Mostrando 6,761 - 6,780 Resultados de 7,103 Para Buscar 'Anjar~', tiempo de consulta: 0.91s Limitar resultados
  1. 6761
    por Muhlmeyer, Michael
    Publicado 2021
    Tabla de Contenidos: “…Clusters, Cohesion, and Polarization -- 5.6. The Adjacency Matrix -- 5.6.1. Example: A Fencing Club Sociogram -- 5.7. …”
    Libro electrónico
  2. 6762
    Publicado 1867
    Libro
  3. 6763
    Libro
  4. 6764
    por Piper, H. Michael, author
    Publicado 2011
    Libro electrónico
  5. 6765
    Publicado 1983
    Libro
  6. 6766
    por Rojas, Efraín
    Publicado 1957
    Libro
  7. 6767
    por Freire, Henda da Rocha
    Publicado 1982
    Libro
  8. 6768
    Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
    Libro electrónico
  9. 6769
    Publicado 2022
    Tabla de Contenidos: “…. -- There's more... -- Generating the adjacency matrix for a network -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating directed and weighted networks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding the shortest paths in a network -- Getting ready -- How to do it... -- How it works... -- There's more... -- Quantifying clustering in a network -- Getting ready -- How to do it... -- How it works... -- There's more... -- Coloring a network -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding minimal spanning trees and dominating sets -- Getting ready -- How to do it... -- How it works... -- Further reading -- Chapter 6: Working with Data and Statistics -- What is statistics? …”
    Libro electrónico
  10. 6770
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting started -- Obtaining and installing Python 3 -- Windows -- macOS -- Linux -- Starting Python command line REPL -- Leaving the REPL -- Windows -- Unix -- Code structure and significant indentation -- Python culture -- Importing standard library modules -- Getting help() -- Counting fruit with math.factorial() -- Different types of numbers -- Scalar data types: integers, floats, None and bool -- int -- float -- Special floating point values -- Promotion to float -- None -- bool -- Relational operators -- Rich comparison operators -- Control flow: if-statements and while-loops -- Conditional control flow: The if-statement -- if...else -- if...elif...else -- Conditional repetition: the while-loop -- Exiting loops with break -- Summary -- Chapter 2: Strings and Collections -- str - an immutable sequence of Unicode code points -- String quoting styles -- Moment of zen -- Concatenation of adjacent strings -- Multiline strings and newlines -- Raw strings -- The str constructor -- Strings as sequences -- String methods -- Strings with Unicode -- The bytes type - an immutable sequence of bytes -- Literal bytes -- Converting between bytes and str -- list - a sequence of objects -- The dict type - associating keys with values -- The For-loops - iterating over series of items -- Putting it all together -- Summary -- Chapter 3: Modularity -- Organizing code in a .py file -- Running Python programs from the operating system shell -- Importing modules into the REPL -- Defining functions -- Organizing our module into functions -- The __name__ type and executing modules from the command line -- The Python execution model -- The difference between modules, scripts, and programs…”
    Libro electrónico
  11. 6771
    Publicado 2020
    Tabla de Contenidos: “…-- Cost of computation: The reason for smart algorithms -- Problems applicable to searching algorithms -- Representing state: Creating a framework to represent problem spaces and solutions -- Graphs: Representing search problems and solutions -- Representing a graph as a concrete data structure -- Exercise: Represent a Graph as a Matrix -- Solution: Represent a Graph as a Matrix -- Trees: The concrete structures used to represent search solutions -- Uninformed search: Looking blindly for solutions -- Breadth-first search: Looking wide before looking deep -- Exercise: Determine the path to the solution -- Solution: Determine the path to the solution -- Depth-first search: Looking deep before looking wide -- Exercise: Determine the path to the solution -- Solution: Determine the path to the solution -- Use cases for uninformed search algorithms -- Optional: More about graph categories -- Optional: More ways to represent graphs -- Incidence matrix -- Adjacency list -- Summary of search fundamentals -- 3 Intelligent search -- Defining heuristics: Designing educated guesses -- Thought Experiment: Given the following scenario, what heuristic can you imagine? …”
    Libro electrónico
  12. 6772
    Tabla de Contenidos: “…Eng. 2016, 4(3), 55, doi: 10.3390/jmse4030055 http://www.mdpi.com/2077-1312/4/3/55 .54 -- Kyra M. Bryant and Muhammad Akbar An Exploration of Wind Stress Calculation Techniques in Hurricane Storm Surge Modeling Reprinted from: J. …”
    Libro electrónico
  13. 6773
    por Ciaburro, Giuseppe
    Publicado 2022
    Tabla de Contenidos: “…Using Monte Carlo methods for stock price prediction -- Exploring the Amazon stock price trend -- Handling the stock price trend as a time series -- Introducing the Black-Scholes model -- Applying the Monte Carlo simulation -- Studying risk models for portfolio management -- Using variance as a risk measure -- Introducing the Value-at-Risk metric -- Estimating VaR for some NASDAQ assets -- Summary -- Chapter 10: Simulating Physical Phenomena Using Neural Networks -- Technical requirements -- Introducing the basics of neural networks -- Understanding biological neural networks -- Exploring ANNs -- Understanding feedforward neural networks -- Exploring neural network training -- Simulating airfoil self-noise using ANNs -- Importing data using pandas -- Scaling the data using sklearn -- Viewing the data using Matplotlib -- Splitting the data -- Explaining multiple linear regression -- Understanding a multilayer perceptron regressor model -- Approaching deep neural networks -- Getting familiar with convolutional neural networks -- Examining recurrent neural networks -- Analyzing long short-term memory networks -- Exploring GNNs -- Introducing graph theory -- Adjacency matrix -- GNNs -- Simulation modeling using neural network techniques -- Concrete quality prediction model -- Summary -- Chapter 11: Modeling and Simulation for Project Management -- Technical requirements -- Introducing project management -- Understanding what-if analysis -- Managing a tiny forest problem -- Summarizing the Markov decision process -- Exploring the optimization process -- Introducing MDPtoolbox -- Defining the tiny forest management example -- Addressing management problems using MDPtoolbox -- Changing the probability of a fire starting -- Scheduling project time using the Monte Carlo simulation -- Defining the scheduling grid -- Estimating the task's time…”
    Libro electrónico
  14. 6774
    Publicado 2024
    Tabla de Contenidos: “…-- Exploring types of malware -- Virus -- Worms -- Trojans -- Ransomware -- Bots/botnets -- Adware -- Spyware -- Malvertising -- Fileless malware -- Backdoors -- Rootkits -- How does malware get onto machines? …”
    Libro electrónico
  15. 6775
    Publicado 2016
    Tabla de Contenidos: “…ORHAN PAMUKS MUSEUM DER UNSCHULD IN ISTANBUL / LA MEMORIA IRREVERENTE: LA AVENTURA DE LOS BUSTOS DE EVA (2004) Y UN YUPPIE EN LA COLUMNA DEL CHE GUEVARA (2011) DE CARLOS GAMERRO / UNA SEMÁNTICA DEL REVERSO: RETORNOS DE LO ILEGIBLE EN LORENZO GARCÍA VEGA / VON DER NOVELA LÍRICA DER CONTEMPORÁNEOS ZUR PROSA DE INTENSIDADES VON ALBERTO RUY SÁNCHEZ: EINE ANDERE TRADITION DER MEXIKANISCHEN LITERATUR DES 20. …”
    Libro electrónico
  16. 6776
    Publicado 1998
    Revista
  17. 6777
    por Canal Ramírez, Gonzalo
    Publicado 1981
    Libro
  18. 6778
    por Sartre, Jean-Paul, 1905-1980
    Publicado 1974
    Libro
  19. 6779
    Publicado 2018
    Tabla de Contenidos: “…VoIP exploitation -- VoIP attacks -- Denial-of-Service -- Eavesdropping -- SIP attacks -- SIP registration hijacking -- Spam over Internet Telephony -- Embedding malware -- Viproy - VoIP penetration testing kit -- VoLTE Exploitation -- VoLTE attacks -- SiGploit - Telecom Signaling Exploitation Framework -- Summary -- Chapter 10: Insecure VPN Exploitation -- Cryptography -- Cryptosystems -- Ciphers -- Classical ciphers -- Modern ciphers -- Kerckhoffs' principle for cryptosystems -- Cryptosystem types -- Symmetric cryptosystem -- Asymmetric cryptosystem -- Hash functions and message integrity -- Digital signatures -- Steganography -- Key management -- Cryptographic attacks -- VPN fundamentals -- Tunneling protocols -- IPSec -- Secure Sockets Layer/Transport Layer Security -- SSL attacks -- DROWN attack (CVE-2016-0800) -- POODLE attack (CVE-2014-3566) -- BEAST attack (CVE-2011-3389) -- CRIME attack (CVE-2012-4929) -- BREACH attack (CVE-2013-3587) -- Heartbleed attack -- Qualys SSL Labs -- Summary -- Chapter 11: Routing and Router Vulnerabilities -- Routing fundamentals -- Exploiting routing protocols -- Routing Information Protocol -- RIPv1 reflection DDoS -- Open Shortest Path First -- OSPF attacks -- Disguised LSA -- MaxAge LSAs -- Remote false adjacency -- Seq++ attack -- Persistent poisoning -- Defenses -- Interior Gateway Routing Protocol -- Enhanced Interior Gateway Routing Protocol -- Border Gateway Protocol -- BGP attacks -- Exploiting routers -- Router components -- Router bootup process -- Router attacks -- The router exploitation framework -- Summary -- Chapter 12: Internet of Things Exploitation -- The IoT ecosystem -- IoT project architecture -- IoT protocols -- The IoT communication stack -- IP Smart Objects protocols suite -- Standards organizations -- IoT attack surfaces -- Devices and appliances -- Firmware -- Web interfaces…”
    Libro electrónico
  20. 6780
    por Green, Dale
    Publicado 2016
    Tabla de Contenidos: “…-- Dijkstra's algorithm -- The A* algorithm -- A breakdown of A* -- Representing a level as nodes -- The open and closed list -- The H, G, and F costs -- The H value -- The G value -- The F value -- The Manhattan distance -- Parenting nodes -- The pseudo-algorithm -- Coding the A* pathfinding algorithm -- The Tile datatype -- Creating supporting functions -- The Level class -- The Enemy class -- Variable declarations -- Precalculating the H values -- Defining the main loop -- Finding the adjacent nodes -- Calculating the G and F costs -- Calculating the G and F cost -- Checking for superior paths -- Creating the final path -- Implementing A* in the game -- Enabling the enemy to follow a path -- Calling the pathfinding behavior -- Viewing our path -- Procedurally generated level goals -- The variable and function declarations -- Generating a random goal -- Checking whether a goal is complete -- Drawing the goal on the screen -- Exercises -- Summary -- Chapter 9: Procedural Dungeon Generation -- The benefits of procedural level design -- Replayability -- A reduction in development time -- Larger game worlds -- Considerations -- A lack of control -- Required computing power -- Suitability -- An overview of dungeon generation overview -- Generating rooms -- Generating a maze -- Connecting rooms and mazes -- The recursive backtracker -- Procedurally generating a dungeon -- Changing how we view the maze -- Updating the Game and Level classes -- Generating a maze -- Preparing before the generation of a maze -- Carving passages -- Adding rooms -- Choosing the tile textures -- The if/else approach -- Bitwise tile maps -- Calculating the tile values -- Mapping the tile value to textures -- Calculating tile textures -- Creating unique floor themes -- Adding entry and exit points -- Setting a player's spawn location…”
    Libro electrónico