Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 105
- Development 88
- Leadership 79
- Engineering & Applied Sciences 78
- Application software 72
- Business & Economics 58
- Computer Science 57
- Design 52
- Web site development 52
- Web sites 45
- Success in business 44
- Programming 36
- JavaScript (Computer program language) 34
- Photography 33
- Digital techniques 32
- Computer networks 31
- Computer software 31
- Information technology 29
- Historia 28
- Technological innovations 28
- Computer programming 27
- Psychological aspects 27
- Security measures 27
- Strategic planning 27
- Computer security 26
- Operating systems (Computers) 26
- Finance 25
- Internet marketing 25
- Marketing 25
- Success 25
-
1021por Johnson, Larry, 1947-“…Honesty isn't just the best policy- it's also best practice…”
Publicado 2003
Libro electrónico -
1022Publicado 2017Tabla de Contenidos: “…Transformation into cyber warfare -- 2.9. Why Isnt Our Security Approach Working? -- 2.9.1. Asymmetrical -- 2.9.2. …”
Libro electrónico -
1023Publicado 2021Tabla de Contenidos: “…Intro -- inside front cover -- Machine Learning Bookcamp -- Copyright -- brief contents -- contents -- front matter -- foreword -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: a roadmap -- About the code -- liveBook discussion forum -- Other online resources -- about the author -- about the cover illustration -- 1 Introduction to machine learning -- 1.1 Machine learning -- 1.1.1 Machine learning vs. rule-based systems -- 1.1.2 When machine learning isn't helpful -- 1.1.3 Supervised machine learning -- 1.2 Machine learning process -- 1.2.1 Business understanding -- 1.2.2 Data understanding -- 1.2.3 Data preparation -- 1.2.4 Modeling -- 1.2.5 Evaluation -- 1.2.6 Deployment -- 1.2.7 Iterate -- 1.3 Modeling and model validation -- Summary -- 2 Machine learning for regression -- 2.1 Car-price prediction project -- 2.1.1 Downloading the dataset -- 2.2 Exploratory data analysis -- 2.2.1 Exploratory data analysis toolbox -- 2.2.2 Reading and preparing data -- 2.2.3 Target variable analysis -- 2.2.4 Checking for missing values -- 2.2.5 Validation framework -- 2.3 Machine learning for regression -- 2.3.1 Linear regression -- 2.3.2 Training linear regression model -- 2.4 Predicting the price -- 2.4.1 Baseline solution -- 2.4.2 RMSE: Evaluating model quality -- 2.4.3 Validating the model -- 2.4.4 Simple feature engineering -- 2.4.5 Handling categorical variables -- 2.4.6 Regularization -- 2.4.7 Using the model -- 2.5 Next steps -- 2.5.1 Exercises -- 2.5.2 Other projects -- Summary -- Answers to exercises -- 3 Machine learning for classification -- 3.1 Churn prediction project -- 3.1.1 Telco churn dataset -- 3.1.2 Initial data preparation -- 3.1.3 Exploratory data analysis -- 3.1.4 Feature importance -- 3.2 Feature engineering -- 3.2.1 One-hot encoding for categorical variables…”
Libro electrónico -
1024Publicado 2024Tabla de Contenidos: “…Secure server configuration -- Logging and monitoring -- Summary -- Chapter 9: Python-Based Threat Detection and Incident Response -- Building effective threat detection mechanisms -- Signature-based detection -- Anomaly detection -- Behavioral analysis -- Threat intelligence integration -- Real-time log analysis and anomaly detection with Python -- Preprocessing -- Real-time analysis with the ELK stack -- Anomaly detection techniques -- Visualizing anomalies -- Automating incident response with Python Scripts -- Leveraging Python for threat hunting and analysis -- Data collection and aggregation -- Data analysis techniques -- Automating threat hunting tasks -- Orchestrating comprehensive incident response using Python -- Designing an incident response workflow -- Integrating detection and response systems -- Logging and reporting -- Generating incident reports -- Summary -- Index -- Other Books You May Enjoy -- OLE_LINK12 -- _Int_bkaDCfSC -- OLE_LINK13 -- OLE_LINK3 -- _Hlk146361481 -- _Int_TcZpD8On -- _Int_F5jmih3p -- _Int_QRiFO5rm -- _Int_EeLSKsJo -- OLE_LINK15 -- _Int_CMmsNieF -- OLE_LINK5 -- OLE_LINK19 -- _Int_De8SG51G -- _Int_zyPgFiYb -- _Int_ErvWzO6T -- OLE_LINK6 -- _Int_i2MxAwh1 -- _Int_tmeiWyXB -- OLE_LINK1 -- OLE_LINK7 -- OLE_LINK8 -- _Int_NkemBQkB -- OLE_LINK9 -- _Int_SUhNg4cX -- _Int_ihCOgYLS -- _Int_EIMHEe17 -- OLE_LINK10 -- OLE_LINK11 -- _Int_CLZZ4qbT -- _Int_KAbAoGkA -- OLE_LINK4 -- _Int_CfykNbIp -- _Int_l6kKGEco -- _Int_cwdZsoDx -- _Int_RURzu0cR -- _Int_DDjf41hP -- _Int_GUdYD5p0 -- _Int_HNQAi43i -- _Int_8z14TaFM -- _Int_7rws3Prb -- _Int_U2ROHeyI -- _Int_v2Bnx9Zu -- _Int_Y6AUOImv -- _Int_zZCVk2LQ -- _Int_jjfdujnv -- _Int_Oy3EXG5v -- _Int_iosPgCJs -- _Int_TFTthTz9 -- _Int_yv8z2zkM -- _Int_TtWJJ0jo -- _Int_IyHm77B2 -- _Int_tX888CIx -- _Int_hosKM9dB -- _Int_PP9v1NaY -- _Int_p1IDq81l -- _Int_1h0GA0oa -- _Int_4jzLrzWm -- _Int_zuD23Gdr…”
Libro electrónico -
1025Publicado 2021Tabla de Contenidos: “…-- 4.2.2 Examples of supporting technical capabilities -- 4.2.3 Identifying technical capabilities -- 4.3 The tertiary driver for scoping microservices: Supporting efficiency of work -- 4.4 What to do when the correct scope isn't clear -- 4.4.1 Starting a bit bigger -- 4.4.2 Carving out new microservices from existing microservices -- 4.4.3 Planning to carve out new microservices later -- 4.5 Well-scoped microservices adhere to the microservice characteristics -- 4.5.1 Primary scoping to business capabilities leads to good microservices -- 4.5.2 Secondary scoping to support technical capabilities leads to good microservices -- 4.5.3 Tertiary scoping to support efficiency of work -- Summary -- 5 Microservice collaboration -- 5.1 Types of collaboration: Commands, queries, and events -- 5.1.1 Commands and queries: Synchronous collaboration -- 5.1.2 Events: Asynchronous collaboration -- 5.1.3 Data formats -- 5.2 Implementing collaboration -- 5.2.1 Setting up a project for the loyalty program -- 5.2.2 Implementing commands and queries…”
Libro electrónico -
1026por Srinivasan, A.Tabla de Contenidos: “…-- 1.5.1 What Cloud Computing Really Isn't? -- Summary -- Key Terms -- Review Questions -- Chapter 2: Move to Cloud Computing -- 2.1 Pros and Cons of Cloud Computing -- 2.1.1 Advantages of Cloud Computing in IT Field -- 2.1.2 The Fixed Cost Advantage -- 2.1.3 Keeping Data Safe -- 2.1.4 The Possible Disadvantages of Cloud Computing -- 2.1.5 Advantages of Cloud Computing -- 2.1.6 Disadvantages of Cloud Computing -- 2.2 Nature of the Cloud -- 2.2.1 Leveraging the Internet to Change the World -- 2.3 Technologies in Cloud Computing -- 2.3.1 Other Cloud-related Technologies -- 2.3.2 Working of Cloud -- 2.3.3 Key Characteristic of Cloud and its Role -- 2.4 Migrating into the Cloud -- 2.4.1 Cloud Computing Migration Issues: What You Need to Know? …”
Publicado 2014
Libro electrónico -
1027Publicado 2012“…He believes that Professor Yu's seemingly innocuous written notes on his essays are coded threats. …”
Vídeo online -
1028Publicado 2012“…He believes that Professor Yu's seemingly innocuous written notes on his essays are coded threats. …”
Vídeo online -
1029Publicado 2013“…w odpowiednie miejsce. Niezwykle istotne jest wi?c ich zrozumienie i wykorzystanie w praktyce. …”
Libro electrónico -
1030Publicado 2016“…Powstaje produkt o wysokiej jakości. Co istotne, realizacja zadań w sprintach przebiega szybciej i jest bardziej wydajna. …”
Libro electrónico -
1031Publicado 2017“…Dowiesz się, jak słuchać ze zrozumieniem oraz jak mówić, aby przekazać istotne kwestie i zyskać akceptację dla swoich rozwiązań. …”
Libro electrónico -
1032Publicado 2012“…Jeżeli użytkownicy sieci śmiało poczynają sobie na stronach WWW, oglądają filmy i ściągają muzykę, przez co istotne usługi mają problemy z wydajnością, możesz sprawdzić, jak temu zaradzić. …”
Libro electrónico -
1033Publicado 1992“…Para hacernos conscientes de las mentiras del V Centenario y desenmascarar la imagen de un Occidente acogedor de un Tercer Mundo en progreso; para agrandar nuestra solidaridad con la Iglesia y los pueblos Latinoamericanos; para acrecentar la protesta por la dependencia política, cultural y económica de los pueblos indígenas, que sobreviven en islotes de marginación y miseria; etc. Para todo esto y mucho más ve la luz este Cuaderno de Noticias Obreras…”
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro -
1034Publicado 2012“…A concise introduction to the basics of open access, describing what it is (and isn't) and showing that it is easy, fast, inexpensive, legal, and beneficial In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. …”
Libro electrónico -
1035por Lauchman, Richard“…Proper punctuation isn't just for school teachers-it's for anyone in the workplace who wants to communicate professionally...and clearly!…”
Publicado 2010
Libro electrónico -
1036Publicado 2016“…Experience is vital for a leader's success, but merely having an experience (such as a challenging new job, a stretch assignment, or an unexpected hardship) isn't enough…”
Libro electrónico -
1037Publicado 2021“…In light of the aforementioned, numerous investigations are being conducted to identify, process, and create materials that are concurrently innocuous towards the environment and have superior properties. …”
Libro electrónico -
1038Publicado 2010“…Sumergiéndose en algunos de los lugares más peligrosos del planeta, bajo espesas placas de hielo del Ártico, en los misteriosos agujeros negros del Caribe y en las profundas cuevas ignotas de Mallorca, nos revelan parajes aún desconocidos de nuestro entorno. …”
BluRay -
1039Publicado 2010“…Sumergiéndose en algunos de los lugares más peligrosos del planeta, bajo espesas placas de hielo del Ártico, en los misteriosos agujeros negros del Caribe y en las profundas cuevas ignotas de Mallorca, nos revelan parajes aún desconocidos de nuestro entorno. …”
Ver más información
Disco de vídeo -
1040por Montgomery, L. M. 1874-1942“…Anne, now sixteen years old and a school teacher at a private school, finds that she isn't much different than her mischievous and spirited pupils…”
Publicado 1996
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico