Mostrando 5,941 - 5,960 Resultados de 9,986 Para Buscar 'Huntik~', tiempo de consulta: 1.29s Limitar resultados
  1. 5941
    por Moore, Bill
    Publicado 2005
    Tabla de Contenidos: “…Integration concepts and solutions -- 2.1 Overview -- 2.2 Integration architectures -- 2.2.1 Integration topologies -- 2.2.2 Integration patterns -- 2.3 Runtime mapping -- 2.4 Reviewing your design -- 2.4.1 Encapsulation -- 2.4.2 Isolation -- 2.4.3 Abstraction -- 2.4.4 Reuse -- 2.4.5 Agility -- 2.4.6 Maintainability -- 2.4.7 Design by contract -- 2.4.8 Unique and explicit expression -- 2.4.9 Functionality as a service -- 2.4.10 Minimum diversity -- Chapter 3. …”
    Libro electrónico
  2. 5942
    Publicado 2018
    Tabla de Contenidos: “…-- Monitoring system event triggers -- Hotkey trigger -- Mouse trigger -- System trigger -- Monitoring image and element triggers -- An example of monitoring email -- Example of monitoring a copying event and blocking it -- Launching an assistant bot on a keyboard event -- Summary -- Exception Handling, Debugging, and Logging -- Exception handling -- Common exceptions and ways to handle them -- Unavailability of UI element -- Handling runtime exceptions -- Orbit reference not set to the instant of an object -- Index was outside the bounds of an array. …”
    Libro electrónico
  3. 5943
    Publicado 2018
    Tabla de Contenidos: “…Controlling memory size -- Heterogeneous lists -- From lists to multidimensional arrays -- Resizing arrays -- Arrays derived from NumPy functions -- Getting an array directly from a file -- Extracting data from pandas -- NumPy fast operation and computations -- Matrix operations -- Slicing and indexing with NumPy arrays -- Stacking NumPy arrays -- Working with sparse arrays -- Summary -- Chapter 3: The Data Pipeline -- Introducing EDA -- Building new features -- Dimensionality reduction -- The covariance matrix -- Principal component analysis -- PCA for big data - RandomizedPCA -- Latent factor analysis -- Linear discriminant analysis -- Latent semantical analysis -- Independent component analysis -- Kernel PCA -- T-SNE -- Restricted Boltzmann Machine -- The detection and treatment of outliers -- Univariate outlier detection -- EllipticEnvelope -- OneClassSVM -- Validation metrics -- Multilabel classification -- Binary classification -- Regression -- Testing and validating -- Cross-validation -- Using cross-validation iterators -- Sampling and bootstrapping -- Hyperparameter optimization -- Building custom scoring functions -- Reducing the grid search runtime -- Feature selection -- Selection based on feature variance -- Univariate selection -- Recursive elimination -- Stability and L1-based selection -- Wrapping everything in a pipeline -- Combining features together and chaining transformations -- Building custom transformation functions -- Summary -- Chapter 4: Machine Learning -- Preparing tools and datasets -- Linear and logistic regression -- Naive Bayes -- K-Nearest Neighbors -- Nonlinear algorithms -- SVM for classification -- SVM for regression -- Tuning SVM -- Ensemble strategies -- Pasting by random samples -- Bagging with weak classifiers -- Random Subspaces and Random Patches -- Random Forests and Extra-Trees…”
    Libro electrónico
  4. 5944
    por Montagnino, Marian, author
    Publicado 2023
    Tabla de Contenidos: “…Intelligent suggestions -- Automatically generated help and man pages -- Powering your CLI -- Viper - easy configuration for CLIs -- Configuration types -- Watching for live config changes -- Basic calculator CLI using Cobra and Viper -- The Cobra CLI commands -- The Viper configuration -- Running the basic calculator -- Summary -- Questions -- Answers -- Further reading -- Part 2: The Ins and Outs of a CLI -- Chapter 5: Defining the Command-Line Process -- Technical requirements -- Receiving the input and user interaction -- Defining subcommands, arguments, and flags -- Piping -- Signals and control characters -- User interaction -- Processing data -- Returning the resulting output and defining best practices -- Summary -- Questions -- Answers -- Further reading -- Chapter 6: Calling External Processes and Handling Errors and Timeouts -- Technical requirements -- Calling external processes -- The os/exec package -- Creating commands using the Cmd struct -- Running the command -- Interacting with REST APIs -- Get request -- Pagination -- Rate limiting -- Handling the expected - timeouts and errors -- Timeouts with external command processes -- Errors or panics with external command processes -- Timeouts and other errors with HTTP requests -- Summary -- Questions -- Answers -- Further reading -- Chapter 7: Developing for Different Platforms -- Technical requirements -- Packages for platform-independent functionality -- The os package -- The time package -- The path package -- The runtime package -- Implementing independent or platform-specific code -- Platform-independent code -- Platform-specific code -- Build tags for targeted platforms -- The build package -- Build tags -- OS-level differences -- Summary -- Questions -- Answers -- Further reading -- Part 3: Interactivity and Empathic Driven Design…”
    Libro electrónico
  5. 5945
    Publicado 2024
    Tabla de Contenidos: “…Chapter 11: Shield Right for APIs with Runtime Protection -- Technical requirements -- Securing and hardening environments -- Container images -- Operating systems -- Using WAFs -- Understanding the Next-Generation Firewall (NGWAF) and Web Application API Protection (WAAP) products -- Using API gateways and API management -- Implementing security patterns in the Kong API gateway -- Best practices for API gateway protection -- Deploying API firewalls -- API monitoring and alerting -- Selecting the correct protections for your APIs -- Summary -- Further reading -- Chapter 12: Securing Microservices -- Technical requirements -- Understanding microservices -- Securing the foundations of microservices -- Securing the connectivity of microservices -- Access control for microservices -- Running secure microservices in practice -- Summary -- Further reading -- Chapter 13: Implementing an API Security Strategy -- Ownership of API security -- Understanding your stakeholders -- Roles and responsibilities -- The 42Crunch maturity model -- Inventory -- Design -- Development -- Testing -- Protection -- Governance -- Planning your program -- Establishing your objectives -- Assessing your current state -- Building a landing zone for APIs -- Running your program -- Building your teams -- Tracking your progress -- Integrating with your existing AppSec program -- Your personal API security journey -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  6. 5946
    Publicado 2017
    Tabla de Contenidos: “…Identity Repositories and Directory Services -- Single Sign-On (SSO) -- Federated Identity Management -- Federation Standards -- Multifactor Authentication -- Supplemental Security Devices -- Cloud Application Architecture -- Application Programming Interfaces -- Tenancy Separation -- Cryptography -- Sandboxing -- Application Virtualization -- Cloud Application Assurance and Validation -- Threat Modeling -- Quality of Service -- Software Security Testing -- Approved APIs -- Software Supply Chain (API) Management -- Securing Open Source Software -- Runtime Application Self-Protection (RASP) -- Secure Code Reviews -- OWASP Top 9 Coding Flaws -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 8 Operations Elements -- Physical/Logical Operations -- Facilities and Redundancy -- Virtualization Operations -- Storage Operations -- Physical and Logical Isolation -- Security Training and Awareness -- Training Program Categories -- Additional Training Insights -- Basic Operational Application Security -- Threat Modeling -- Application Testing Methods -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 9 Operations Management -- Monitoring, Capacity, and Maintenance -- Monitoring -- Maintenance -- Change and Configuration Management (CM) -- Baselines -- Deviations and Exceptions -- Roles and Process -- Business Continuity and Disaster Recovery (BC/DR) -- Primary Focus -- Continuity of Operations -- The BC/DR Plan -- The BC/DR Kit -- Relocation -- Power -- Testing -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 10 Legal and Compliance Part 1 -- Legal Requirements and Unique Risks in the Cloud Environment -- Legal Concepts -- U.S. …”
    Libro electrónico
  7. 5947
    por Darmawan, Budi
    Publicado 2005
    Tabla de Contenidos: “…\Managing production environment -- 4.1 Production environment definition -- 4.2 An operator's typical day -- 4.3 Reports -- 4.3.1 Report types -- 4.3.2 Performing capacity planning -- 4.3.3 Report usage -- 4.4 Performance tuning -- 4.4.1 Development perspective -- 4.4.2 Administration perspective -- 4.4.3 Runtime perspective -- 4.5 Notification -- 4.6 Working with composite applications -- 4.6.1 CICS composite application -- 4.6.2 IMS composite application -- Chapter 5. …”
    Libro electrónico
  8. 5948
    Publicado 2017
    Tabla de Contenidos: “…-- The cloud native runtimes -- Cloud native architecture -- Are microservices a new concept? …”
    Libro electrónico
  9. 5949
    Publicado 2017
    Tabla de Contenidos: “…nRF UART (Android and iOS) -- nRF Logger (Android) -- nRF Beacon for Eddystone (Android and iOS) -- nRF BLE Joiner (Android) -- Google Beacon tools (Android) -- Physical web (Android) -- Summary -- Chapter 3: Building a BLE Central and Peripheral Communication System -- Bluetooth Low Energy central and peripheral -- Examples of Bluetooth central peripheral communication -- Smartphone - smartwatch communication -- Smartphone - smart LED strip communication -- Android Bluetooth Low Energy -- An introduction to Android -- Bluetooth Low Energy in API level 24 -- Bluetooth Low Energy permissions -- Bluetooth Low Energy interfaces -- BluetoothAdapter.LeScanCallback -- BluetoothProfile.ServiceListener -- Bluetooth Low Energy classes -- BluetoothAdapter -- BluetoothGatt -- BluetoothGattCallback -- BluetoothGattService -- BluetoothGattCharacteristic -- Building an Android app to list Bluetooth devices in the proximity -- Conventions -- Permissions in AndroidManifest.xml -- Runtime permissions -- Bluetooth scanning process -- Custom list adapter and ListView -- Android app - heart rate monitor application -- Deploying the GATT server using Nordic Connect -- Writing central-side Android apps -- Writing data on the characteristic -- Bluetooth Over-The-Air device firmware update -- Adding Android DFU library using Gradle -- DFUService -- FirmwareUpdateActivity -- Summary -- Chapter 4: Bluetooth Low Energy Beacons -- Introduction to Bluetooth Low Energy Beacons -- Applications of Bluetooth Low Energy Beacons -- Beginner applications -- Advanced applications -- Beacon protocols -- Google Eddystone -- Eddystone-UID -- Eddystone-EID -- Eddystone-URL -- Apple iBeacon -- Estimote beacons -- Estimote SDK for Android -- Getting started -- Background monitoring and ranging -- Estimote SDK for iOS -- Physical web using Estimote -- Estimote cloud interface -- Summary…”
    Libro electrónico
  10. 5950
    por Vergin, Wiebke, 1980-
    Publicado 2013
    Tabla de Contenidos: “…Die Exkurse uber Sarazenen (Amm. 14.4), Hunnen und Alanen (Amm. 31.2) -- 4.1. Antike Vorstellungen von vagantes -- 4.2. Der Exkurs uber die Sarazenen (Amm.14.4) -- 4.3. …”
    Libro electrónico
  11. 5951
    Publicado 2022
    Tabla de Contenidos: “…-- 8.4 How the JVM supports alternative languages -- 8.4.1 Performance -- 8.4.2 Runtime environments for non-Java languages -- 8.4.3 Compiler fictions -- Summary -- 9 Kotlin -- 9.1 Why use Kotlin? …”
    Libro electrónico
  12. 5952
    por Rodriguez, Juan R.
    Publicado 2005
    Tabla de Contenidos: “…-- 1.2.2 Enablement for portals -- 1.2.3 The WebSphere Portal framework -- 1.2.4 WebSphere Portal architecture -- 1.2.5 WebSphere Portal tooling -- 1.3 WebSphere Portal -- 1.3.1 Portal concepts -- 1.3.2 Portlets -- 1.3.3 The model-view-controller (MVC) design pattern -- 1.3.4 Standard MVC architecture -- 1.3.5 Portlet MVC architecture -- 1.3.6 Portlet MVC sample -- 1.3.7 WebSphere Portal runtime: the portlet container -- 1.3.8 Page aggregation -- 1.4 Highlights in WebSphere Portal V5.1 -- 1.4.1 Portal install -- 1.4.2 General infrastructure -- 1.4.3 Event broker -- 1.4.4 Member subsystem -- 1.4.5 Authentication -- 1.4.6 Authorization -- 1.4.7 URL generation, processing and mappings -- 1.4.8 Search -- 1.4.9 Content management -- 1.4.10 Transcoding -- 1.4.11 Struts Portlet Framework -- 1.4.12 JSF Portlet Runtime -- 1.4.13 User interface -- 1.4.14 Cooperative portlets (Click-To-Action) -- 1.4.15 Portal Toolkit -- 1.5 Portlet solution patterns -- 1.6 Building a war file -- Chapter 2. …”
    Libro electrónico
  13. 5953
    por Hunziker, Peter
    Publicado 1972
    Libro
  14. 5954
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Foreword -- Contributors -- Table of Contents -- Preface -- Chapter 1: Quick Look Back at Data Services for Simple Apps -- Model-View-Controller - the pattern we all know -- Cohesion and coupling - establishing a common language -- Explaining the components of MVC -- The model -- The view -- The controller -- Interactions - the behavior between the components -- MVC summary -- An MVC flow in Angular -- The model -- The component - a controller and a building block -- First responder to a route -- Used as a building block -- Components from an architectural standpoint -- NgModule - our new facade (and some other bits) -- Using ES2015 modules -- Consuming a module -- An Angular example -- Multiple exports -- The default import/export -- Renaming imports -- The service -- Service without dependencies -- Service with dependencies -- Dependency Injection -- Dependency Injection in Angular using providers -- Overriding an existing construct -- Overriding at runtime -- Overriding constants -- Resolving your dependencies with @Injectable -- Fetching and persisting data with HTTP - introducing services with Observables -- Fetching data with the HTTP service -- Summary -- Chapter 2: 1.21 Gigawatt - Flux Pattern Explained -- Core concepts overview -- A uniform data flow -- Action - capture the intent -- Dispatcher - the spider in the web -- Listening to the dispatcher -- The store - managing state, data retrieval, and callbacks -- The view -- Demoing a uniform data flow -- Creating a selection view -- Adding the dispatcher -- Adding the store -- Adding a selected view -- Running the demo -- Adding more actions to our flow -- Cleaning up the view -- Cleaning up the store -- Adding EventEmitter -- Adding to and cleaning up the register method -- Further improvements -- Adding immutability…”
    Libro electrónico
  15. 5955
    Publicado 2021
    Tabla de Contenidos: “…Fixed Window Aggregation over an Event Time -- Sliding Window Aggregation over Event Time -- Aggregation State -- Watermarking: Limit State and Handle Late Data -- Arbitrary Stateful Processing -- Arbitrary Stateful Processing with Structured Streaming -- Handling State Timeouts -- Arbitrary State Processing in Action -- Extracting Patterns with mapGroupsWithState -- User Sessionization with flatMapGroupsWithState -- Handling Duplicate Data -- Fault Tolerance -- Streaming Application Code Change -- Spark Runtime Change -- Streaming Query Metrics and Monitoring -- Streaming Query Metrics -- Monitoring Streaming Queries via Callback -- Monitoring Streaming Queries via Visualization UI -- Streaming Query Summary Information -- Streaming Query Detailed Statistics Information -- Troubleshooting Streaming Query -- Summary -- Chapter 8: Machine Learning with Spark -- Machine Learning Overview -- Machine Learning Terminologies -- Machine Learning Types -- Supervised Learning -- Unsupervised Learning -- Reinforcement Learning -- Machine Learning Development Process -- Spark Machine Learning Library -- Machine Learning Pipelines -- Transformers -- Estimators -- Pipeline -- Pipeline Persistence: Saving and Loading -- Model Tuning -- Speeding Up Model Tuning -- Model Evaluators -- Machine Learning Tasks in Action -- Classification -- Model Hyperparameters -- Example -- Regression -- Model Hyperparameters -- Example -- Recommendation -- Model Hyperparameters -- Example -- Deep Learning Pipeline -- Summary -- Chapter 9: Managing the Machine Learning Life Cycle -- The Rise of MLOps -- MLOps Overview -- MLflow Overview -- MLflow Components -- MLflow in Action -- MLflow Tracking -- MLflow Projects -- MLflow Models -- MLflow Model Registry -- Model Deployment and Prediction -- Summary -- Index…”
    Libro electrónico
  16. 5956
    Tabla de Contenidos: “…Retrieving and Displaying Twitter Accounts -- Configuring the Feed View -- Configuring the Tweet View -- Configuring the Compose View -- Discovering the Collection View -- Embedding a Tab Bar Controller -- Persisting User Preferences with NSUserDefaults -- Adding a Collection View Controller -- Configuring a Collection View -- Displaying Items in a Collection View -- Summary -- Chapter 9: Frameworks, Libraries, and Targ ets -- Understanding Frameworks -- Creating the Project -- Adding a Framework -- Manipulating a Map View -- Subclassing MKPointAnnotation -- Static Libraries -- Creating a Static Library -- Adding an Aggregate Target -- Adding a Static Library to a Project -- Working with Multiple Targets -- Discovering Modules -- Enabling Modules for Older Projects -- Summary -- Chapter 10: Advanced Editing -- Getting Started -- Efficient Editing -- Changing Color Schemes -- Creating a New Theme -- Sharing or Importing a Theme -- Organizing and Navigating Code -- Creating Code Reminders -- Using the Jump Bar -- Organizing Code with Pragma Marks -- Building the Scene -- Folding Code -- The Code Snippet Library -- Using Code Snippets -- Creating Code Snippets -- Summary -- Chapter 11: Debugging and Analysis -- Building the Application -- Using Breakpoints to Resolve Logical Errors -- Setting a Breakpoint -- The Debug Navigator -- The Debug Area -- The Breakpoint Navigator -- Conditional Breakpoints -- Runtime Errors -- Using Exception Breakpoints -- Compile-Time Errors -- The Issue Navigator -- Tools to Help with Debugging -- Debugging Location -- Print Debugging with the Printer Simulator -- Summary -- Part 3: Final Preparations and Releasing -- Chapter 12: Version Control with Git -- Why Use Version Control? …”
    Libro electrónico
  17. 5957
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with Python Machine Learning -- Machine learning and Python - a dream team -- What the book will teach you - and what it will not -- How to best read this book -- What to do when you are stuck -- Getting started -- Introduction to NumPy, SciPy, Matplotlib, and TensorFlow -- Installing Python -- Chewing data efficiently with NumPy and intelligently with SciPy -- Learning NumPy -- Indexing -- Handling nonexistent values -- Comparing the runtime -- Learning SciPy -- Fundamentals of machine learning -- Asking a question -- Getting answers -- Our first (tiny) application of machine learning -- Reading in the data -- Preprocessing and cleaning the data -- Choosing the right model and learning algorithm -- Before we build our first model -- Starting with a simple straight line -- Toward more complex models -- Stepping back to go forward - another look at our data -- Training and testing -- Answering our initial question -- Summary -- Chapter 2: Classifying with Real-World Examples -- The Iris dataset -- Visualization is a good first step -- Classifying with scikit-learn -- Building our first classification model -- Evaluation - holding out data and cross-validation -- How to measure and compare classifiers -- A more complex dataset and the nearest-neighbor classifier -- Learning about the seeds dataset -- Features and feature engineering -- Nearest neighbor classification -- Looking at the decision boundaries -- Which classifier to use -- Summary -- Chapter 3: Regression -- Predicting house prices with regression -- Multidimensional regression -- Cross-validation for regression -- Penalized or regularized regression -- L1 and L2 penalties -- Using Lasso or ElasticNet in scikit-learn -- Visualizing the Lasso path…”
    Libro electrónico
  18. 5958
    Publicado 2021
    Tabla de Contenidos: “…Here There Be Dragons: Reflect, Unsafe, and Cgo -- Reflection Lets Us Work with Types at Runtime -- Types, Kinds, and Values -- Making New Values -- Use Reflection to Check If an Interface's Value Is nil -- Use Reflection to Write a Data Marshaler -- Build Functions with Reflection to Automate Repetitive Tasks -- You Can Build Structs with Reflection, but Don't -- Reflection Can't Make Methods -- Only Use Reflection If It's Worthwhile -- unsafe Is Unsafe -- Use unsafe to Convert External Binary Data -- unsafe Strings and Slices -- unsafe Tools -- Cgo Is for Integration, Not Performance -- Wrapping Up -- Chapter 15. …”
    Libro electrónico
  19. 5959
    Publicado 2004
    Tabla de Contenidos: “…Customization, deployment, and configuration -- 4.1 Security setup -- 4.1.1 WebSphere BI for FN Base users -- 4.1.2 WebSphere BI for FN Extension for SWIFTNet users -- 4.1.3 WebSphere BI for FN groups -- 4.2 SMP/E installation and post installation -- 4.2.1 WebSphere BI for FN SMP/E installation -- 4.2.2 Define permissions to the WebSphere BI for FN filesystems -- 4.2.3 Create user profiles for customization -- 4.2.4 Create the customization JCL library -- 4.2.5 Review and update REXX edit macros -- 4.3 Set up customization database -- 4.3.1 Define DB2 resources -- 4.3.2 Prepare the customization database -- 4.3.3 Create the customization database -- 4.4 Customization definition -- 4.4.1 Set up the customization environment -- 4.4.2 Execute initial WebSphere BI for FN Base customization -- 4.4.3 Create the organizational units -- 4.4.4 Execute initial setup for Extension for SWIFTNet -- 4.4.5 Make Extension for SWIFTNet services available to BANKDOS -- 4.4.6 Transfer resources to the runtime system -- 4.5 Customization deployment -- 4.5.1 WebSphere MQ resources deployment -- 4.5.2 WebSphere MQ Integrator resources deployment -- 4.5.3 DB2 resources deployment -- 4.5.4 Security resources deployment -- 4.6 Verification: WebSphere BI for FN Base -- 4.7 Create configuration entities and roles -- 4.8 Merva Bridge customization -- 4.9 SAG Add-On installation -- 4.10 WebSphere BI for FN configuration -- 4.10.1 Preparation for the Extension for SWIFTNet configuration -- 4.10.2 Configuration of the SAG…”
    Libro electrónico
  20. 5960
    por Holland, Margaret B.
    Publicado 2022
    Tabla de Contenidos: “…-- Formalization for Conservation and Climate Mitigation -- Seeking Formal Recognition as a Form of Resistance to Land and Resource Development -- Formalization as Legal Recognition of the Rights of Nature -- Aligning Top-Down and Bottom-Up for Strengthening Tenure Security -- References -- 12: Securing Communal Tenure Complemented by Collaborative Platforms for Improved Participatory Landscape Management and Sustainable Development: Lessons from Northern Tanzania and the Maasai Mara in Kenya -- The Relationships between Tenure, Sustainable Development, and Conservation -- The Mara-Serengeti-Tarangire Ecosystem Chain: Two Case Studies across One Border -- The Last Vestige of the Hadzabe: Tanzania's Last Hunter-Gatherers -- Conversion to Agriculture and Land Grabs: The Loss of Hadzabe Lands and Resources -- Certificate of Customary Right of Occupancy: Retrofitting Communality to the Village Acts -- Fragmenting the Manyatta: How Privatization and the Subdivision of Lands Blocked Collective Action on the Mara -- Collaborative Civil Society: Maasai Mara Wildlife Conservancies Association Busting down a Siloed Landscape and Breaking Tragedy of the Commons Mythology -- Conclusions and Recommendations: Communal Tenure, Collaborative Platforms, Conservation Incentives, and Explicit Management Agreements -- References -- 13: Beyond the Traditional: Voluntary Market-Based Initiatives to Promote Land Tenure Security -- The Causes of Forest Land Tenure Insecurities in Developing Countries -- FSC Certification as a Way to Address Forest Land Tenure Insecurity and Promote Forest Conservation…”
    Libro electrónico