Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 363
- Revistes 199
- Història 195
- Crítica e interpretación 115
- Aalto, Alvar 101
- Filosofía 95
- Poesía española 92
- Arquitectura 85
- History 82
- Arquitectes 50
- Arquitectura moderna 50
- Altars 49
- Anuaris 49
- Obras 48
- Exposicions 45
- Lengua española 45
- Congressos 42
- Altares 41
- Església Catòlica 41
- Historia y crítica 40
- Anders, Günther 39
- Estadístiques 38
- Literatura española 36
- Derecho 30
- Crítica i interpretació 29
- Ensenyament 29
- Litúrgia 28
- Política y gobierno 28
- Iglesia Católica 27
- Economía 26
-
6761por Muhlmeyer, MichaelTabla de Contenidos: “…Clusters, Cohesion, and Polarization -- 5.6. The Adjacency Matrix -- 5.6.1. Example: A Fencing Club Sociogram -- 5.7. …”
Publicado 2021
Libro electrónico -
6762
-
6763
-
6764
-
6765
-
6766
-
6767
-
6768Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
Libro electrónico -
6769Publicado 2022Tabla de Contenidos: “…. -- There's more... -- Generating the adjacency matrix for a network -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating directed and weighted networks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding the shortest paths in a network -- Getting ready -- How to do it... -- How it works... -- There's more... -- Quantifying clustering in a network -- Getting ready -- How to do it... -- How it works... -- There's more... -- Coloring a network -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding minimal spanning trees and dominating sets -- Getting ready -- How to do it... -- How it works... -- Further reading -- Chapter 6: Working with Data and Statistics -- What is statistics? …”
Libro electrónico -
6770Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting started -- Obtaining and installing Python 3 -- Windows -- macOS -- Linux -- Starting Python command line REPL -- Leaving the REPL -- Windows -- Unix -- Code structure and significant indentation -- Python culture -- Importing standard library modules -- Getting help() -- Counting fruit with math.factorial() -- Different types of numbers -- Scalar data types: integers, floats, None and bool -- int -- float -- Special floating point values -- Promotion to float -- None -- bool -- Relational operators -- Rich comparison operators -- Control flow: if-statements and while-loops -- Conditional control flow: The if-statement -- if...else -- if...elif...else -- Conditional repetition: the while-loop -- Exiting loops with break -- Summary -- Chapter 2: Strings and Collections -- str - an immutable sequence of Unicode code points -- String quoting styles -- Moment of zen -- Concatenation of adjacent strings -- Multiline strings and newlines -- Raw strings -- The str constructor -- Strings as sequences -- String methods -- Strings with Unicode -- The bytes type - an immutable sequence of bytes -- Literal bytes -- Converting between bytes and str -- list - a sequence of objects -- The dict type - associating keys with values -- The For-loops - iterating over series of items -- Putting it all together -- Summary -- Chapter 3: Modularity -- Organizing code in a .py file -- Running Python programs from the operating system shell -- Importing modules into the REPL -- Defining functions -- Organizing our module into functions -- The __name__ type and executing modules from the command line -- The Python execution model -- The difference between modules, scripts, and programs…”
Libro electrónico -
6771Publicado 2020Tabla de Contenidos: “…-- Cost of computation: The reason for smart algorithms -- Problems applicable to searching algorithms -- Representing state: Creating a framework to represent problem spaces and solutions -- Graphs: Representing search problems and solutions -- Representing a graph as a concrete data structure -- Exercise: Represent a Graph as a Matrix -- Solution: Represent a Graph as a Matrix -- Trees: The concrete structures used to represent search solutions -- Uninformed search: Looking blindly for solutions -- Breadth-first search: Looking wide before looking deep -- Exercise: Determine the path to the solution -- Solution: Determine the path to the solution -- Depth-first search: Looking deep before looking wide -- Exercise: Determine the path to the solution -- Solution: Determine the path to the solution -- Use cases for uninformed search algorithms -- Optional: More about graph categories -- Optional: More ways to represent graphs -- Incidence matrix -- Adjacency list -- Summary of search fundamentals -- 3 Intelligent search -- Defining heuristics: Designing educated guesses -- Thought Experiment: Given the following scenario, what heuristic can you imagine? …”
Libro electrónico -
6772por Multidisciplinary Digital Publishing InstituteTabla de Contenidos: “…Eng. 2016, 4(3), 55, doi: 10.3390/jmse4030055 http://www.mdpi.com/2077-1312/4/3/55 .54 -- Kyra M. Bryant and Muhammad Akbar An Exploration of Wind Stress Calculation Techniques in Hurricane Storm Surge Modeling Reprinted from: J. …”
Publicado 2017
Libro electrónico -
6773por Ciaburro, GiuseppeTabla de Contenidos: “…Using Monte Carlo methods for stock price prediction -- Exploring the Amazon stock price trend -- Handling the stock price trend as a time series -- Introducing the Black-Scholes model -- Applying the Monte Carlo simulation -- Studying risk models for portfolio management -- Using variance as a risk measure -- Introducing the Value-at-Risk metric -- Estimating VaR for some NASDAQ assets -- Summary -- Chapter 10: Simulating Physical Phenomena Using Neural Networks -- Technical requirements -- Introducing the basics of neural networks -- Understanding biological neural networks -- Exploring ANNs -- Understanding feedforward neural networks -- Exploring neural network training -- Simulating airfoil self-noise using ANNs -- Importing data using pandas -- Scaling the data using sklearn -- Viewing the data using Matplotlib -- Splitting the data -- Explaining multiple linear regression -- Understanding a multilayer perceptron regressor model -- Approaching deep neural networks -- Getting familiar with convolutional neural networks -- Examining recurrent neural networks -- Analyzing long short-term memory networks -- Exploring GNNs -- Introducing graph theory -- Adjacency matrix -- GNNs -- Simulation modeling using neural network techniques -- Concrete quality prediction model -- Summary -- Chapter 11: Modeling and Simulation for Project Management -- Technical requirements -- Introducing project management -- Understanding what-if analysis -- Managing a tiny forest problem -- Summarizing the Markov decision process -- Exploring the optimization process -- Introducing MDPtoolbox -- Defining the tiny forest management example -- Addressing management problems using MDPtoolbox -- Changing the probability of a fire starting -- Scheduling project time using the Monte Carlo simulation -- Defining the scheduling grid -- Estimating the task's time…”
Publicado 2022
Libro electrónico -
6774Publicado 2024Tabla de Contenidos: “…-- Exploring types of malware -- Virus -- Worms -- Trojans -- Ransomware -- Bots/botnets -- Adware -- Spyware -- Malvertising -- Fileless malware -- Backdoors -- Rootkits -- How does malware get onto machines? …”
Libro electrónico -
6775Publicado 2016Tabla de Contenidos: “…ORHAN PAMUKS MUSEUM DER UNSCHULD IN ISTANBUL / LA MEMORIA IRREVERENTE: LA AVENTURA DE LOS BUSTOS DE EVA (2004) Y UN YUPPIE EN LA COLUMNA DEL CHE GUEVARA (2011) DE CARLOS GAMERRO / UNA SEMÁNTICA DEL REVERSO: RETORNOS DE LO ILEGIBLE EN LORENZO GARCÍA VEGA / VON DER NOVELA LÍRICA DER CONTEMPORÁNEOS ZUR PROSA DE INTENSIDADES VON ALBERTO RUY SÁNCHEZ: EINE ANDERE TRADITION DER MEXIKANISCHEN LITERATUR DES 20. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
6776
-
6777
-
6778
-
6779Publicado 2018Tabla de Contenidos: “…VoIP exploitation -- VoIP attacks -- Denial-of-Service -- Eavesdropping -- SIP attacks -- SIP registration hijacking -- Spam over Internet Telephony -- Embedding malware -- Viproy - VoIP penetration testing kit -- VoLTE Exploitation -- VoLTE attacks -- SiGploit - Telecom Signaling Exploitation Framework -- Summary -- Chapter 10: Insecure VPN Exploitation -- Cryptography -- Cryptosystems -- Ciphers -- Classical ciphers -- Modern ciphers -- Kerckhoffs' principle for cryptosystems -- Cryptosystem types -- Symmetric cryptosystem -- Asymmetric cryptosystem -- Hash functions and message integrity -- Digital signatures -- Steganography -- Key management -- Cryptographic attacks -- VPN fundamentals -- Tunneling protocols -- IPSec -- Secure Sockets Layer/Transport Layer Security -- SSL attacks -- DROWN attack (CVE-2016-0800) -- POODLE attack (CVE-2014-3566) -- BEAST attack (CVE-2011-3389) -- CRIME attack (CVE-2012-4929) -- BREACH attack (CVE-2013-3587) -- Heartbleed attack -- Qualys SSL Labs -- Summary -- Chapter 11: Routing and Router Vulnerabilities -- Routing fundamentals -- Exploiting routing protocols -- Routing Information Protocol -- RIPv1 reflection DDoS -- Open Shortest Path First -- OSPF attacks -- Disguised LSA -- MaxAge LSAs -- Remote false adjacency -- Seq++ attack -- Persistent poisoning -- Defenses -- Interior Gateway Routing Protocol -- Enhanced Interior Gateway Routing Protocol -- Border Gateway Protocol -- BGP attacks -- Exploiting routers -- Router components -- Router bootup process -- Router attacks -- The router exploitation framework -- Summary -- Chapter 12: Internet of Things Exploitation -- The IoT ecosystem -- IoT project architecture -- IoT protocols -- The IoT communication stack -- IP Smart Objects protocols suite -- Standards organizations -- IoT attack surfaces -- Devices and appliances -- Firmware -- Web interfaces…”
Libro electrónico -
6780por Green, DaleTabla de Contenidos: “…-- Dijkstra's algorithm -- The A* algorithm -- A breakdown of A* -- Representing a level as nodes -- The open and closed list -- The H, G, and F costs -- The H value -- The G value -- The F value -- The Manhattan distance -- Parenting nodes -- The pseudo-algorithm -- Coding the A* pathfinding algorithm -- The Tile datatype -- Creating supporting functions -- The Level class -- The Enemy class -- Variable declarations -- Precalculating the H values -- Defining the main loop -- Finding the adjacent nodes -- Calculating the G and F costs -- Calculating the G and F cost -- Checking for superior paths -- Creating the final path -- Implementing A* in the game -- Enabling the enemy to follow a path -- Calling the pathfinding behavior -- Viewing our path -- Procedurally generated level goals -- The variable and function declarations -- Generating a random goal -- Checking whether a goal is complete -- Drawing the goal on the screen -- Exercises -- Summary -- Chapter 9: Procedural Dungeon Generation -- The benefits of procedural level design -- Replayability -- A reduction in development time -- Larger game worlds -- Considerations -- A lack of control -- Required computing power -- Suitability -- An overview of dungeon generation overview -- Generating rooms -- Generating a maze -- Connecting rooms and mazes -- The recursive backtracker -- Procedurally generating a dungeon -- Changing how we view the maze -- Updating the Game and Level classes -- Generating a maze -- Preparing before the generation of a maze -- Carving passages -- Adding rooms -- Choosing the tile textures -- The if/else approach -- Bitwise tile maps -- Calculating the tile values -- Mapping the tile value to textures -- Calculating tile textures -- Creating unique floor themes -- Adding entry and exit points -- Setting a player's spawn location…”
Publicado 2016
Libro electrónico