning Objectives -- Introduction -- Systems Acquisition -- Outsourcing -- Sources of Software -- Choosing Off-the-Shelf Software -- Validating Purchased Software Information -- Reuse -- Summary -- Key Terms -- Review Questions -- Problems and Exercises -- Field Exercises -- References -- BEC CASE: THE ORIGINS OF SOFTWARE -- Case Questions -- 3 Managing the Information Systems Project -- Learning Objectives -- Introduction -- Pine Valley Furniture Company Background -- Managing the Information Systems Project -- Initiating a Project -- Planning the Project -- Executing the Project -- Closing Down the Project -- Representing and Scheduling Project Plans -- Representing Project Plans -- Calculating Expected Time Durations Using PERT -- Constructing a Gantt Chart and Network Diagram at Pine Valley Furniture -- Using Project Management Software -- Establishing a Project Start Date -- Entering Tasks and Assigning Task Relationships -- Selecting a Scheduling Method to Review Project Reports -- Summary -- Key Terms -- Review Questions -- Problems and Exercises -- Field Exercises -- References…”
    Libro electrónico
  8. 3108
    Publicado 2024
    Tabla de Contenidos: “…-- How to manage data quality -- Accuracy -- Completeness -- Consistency -- Timeliness -- Validity -- Uniqueness -- Reliability -- Data quality management systems -- Completely decentralized -- Completely centralized -- The hybrid approach -- Build versus buy -- Popular data quality frameworks and tools -- Summary -- Chapter 10: Master Data Management -- Single source of truth -- What causes discrepancies in master data? …”
    Libro electrónico
  9. 3109
    Publicado 2024
    Tabla de Contenidos: “…Assessing Your Unique Leadership Skills and Talents -- Identifying Your Leadership Style -- Selfless leadership style -- Transformational leadership style -- Transactional leadership style -- "Laissez Faire" leadership style -- Democratic leadership style -- Situational leadership style -- Building Your Personal Brand and Reputation -- Why building a strong personal brand matters -- Why your reputation as a leader matters -- Strengthening your personal leadership brand -- Diagnosing Your Level of Inclusiveness -- Part 2 Developing the Skills to Lead Yourself -- Chapter 5 Getting Clear on Your Purpose, Vision, and Values -- Knowing the Importance of Your Purpose -- Asking the Right Questions to Uncover Your "Why" -- Getting Grounded on Your Personal Vision Statement -- Establishing and Living Your Personal Values -- Chapter 6 Minimizing Your Own Biases and Microaggressions -- Defining Unconscious Bias -- Figuring Out Microaggressions -- Understanding Intent versus Impact -- Identifying the Effects of Bias in the Workplace -- Sourcing and selecting new talent -- Onboarding and orienting new talent -- Developing, promoting, and engaging talent -- Communicating with talent -- Retaining top talent -- Interrupting Biased Behaviors -- Step 1: Recognize when a bias has occurred -- Step 2: Validate or invalidate your bias -- Step 3: Chart your path forward -- Chapter 7 Leading with Authenticity and Transparency -- Defining Authenticity and Transparency and Seeing How They Relate -- Authenticity -- Transparency -- Understanding Why Some Leaders Shy Away from Authenticity and Transparency -- Analyzing Your Effectiveness as an Authentic and Transparent Leader -- Mastering Authentic and Transparent Leadership -- Chapter 8 Demonstrating Empathy and Emotional Intelligence -- Understanding Empathy and its Role in Leadership…”
    Libro electrónico
  10. 3110
    Publicado 2024
    Tabla de Contenidos: “…-- Common Sales Cloud use cases -- Summary -- Further reading -- Part 2: Preparing to Release -- Chapter 6: Bringing Data into Sales Cloud -- Supporting tools and information -- Identifying data to load -- Identifying available data -- Assessing the data -- Deciding what data to load -- Preparing your data -- Selecting your data-loading tool -- Salesforce-supported tools -- Third-party tools -- Which tool to use -- Loading data -- The loading process -- Data mapping and formatting -- Executing a data load -- Validating a data load -- Undoing a data load -- Planning your legacy data load -- Business transition -- Loading order -- Preloading steps -- Post-loading steps -- Data load rehearsal -- Scheduling -- Communication -- Ongoing data-loading activities -- Summary -- Further reading -- Chapter 7: Getting Sign-Off -- Supporting tools and information -- The what, why, who, how, and when of sign-off -- What is a sign-off? …”
    Libro electrónico
  11. 3111
    Publicado 2024
    Tabla de Contenidos: “…Exploring AKS and its benefits -- Architecting Corda networks on AKS -- Design considerations for Corda network deployment -- Integrating your AKS configuration for Corda with additional Azure services -- Provisioning an AKS cluster for Corda -- Setting up an Azure subscription and preparing the prerequisites -- Deploying an AKS cluster with the appropriate Corda configuration -- Corda Enterprise in the Azure Marketplace -- Securing the AKS cluster and managing access controls -- Managing Corda nodes on AKS -- Scaling Corda nodes as Kubernetes pods -- Testing and validating the resilience of Corda networks on AKS -- Ensuring high availability and disaster recovery -- Performing failover tests in AKS -- Summary -- Further reading -- Chapter 8: Using the Ledger Features of Azure SQL -- Technical requirements -- Introduction to the ledger features of Azure SQL -- Use cases for SQL Ledger -- Creating a ledger in Azure SQL database -- Database ledger versus table ledger -- Benefits of the ledger features of Azure SQL -- Security and integrity -- Performance and scalability -- Using the ledger features of Azure SQL for blockchain solutions -- Supply chain traceability -- Certificate issuance and verification -- Asset ownership transfer -- Integrating the ledger features of Azure SQL with other Azure services -- Azure Functions -- Azure Logic Apps -- Azure Event Grid -- Azure Analysis Services -- Azure Machine Learning -- Power BI -- Azure API Management -- Azure Data Factory -- Best practices for implementing blockchain solutions with the ledger features of Azure SQL -- Summary -- Further reading -- Chapter 9: Leveraging Azure Confidential Ledger -- Technical requirements -- An introduction to ACL -- Use cases -- The features and benefits of ACL -- Using ACL for blockchain solutions -- Connecting and sending data to ACL…”
    Libro electrónico
  12. 3112
    Publicado 2024
    Tabla de Contenidos: “…Kanban -- Understand the Change Request Process -- Need for On-Boarding Training -- Get Licensing and IP Issues Resolved as Early as Possible -- Project Owner and Communicating with Other Teams -- Project Team Capacity Planning -- Working Groups -- Conclusion -- Acknowledgments -- References -- Biographical Sketches -- Chapter 11 System Behavior Specification Verification and Validation (V&amp -- V) -- Introduction -- Background -- Monterey Phoenix -- Emergent Behavior Analysis -- Search and Rescue Examples -- Select the Behavior Model to V&amp -- V -- Prepare Models for V&amp -- V -- Expand the Model with Alternative Flows -- Probe the Model for Emergent Behaviors -- Conclusions -- References -- Biographical Sketches -- Chapter 12 Digital Engineering Transformation: : A Case Study -- Case Study of Digital Engineering from Scratch: a DoD and JPEO Journey -- Understanding the Needs -- Tailoring Products for User's Needs -- State-of-the-Art in Digital Transformation and "Clash with Reality" -- Digital Engineering Transformation and Directives (DE for AM) -- Additive Manufacturing - Technical Analysis: Additive Manufacturing (AM) vs. …”
    Libro electrónico
  13. 3113
    Publicado 2024
    Tabla de Contenidos: “…-- Chapter 10 Law 6: Everybody Owns the Customer: Community Is a Company-Wide Strategy, Not a DepartmentBy Seth Wylie -- Community Starts at the Top, with a Purpose -- Community's Value Flows in All Directions -- Engage Employees in the Value Loop -- Engage Employees in the Validation Loop -- Start Small, with Eager Believers -- Crank up the Momentum -- Community Management Skills -- Program Leadership -- Community Leadership -- Tummeling -- Community Operations -- The Team Can Be One or Many -- So, Who Owns Community? …”
    Libro electrónico
  14. 3114
    Publicado 2024
    Tabla de Contenidos: “…-- How to access and store data with the Windows Registry -- Comparing the Windows Registry to JSON settings files -- Worker Services -- Docker support -- Dissecting the Worker Service -- Controlling the lifetime of the service -- Wrapping up Worker Services -- WMI -- How to use WMI -- Reading the CPU temperature -- Reading the BIOS -- Controlling the Windows Update service -- Watching USB devices -- Registry and WMI - risks and how to avoid them -- The Windows Registry -- Potential risks when dealing with WMI -- Next steps -- Chapter 8: The One with the Network Navigation -- Technical requirements -- The fundamentals -- A walk down the OSI layers -- Exploring the System.Net namespace -- Understanding HTTP/HTTPS -- FTP -- Email protocols -- Working with the System.Net.Sockets namespace -- Steps to take when using sockets -- IPv4 and IPv6 -- Looking up time with sockets -- Async, non-blocking networking -- Making asynchronous calls -- Networking performance -- Connection pooling -- Caching -- Compression and serialization -- Keep-alive connections -- Networking errors and time-outs -- Using the HTTPClient wisely -- Implementing retries with Polly -- The circuit breaker pattern -- Validating network availability -- Monitoring and logging -- Next steps -- Chapter 9: The One with the Hardware Handshakes -- Technical requirements…”
    Libro electrónico
  15. 3115
    Publicado 2024
    Tabla de Contenidos: “…Supply chain and inventory optimization -- Predictive maintenance -- Healthcare diagnostics and treatment -- The different types of machine learning -- Supervised learning -- Unsupervised learning -- Semi-supervised learning -- Reinforcement learning -- Transfer learning -- Popular machine learning algorithms -- Linear regression -- Logistic regression -- Decision trees -- Random forests -- Support vector machines -- k-nearest neighbors -- Neural networks -- The machine learning process -- Training a supervised machine learning model -- Validation of a supervised machine learning model -- Testing a supervised machine learning model -- Evaluating machine learning models -- Risks and limitations of machine learning -- Overfitting and underfitting -- Bias and variance -- Balanced dataset -- Models are approximations of reality -- Machine learning on unstructured data -- Natural language processing (NLP) -- Computer vision -- Deep learning and artificial intelligence -- Artificial intelligence -- Deep learning -- Summary -- Supervised Machine Learning -- Defining supervised learning -- Applications of supervised learning -- The two types of supervised learning -- Key factors in supervised learning -- Steps within supervised learning -- Data preparation - laying the foundation -- Algorithm selection - choosing the right tool -- Model training - learning from data -- Model evaluation - assessing performance -- Prediction and deployment - putting the model to work -- Characteristics of regression and classification algorithms -- Regression algorithms -- Classification algorithms -- Key considerations in supervised learning -- Evaluation metrics -- Applications of supervised learning -- Consumer goods -- Retail -- Manufacturing -- Summary -- Unsupervised Machine Learning -- Defining UL -- Practical examples of UL -- Steps in UL -- Step 1 - Data collection…”
    Libro electrónico
  16. 3116
    Publicado 2023
    Tabla de Contenidos: “…Setting Up the Tab View Controller -- Creating a Tab Application -- Summary -- Chapter 5: Adding Book Screen -- Designing the Add Screen -- Assigning the Add View Controller File in Main.storyboard -- Running the Code -- Defining the UI Objects for the Add Screen -- Running the Program -- Saving the Book Record in iCloud -- Data Validation Is an Important Step -- Create a Database Function File -- Preparation Before Saving the Book -- Function to Save Book Record -- Setting Value Before Calling saveBook -- Post Save -- Reset Field -- Summary -- Chapter 6: Displaying the Book Records -- Setting Up Display View Controller -- Assigning the Display View Controller File in Main.storyboard -- Query the Book Table -- Call the Query Book -- Create a Table View -- Step 1: Define the Table Object -- Step 2: Extending the Table Delegate and Table Data Source -- Step 3: Setting the Table Delegate and Table Cell -- Step 4: Drawing the Table -- Step 5: Implementing numberOfRowsInSection -- Step 6: Implementing the cellForRowAt -- Step 6: Run the program -- Detailed Text Label -- Setting a Table Header -- Summary -- Chapter 7: Deleting a Table Record -- Trailing Swipe Function -- Deleting book from CloudKit Database -- Summary -- Chapter 8: Searching Data Screen -- Create the Search View Controller -- Draw the Search Screen -- Query for All Records to Enable Search -- Text Field Events, Operations, and Display -- Remove Constraints -- Table Functions -- Summary -- Chapter 9: App Development Part 2 Overview -- What Lies Ahead . . . -- iCloud Setup -- Summary -- Part II: Overview -- Chapter 10: Redesigning the Display Screen -- Redesigning the UI of the Display Book Screen -- Initial Setup -- Defining UI Objects for the Top Views -- Lifecycle Method and Initial Setup -- Class-Level Variables -- Lifecycle Method -- Query Books -- Setup Function -- Drawing the Screen…”
    Libro electrónico
  17. 3117
    Tabla de Contenidos: “…Interviewer Versus Self-Administered Assessments -- Behavioral Specificity -- Reliability And Validity Of Measures -- Sample Coverage -- ANTHROPOLOGY'S PERSPECTIVE ON HUMAN SEXUAL BEHAVIOR -- From 1929 To The 1970s -- The 1980s Prior To AIDS -- Anthropological Research Since Aids -- CONCLUSIONS AND RECOMMENDATIONS -- BIBLIOGRAPHY -- 3 AIDS and IV Drug Use -- DRUG-USE BEHAVIORS THAT TRANSMIT HIV -- Sharing Drug Injection Equipment -- Social Context Of Needle-Sharing -- Initiation into Drug Use. -- Adolescent IV Drug Use. -- Friendship Networks and Intimate Relationships. -- Shooting Galleries. -- Mechanics Of Drug Use And Sources Of Contamination -- The Syringe. -- The Needle. -- The Cooker. -- The Cotton. -- The Rinse Water. -- Frequency Of Injection -- Polydrug Use -- Sexual Behaviors And IV Drug Use -- Toward A Better Understanding Of Risk-Associated Behaviors -- RISK REDUCTION AMONG IV DRUG USERS -- Changes In Injection Behavior -- Changes In Sexual Behavior -- Toward Reducing Risk-Associated Behavior Among IV Drug Users -- CONDUCTING RESEARCH ON IV DRUG USE -- Research Traditions -- Investigating Risk-Associated Drug Behaviors -- Methods -- Convenience Samples -- Self-Reported Information -- Toward Better Quality Data -- MEASURING THE SCOPE OF THE PROBLEM -- Prevalence Of IV Drug Use -- Definition Of An IV Drug User -- Techniques For Estimating The Total Number Of IV Drug Users -- National Aggregates Of State Estimates -- Consumption And Turnover Rates Among IV Drug Users -- Modeling The IV Drug-Using Population: Constraints And Limitations -- Prevalence Of AIDS And HIV Infection Among IV Drug Users -- CONCLUSION -- Bibliography -- PART II INTERVENING TO LIMIT THE SPREAD OF HIV INFECTION -- 4 Facilitating Change In Health Behaviors -- EDUCATION PROGRAMS -- The Role Of Education And Knowledge In Preventing The Spread Of Hiv Infection…”
    Libro electrónico
  18. 3118
    Publicado 2024
    Tabla de Contenidos: “…Numeric values in the ACL -- Ownership -- Transactions -- File catalog commands -- About hashing -- New-FileCatalog -- Test-FileCatalog -- Summary -- Chapter 11: Windows Management Instrumentation -- Working with WMI -- WMI classes -- WMI commands -- CIM commands -- Getting instances -- Getting classes -- Calling methods -- Creating instances -- Removing instances -- Working with CIM sessions -- Associated classes -- The WMI Query Language -- Understanding SELECT, WHERE, and FROM -- Escape sequences and wildcards -- Comparison operators -- WQL filters and dates -- Logic operators -- Quoting values -- Associated classes -- WMI object paths -- Using ASSOCIATORS OF -- WMI type accelerators -- Getting instances -- Working with dates -- Getting classes -- Calling methods -- Creating instances -- Associated classes -- Permissions -- Sharing permissions -- Creating a shared directory -- Getting a security descriptor -- Adding an access control entry -- Setting the security descriptor -- WMI permissions -- Getting a security descriptor -- The access mask -- WMI and SDDL -- Summary -- Chapter 12: Working with HTML, XML, and JSON -- ConvertTo-Html -- Multiple tables -- Adding style -- ConvertTo-Html and Send-MailMessage -- Windows PowerShell and ConvertTo-Html -- Modifying HTML content -- XML commands -- About XML -- Elements and attributes -- Namespaces -- Schemas -- Select-Xml -- Select-Xml and namespaces -- ConvertTo-Xml -- System.Xml -- The XML type accelerator -- XPath and XmlDocument -- SelectNodes and XPathNodeList -- Working with namespaces -- Creating XML documents -- Modifying element and attribute values -- Adding elements -- Removing elements and attributes -- Copying nodes between documents -- Schema validation -- Inferring a schema -- System.Xml.Linq -- Opening documents -- Selecting nodes -- Creating documents -- Working with namespaces…”
    Libro electrónico
  19. 3119
    Publicado 2024
    Tabla de Contenidos: “…. -- See also -- Implementing data quality and validation rules with Delta Live Tables in Databricks -- How to do it... -- How it works... -- See also -- Quarantining bad data with Delta Live Tables in Databricks -- How to do it... -- See also -- Monitoring Delta Live Tables pipelines -- How to do it... -- See also -- Deploying Delta Live Tables pipelines with Databricks Asset Bundles -- Getting ready -- How to do it... -- There's more... -- See also -- Applying changes (CDC) to Delta tables with Delta Live Tables -- How to do it... -- See also -- Chapter 10: Data Governance with Unity Catalog -- Technical requirements -- Connecting to cloud object storage using Unity Catalog -- Getting ready -- How to do it... -- See also -- Creating and managing catalogs, schemas, volumes, and tables using Unity Catalog -- Getting ready -- How to do it... -- See also -- Defining and applying fine-grained access control policies using Unity Catalog -- Getting ready -- How to do it... -- See also…”
    Libro electrónico
  20. 3120
    Publicado 2022
    “…It examines topics including pretreatment validation and factors affecting reference dosimetry. …”
    Libro electrónico