Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Iglesia Católica 616
- Historia 569
- Església Catòlica 511
- Biblia 504
- Liturgia 468
- Teología dogmática 440
- Derecho canónico 421
- Teología 379
- Breviarios 369
- Litúrgia 345
- Concilio Vaticano 271
- Misales 268
- Moral cristiana 236
- Libros litúrgicos 232
- Filosofía 230
- Jesuitas 200
- Història 175
- Derecho Canónico 168
- History 161
- Tàpies, Antoni 161
- Utopies 160
- Obres anteriors al 1800 146
- Crítica e interpretación 140
- Iglesia católica 140
- Teología moral 137
- Bíblia 128
- Teologia 127
- Documentos pontificios 118
- Dret canònic 116
- Research & information: general 113
-
24301Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Data Science Using Java -- Data science -- Machine learning -- Supervised learning -- Unsupervised learning -- Clustering -- Dimensionality reduction -- Natural Language Processing -- Data science process models -- CRISP-DM -- A running example -- Data science in Java -- Data science libraries -- Data processing libraries -- Math and stats libraries -- Machine learning and data mining libraries -- Text processing -- Summary -- Chapter 2: Data Processing Toolbox -- Standard Java library -- Collections -- Input/Output -- Reading input data -- Writing ouput data -- Streaming API -- Extensions to the standard library -- Apache Commons -- Commons Lang -- Commons IO -- Commons Collections -- Other commons modules -- Google Guava -- AOL Cyclops React -- Accessing data -- Text data and CSV -- Web and HTML -- JSON -- Databases -- DataFrames -- Search engine - preparing data -- Summary -- Chapter 3: Exploratory Data Analysis -- Exploratory data analysis in Java -- Search engine datasets -- Apache Commons Math -- Joinery -- Interactive Exploratory Data Analysis in Java -- JVM languages -- Interactive Java -- Joinery shell -- Summary -- Chapter 4: Supervised Learning - Classification and Regression -- Classification -- Binary classification models -- Smile -- JSAT -- LIBSVM and LIBLINEAR -- Encog -- Evaluation -- Accuracy -- Precision, recall, and F1 -- ROC and AU ROC (AUC) -- Result validation -- K-fold cross-validation -- Training, validation, and testing -- Case study - page prediction -- Regression -- Machine learning libraries for regression -- Smile -- JSAT -- Other libraries -- Evaluation -- MSE -- MAE -- Case study - hardware performance -- Summary…”
Libro electrónico -
24302Publicado 2016“…You will then explore the typical programming development workflow with Xtext when we modify the grammar of the DSL. …”
Libro electrónico -
24303Publicado 2016Tabla de Contenidos: “…Android N JIT compiler -- Memory leak -- Memory churn -- References -- Memory-side projects -- Project Svelte and Android N -- Best practices -- Data types -- Autoboxing -- Sparse array family -- ArrayMap -- Syntax -- Collections -- Enumerations -- Constants -- Object management -- Strings -- String concatenation -- Local variables -- Arrays versus collections -- Streams -- Memory patterns -- The object pool pattern -- The FlyWeight pattern -- Android component leaks -- Activities -- Services -- Processes -- The memory API -- Main components and memory management -- Debugging tools -- LogCat -- Dalvik -- ART -- The ActivityManager API -- StrictMode -- Dumpsys -- Meminfo -- ProcStats -- Summary -- Chapter 5: Multithreading -- Walkthrough -- Threading basics -- Multicore CPUs -- Threads -- Multithreaded applications -- Thread safety -- Android multithreading environment -- Processes -- Android application thread -- The UI thread -- Worker threads -- The binder thread -- Android thread messaging -- Best practices -- Threads -- HandlerThread -- When to use -- AsyncTask -- Methods -- Generics parameters -- States management -- Executor -- When to use -- Loaders -- LoaderManager -- LoaderCallbacks< -- D> -- -- Provided loaders -- When to use -- Services -- Life cycle -- Started Service -- Bound Service -- IntentService -- Inter-process communication -- Remote Procedure Call -- AIDL -- Messenger -- Advanced techniques -- BroadcastReceiver asynchronous techniques -- ContentProvider asynchronous techniques -- Repeating tasks -- Debugging tools -- StrictMode -- Summary -- Chapter 6: Networking -- Walkthrough -- Protocols -- Methods -- Headers -- Timeout -- Content -- Compression -- Response code -- Connection types -- Best practices -- Latency gauging -- Batching connections -- Prefetching -- Queuing connections -- Caching responses -- Cache control…”
Libro electrónico -
24304Publicado 2017Tabla de Contenidos: “…Cover -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Data Types: Foundational Structures -- Numeric data types -- Integer types -- Single precision float -- Double precision float -- Currency -- Typecasting -- Statically versus dynamically typed languages -- Implicit and explicit casting -- Widening and narrowing -- Boolean data type -- Operator precedence -- Short-circuiting -- Strings -- Summary -- Chapter 2: Arrays: Foundational Collections -- Mutable versus immutable arrays -- Case study: users logged in to a web service -- Advanced topics -- Linear search -- Primitive arrays -- Object arrays -- Mixed arrays -- Multidimensional arrays -- Jagged Arrays -- Summary -- Chapter 3: Lists: Linear Collections -- List implementations -- Array-based lists -- Linked list -- Instantiating lists -- Revisiting users logged in to a service -- Generics -- Case study: bike route -- Doubly linked list -- Searching -- A few pointers -- Summary -- Chapter 4: Stacks: LIFO Collections -- Initializing stacks -- UINavigationController -- Stack operations -- Case study: motion planning algorithm -- Advanced topics - stack implementations -- Array-based stack -- Linked list-based stack -- Summary -- Chapter 5: Queues: FIFO Collections -- Initializing queues -- Queue operations -- Case study: customer service -- Advanced topics -- Array-based queues -- Linked list-based queues -- Heap-based queues -- Double-ended queues -- Priority queues -- Summary -- Chapter 6: Dictionaries: Keyed Collections -- Initializing dictionaries -- Dictionary operations -- Case study: arcade ticket totals -- Advanced topics -- Hash table based dictionaries -- Search tree based dictionaries -- Summary -- Chapter 7: Sets: No Duplicates -- Set theory -- Initializing sets -- Set operations…”
Libro electrónico -
24305por Kovalevsky, Vladimir. author“…Throughout the book, you will create projects that resolve typical problems that you might encounter in the world of digital image processing. …”
Publicado 2019
Libro electrónico -
24306Publicado 2018“…We use them to explain how a typical state-of-the-art RNN model works. From generating text to building a language translator, we show how some of today's most powerful AI applications work under the hood. …”
Libro electrónico -
24307Publicado 2013“…Consider what goes on during your typical week: Can you influence your client to accept your proposal? …”
Libro electrónico -
24308Publicado 2015“…Topics covered include: Project management Physical security Password management Consumerization (BYOD) Audit log management Vulnerability management Cloud computing Incident reporting Penetration testing Linking information security with records management Privacy impact assessments Internal auditing In this revised edition of Once more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM’s year and highlighting the challenges and pitfalls of an information security program. …”
Libro electrónico -
24309Publicado 1963“…Sa considération pour les thèses rationalistes des mu‘tazilites, inspirées par la philosophie grecque, son esprit libéral et moderniste, son admiration pour le grand mystique al-Ḥallāǧ et sa curiosité intellectuelle sont autant de qualités qui font en effet de lui un ḥanbalite bien atypique au milieu de congénères conservateurs dont il ne s’est pourtant jamais séparé. …”
Libro electrónico -
24310por Bahar, Heymi“…Renewable fuels for transport are typically promoted by governments through obliging fuel suppliers to mix ethanol or biodiesel with their corresponding petroleum-derived fuels. …”
Publicado 2013
Capítulo de libro electrónico -
24311Publicado 2023“…He is a lifelong video game aficionado who started with the Atari 2600 and never looked back. He enjoys music, reading, and sports in his spare time…”
Video -
24312Publicado 2017“…CCIE-level Cisco routing and switching guide for every CCNP Preparing for the CCIE Routing and Switching lab exam typically involves deep and lengthy study. But if you already possess the Cisco CCNP Routing and Switching certification, you already know much of what you’ll need to succeed on CCIE’s labs. …”
Libro electrónico -
24313Publicado 2016“…Instead of focusing on the skills, behaviors, and tools found in typical books on strategic leadership, the authors shed light on the attributes and qualities necessary to lead strategic change and help transform a business. …”
Libro electrónico -
24314por Erl, Thomas“…—Priscilla Walmsley, Managing Director of Datypic "Thomas Erl's Service-Oriented Architecture: Concepts, Technology, and Design is as good an introduction to service-oriented architectures as one could wish for. …”
Publicado 2005
Libro electrónico -
24315por Miller, Michael, 1958-“…This digital wallet is typically stored on the P2P servers, with all transactions secured via public-key encryption. …”
Publicado 2015
Libro electrónico -
24316Publicado 2015“…Description Information security directly impacts virtually every type of business. While related issues appear in the media more and more, it’s typically in a fragmented fashion that really doesn’t help give the people tasked with protecting organizational data and other assets a “big picture” view of what the real threats and vulnerabilities are, or what steps should be taken to mitigate them. …”
-
24317Publicado 2012“…Cette nouvelle édition mise à jour s'enrichit d'ateliers permettant d'approfondir certaines techniques photo - atténuer un reflet, gérer transparences et contre-jours, aménager un studio macro... - ou de se perfectionner dans la recherche de petits sujets. …”
Libro electrónico -
24318Publicado 2020“…Then, in five chapters that are the real core of the book, Tamara tackles typical shooting scenarios and works through each kind of shoot, explaining what worked, what didn’t, and how each shoot progresses from start to finish. …”
Libro electrónico -
24319Publicado 2006“…In direct correlation with the number of weaknesses discovered, the number of viruses, worms, and security attacks has also exploded across the Internet. To add to the typical virus issues that businesses have had to confront, there are also malicious programs infiltrating organizations today in the form of spyware and adware. …”
Libro electrónico -
24320Publicado 2007“…Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. …”
Libro electrónico