Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,622
- History and criticism 773
- History 700
- Política y gobierno 622
- Història 595
- Edificios, estructuras, etc 458
- Management 441
- TFC 437
- Música 416
- Development 396
- Arquitectura 381
- Application software 338
- Engineering & Applied Sciences 317
- Bancs 305
- Civilización y cultura 297
- Edificis, estructures, etc 279
- Database management 220
- Data processing 218
- Computer Science 216
- Operating systems (Computers) 210
- Crítica e interpretación 208
- Computer programs 196
- Filosofía 195
- Música sagrada 195
- Politics and government 194
- Bach, Johann Sebastian 193
- Relaciones 193
- Situación social 190
- Computer networks 180
- Photography 177
-
28941Publicado 2003Tabla de Contenidos: “…System requirements for downloading the Web material -- How to use the Web material -- 13.5.1 Supplier application configuration -- 13.5.2 Running -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover…”
Libro electrónico -
28942Publicado 2003Tabla de Contenidos: “…Additional material -- 8.2.2 Locating the Web material -- 8.2.3 Using the Web material -- 8.2.4 System requirements for downloading the Web material -- 8.2.5 How to use the Web material -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Index -- Back cover…”
Libro electrónico -
28943por Wilkinson, Michael, 1957-Tabla de Contenidos: “…Secret #28-The Secret to Getting the Details -- Categorizing -- Secret #29-The Secret to Categorizing -- Inquiring -- Secret #30-The Secret to Q& -- A Sessions -- Generating Ideas -- Secret #31-The Secret to Generating Ideas -- Prioritizing -- Secret #32-The Secret to Prioritizing -- Reporting -- Secret #33-The Secret to Reporting Back -- Getting Feedback -- Secret #34-The Secret to Getting Quality Feedback -- Additional Information Gathering and Processing Strategies -- Applying the Secrets to Information Gathering -- Case Study: Facilitation in the Classroom -- Facilitator's Checklist for Information Gathering -- Exercise Your Skills -- VIII. …”
Publicado 2012
Libro electrónico -
28944Publicado 2022Tabla de Contenidos: “…. -- How it works... -- Backing up your Zabbix setup -- Getting ready -- How to do it... -- How it works... -- There's more... -- Optionally upgrading the Zabbix backend from PHP 7.2 to PHP 7.4 -- Getting ready -- How to do it... -- How it works... -- Upgrading a Zabbix database from older MariaDB versions to MariaDB 10.6 -- Getting ready -- How to do it... -- How it works... -- There's more... -- Upgrading your Zabbix setup -- Getting ready -- How to do it... -- How it works... -- See also -- Maintaining Zabbix performance over time -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 12: Advanced Zabbix Database Management -- Technical requirements -- Setting up MySQL partitioning for your Zabbix database -- Getting ready -- How to do it... -- How it works... -- See also -- Using the PostgreSQL TimescaleDB functionality -- Getting ready -- How to do it... -- How it works... -- See also…”
Libro electrónico -
28945por Pathak, Bharati V.Tabla de Contenidos: “…Development of the Stock Market in India -- Post-reforms Market Scenario -- Regulation of Stock Exchanges -- Organisation, Management and Membership of Stock Exchanges -- Demutualisation of Stock Exchanges -- Listing of Securities -- Central Listing Authority -- The SEBI (Central Listing Authority) Regulations, 2003 -- Risk Management -- Trading Rules and Regulations -- Circuit Breakers -- Trading Arrangements -- Trading and Settlement -- Dematerialisation of Securities -- Internet Trading -- Stock Market Index -- Methodologies for Calculating the Index -- Global Stock Market Indices -- Major Indices in India -- Stock Exchanges -- The Bombay Stock Exchange -- BSE Milestones -- Carry Forward Deals, or Badla -- Badla Mechanism -- Advantages -- Listing Categories -- BSE Indices -- Trends in Turnover on the BSE -- Conclusion -- The National Stock Exchange of India -- Membership Pattern on the NSE -- Indices -- National Securities Clearing Corporation Limited -- Margin Requirements -- Capital Market Segment of the NSE -- Conclusion -- The Over the Counter Exchange of India (OTCEI) -- Trading Documents on the OTCEI -- Advantages of OTCEI -- Steps to Improve Turnover on the OTCEI -- Conclusion -- The Inter-Connected Stock Exchange of India LTD -- Regional Stock Exchanges -- Indo Next -- Measures to Boost Liquidity in the Secondary Market -- Investment by Foreign Institutional Investors in the Indian Stock Market -- Depositories -- Buy Back of Shares -- Conclusion -- Market Making System -- Stock Lending and Borrowing (SLB) -- Conclusion -- Rolling Settlement -- Conclusion -- Straight Through Processing (STP) -- Margin Trading -- Conclusion -- Impact of Reforms and Measures on Secondary Market Activities -- Conclusion -- Key Terms -- Summary -- Review Questions -- References -- Chapter 9: The Derivatives Market -- Introduction…”
Publicado 2010
Libro electrónico -
28946Publicado 2003Tabla de Contenidos: “…Additional material -- Locating the Web material -- Using the Web material -- System requirements for downloading the Web material -- How to use the Web material -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Help from IBM -- Index -- Back cover…”
Libro electrónico -
28947Publicado 2013Tabla de Contenidos: “…Use Firewall Software -- Secure Network Share Permissions -- Use Encryption -- Secure Applications -- Back Up the System -- Implement ARP Poisoning Defenses -- Create a Computer Security Defense Plan -- Summary -- References -- Chapter 5: Security Policies, Standards, Procedures, and Guidelines -- Security Policies -- Security Policy Development -- Security Policy Contributors -- Security Policy Audience -- Policy Categories -- Frameworks -- Security Awareness -- Importance of Security Awareness -- Objectives of an Awareness Program -- Increasing Effectiveness -- Implementing the Awareness Program -- Enforcement -- Policy Enforcement for Vendors -- Policy Enforcement for Employees -- Software-Based Enforcement -- Example Security Policy Topics -- Acceptable Use Policies -- Computer Policies -- Network Policies -- Data Privacy Policies -- Data Integrity Policies -- Personnel Management Policies -- Security Management Policies -- Physical Security Policies -- Security Standards -- Security Standard Example -- Security Procedures -- Security Procedure Example -- Security Guidelines -- Security Guideline Example -- Ongoing Maintenance -- Summary -- References -- Chapter 6: Security Organization -- Roles and Responsibilities -- Security Positions -- Security Incident Response Team -- Managed Security Services -- Services Performed by MSSPs -- Services That Can Be Monitored by MSSPs -- Security Council, Steering Committee, or Board of Directors -- Interaction with Human Resources -- Summary -- References -- Chapter 7: Authentication and Authorization -- Authentication -- Usernames and Passwords -- Certificate-Based Authentication -- Extensible Authentication Protocol (EAP) -- Biometrics -- Additional Uses for Authentication -- Authorization -- User Rights -- Role-Based Authorization (RBAC) -- Access Control Lists (ACLs) -- Rule-Based Authorization…”
Libro electrónico -
28948Publicado 2018Tabla de Contenidos: “…8.2.4 Multivariate Geometric Distribution-4 -- 8.2.5 Bivariate Geometric Distribution-6 -- 8.2.6 Bivariate Geometric Distribution-7 -- 8.3 Schur-Constant Family -- 8.3.1 Distributional Features -- 8.3.2 Reliability Aspects -- 8.3.3 Dependence and Ageing -- 8.4 Bivariate Waring Distribution-1 -- 8.5 Bivariate Waring Distribution-2 -- 8.6 Bivariate Negative Hypergeometric Distribution -- 8.7 Bivariate Weibull Distribution -- 8.8 Multivariate Zipf Distributions -- 9 Applications -- 9.1 Introduction -- 9.2 Survival Analysis -- 9.2.1 Proportional Hazards Models -- 9.2.2 Additive Hazards Model -- 9.2.3 Proportional Reversed Hazards Model -- 9.2.4 Proportional Mean Residual Life Model -- 9.2.5 Proportional Odds Model -- 9.3 Social Sciences -- 9.4 Risk Analysis -- 9.5 Information Theory -- 9.6 Mathematics and Statistics -- References -- Index -- Back Cover…”
Libro electrónico -
28949Publicado 2017Tabla de Contenidos: “…-- Practical parallelization with R -- Using C++ and Fortran to accelerate calculations -- Using an old-school approach with Fortran -- Using a modern approach with C++ -- Looking back at what we have achieved -- Other topics of interest to enhance performance -- Preallocating memory to avoid duplication -- Making R code a bit faster with byte code compilation -- Just-in-time (JIT) compilation of R code -- Using memoization or cache layers -- Improving our data and memory management -- Using specialized packages for performance -- Flexibility and power with cloud computing -- Specialized R distributions -- Summary -- Chapter 10: Adding Interactivity with Dashboards -- Required packages…”
Libro electrónico -
28950Roslyn cookbook compiler as a service, static code analysis, code quality, code generation, and morePublicado 2017Tabla de Contenidos: “…. -- How it works... -- Applying batch code fixes (FixAll) across different scopes: document, project, and solution -- Getting ready -- How to do it... -- Creating a custom FixAllProvider to fix all occurrences of an issue across a scope -- Getting ready -- How to do it... -- How it works... -- Creating a CodeRefactoringProvider to refactor source code to recommend using C# 7.0 tuples -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a CompletionProvider to provide additional intellisense items while editing code. -- Getting ready -- How to do it... -- How it works... -- Writing unit tests for a CodeFixProvider -- Getting ready -- How to do it... -- How it works... -- Chapter 4: Improving Code Maintenance of C# Code Base -- Introduction -- Configuring C# code style rules built into Visual Studio 2017 -- Getting ready -- How to do it... -- How it works... -- There is more... -- Using the .editorconfig file for configuration of code style rules -- Getting ready -- How to do it... -- How it works... -- Using the public API analyzer for API surface maintenance -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using third-party StyleCop analyzers for code style rules -- Getting ready -- How to do it... -- How it works... -- Chapter 5: Catch Security Vulnerabilities and Performance Issues in C# Code -- Introduction -- Identifying configuration-related security vulnerabilities in web applications -- Getting ready -- How to do it... -- How it works... -- Identifying cross-site scripting vulnerabilities in view markup files (.cshtml, .aspx files) in web applications -- Getting ready -- How to do it... -- How it works... -- Identifying insecure method calls that can lead to SQL and LDAP injection attacks…”
Libro electrónico -
28951Publicado 2018Tabla de Contenidos: “…Gradient-based optimization -- The Jacobian and Hessian matrices -- Chain rule of derivatives -- Stochastic Gradient Descent -- Non-linear neural units -- Learning a simple non-linear unit - logistic unit -- Loss functions -- Data representations -- Tensor examples -- Tensor operations -- Multilayered neural networks -- Backprop - training deep neural networks -- Challenges in neural network learning -- Ill-conditioning -- Local minima and saddle points -- Cliffs and exploding gradients -- Initialization - bad correspondence between the local and global structure of the objective -- Inexact gradients -- Initialization of model parameters -- Initialization heuristics -- Improvements of SGD -- The momentum method -- Nesterov momentum -- Adaptive learning rate - separate for each connection -- AdaGrad -- RMSprop -- Adam -- Overfitting and underfitting in neural networks -- Model capacity -- How to avoid overfitting - regularization -- Weight-sharing -- Weight-decay -- Early stopping -- Dropout -- Batch normalization -- Do we need more data? -- Hyperparameters of the neural network -- Automatic hyperparameter tuning -- Grid search -- Summary -- Chapter 3: Understanding Deep Learning Architectures -- Neural network architecture -- Why different architectures are needed -- Various architectures -- MLPs and deep neural networks -- Autoencoder neural networks -- Variational autoencoders -- Generative Adversarial Networks -- Text-to-image synthesis using the GAN architecture -- CNNs -- The convolution operator -- Stride and padding mode in convolution -- The convolution layer -- LeNet architecture -- AlexNet -- ZFNet -- GoogLeNet (inception network) -- VGG -- Residual Neural Networks -- Capsule networks -- Recurrent neural networks -- LSTMs -- Stacked LSTMs -- Encoder-decoder - Neural Machine Translation -- Gated Recurrent Units -- Memory Neural Networks…”
Libro electrónico -
28952Publicado 2018Tabla de Contenidos: “…The context click on WebElement action -- The context click at current location action -- Learning keyboard-based interactions -- The keyDown and keyUp actions -- The sendKeys method -- Summary -- Questions -- Further information -- Chapter 6: Understanding WebDriver Events -- Introducing the eventFiringWebDriver and eventListener classes -- Creating an instance of EventListener -- Implementing WebDriverEventListener -- Extending AbstractWebDriverEventListener -- Creating a WebDriver instance -- Creating EventFiringWebDriver and EventListener instances -- Registering EventListener with EventFiringWebDriver -- Executing and verifying the events -- Registering multiple EventListeners -- Exploring different WebDriver event listeners -- Listening for WebElement value changes -- Listening for the clicked WebElement -- Listening for a WebElement search event -- Listening for browser back-navigation -- Listening for browser forward-navigation -- Listening for browser NavigateTo events -- Listening for script execution -- Listening for an exception -- Unregistering EventListener with EventFiringWebDriver -- Performing accessibility testing -- Capturing page-performance metrics -- Summary -- Questions -- Further information -- Chapter 7: Exploring RemoteWebDriver -- Introducing RemoteWebDriver -- Understanding Selenium Standalone Server -- Downloading Selenium Standalone Server -- Running the server -- Understanding the RemoteWebDriver client -- Converting an existing test script to use the RemoteWebDriver server -- Using RemoteWebDriver for Firefox -- Using RemoteWebDriver for Internet Explorer -- Understanding the JSON wire protocol -- Summary -- Questions -- Further information -- Chapter 8: Setting up Selenium Grid -- Exploring Selenium Grid -- Understanding the hub -- Understanding the node -- Modifying the existing test script to use Selenium Grid…”
Libro electrónico -
28953Publicado 2018Tabla de Contenidos: “…-- ORGANIZATION OF ASSETS -- BACKING UP YOUR DATA -- THE BASICS OF DESIGN -- Style -- Line -- Shape -- Composition -- Rule of Thirds -- Negative Space -- Unity -- Variety -- Balance -- Color -- Texture -- Emphasis…”
Libro electrónico -
28954Publicado 2017Tabla de Contenidos: “…Adding Content to Track-Add -- Staging Scope -- Finalizing Changes-Commit -- Prerequisites -- Commit Scope -- Putting It All Together -- Amending Commits -- Results of a Commit -- Advanced Topics -- Using the Verbose Option -- The Full Commit Message Experience -- Autocorrect and Auto Execute -- Summary -- About Connected Lab 2: Creating and Exploring a Git Repository and Managing Content -- Connected Lab 2 Creating and Exploring a Git Repository and Managing Content -- Prerequisites -- Optional Advanced Deep-Dive into the Repository Structure -- Steps -- Chapter 6: Tracking Changes -- Git Status -- Workflow Example with Status -- Status Command Short Form -- Git Diff -- Important Symbolic Names in Git -- How to Think about Git's Approach to Diffing -- Diff Names Only -- Word-diff -- Ignoring Non-critical Changes -- Diffing Two Commits -- Visual Diffing -- Other Diff Tricks -- Summary -- About Connected Lab 3: Tracking Content through the File Status Life Cycle -- Connected Lab 3 Tracking Content Through the File Status Life Cycle -- Prerequisites -- Steps -- Chapter 7: Working with Changes over Time and Using Tags -- The Log Command -- Common Display and Filtering Options -- Time-Limiting Options -- History by Files and Paths -- Log Output Format -- Searching History -- Git Blame -- Seeing History Visually -- Tags -- Seeing Tag Details -- Modifying Tags -- Quick Tagging Example -- Undoing Changes in History -- Reset-Rolling Back Changes -- Completely Resetting the Local Environment -- Revert-Canceling Out Changes -- Advanced Topics -- Signing Commits and Tags -- Reflogs -- Summary -- About Connected Lab 4: Using Git History, Tags, and Aliases -- Connected Lab 4 Using Git History, Aliases, and Tags -- Prerequisites -- Steps -- Chapter 8: Working with Local Branches -- What Is a Branch? …”
Libro electrónico -
28955Publicado 2014Tabla de Contenidos: “…: Background : gate arrays -- Experiment 18 : Time to switch -- Background : an XNOR made from light switches : Back to the rock ; Showing which button ; Cheat proofing ; Fit to be tied ; Wiring it ; Cheat-proofed wiring ; Conclusion -- Experiment 19 : Decoding telepathy -- Decoder testing : Remembering binary ; Boarding it ; Decoder pinouts -- Experiment 20 : Decoding rock, paper, scissors -- The logic : The specification ; An unobtainable or ; Saved by NOR ; Boarding the simplified scheme ; Make even more ; Undecoding -- Experiment 21 : The hot slot -- Muxing it : Jumping and roaming ; Quick facts about muxes ; Mux pinouts ; Mux applications ; Analog versus digital mux ; Quick facts about mux variants -- Game design : Slot counting ; Circuit design -- Slot design : Hot slot testing -- Who wins? …”
Libro electrónico -
28956Publicado 2010Tabla de Contenidos: “…Deleting All Items from Your History List -- Emailing Links -- Printing a Web Page -- Saving a Web Page -- Organizing Favorites -- CHAPTER 11 USER ACCOUNTS AND SYSTEM SECURITY -- Setting Up Windows 7 for Multiple Users -- Changing Account Settings -- Adding/Changing a Password -- Creating a Password Reset Disk -- Enabling Parental Controls -- Checking for Spyware with Windows Defender -- Setting Windows Defender Options -- Using Action Center -- Reporting Problems with Action Center -- CHAPTER 12 PERSONALIZING WINDOWS 7 -- Opening the Personalization Menu from the Desktop -- Opening the Personalization Menu from Control Panel -- Selecting a Desktop Theme -- Changing the Window Color -- Choosing a Desktop Background -- Selecting a Screen Saver -- Enabling and Using Multiple Monitors -- Adjusting Screen Resolution -- Adjusting Mouse Settings -- Using a Sound Scheme -- Setting the Date and Time -- Using Additional Clocks -- CHAPTER 13 SYSTEM MAINTENANCE AND PERFORMANCE -- The System and Security Category in Control Panel -- Displaying System Information -- Configuring Windows Update -- Updating Windows Manually -- Using Devices and Printers -- Selecting a Power Plan -- Viewing Disk Information -- Using ReadyBoost -- Cleaning Up Unnecessary Files -- Checking Drives for Errors -- Configuring Defragment -- Troubleshooting -- Fixing Problems with System Restore -- Creating a System Repair Disc -- Backing Up Your Files -- Restoring Files from a Backup -- Using the Problem Steps Recorder -- CHAPTER 14 SETTING UP PROGRAMS -- Control Panel's Programs Menu -- Installing a CD or DVD Program from the AutoPlay Menu -- Installing a Program Manually -- Adding a Program Shortcut to the Start Menu -- Adding a Program Shortcut to the Desktop -- Adding a Program Shortcut to the Taskbar -- Helping an Older Program to Run Properly -- Removing (Uninstalling) a Program…”
Libro electrónico -
28957Publicado 2012Tabla de Contenidos: “…Cover -- Contents -- Introduction: Homeland Security: A Concern and a Role for Everyone -- Part 1 How We Got Here from There: The Emergence of Contemporary Homeland Security -- Chapter 1 Homeland Security: The American Tradition -- Chapter Overview -- Chapter Learning Objectives -- A Colonial Legacy: Securing Communities and Coastlines -- The Young Republic: Dangers from Within -- The New Great Power Faces Foreign Threats -- World War I: From Sabotage to Pandemics -- World War II: Safeguarding Freedom's Arsenal -- The Cold War: Foreign Spies, Domestic Radicals, and Disaster Response -- The Threat of Shadow War -- Out of the Cold: Emerging Threats to America's Homeland -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 2 The Road to 9/11: Contemporary Terrorism and the Meaning of the September 11 Attacks -- Chapter Overview -- Chapter Learning Objectives -- Terrorist Trends Anticipating 9/11 -- The Emergence of al-Qaida -- A Day That Changed the World -- Lessons for Disaster Preparedness and Response -- New Fears: Weapons of Mass Destruction and Disruption -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 3 The Birth of Contemporary Homeland Security: The National Response to 9/11 and Its Aftermath -- Chapter Overview -- Chapter Learning Objectives -- The Response to Contemporary Terrorism -- International Cooperation -- Defensive Efforts -- Katrina and What Followed -- Back to the Border -- Homeland Security's Evolving Enterprise -- Twilight of the Long War? …”
Libro electrónico -
28958Publicado 1989Tabla de Contenidos: “…IMPLEMENTATION -- STEREOTYPES ABOUT HIGH SCHOOLS -- Myth 1: -- Myth 2: -- Myth 3: -- Myth 4: -- Myth 5: -- STUDIES OF CHANGE FROM THE TEACHER'S POINT OF VIEW -- Stages of Concern -- Levels of Use -- ADAPTATIONS IN THE INNOVATION -- THE PRINCIPAL -- THE DEPARTMENT HEAD -- BACK TO THE HIGH SCHOOL -- EXTERNAL FACILITATORS -- SUMMARY AND RECOMMENDATIONS -- References -- 33 Change in Schools: A Context for Action -- A SYSTEM PERSPECTIVE OF SCHOOLS -- THE ECOLOGY OF A LEARNING ENVIRONMENT -- CHANGE IS SYSTEMIC -- Change is a Process -- BELIEFS ABOUT TEACHING AND LEARNING -- THE HIGH SCHOOL AS A CONTEXT FOR ACTION -- References -- 34 Creating and Nurturing Curriculum Changes: Some Models That Speak to the Future -- CURRICULAR CHANGE -- Change As an End -- The School's Mechanisms for Change -- Stability in Curriculum -- Crisis, Stability, and Change -- The Current Crisis -- Teachers and Curricular Change -- Training and Its Problems -- Political Forces Frustrating Change -- Administrative Frustration with Change -- THE CRDG MODEL -- Resources -- Research -- The University Setting Advantage…”
Libro electrónico -
28959Publicado 2004Tabla de Contenidos: “…Additional material -- Locating the Web material -- Using the Web material -- System requirements for downloading the Web material -- How to use the Web material -- Related publications -- IBM Redbooks -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
Libro electrónico -
28960Publicado 2022Tabla de Contenidos: “…-- 11.2.3 Sequential solution for NER -- 11.3 Practical applications of NER -- 11.3.1 Data loading and exploration -- 11.3.2 Named entity types exploration with spaCy -- 11.3.3 Information extraction revisited -- 11.3.4 Named entities visualization -- Summary -- Conclusion -- Solutions to miscellaneous exercises -- Appendix A Installation instructions -- index -- inside back cover…”
Libro electrónico