Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Economics 157
- Development 101
- Education 96
- Engineering & Applied Sciences 96
- Historia 83
- Economic conditions 80
- Management 78
- Social Issues/Migration/Health 72
- Application software 71
- Data processing 66
- Computer networks 63
- Finance 57
- Economic policy 53
- Business & Economics 52
- Computer programs 52
- Python (Computer program language) 50
- Computer Science 48
- Investments 46
- Machine learning 45
- History 43
- Computer security 42
- Data mining 40
- Examinations 39
- Taxation 38
- Security measures 37
- Cloud computing 36
- Electrical & Computer Engineering 36
- Telecommunications 35
- Database management 34
- Investment analysis 33
-
4681por McFedries, Paul“…Microsoft Windows Vista Unleashed, Second Edition, is a book for people, like you, who don't consider themselves to be "average users." It's a book for anyone who finds that doing things the official way is slower, less efficient, and less powerful because Windows Vista was designed from the ground up to avoid confusing novice users. …”
Publicado 2008
Libro electrónico -
4682por Schlachter, Michael C. author“…Institutional investors like the retirement systems of states and major companies, as well as the largest university endowments, are among the few that consistently outperform the market. Sure, average retail investors can't make the same types of private deals in real estate, private equity, or hedge funds that institutional investors use to reap large returns or offset market volatility. …”
Publicado 2013
Libro electrónico -
4683por Kesselman, George“…Did you know that we, on average, play 8.5 hours of games per week? While this varies slightly from East to West, we spend nearly one day per week immersed in this enjoyable problem-solving experience. …”
Publicado 2023
Libro electrónico -
4684Clinical effectiveness and cost effectiveness of intracoronary brachytherapy and drug eluting stentsPublicado 2004“…Use of stents has successfully reduced the problem of restenosis, on average from 22 % to 32 %, although with higher values for patients in high risk groups. …”
Libro electrónico -
4685Publicado 2010“…Constituye hoy una amenaza especialmente grave, frente a la que es necesaria una constante alerta, la difusión de la ideología de género, a la que obedece un conjunto de leyes aprobadas en España absolutamente incompatibles con el respeto a la vida y dignidad de la persona. …”
Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo)Libro -
4686Publicado 2010“…Constituye hoy una amenaza especialmente grave, frente a la que es necesaria una constante alerta, la difusión de la ideología de género, a la que obedece un conjunto de leyes aprobadas en España absolutamente incompatibles con el respeto a la vida y dignidad de la persona. …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)CDROM -
4687Publicado 2023“…Ángeles Bonmatí, además de ayudarnos a desgranar la presencia del sueño en el arte, contarnos cómo duermen otros animales o hacer alguna parada en situaciones excepcionales como dormir en el espacio exterior, nos explicará qué ocurre en nuestro cerebro y en el resto del cuerpo mientras dormimos (spoiler alert: de inactividad, nada) y qué consecuencias puede tener no hacerlo durante el tiempo necesario y en el momento adecuado. …”
Libro -
4688Publicado 2018Tabla de Contenidos: “…Azure Key Vault secrets in ARM templates -- Azure Storage Service Encryption -- Azure Disk Encryption -- Azure SQL Database Security -- Azure Active Directory Managed Service Identity -- Summary -- Questions -- Further reading -- Chapter 11: Governance and Policies -- Technical requirements -- Azure Role-Based Access Control -- Built-in Roles -- Custom Roles -- Creating a Custom Role -- Azure Resource Policies -- Azure AD Privileged Identity Management -- Azure AD Identity Protection -- Azure Security Center -- Advanced Threat Detection -- Azure Endpoint Protection -- Operations Management Suite - Security and Compliance -- Summary -- Questions -- Further reading -- Chapter 12: Artificial Intelligence, IoT, and Media Services -- Technical requirements -- Azure Cognitive Services -- Available services and APIs -- Using the Computer Vision API -- Azure Bot Service -- Creating a Bot from the Azure Portal -- Azure Machine Learning -- Azure IoT Hub -- Azure Event Hub -- Azure IoT Edge -- Azure Stream Analytics -- Azure Time Series Insights -- Azure Media Services -- Azure Media Analytics -- Using the Azure Media Analytics Indexer -- Summary -- Questions -- Further reading -- Chapter 13: Implementing Messaging Solutions -- Technical requirements -- Azure Queue Storage -- Azure Service Bus -- Azure Event Grid -- Routing Events with Azure Event Grid -- Notification Hubs -- Designing an effective messaging architecture -- Summary -- Questions -- Further reading -- Chapter 14: Application Monitoring and Alerting Strategies -- Azure Log Analytics -- Creating a Log Analytics Workspace -- Azure Monitor -- Application Insights -- Azure Service Health -- Azure Advisor -- Address Recommendation from Azure Advisor -- Azure Network Watcher -- Summary -- Questions -- Further reading -- Chapter 15: Exploring Operations Automation Strategies…”
Libro electrónico -
4689Publicado 2019“…By the end of the course, you’ll be able to use centralized logging and monitoring techniques for debugging purposes to find out reasons for crashes, and trigger alerts if there is a spike in error messages (which can be more efficient than a system health check)…”
-
4690Publicado 2018“…What you will learn Design and implement a complex Splunk Enterprise solution Configure your Splunk environment to get machine data in and indexed Build searches to get and format data for analysis and visualization Build reports, dashboards, and alerts to deliver critical insights Create knowledge objects to enhance the value of your data Install Splunk apps to provide focused views into key technologies Monitor, troubleshoot, and manage your Splunk environment Who this book is for This book is intended for experienced IT personnel who are just getting started working with Splunk and want to quickly become proficient with its usage. …”
Libro electrónico -
4691Publicado 2017“…Then you will learn to write simple logic to execute tasks based upon sensor data (for example, to control a motor) and retrieve data from the web (such as to check e-mails to provide a visual alert). Finally, you will learn to build a home automation system with Python where different appliances are controlled using the Raspberry Pi. …”
Libro electrónico -
4692Publicado 2017Tabla de Contenidos: “…Security Information and Event Management (SIEM) -- Splunk -- Alert status -- IDS versus IPS -- Snort as an IPS -- How? …”
Libro electrónico -
4693Publicado 2017Tabla de Contenidos: “…. -- Chapter 4: Configuring Alerts and Notifications…”
Libro electrónico -
4694Publicado 2016“…What You Will Learn Create Scala web applications that couple with JavaScript libraries such as D3 to create compelling interactive visualizations Deploy scalable parallel applications using Apache Spark, loading data from HDFS or Hive Solve big data problems with Scala parallel collections, Akka actors, and Apache Spark clusters Apply key learning strategies to perform technical analysis of financial markets Understand the principles of supervised and unsupervised learning in machine learning Work with unstructured data and serialize it using Kryo, Protobuf, Avro, and AvroParquet Construct reliable and robust data pipelines and manage data in a data-driven enterprise Implement scalable model monitoring and alerts with Scala In Detail This Learning Path aims to put the entire world of machine learning with Scala in front of you. …”
Libro electrónico -
4695Publicado 2016“…What You Will Learn Sharpen your functional programming skills in Scala using REPL Apply standard and advanced machine learning techniques using Scala Get acquainted with Big Data technologies and grasp why we need a functional approach to Big Data Discover new data structures, algorithms, approaches, and habits that will allow you to work effectively with large amounts of data Understand the principles of supervised and unsupervised learning in machine learning Work with unstructured data and serialize it using Kryo, Protobuf, Avro, and AvroParquet Construct reliable and robust data pipelines and manage data in a data-driven enterprise Implement scalable model monitoring and alerts with Scala In Detail Since the advent of object-oriented programming, new technologies related to Big Data are constantly popping up on the market. …”
Libro electrónico -
4696Publicado 2015“…Originally presented as a live online event, all six presentations are now available to view at your leisure, including: Getting to simple: Deploying IoT at scale Pilgrim Beart, Founder, AlertMe.com Ltd. Explore the underlying factors and trends driving IoT design requirements, with lessons learned—and pitfalls to avoid—from Pilgrim Beart’s experience scaling his Connected Home service into the millions. …”
-
4697Publicado 2008“…tips offer advice or show you easier ways to do something. Watch Out! cautions alert you to possible problems and give you advice on how to avoid them. …”
Libro electrónico -
4698por Beck, Kent“…Specific topics include: Planning and the four key variables: cost, quality, time, and scope Deciding how many features to incorporate into a release Estimating scope, time, and effort for user stories Prioritizing user stories Balancing the business value and technical risk of user stories Rebuilding the release plan based on customer and programmer input Choosing the iteration length Tracking an iteration What to do when you're not going to make the date Dealing with bugs Making changes to the team Outsourcing Working with business contracts In addition, this book alerts you to the red flags that signal serious problems: customers who won't make decisions, growing defect reports, failing daily builds, and more. …”
Publicado 2001
Libro electrónico -
4699Publicado 2008“…The ultimate goal is to deploy a set of security capabilities that together create an intelligent, self-defending network that identifies attacks as they occur, generates alerts as appropriate, and then automatically responds. …”
Libro electrónico -
4700por Sobell, Mark G.“…A full chapter on the use and customization of the Red Hat default GNOME 2 desktop manager and the new Metacity window manager A full chapter on how to use and customize the KDE 3 desktop environment Lucid descriptions of utilities illustrated by many practical examples Detailed coverage of the Linux programming environment and tools, including the C compiler, make, and source code management In-depth discussion of networking and the Internet, including types of networks, secure network utilities, and distributed computing An emphasis on security issues throughout, including highlighted warnings and a dedicated appendix Extensive information and full-length examples about using shells interactively and as programming tools, with chapters on the Bourne Again Shell (bash), the TC Shell (tcsh), and the Z Shell (zsh) Appendixes covering regular expressions, online resources, security, and POSIX standards A comprehensive glossary of more than five hundred words and phrases Helpful features such as tips, cautions, and security alerts supplement the lessons of the text. The companion Web site (http://www.sobell.com) provides useful links, downloadable examples and illustrations, answers to selected review exercises, additional exercises and programs, and updates to the book. …”
Publicado 2003
Libro electrónico