Mostrando 6,781 - 6,800 Resultados de 7,103 Para Buscar 'Anjar~', tiempo de consulta: 0.97s Limitar resultados
  1. 6781
    por Mueller, John Paul
    Publicado 2019
    Tabla de Contenidos: “…Generating variations on image data -- Sampling data in different ways -- Accessing Data in Structured Flat-File Form -- Reading from a text file -- Reading CSV delimited format -- Reading Excel and other Microsoft Office files -- Sending Data in Unstructured File Form -- Managing Data from Relational Databases -- Interacting with Data from NoSQL Databases -- Accessing Data from the Web -- Chapter 7 Conditioning Your Data -- Juggling between NumPy and pandas -- Knowing when to use NumPy -- Knowing when to use pandas -- Validating Your Data -- Figuring out what's in your data -- Removing duplicates -- Creating a data map and data plan -- Manipulating Categorical Variables -- Creating categorical variables -- Renaming levels -- Combining levels -- Dealing with Dates in Your Data -- Formatting date and time values -- Using the right time transformation -- Dealing with Missing Data -- Finding the missing data -- Encoding missingness -- Imputing missing data -- Slicing and Dicing: Filtering and Selecting Data -- Slicing rows -- Slicing columns -- Dicing -- Concatenating and Transforming -- Adding new cases and variables -- Removing data -- Sorting and shuffling -- Aggregating Data at Any Level -- Chapter 8 Shaping Data -- Working with HTML Pages -- Parsing XML and HTML -- Using XPath for data extraction -- Working with Raw Text -- Dealing with Unicode -- Stemming and removing stop words -- Introducing regular expressions -- Using the Bag of Words Model and Beyond -- Understanding the bag of words model -- Working with n-grams -- Implementing TF-IDF transformations -- Working with Graph Data -- Understanding the adjacency matrix -- Using NetworkX basics -- Chapter 9 Putting What You Know in Action -- Contextualizing Problems and Data -- Evaluating a data science problem -- Researching solutions -- Formulating a hypothesis -- Preparing your data…”
    Libro electrónico
  2. 6782
    Publicado 2023
    Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning -- Malvertising…”
    Libro electrónico
  3. 6783
    Publicado 2005
    Tabla de Contenidos: “…GENERAL OSI REFERENCE MODEL ISSUES AND CONCEPTS -- History of the OSI Reference Model -- General Reference Model Issues -- The Benefits of Networking Models -- Why Understanding the OSI Reference Model Is Important to You -- How to Use the OSI Reference Model -- Other Network Architectures and Protocol Stacks -- Key OSI Reference Model Concepts -- OSI Reference Model Networking Layers, Sublayers, and Layer Groupings -- N" Notation and Other OSI Model Layer Terminology -- Interfaces: Vertical (Adjacent Layer) Communication -- Protocols: Horizontal (Corresponding Layer) Communication -- Data Encapsulation, Protocol Data Units (PDUs), and Service Data Units (SDUs) -- Indirect Device Connection and Message Routing -- 6. …”
    Libro electrónico
  4. 6784
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning…”
    Libro electrónico
  5. 6785
    Publicado 2024
    Tabla de Contenidos: “…Chapter 6 Working with Real Data -- Uploading, Streaming, and Sampling Data -- Uploading small amounts of data into memory -- Streaming large amounts of data into memory -- Generating variations on image data -- Sampling data in different ways -- Accessing Data in Structured Flat-File Form -- Reading from a text file -- Reading CSV delimited format -- Reading Excel and other Microsoft Office files -- Sending Data in Unstructured File Form -- Managing Data from Relational Databases -- Interacting with Data from NoSQL Databases -- Accessing Data from the Web -- Chapter 7 Processing Your Data -- Juggling between NumPy and pandas -- Knowing when to use NumPy -- Knowing when to use pandas -- Validating Your Data -- Figuring out what's in your data -- Removing duplicates -- Creating a data map and data plan -- Manipulating Categorical Variables -- Creating categorical variables -- Renaming levels -- Combining levels -- Dealing with Dates in Your Data -- Formatting date and time values -- Using the right time transformation -- Dealing with Missing Data -- Finding the missing data -- Encoding missingness -- Imputing missing data -- Slicing and Dicing: Filtering and Selecting Data -- Slicing rows -- Slicing columns -- Dicing -- Concatenating and Transforming -- Adding new cases and variables -- Removing data -- Sorting and shuffling -- Aggregating Data at Any Level -- Chapter 8 Reshaping Data -- Using the Bag of Words Model to Tokenize Data -- Understanding the bag of words model -- Sequencing text items with n-grams -- Implementing TF-IDF transformations -- Working with Graph Data -- Understanding the adjacency matrix -- Using NetworkX basics -- Chapter 9 Putting What You Know into Action -- Contextualizing Problems and Data -- Evaluating a data science problem -- Researching solutions -- Formulating a hypothesis -- Preparing your data…”
    Libro electrónico
  6. 6786
    Publicado 2024
    Tabla de Contenidos: “…-- What we've learned -- Basic characteristics of graphs -- Undirected and directed edges -- The adjacency matrix -- In-degree and out-degree -- Centrality -- What we've learned -- Different types of graphs -- Fully connected graphs -- Disconnected graphs -- Directed acyclic graphs -- Small-world networks -- Scale-free networks -- What we've learned -- Community detection and decomposing graphs -- What is a community? …”
    Libro electrónico
  7. 6787
    Publicado 1974
    Libro
  8. 6788
    por Caballero Fernández, José
    Publicado 1996
    Libro
  9. 6789
    por Schneider, Helga
    Publicado 2006
    Libro
  10. 6790
    Libro
  11. 6791
    Publicado 2000
    Libro
  12. 6792
    Publicado 2017
    Tabla de Contenidos: “…Ormsbee, Vincent Miller, Caitlin Sheridan and Feng He / Protein-Pacing and Multi-Component Exercise Training Improves Physical Performance Outcomes in Exercise-Trained Women: The PRISE 3 Study, Reprinted from: Nutrients 2016, 8(6), 332; doi: 10.3390/nu8060332 -- Mauricio Castro-Sepulveda, Neil Johannsen, Sebastián Astudillo, Carlos Jorquera, Cristian Álvarez, Hermann Zbinden-Foncea and Rodrigo Ramírez-Campillo Effects of Beer, Non-Alcoholic Beer and Water Consumption before Exercise on Fluid and / Electrolyte Homeostasis in Athletes, Reprinted from: Nutrients 2016, 8(6), 345; doi: 10.3390/nu8060345 -- Kelly Pritchett, Robert Pritchett, Dana Ogan, Phil Bishop, Elizabeth Broad and Melissa LaCroix / 25(OH)D Status of Elite Athletes with Spinal Cord Injury Relative to Lifestyle Factors, Reprinted from: Nutrients 2016, 8(6), 374; doi: 10.3390/nu8060374 -- Malgorzata Michalczyk, Milosz Czuba, Grzegorz Zydek, Adam Zajac and Józef Langfort / Dietary Recommendations for Cyclists during Altitude Training, Reprinted from: Nutrients 2016, 8(6), 377; doi: 10.3390/nu8060377 -- Daniel König, Denise Zdzieblik, Anja Holz, Stephan Theis and Albert Gollhofer / Substrate Utilization and Cycling Performance Following PalatinoseTM Ingestion: A Randomized, Double-Blind, Controlled Trial, Reprinted from: Nutrients 2016, 8(7), 390; doi: 10.3390/nu8070390 -- Daniel A. …”
    Libro electrónico
  13. 6793
    Libro
  14. 6794
    por Ladame, Paul Alexis
    Publicado 1949
    Tesis
  15. 6795
    Publicado 2015
    Tabla de Contenidos: “…Entering numbers with fractions -- Using a form for data entry -- Entering the current date or time into a cell -- Applying Number Formatting -- Using automatic number formatting -- Formatting numbers by using the Ribbon -- Using shortcut keys to format numbers -- Formatting numbers by using the Format Cells dialog box -- Adding your own custom number formats -- Chapter 3: Essential Worksheet Operations -- Learning the Fundamentals of Excel Worksheets -- Working with Excel windows -- Moving and resizing windows -- Switching among windows -- Closing windows -- Activating a worksheet -- Adding a new worksheet to your workbook -- Deleting a worksheet you no longer need -- Changing the name of a worksheet -- Changing a sheet tab color -- Rearranging your worksheets -- Hiding and unhiding a worksheet -- Controlling the Worksheet View -- Zooming in or out for a better view -- Viewing a worksheet in multiple windows -- Comparing sheets side by side -- Splitting the worksheet window into panes -- Keeping the titles in view by freezing panes -- Monitoring cells with a Watch Window -- Working with Rows and Columns -- Inserting rows and columns -- Deleting rows and columns -- Changing column widths and row heights -- Changing column widths -- Changing row heights -- Hiding rows and columns -- Chapter 4: Working with Cells and Ranges -- Understanding Cells and Ranges -- Selecting ranges -- Selecting complete rows and columns -- Selecting noncontiguous ranges -- Selecting multisheet ranges -- Selecting special types of cells -- Selecting cells by searching -- Copying or Moving Ranges -- Copying by using Ribbon commands -- Copying by using shortcut menu commands -- Copying by using shortcut keys -- Copying or moving by using drag-and-drop -- Copying to adjacent cells -- Copying a range to other sheets -- Using the Office Clipboard to paste…”
    Libro electrónico
  16. 6796
    por Schilling, Martin
    Publicado 2022
    Tabla de Contenidos: “…Practice 14: Evaluating candidates in record time while creating an outstanding candidate experience -- Practice 15: Boosting the offer acceptance rates -- Organizational development -- Practice 16: Establishing a strong job architecture with clear levels, career paths and tracks -- Practice 17: Putting fair appraisal and promotion processes in place -- Employee experience -- Practice 18: Driving employee happiness by enabling meaning, mastery, psychological safety, autonomy and community -- Employee stock option programs -- Practice 19: Building the right employee stock option program -- 4 Scale-Up Mindset: Principles to bridge organizational silos -- Obsession with customer experience -- Practice 20: Improving key customer journey experiences as a top priority for leaders -- Impossible is nothing -- Practice 21: Setting impossible-is-nothing goals by thinking "and," not "or" -- Learn-it-all beats know-it-all -- Practice 22: Embracing learning cycles by establishing psychological safety and an idea meritocracy -- Autonomy to act -- Practice 23: Empowering cross-functional teams to make decisions rapidly &amp -- independently -- Functional Excellence in Scale-Ups -- 5 Product Management Excellence: Launching products that create value for customers -- OKRs -- Practice 24: Establishing the right product OKRs -- Organizational chart and roles -- Practice 25: Defining the roles &amp -- responsibilities for a product function -- Practice 26: Scaling the right product roles at the right time -- Product vision &amp -- direction -- Practice 27: Developing a clear product vision and deriving your roadmap from it -- Practice 28: Focusing your product organization on outcomes, not just designing a "feature factory" -- Practice 29: Investing in the core product while pushing adjacent opportunities and venture bets -- Product development process…”
    Libro electrónico
  17. 6797
    Publicado 2009
    Tabla de Contenidos: “…Restarting, Shutting Down, and Blocking RIP -- Verifying and Troubleshooting RIP -- Enhanced Interior Gateway Routing Protocol -- Understanding EIGRP Fundamentals -- Neighbor Discovery/Recovery -- Reliable Transport Protocol -- Diffusing Update Algorithm -- Protocol-Dependent Modules -- Configuring EIGRP in Cisco IOS XR -- Configuring Routing Policy -- Configuring Router ID -- Configuring and Verifying NSF -- Verifying EIGRP Process Status -- Verifying and Troubleshooting EIGRP -- Open Shortest Path First -- Understanding OSPF Fundamentals -- Configuring OSPF in Cisco IOS XR -- Configuring and Verifying OSPFv2 -- Hierarchical CLI and Inheritance -- Configuring OSPFv2 Authentication -- Verifying NSF Configuration and Standby RP Status -- Configuring and Verifying Nonstop Routing -- Configuring and Verifying Multiarea Adjacencies -- Configuring and Verifying Bidirectional Forwarding Detection -- Configuring OSPF Timers -- Configuring and Verifying OSPFv3 -- Intermediate System to Intermediate System -- Understanding IS-IS Fundamentals -- Configuring IS-IS in Cisco IOS XR -- Verifying the Single Topology Model -- Configuring and Verifying the Multitopology Model -- Configuring and Verifying Interface States -- Configuring IS-IS NSF and IS-IS Timers -- Configuring and Verifying BFD in IS-IS -- Configuring and Verifying IP Fast Reroute -- Configuring and Verifying Authentication in IOS XR IS-IS -- Chapter 8 Implementing BGP in Cisco IOS XR -- Cisco IOS XR BGP Architectural Overview -- Cisco IOS XR BGP Hierarchical Configuration -- Address Family Configuration Mode -- Configuration Groups -- Implementing BGP Policies -- Routing Policy Language -- Prefix Set -- AS-path Set -- Community Set -- Routing Policies -- Hierarchical Policies and Parameterization -- BGP Policy Accounting -- BGP Remotely Triggered Black Hole -- BGP Graceful Restart…”
    Libro electrónico
  18. 6798
    por Empson, Scott, Roth, Hans, 1953-
    Publicado 2010
    Tabla de Contenidos: “…Step 1: Define One (or More) Probes -- Step 2: Define One (or More) Tracking Objects -- Step 3: Define the Action on the Tracking Object(s) -- Step 4: Verify IP SLA Operations -- Policy Routing Using Route Maps -- Configuration Example: Route Maps -- Chapter 6 Enterprise to ISP Connectivity -- Configuring BGP -- BGP and Loopback Addresses -- eBGP Multihop -- Verifying BGP Connections -- Troubleshooting BGP Connections -- Autonomous System Synchronization -- Default Routes -- Load Balancing -- Authentication -- Attributes -- Route Selection Decision Process -- Origin -- Next-Hop -- Autonomous System Path: Remove Private Autonomous System -- Autonomous System Path: Prepend -- Weight: The Weight Attribute -- Weight: Access Lists -- Weight: Route Maps -- Local Preference: bgp default local-preference Command -- Local Preference: Route Maps -- Multi-Exit Discriminator (MED) -- Atomic Aggregate -- Regular Expressions -- Regular Expressions: Example One -- Regular Expressions: Example Two -- BGP Route Filtering Using Access Lists -- BGP Route Filtering Using Prefix Lists -- Configuration Example: BGP -- Chapter 7 Implementing IPv6 -- Assigning IPv6 Addresses to Interfaces -- IPv6 on NBMA Networks -- Cisco Express Forwarding (CEF) and Distributed CEF (dCEF) Switching for IPv6 -- IPv6 and RIPng -- Configuration Example: IPv6 RIP -- IPv6 and OSPFv3 -- Enabling OSPF for IPv6 on an Interface -- OSPFv3 and Stub/NSSA Areas -- Enabling an OSPF for IPv6 Area Range -- Enabling an IPv4 Router ID for OSPFv3 -- Forcing an SPF Calculation -- Configuration Example: OSPFv3 -- IPv6 and EIGRP -- Enabling EIGRP for IPv6 on an Interface -- Configuring the Percentage of Link Bandwidth Used by EIGRP -- Configuring Summary Addresses -- Configuring EIGRP Route Authentication -- Configuring EIGRP Timers -- Configuring EIGRP Stub Routing -- Logging EIGRP Neighbor Adjacency Changes…”
    Libro electrónico
  19. 6799
    Publicado 2012
    Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
    Libro electrónico
  20. 6800
    por Manjares y Perez de J. (Fca.)
    Publicado 1930
    Libro