Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
5901Publicado 2023Tabla de Contenidos: “…Chapter 1: Introduction: Dimensions of cloud security -- Chapter 2: Identity and Access Management with Azure Active Directory -- Chapter 3: Network Security Patterns -- Chapter 4: Infrastructure Security Patterns -- Chapter 5: Application and Data Security Patterns -- Chapter 6: Security Processes -- Chapter 7: Automated Security Monitoring -- Chapter 8: Creating a Security Culture…”
Libro electrónico -
5902por Forum International des Transports.Tabla de Contenidos: “…Résumé -- Évaluation des services ferroviaires urbains -- Synthèse des discussions -- Tour d'horizon du secteur des transports publics dans le monde -- Valorisation de l'affluence dans les transports publics en Île-De-France -- Liste des participants -- Évaluation de la commodité des transports publics en Corée…”
Publicado 2014
Libro electrónico -
5903por Sharma, Vishal. authorTabla de Contenidos: “…Configuring Logstash for Services and System Logs -- 6. Graphite Monitoring and Graphs -- 7. Configuring Elasticsearch Watcher -- 8. …”
Publicado 2016
Libro electrónico -
5904por Snyder, Scott A. 1965-Tabla de Contenidos: “…The swarm analogy and the wireless revolution -- Digital swarm drivers -- Possible future scenarios : convergence, collision, confluence -- The swarm effect : implications for you and your company -- Organizing for success : strategies and options -- Monitoring and adapting to early signals -- Killer swarm apps -- Swarm leadership -- Appendix A: Taking the WiQ survey -- Appendix B: Wireless 101 : inside the technology…”
Publicado 2009
Libro electrónico -
5905por Ip, Greg, 1964-Tabla de Contenidos: “…The secrets of success -- Economic bungee jumping -- In-flight monitor -- Labor pains -- Fire and ice -- Drop the puck! …”
Publicado 2013
Libro electrónico -
5906Publicado 2022Tabla de Contenidos: “…Chapter 1: Exam Overview & Introduction to Azure Virtual Desktop Chapter 2: Plan an Azure Virtual Desktop Architecture Chapter 3: Implement an Azure Virtual Desktop Infrastructure Chapter 4: Manage Access and Security to Azure Virtual Desktop Chapter 5: Manage User Environments and Apps Chapter 6: Monitor and maintain an Azure Virtual Desktop Infrastructure…”
Libro electrónico -
5907Publicado 2010Tabla de Contenidos: “…Cover; Official (ISC)2® guide to the SSCP® CBK®; Copyright; Contents; Foreword; Editor; About the Authors; Introduction; Chapter 1: Access Controls; Chapter 2: Cryptography; Chapter 3: Malicious Code; Chapter 4: Monitoring and Analysis; Chapter 5: Networks and Telecommunications; Chapter 6: Security Operations and Administration; Chapter 7: Risk, Response, and Recovery; Appendix; Index…”
Libro electrónico -
5908Tabla de Contenidos: “…Optimizing table performance -- Choosing and optimizing indexes -- Optimizing instance memory -- Monitoring system performance -- Minimizing system contention -- Analyzing operating system performance -- Troubleshooting the database -- Creating efficient SQL -- Manually tuning SQL -- Tracing SQL execution -- Automated SQL tuning -- Execution plan optimization and consistency -- Configuring the optimizer -- Implementing query hints -- Executing SQL in parallel…”
Libro electrónico -
5909Publicado 2018Tabla de Contenidos: “…Introduction - HPC architecture 1: systems and technologies - Commodity clusters - Benchmarking - The essential resource management - Symmetric multiprocessor architecture - The essential OpenMP - The Essential MPI - Parallel algorithms - Libraries - Operating systems - Visualization - Performance monitoring - Debugging - Accelerator architecture - The essential OpenACC - Mass storage - File systems - MapReduce - Checkpointing - Next steps and beyond…”
Libro electrónico -
5910por Clark, Lisa F.Tabla de Contenidos: “…-- Part 2 Emerging Opportunities for Regulatory Enhancement -- Chapter 4 Novel Genomic Techniques and Applications on the Horizon -- Chapter 5 Governing the Unknown -- Chapter 6 What’s Next for Gene Editing in Agrifood?…”
Publicado 2024
Libro electrónico -
5911Publicado 1996Tabla de Contenidos: “…Front Matter; Contents; Data Priorities for Population and Health in Developing Countries: Summary of a Workshop; SESSION I: NEW INFORMATION NEEDS; SESSION II: ALTERNATIVE DATA COLLECTION STRATEGIES FOR MONITORING, EVALUATING, AND PLANNING PURPOSES; SESSION III: EVALUATING PROGRAM IMPACT AND PERFORMANCE; SESSION IV: INSTITUTIONALIZING DATA COLLECTION IN HOST COUNTRIES; CONCLUSION; REFERENCES; APPENDIX AUTHORS AND PAPERS…”
Libro electrónico -
5912por Kelley, Donald R., 1931-Tabla de Contenidos: “…Contents Preface 00 Introduction: Horizons, 1914 1 1. Before the Great War 00 2. Reevaluations 00 3. …”
Publicado 2006
Libro -
5913Publicado 2023Tabla de Contenidos: “…The desert, the rivers, and the oceans -- The long beginning -- Domesticating the land, 6500-1000 BC -- Creating connectivities, 1000-140 BC -- The impace of empire, 140 BC-AD 400 -- An end and a beginning, AD 400-760 -- Emerging states, AD 760-1150 -- Widening horizons, AD 1150-1400 -- Africa and the world, AD 1400-1600 -- Retrospect and prospect…”
Libro -
5914Publicado 2016Tabla de Contenidos: “…Prerequisites - deploying our application on Remote Server -- Setting up Tomcat server -- Deploying application in Docker container -- Deploying Application in AWS -- Deploying application in Microsoft Azure -- Self-test questions -- Summary -- Chapter 8: Monitoring Infrastructure and Applications -- Getting started - monitoring -- Overview of Monitoring tools and Techniques -- Nagios -- Quick start with Nagios -- Monitoring AWS Elastic Beanstalk -- Monitoring Microsoft Azure Web App Service -- Self-test questions -- Summary -- Chapter 9: Orchestrating Application Deployment -- Creating build jobs for end-to-end automation -- Configuring SSH authentication using a key -- Configuring the build pipeline for build job orchestration -- Executing the pipeline for application deployment automation -- Hygieia - a DevOps dashboard -- Self-test questions -- Summary -- Index…”
Libro electrónico -
5915Publicado 2003Tabla de Contenidos: “…Implicit emotion -- A neural model of implicit and explicit emotional processing -- Self-regulation -- Discussion -- Normative emotional experience -- Clinical implications -- Summary -- References -- Self-regulation by the medial frontal cortex -- Introduction -- Concepts of self-regulation -- The anterior cingulate cortex in self-regulation -- Animal studies of action monitoring -- Human studies of action monitoring -- The ERN and action monitoring -- The ERN and conflict monitoring -- Disorders of self-regulation -- Monitoring deficits and schizophrenia -- Monitoring deficits and OCD -- Affective control of action monitoring -- A model of action-regulation -- Systems for discriminative learning -- Neurophysiological mechanisms for self-regulation -- Human electrophysiology of corticolimbic self-regulation -- Phase resetting of the theta rhythm by dopaminergic signals -- Opiates and the theta rhythm: Modification of the signal-to-noise ratio -- Cybernetics of motivational congruence -- Summary -- Acknowledgements -- References -- Neural basis of conscious and voluntary self-regulation of emotion -- Introduction -- Definition of emotional self-regulation -- Neural basis of emotional self-regulation: Findings from functional neuroimaging studies -- Neural correlates of conscious and voluntary regulation of sexual arousal -- Neural correlates of conscious and voluntary regulation of sadness in adults…”
Libro electrónico -
5916Publicado 2024Tabla de Contenidos: “…Project - streaming transactions -- Project - Favorita store sales - time series forecasting -- Project - a retrieval augmented generation chatbot -- Project - multilabel image classification -- Summary -- Questions -- Answers -- Further reading -- Part 2: Heavily Use Case-Focused -- Chapter 4: Getting to Know Your Data -- Improving data integrity with DLT -- Monitoring data quality with Databricks Lakehouse Monitoring -- Mechanics of Lakehouse Monitoring -- Visualization and alerting -- Creating a monitor -- Exploring data with Databricks Assistant -- Generating data profiles with AutoML -- Using embeddings to understand unstructured data -- Enhancing data retrieval with Databricks Vector Search -- Flexibility in embedding model support -- Setting up a vector search -- Applying our learning -- Technical requirements -- Project - Favorita Store Sales - time-series forecasting -- Project - streaming transactions -- Project - RAG chatbot -- Project - multilabel image classification -- Summary -- Questions -- Answers -- Further reading -- Chapter 5: Feature Engineering on Databricks -- Databricks Feature Engineering in Unity Catalog -- Feature engineering on a stream -- Employing point-in-time lookups for time series feature tables -- Computing on-demand features -- Publishing features to the Databricks Online Store -- Applying our learning -- Technical requirements -- Project - Streaming Transactions -- Project - Favorita Store Sales - time series forecasting -- Summary -- Questions -- Answers -- Further reading -- Chapter 6: Searching for a Signal -- Technical requirements -- Baselining with AutoML -- Tracking experiments with MLflow -- Classifying beyond the basic -- Integrating innovation -- Applying our learning -- Parkinson's FOG -- Forecasting Favorita sales -- Summary -- Questions -- Answers -- Further reading…”
Libro electrónico -
5917Publicado 2024Tabla de Contenidos: “…Strengthening security through logging and monitoring -- Importance in cloud security -- Evolution of AWS services for logging and monitoring -- Integrated approach -- Key considerations for unified logging and monitoring -- Beyond basic auditing with CloudTrail -- Best practices for configuring CloudTrail trails -- Anomaly detection with CloudTrail Insights -- Advanced data analysis with CloudTrail Lake -- Advanced security monitoring with CloudWatch -- Enhancing application security monitoring with CloudWatch -- Building security dashboards in CloudWatch -- Integration with diverse log sources for comprehensive monitoring -- Developer best practices for security monitoring -- Practical use cases -- Empowering security logs integration and analytics -- Understanding Security Lake -- Leveraging Athena for log analytics -- Best practices for integrating Security Lake and Athena -- Summary -- Questions -- Answers -- Further reading -- Chapter 11: Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation -- Continuous compliance monitoring and assessment -- Overview of compliance with Config -- Setting up Config -- Monitoring compliance -- Managing multi-account compliance -- Best practices for Config -- Automated remediation -- Understanding automated remediation -- Designing automated remediation strategies -- Tools for automation -- Tips for effective automated remediation -- Case study - automated remediation scenario -- Centralized compliance management and integration -- Integrating Config with Security Hub -- Utilizing Security Hub for compliance benchmarking -- Managing security standards -- Creating custom insights -- Summary -- Questions -- Answers -- Further reading -- Chapter 12: DevSecOps - Integrating Security into CI/CD Pipelines -- DevSecOps in the modern software supply chain -- Understanding DevSecOps…”
Libro electrónico -
5918por Mishra, Brojo KishoreTabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Chapter 1 IoT-Based Health Monitoring Using a Hybrid Machine Learning Model -- 1.1 Introduction -- 1.2 Related Works -- 1.3 Research Gap -- 1.4 Proposed Model -- 1.4.1 Model Analysis with Result and Discussion -- 1.4.2 Dataset Description -- 1.4.3 Model Description -- 1.5 Conclusion -- References -- 2 Addressing Overcrowding: A Plight for Smart Cities -- 2.1 Introduction -- 2.1.1 Smart Industry 4.0 -- 2.1.2 IoT and IIoT -- 2.1.3 IoT - A Basis of Big Data -- 2.1.4 Smart Cities -- 2.2 Overcrowding -- 2.2.1 Causes -- 2.2.2 Consequences -- 2.2.3 Challenges -- 2.3 Existing Applications -- 2.3.1 Traffic Congestion -- 2.3.2 Tourism Control -- 2.3.3 Sustainable Usage of Resources -- 2.3.4 Housing and Infrastructure -- 2.3.5 Public Safety and Security -- 2.4 Modified PSO for Optimal Path in Crowded Areas -- 2.4.1 Step 1: Modeling the Environment and Obstacles -- 2.4.2 Step 2: Particle Swarm Initialization -- 2.4.3 Step 3: Evaluating the Fitness Function -- 2.4.4 Step 4: Particle Position and Velocity Update -- 2.5 Scope -- 2.6 Conclusion -- References -- Chapter 3 Smart Sensors for Environmental Monitoring in Industry 4.0 -- 3.1 Introduction to Smart Sensors for Environmental Monitoring in Industry 4.0 -- 3.1.1 Basic Concepts of Industry 4.0 and Environmental Monitoring -- 3.1.2 Overview of Smart Sensors and Their Applications in Industry 4.0 -- 3.1.3 Challenges in Smart Sensor Design and Implementation for Environmental Monitoring in Industry 4.0 -- 3.2 State-of-the-Art of Smart Sensors for Environmental Monitoring in Industry 4.0 and Real-World Applications -- 3.2.1 Types of Smart Sensors for Environmental Monitoring in Industry 4.0.…”
Publicado 2024
Libro electrónico -
5919Publicado 2017Tabla de Contenidos: “…FOREWORD -- SESSION I VOICE QUALITY ASSESSMENT -- ON THE DESIGN OF A VOICE PATHOLOGY ASSESSMENT SYSTEM BASED ON THE GRB SCALE -- EFFECT OF VELOPHARYNGEAL INSUFFICIENCY ON HUMAN VOICE QUALITY -- EFFECT OF VELOPHARYNGEAL INSUFFICIENCY ON HUMAN VOICE QUALITY -- PHONATION QUALITY DETECTION ON THE SAARBRUCKEN VOICE DATABASE USING HARMONIC SPECTRUM-BASED PARAMETERS -- ACOUSTIC TREMOR MEASUREMENT: COMPARING TWO SYSTEMS -- THE DATABASE OF NORMAL AND PATHOLOGICAL SINGERS' VOICES: AN APPROACH TO COLLECTING DATA -- SESSION II VOICE QUALITY MONITORING -- SESSION II VOICE QUALITY MONITORING -- SESSION II VOICE QUALITY MONITORING -- SESSION II VOICE QUALITY MONITORING -- SESSION III VOICE AND NEUROCOGNITION -- SESSION III VOICE AND NEUROCOGNITION --RELATIONSHIPS BETWEEN NEWBORNS' CRY MELODY SHAPES AND NATIVE LANGUAGE -- FACIAL EXPRESSION RECOGNITION WITH FUZZY EXPLAINABLE MODELS -- A CORRELATION STUDY BETWEEN SPEECH-RELATED FEATURES AND PERSONALITY TRAITS -- TRANSFER LEARNING ON IMAGINED SPEECH ELECTROENCEPHALOGRAM USING BAG OF FEATURES -- ROUND TABLE -- VOICE AND SPEECH PROCESSORS (VSP): READY FOR GLOBAL DEPLOYMENT IN MOBILE DEVICES? …”
Libro electrónico -
5920por Donaldson, Scott E., author, Siegel, Stanley. author, Williams, Chris K. author, Aslam, Abdul. authorTabla de Contenidos: “…Identity, Authentication, and Access Management: Threat Vectors Identity, Authentication, and Access Management: Capabilities; Data Protection and Cryptography; Data Protection and Cryptography: Goal and Objectives ; Data Protection and Cryptography: Threat Vectors ; Data Protection and Cryptography: Capabilities ; Monitoring, Vulnerability, and Patch Management; Monitoring, Vulnerability, and Patch Management: Goal and Objectives ; Monitoring, Vulnerability, and Patch Management: Threat Vectors; Monitoring, Vulnerability, and Patch Management: Capabilities…”
Publicado 2015
Libro electrónico