Mostrando 13,961 - 13,980 Resultados de 14,119 Para Buscar 'InterLiga~', tiempo de consulta: 2.09s Limitar resultados
  1. 13961
    Publicado 2020
    “…At the heart of Leadership Conversations is a tactical, practical guide to achieving this, setting out the four types of conversation every leader must master to achieve just that: Conversations to Build Relationships: how to master the emotional intelligence required to be an effective leader, embrace differences in order to engage followers and align them with the organization's goals, and foster genuine transparency and honesty to gain trust and respect. …”
    Grabación musical
  2. 13962
    Publicado 2022
    “…What you will learn Understand how to set realistic performance targets and address performance proactively Understand how architectural options and configuration affect performance Build efficient Power BI reports and data transformations Explore best practices for data modeling, DAX, and large datasets Understand the inner workings of Power BI Premium Explore options for extreme scale with Azure services Understand how to use tools that help identify and fix performance issues Who this book is for Data analysts, BI developers, and data professionals who have learnt the basics of Power BI and now want to understand how to build advanced analytics solutions will find this business intelligence book useful. Familiarity with the major components of Power BI and a beginner-level understanding of their purpose and use cases are required…”
    Libro electrónico
  3. 13963
    Publicado 2022
    “…Whether you're new to Azure Synapse or just getting started, you'll find the instructions you need to solve any problem you may face, including using Azure services for data visualization as well as for artificial intelligence (AI) and machine learning (ML) solutions. …”
    Libro electrónico
  4. 13964
    Publicado 2006
    “…Et pourtant convaincu que ce monde recèle en lui des trésors de passion et d'enthousiasme, d'intelligence et de beauté, susceptibles de le préserver du pire et de l'orienter vers le tout meilleur... …”
    Electrónico
  5. 13965
    Publicado 2020
    “…James - Future Development of Taiwan's Smart Cities from an Information Security Perspective - Towards a Smart and Sustainable City with the Involvement of Public Participation--The Case of Wroclaw Section C: Sustainable Smart City and Smart Village Research: Technical Issues - Detection and Localization of Water Leaks in Water Nets Supported by an ICT System with Artificial Intelligence Methods as a Way Forward for Smart Cities - A Study of the Public Landscape Order of Xinye Village - Spatio-Temporal Changes and Dependencies of Land Prices: A Case Study of the City of Olomouc - Geographical Assessment of Low-Carbon Transportation Modes: A Case Study from a Commuter University - Performance Analysis of a Polling-Based Access Control Combined with the Sleeping Schema in V2I VANETs for Smart Cities…”
    Libro electrónico
  6. 13966
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
    Video
  7. 13967
    por Gómez Seijo, Francisca, author
    Publicado 2023
    “…Es decir, la tragedia ática era ante todo una experiencia emocional, no una ocasión para la introspección psicológica o la reflexión filosófica Transcending the dialectic between appearance and reality, Euripides succeeded in giving human intelligibility to a new Helena, who never loved Paris nor fled with him. …”
    Libro electrónico
  8. 13968
    Publicado 2023
    “…Yuri has a master's degree in Cybersecurity Intelligence and Forensics Investigation at UTICA College and currently he is working on a PhD in Cybersecurity Leadership from Capitol Technology University. …”
    Video
  9. 13969
    Publicado 2023
    “…What You Will Learn Learn about Artificial Intelligence (AI) and machine learning Understand deep learning and neural networks Learn about lists, tuples, dictionaries, and functions in Python Learn Pandas, NumPy, and Matplotlib basics Explore the basic structure of artificial neurons and neural network Understand Stride, Padding, and Flattening concepts of CNNs Audience This course is designed for newcomers aiming to excel in deep learning and Generative Adversarial Networks (GANs) starting from the basics. …”
    Video
  10. 13970
    Publicado 2023
    “…It's a valuable resource for students pursuing careers in data science, business intelligence, or related fields. If you are eager to harness the power of Microsoft Excel for data manipulation and analysis, this course provides essential insights and techniques. …”
    Video
  11. 13971
    Publicado 2023
    “…Kickstart your emotion analysis journey with this step-by-step guide to data science success Key Features Discover the inner workings of the end-to-end emotional analysis workflow Explore the use of various ML models to derive meaningful insights from data Hone your craft by building and tweaking complex emotion analysis models with practical projects Purchase of the print or Kindle book includes a free PDF eBook Book Description Artificial intelligence and machine learning are the technologies of the future, and this is the perfect time to tap into their potential and add value to your business. …”
    Libro electrónico
  12. 13972
    Publicado 2024
    “…The concluding chapters provide valuable insights on optimizing your Java code when interacting with databases and show you how to leverage artificial intelligence (AI) for high performance Java applications. …”
    Libro electrónico
  13. 13973
    Publicado 2024
    “…By the end of this book, you'll have gained the skills necessary to run intelligence-driven incident response in a Windows environment, establishing a full-fledged incident response and management process, as well as proactive methodologies to enhance the cybersecurity posture of an enterprise environment. …”
    Libro electrónico
  14. 13974
    por Lorenz, David
    Publicado 2024
    “…You'll build essential skills for effective data manipulation, authentication, and file storage, as well as master Supabase's advanced capabilities including automating tasks with cron scheduling, performing similarity searches with artificial intelligence, testing your database, and leveraging real-time updates. …”
    Libro electrónico
  15. 13975
    Publicado 2020
    “…Aujourd'hui, le catholicisme a beau reculer dans les coeurs et les intelligences des Européens, il marque toujours leurs mentalités et leurs habitudes. …”
    Libro
  16. 13976
    “…El considerable retraso del titular, marqués del Carpio, en incorporarse a la misma permitirá que Nithard la ocupe de forma interina por casi siete años.Nombrado arzobispo de Edesa, y más tarde cardenal, murió en la ciudad eterna, en la que descansa a los pies del fundador de la Compañía, en la Iglesia del Gesú, como era su deseo --…”
    Libro
  17. 13977
    por Stiegler, Barbara, 1971-
    Publicado 2019
    “…Lippmann se heurte alors à John Dewey, grande figure du pragmatisme américain, qui, à partir d'un même constat, appelle à mobiliser l'intelligence collective des publics, à multiplier les initiatives démocratiques, à inventer par le bas l'avenir collectif. …”
    Libro
  18. 13978
    “…Esta obra es útil, igualmente, para los padres, las personas adultas y las instituciones educativas ya que en sus temas se describen, de manera sencilla e inteligible, las conductas de las personas, los procesos de aprendizaje y los métodos de intervención para optimizar ambos; también se explican las posibles desviaciones de la normalidad de dichas conductas y las formas más actuales de abordar la intervención psicoeducativa sobre las mismas…”
    Libro
  19. 13979
    Publicado 2012
    “…Podemos considerar las series de televisión como lúcidos retratos en los que la contemporaneidad se ve reflejada en una doble dirección: en ellas se representan no solo determinadas intrigas o acontecimientos de la realidad, sino que también se proyectan tendencias sociales de futuro. …”
    Libro
  20. 13980
    Publicado 2014
    Tabla de Contenidos: “…15.3 Development of Military Communication Satellite Systems 719 -- 15.3.1 American Systems 720 -- 15.3.2 Russian Systems 724 -- 15.3.3 Satellites Launched by other Countries 725 -- 15.4 Frequency Spectrum Utilized by Military Communication Satellite Systems 726 -- 15.5 Dual-use Military Communication Satellite Systems 727 -- 15.6 Reconnaisance Satellites 728 -- 15.6.1 Image Intelligence or IMINT Satellites 728 -- 15.7 SIGINT Satellites 732 -- 15.7.1 Development of SIGINT Satellites 733 -- 15.8 Early Warning Satellites 735 -- 15.8.1 Major Early Warning Satellite Programmes 736 -- 15.9 Nuclear Explosion Satellites 738 -- 15.10 Military Weather Forecasting Satellites 738 -- 15.11 Military Navigation Satellites 739 -- 15.12 Space Weapons 739 -- 15.12.1 Classification of Space Weapons 740 -- 15.13 Strategic Defence Initiative 745 -- 15.13.1 Ground Based Programmes 746 -- 15.13.2 Directed Energy Weapon Programmes 749 -- 15.13.3 Space Programmes 751 -- 15.13.4 Sensor Programmes 752 -- 15.14 Directed Energy Laser Weapons 752 -- 15.14.1 Advantages 753 -- 15.14.2 Limitations 753 -- 15.14.3 Directed Energy Laser Weapon Components 754 -- 15.14.4 Important Design Parametres 755 -- 15.14.5 Important Laser Sources 756 -- 15.14.6 Beam Control Technology 763 -- 15.15 Advanced Concepts 764 -- 15.15.1 New Surveillance Concepts Using Satellites 765 -- 15.15.2 Long Reach Non-lethal Laser Dazzler 765 -- 15.15.3 Long Reach Laser Target Designator 766 -- Further Readings 767 -- Glossary 767 -- 16 Emerging Trends 769 -- 16.1 Introduction 769 -- 16.2 Space Tethers 769 -- 16.2.1 Space Tethers -- Different Types 770 -- 16.2.2 Applications 774 -- 16.2.3 Space Tether Missions 775 -- 16.2.4 Space Elevator 779 -- 16.3 Aerostat Systems 781 -- 16.3.1 Components of an Aerostat System 782 -- 16.3.2 Types of Aerostat Systems 782 -- 16.3.3 Applications 783 -- 16.4 Millimetre Wave Satellite Communication 784 -- 16.4.1 Millimetre Wave Band 784 -- 16.4.2 Advantages 785 -- 16.4.3 Propagation Considerations 787.…”
    Libro electrónico