Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 363
- Revistes 199
- Història 195
- Crítica e interpretación 115
- Aalto, Alvar 101
- Filosofía 95
- Poesía española 92
- Arquitectura 85
- History 82
- Arquitectes 50
- Arquitectura moderna 50
- Altars 49
- Anuaris 49
- Obras 48
- Exposicions 45
- Lengua española 45
- Congressos 42
- Altares 41
- Església Catòlica 41
- Historia y crítica 40
- Anders, Günther 39
- Estadístiques 38
- Literatura española 36
- Derecho 30
- Crítica i interpretació 29
- Ensenyament 29
- Litúrgia 28
- Política y gobierno 28
- Iglesia Católica 27
- Economía 26
-
6781por Mueller, John PaulTabla de Contenidos: “…Generating variations on image data -- Sampling data in different ways -- Accessing Data in Structured Flat-File Form -- Reading from a text file -- Reading CSV delimited format -- Reading Excel and other Microsoft Office files -- Sending Data in Unstructured File Form -- Managing Data from Relational Databases -- Interacting with Data from NoSQL Databases -- Accessing Data from the Web -- Chapter 7 Conditioning Your Data -- Juggling between NumPy and pandas -- Knowing when to use NumPy -- Knowing when to use pandas -- Validating Your Data -- Figuring out what's in your data -- Removing duplicates -- Creating a data map and data plan -- Manipulating Categorical Variables -- Creating categorical variables -- Renaming levels -- Combining levels -- Dealing with Dates in Your Data -- Formatting date and time values -- Using the right time transformation -- Dealing with Missing Data -- Finding the missing data -- Encoding missingness -- Imputing missing data -- Slicing and Dicing: Filtering and Selecting Data -- Slicing rows -- Slicing columns -- Dicing -- Concatenating and Transforming -- Adding new cases and variables -- Removing data -- Sorting and shuffling -- Aggregating Data at Any Level -- Chapter 8 Shaping Data -- Working with HTML Pages -- Parsing XML and HTML -- Using XPath for data extraction -- Working with Raw Text -- Dealing with Unicode -- Stemming and removing stop words -- Introducing regular expressions -- Using the Bag of Words Model and Beyond -- Understanding the bag of words model -- Working with n-grams -- Implementing TF-IDF transformations -- Working with Graph Data -- Understanding the adjacency matrix -- Using NetworkX basics -- Chapter 9 Putting What You Know in Action -- Contextualizing Problems and Data -- Evaluating a data science problem -- Researching solutions -- Formulating a hypothesis -- Preparing your data…”
Publicado 2019
Libro electrónico -
6782Publicado 2023Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning -- Malvertising…”
Libro electrónico -
6783Publicado 2005Tabla de Contenidos: “…GENERAL OSI REFERENCE MODEL ISSUES AND CONCEPTS -- History of the OSI Reference Model -- General Reference Model Issues -- The Benefits of Networking Models -- Why Understanding the OSI Reference Model Is Important to You -- How to Use the OSI Reference Model -- Other Network Architectures and Protocol Stacks -- Key OSI Reference Model Concepts -- OSI Reference Model Networking Layers, Sublayers, and Layer Groupings -- N" Notation and Other OSI Model Layer Terminology -- Interfaces: Vertical (Adjacent Layer) Communication -- Protocols: Horizontal (Corresponding Layer) Communication -- Data Encapsulation, Protocol Data Units (PDUs), and Service Data Units (SDUs) -- Indirect Device Connection and Message Routing -- 6. …”
Libro electrónico -
6784CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning…”
Libro electrónico -
6785Publicado 2024Tabla de Contenidos: “…Chapter 6 Working with Real Data -- Uploading, Streaming, and Sampling Data -- Uploading small amounts of data into memory -- Streaming large amounts of data into memory -- Generating variations on image data -- Sampling data in different ways -- Accessing Data in Structured Flat-File Form -- Reading from a text file -- Reading CSV delimited format -- Reading Excel and other Microsoft Office files -- Sending Data in Unstructured File Form -- Managing Data from Relational Databases -- Interacting with Data from NoSQL Databases -- Accessing Data from the Web -- Chapter 7 Processing Your Data -- Juggling between NumPy and pandas -- Knowing when to use NumPy -- Knowing when to use pandas -- Validating Your Data -- Figuring out what's in your data -- Removing duplicates -- Creating a data map and data plan -- Manipulating Categorical Variables -- Creating categorical variables -- Renaming levels -- Combining levels -- Dealing with Dates in Your Data -- Formatting date and time values -- Using the right time transformation -- Dealing with Missing Data -- Finding the missing data -- Encoding missingness -- Imputing missing data -- Slicing and Dicing: Filtering and Selecting Data -- Slicing rows -- Slicing columns -- Dicing -- Concatenating and Transforming -- Adding new cases and variables -- Removing data -- Sorting and shuffling -- Aggregating Data at Any Level -- Chapter 8 Reshaping Data -- Using the Bag of Words Model to Tokenize Data -- Understanding the bag of words model -- Sequencing text items with n-grams -- Implementing TF-IDF transformations -- Working with Graph Data -- Understanding the adjacency matrix -- Using NetworkX basics -- Chapter 9 Putting What You Know into Action -- Contextualizing Problems and Data -- Evaluating a data science problem -- Researching solutions -- Formulating a hypothesis -- Preparing your data…”
Libro electrónico -
6786Publicado 2024Tabla de Contenidos: “…-- What we've learned -- Basic characteristics of graphs -- Undirected and directed edges -- The adjacency matrix -- In-degree and out-degree -- Centrality -- What we've learned -- Different types of graphs -- Fully connected graphs -- Disconnected graphs -- Directed acyclic graphs -- Small-world networks -- Scale-free networks -- What we've learned -- Community detection and decomposing graphs -- What is a community? …”
Libro electrónico -
6787
-
6788
-
6789
-
6790
-
6791
-
6792Publicado 2017Tabla de Contenidos: “…Ormsbee, Vincent Miller, Caitlin Sheridan and Feng He / Protein-Pacing and Multi-Component Exercise Training Improves Physical Performance Outcomes in Exercise-Trained Women: The PRISE 3 Study, Reprinted from: Nutrients 2016, 8(6), 332; doi: 10.3390/nu8060332 -- Mauricio Castro-Sepulveda, Neil Johannsen, Sebastián Astudillo, Carlos Jorquera, Cristian Álvarez, Hermann Zbinden-Foncea and Rodrigo Ramírez-Campillo Effects of Beer, Non-Alcoholic Beer and Water Consumption before Exercise on Fluid and / Electrolyte Homeostasis in Athletes, Reprinted from: Nutrients 2016, 8(6), 345; doi: 10.3390/nu8060345 -- Kelly Pritchett, Robert Pritchett, Dana Ogan, Phil Bishop, Elizabeth Broad and Melissa LaCroix / 25(OH)D Status of Elite Athletes with Spinal Cord Injury Relative to Lifestyle Factors, Reprinted from: Nutrients 2016, 8(6), 374; doi: 10.3390/nu8060374 -- Malgorzata Michalczyk, Milosz Czuba, Grzegorz Zydek, Adam Zajac and Józef Langfort / Dietary Recommendations for Cyclists during Altitude Training, Reprinted from: Nutrients 2016, 8(6), 377; doi: 10.3390/nu8060377 -- Daniel König, Denise Zdzieblik, Anja Holz, Stephan Theis and Albert Gollhofer / Substrate Utilization and Cycling Performance Following PalatinoseTM Ingestion: A Randomized, Double-Blind, Controlled Trial, Reprinted from: Nutrients 2016, 8(7), 390; doi: 10.3390/nu8070390 -- Daniel A. …”
Libro electrónico -
6793
-
6794
-
6795Publicado 2015Tabla de Contenidos: “…Entering numbers with fractions -- Using a form for data entry -- Entering the current date or time into a cell -- Applying Number Formatting -- Using automatic number formatting -- Formatting numbers by using the Ribbon -- Using shortcut keys to format numbers -- Formatting numbers by using the Format Cells dialog box -- Adding your own custom number formats -- Chapter 3: Essential Worksheet Operations -- Learning the Fundamentals of Excel Worksheets -- Working with Excel windows -- Moving and resizing windows -- Switching among windows -- Closing windows -- Activating a worksheet -- Adding a new worksheet to your workbook -- Deleting a worksheet you no longer need -- Changing the name of a worksheet -- Changing a sheet tab color -- Rearranging your worksheets -- Hiding and unhiding a worksheet -- Controlling the Worksheet View -- Zooming in or out for a better view -- Viewing a worksheet in multiple windows -- Comparing sheets side by side -- Splitting the worksheet window into panes -- Keeping the titles in view by freezing panes -- Monitoring cells with a Watch Window -- Working with Rows and Columns -- Inserting rows and columns -- Deleting rows and columns -- Changing column widths and row heights -- Changing column widths -- Changing row heights -- Hiding rows and columns -- Chapter 4: Working with Cells and Ranges -- Understanding Cells and Ranges -- Selecting ranges -- Selecting complete rows and columns -- Selecting noncontiguous ranges -- Selecting multisheet ranges -- Selecting special types of cells -- Selecting cells by searching -- Copying or Moving Ranges -- Copying by using Ribbon commands -- Copying by using shortcut menu commands -- Copying by using shortcut keys -- Copying or moving by using drag-and-drop -- Copying to adjacent cells -- Copying a range to other sheets -- Using the Office Clipboard to paste…”
Libro electrónico -
6796por Schilling, MartinTabla de Contenidos: “…Practice 14: Evaluating candidates in record time while creating an outstanding candidate experience -- Practice 15: Boosting the offer acceptance rates -- Organizational development -- Practice 16: Establishing a strong job architecture with clear levels, career paths and tracks -- Practice 17: Putting fair appraisal and promotion processes in place -- Employee experience -- Practice 18: Driving employee happiness by enabling meaning, mastery, psychological safety, autonomy and community -- Employee stock option programs -- Practice 19: Building the right employee stock option program -- 4 Scale-Up Mindset: Principles to bridge organizational silos -- Obsession with customer experience -- Practice 20: Improving key customer journey experiences as a top priority for leaders -- Impossible is nothing -- Practice 21: Setting impossible-is-nothing goals by thinking "and," not "or" -- Learn-it-all beats know-it-all -- Practice 22: Embracing learning cycles by establishing psychological safety and an idea meritocracy -- Autonomy to act -- Practice 23: Empowering cross-functional teams to make decisions rapidly & -- independently -- Functional Excellence in Scale-Ups -- 5 Product Management Excellence: Launching products that create value for customers -- OKRs -- Practice 24: Establishing the right product OKRs -- Organizational chart and roles -- Practice 25: Defining the roles & -- responsibilities for a product function -- Practice 26: Scaling the right product roles at the right time -- Product vision & -- direction -- Practice 27: Developing a clear product vision and deriving your roadmap from it -- Practice 28: Focusing your product organization on outcomes, not just designing a "feature factory" -- Practice 29: Investing in the core product while pushing adjacent opportunities and venture bets -- Product development process…”
Publicado 2022
Libro electrónico -
6797Publicado 2009Tabla de Contenidos: “…Restarting, Shutting Down, and Blocking RIP -- Verifying and Troubleshooting RIP -- Enhanced Interior Gateway Routing Protocol -- Understanding EIGRP Fundamentals -- Neighbor Discovery/Recovery -- Reliable Transport Protocol -- Diffusing Update Algorithm -- Protocol-Dependent Modules -- Configuring EIGRP in Cisco IOS XR -- Configuring Routing Policy -- Configuring Router ID -- Configuring and Verifying NSF -- Verifying EIGRP Process Status -- Verifying and Troubleshooting EIGRP -- Open Shortest Path First -- Understanding OSPF Fundamentals -- Configuring OSPF in Cisco IOS XR -- Configuring and Verifying OSPFv2 -- Hierarchical CLI and Inheritance -- Configuring OSPFv2 Authentication -- Verifying NSF Configuration and Standby RP Status -- Configuring and Verifying Nonstop Routing -- Configuring and Verifying Multiarea Adjacencies -- Configuring and Verifying Bidirectional Forwarding Detection -- Configuring OSPF Timers -- Configuring and Verifying OSPFv3 -- Intermediate System to Intermediate System -- Understanding IS-IS Fundamentals -- Configuring IS-IS in Cisco IOS XR -- Verifying the Single Topology Model -- Configuring and Verifying the Multitopology Model -- Configuring and Verifying Interface States -- Configuring IS-IS NSF and IS-IS Timers -- Configuring and Verifying BFD in IS-IS -- Configuring and Verifying IP Fast Reroute -- Configuring and Verifying Authentication in IOS XR IS-IS -- Chapter 8 Implementing BGP in Cisco IOS XR -- Cisco IOS XR BGP Architectural Overview -- Cisco IOS XR BGP Hierarchical Configuration -- Address Family Configuration Mode -- Configuration Groups -- Implementing BGP Policies -- Routing Policy Language -- Prefix Set -- AS-path Set -- Community Set -- Routing Policies -- Hierarchical Policies and Parameterization -- BGP Policy Accounting -- BGP Remotely Triggered Black Hole -- BGP Graceful Restart…”
Libro electrónico -
6798Tabla de Contenidos: “…Step 1: Define One (or More) Probes -- Step 2: Define One (or More) Tracking Objects -- Step 3: Define the Action on the Tracking Object(s) -- Step 4: Verify IP SLA Operations -- Policy Routing Using Route Maps -- Configuration Example: Route Maps -- Chapter 6 Enterprise to ISP Connectivity -- Configuring BGP -- BGP and Loopback Addresses -- eBGP Multihop -- Verifying BGP Connections -- Troubleshooting BGP Connections -- Autonomous System Synchronization -- Default Routes -- Load Balancing -- Authentication -- Attributes -- Route Selection Decision Process -- Origin -- Next-Hop -- Autonomous System Path: Remove Private Autonomous System -- Autonomous System Path: Prepend -- Weight: The Weight Attribute -- Weight: Access Lists -- Weight: Route Maps -- Local Preference: bgp default local-preference Command -- Local Preference: Route Maps -- Multi-Exit Discriminator (MED) -- Atomic Aggregate -- Regular Expressions -- Regular Expressions: Example One -- Regular Expressions: Example Two -- BGP Route Filtering Using Access Lists -- BGP Route Filtering Using Prefix Lists -- Configuration Example: BGP -- Chapter 7 Implementing IPv6 -- Assigning IPv6 Addresses to Interfaces -- IPv6 on NBMA Networks -- Cisco Express Forwarding (CEF) and Distributed CEF (dCEF) Switching for IPv6 -- IPv6 and RIPng -- Configuration Example: IPv6 RIP -- IPv6 and OSPFv3 -- Enabling OSPF for IPv6 on an Interface -- OSPFv3 and Stub/NSSA Areas -- Enabling an OSPF for IPv6 Area Range -- Enabling an IPv4 Router ID for OSPFv3 -- Forcing an SPF Calculation -- Configuration Example: OSPFv3 -- IPv6 and EIGRP -- Enabling EIGRP for IPv6 on an Interface -- Configuring the Percentage of Link Bandwidth Used by EIGRP -- Configuring Summary Addresses -- Configuring EIGRP Route Authentication -- Configuring EIGRP Timers -- Configuring EIGRP Stub Routing -- Logging EIGRP Neighbor Adjacency Changes…”
Libro electrónico -
6799Publicado 2012Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
Libro electrónico -
6800