Mostrando 1,021 - 1,040 Resultados de 1,993 Para Buscar 'Isnotú~', tiempo de consulta: 1.16s Limitar resultados
  1. 1021
    por Johnson, Larry, 1947-
    Publicado 2003
    “…Honesty isn't just the best policy- it's also best practice…”
    Libro electrónico
  2. 1022
    Publicado 2017
    Tabla de Contenidos: “…Transformation into cyber warfare -- 2.9. Why Isnt Our Security Approach Working? -- 2.9.1. Asymmetrical -- 2.9.2. …”
    Libro electrónico
  3. 1023
    Publicado 2021
    Tabla de Contenidos: “…Intro -- inside front cover -- Machine Learning Bookcamp -- Copyright -- brief contents -- contents -- front matter -- foreword -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: a roadmap -- About the code -- liveBook discussion forum -- Other online resources -- about the author -- about the cover illustration -- 1 Introduction to machine learning -- 1.1 Machine learning -- 1.1.1 Machine learning vs. rule-based systems -- 1.1.2 When machine learning isn't helpful -- 1.1.3 Supervised machine learning -- 1.2 Machine learning process -- 1.2.1 Business understanding -- 1.2.2 Data understanding -- 1.2.3 Data preparation -- 1.2.4 Modeling -- 1.2.5 Evaluation -- 1.2.6 Deployment -- 1.2.7 Iterate -- 1.3 Modeling and model validation -- Summary -- 2 Machine learning for regression -- 2.1 Car-price prediction project -- 2.1.1 Downloading the dataset -- 2.2 Exploratory data analysis -- 2.2.1 Exploratory data analysis toolbox -- 2.2.2 Reading and preparing data -- 2.2.3 Target variable analysis -- 2.2.4 Checking for missing values -- 2.2.5 Validation framework -- 2.3 Machine learning for regression -- 2.3.1 Linear regression -- 2.3.2 Training linear regression model -- 2.4 Predicting the price -- 2.4.1 Baseline solution -- 2.4.2 RMSE: Evaluating model quality -- 2.4.3 Validating the model -- 2.4.4 Simple feature engineering -- 2.4.5 Handling categorical variables -- 2.4.6 Regularization -- 2.4.7 Using the model -- 2.5 Next steps -- 2.5.1 Exercises -- 2.5.2 Other projects -- Summary -- Answers to exercises -- 3 Machine learning for classification -- 3.1 Churn prediction project -- 3.1.1 Telco churn dataset -- 3.1.2 Initial data preparation -- 3.1.3 Exploratory data analysis -- 3.1.4 Feature importance -- 3.2 Feature engineering -- 3.2.1 One-hot encoding for categorical variables…”
    Libro electrónico
  4. 1024
    Publicado 2024
    Tabla de Contenidos: “…Secure server configuration -- Logging and monitoring -- Summary -- Chapter 9: Python-Based Threat Detection and Incident Response -- Building effective threat detection mechanisms -- Signature-based detection -- Anomaly detection -- Behavioral analysis -- Threat intelligence integration -- Real-time log analysis and anomaly detection with Python -- Preprocessing -- Real-time analysis with the ELK stack -- Anomaly detection techniques -- Visualizing anomalies -- Automating incident response with Python Scripts -- Leveraging Python for threat hunting and analysis -- Data collection and aggregation -- Data analysis techniques -- Automating threat hunting tasks -- Orchestrating comprehensive incident response using Python -- Designing an incident response workflow -- Integrating detection and response systems -- Logging and reporting -- Generating incident reports -- Summary -- Index -- Other Books You May Enjoy -- OLE_LINK12 -- _Int_bkaDCfSC -- OLE_LINK13 -- OLE_LINK3 -- _Hlk146361481 -- _Int_TcZpD8On -- _Int_F5jmih3p -- _Int_QRiFO5rm -- _Int_EeLSKsJo -- OLE_LINK15 -- _Int_CMmsNieF -- OLE_LINK5 -- OLE_LINK19 -- _Int_De8SG51G -- _Int_zyPgFiYb -- _Int_ErvWzO6T -- OLE_LINK6 -- _Int_i2MxAwh1 -- _Int_tmeiWyXB -- OLE_LINK1 -- OLE_LINK7 -- OLE_LINK8 -- _Int_NkemBQkB -- OLE_LINK9 -- _Int_SUhNg4cX -- _Int_ihCOgYLS -- _Int_EIMHEe17 -- OLE_LINK10 -- OLE_LINK11 -- _Int_CLZZ4qbT -- _Int_KAbAoGkA -- OLE_LINK4 -- _Int_CfykNbIp -- _Int_l6kKGEco -- _Int_cwdZsoDx -- _Int_RURzu0cR -- _Int_DDjf41hP -- _Int_GUdYD5p0 -- _Int_HNQAi43i -- _Int_8z14TaFM -- _Int_7rws3Prb -- _Int_U2ROHeyI -- _Int_v2Bnx9Zu -- _Int_Y6AUOImv -- _Int_zZCVk2LQ -- _Int_jjfdujnv -- _Int_Oy3EXG5v -- _Int_iosPgCJs -- _Int_TFTthTz9 -- _Int_yv8z2zkM -- _Int_TtWJJ0jo -- _Int_IyHm77B2 -- _Int_tX888CIx -- _Int_hosKM9dB -- _Int_PP9v1NaY -- _Int_p1IDq81l -- _Int_1h0GA0oa -- _Int_4jzLrzWm -- _Int_zuD23Gdr…”
    Libro electrónico
  5. 1025
    Publicado 2021
    Tabla de Contenidos: “…-- 4.2.2 Examples of supporting technical capabilities -- 4.2.3 Identifying technical capabilities -- 4.3 The tertiary driver for scoping microservices: Supporting efficiency of work -- 4.4 What to do when the correct scope isn't clear -- 4.4.1 Starting a bit bigger -- 4.4.2 Carving out new microservices from existing microservices -- 4.4.3 Planning to carve out new microservices later -- 4.5 Well-scoped microservices adhere to the microservice characteristics -- 4.5.1 Primary scoping to business capabilities leads to good microservices -- 4.5.2 Secondary scoping to support technical capabilities leads to good microservices -- 4.5.3 Tertiary scoping to support efficiency of work -- Summary -- 5 Microservice collaboration -- 5.1 Types of collaboration: Commands, queries, and events -- 5.1.1 Commands and queries: Synchronous collaboration -- 5.1.2 Events: Asynchronous collaboration -- 5.1.3 Data formats -- 5.2 Implementing collaboration -- 5.2.1 Setting up a project for the loyalty program -- 5.2.2 Implementing commands and queries…”
    Libro electrónico
  6. 1026
    por Srinivasan, A.
    Publicado 2014
    Tabla de Contenidos: “…-- 1.5.1 What Cloud Computing Really Isn't? -- Summary -- Key Terms -- Review Questions -- Chapter 2: Move to Cloud Computing -- 2.1 Pros and Cons of Cloud Computing -- 2.1.1 Advantages of Cloud Computing in IT Field -- 2.1.2 The Fixed Cost Advantage -- 2.1.3 Keeping Data Safe -- 2.1.4 The Possible Disadvantages of Cloud Computing -- 2.1.5 Advantages of Cloud Computing -- 2.1.6 Disadvantages of Cloud Computing -- 2.2 Nature of the Cloud -- 2.2.1 Leveraging the Internet to Change the World -- 2.3 Technologies in Cloud Computing -- 2.3.1 Other Cloud-related Technologies -- 2.3.2 Working of Cloud -- 2.3.3 Key Characteristic of Cloud and its Role -- 2.4 Migrating into the Cloud -- 2.4.1 Cloud Computing Migration Issues: What You Need to Know? …”
    Libro electrónico
  7. 1027
    Publicado 2012
    “…He believes that Professor Yu's seemingly innocuous written notes on his essays are coded threats. …”
    Vídeo online
  8. 1028
    Publicado 2012
    “…He believes that Professor Yu's seemingly innocuous written notes on his essays are coded threats. …”
    Vídeo online
  9. 1029
    Publicado 2013
    “…w odpowiednie miejsce. Niezwykle istotne jest wi?c ich zrozumienie i wykorzystanie w praktyce. …”
    Libro electrónico
  10. 1030
    Publicado 2016
    “…Powstaje produkt o wysokiej jakości. Co istotne, realizacja zadań w sprintach przebiega szybciej i jest bardziej wydajna. …”
    Libro electrónico
  11. 1031
    Publicado 2017
    “…Dowiesz się, jak słuchać ze zrozumieniem oraz jak mówić, aby przekazać istotne kwestie i zyskać akceptację dla swoich rozwiązań. …”
    Libro electrónico
  12. 1032
    Publicado 2012
    “…Jeżeli użytkownicy sieci śmiało poczynają sobie na stronach WWW, oglądają filmy i ściągają muzykę, przez co istotne usługi mają problemy z wydajnością, możesz sprawdzić, jak temu zaradzić. …”
    Libro electrónico
  13. 1033
    Publicado 1992
    “…Para hacernos conscientes de las mentiras del V Centenario y desenmascarar la imagen de un Occidente acogedor de un Tercer Mundo en progreso; para agrandar nuestra solidaridad con la Iglesia y los pueblos Latinoamericanos; para acrecentar la protesta por la dependencia política, cultural y económica de los pueblos indígenas, que sobreviven en islotes de marginación y miseria; etc. Para todo esto y mucho más ve la luz este Cuaderno de Noticias Obreras…”
    Libro
  14. 1034
    Publicado 2012
    “…A concise introduction to the basics of open access, describing what it is (and isn't) and showing that it is easy, fast, inexpensive, legal, and beneficial In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. …”
    Libro electrónico
  15. 1035
    por Lauchman, Richard
    Publicado 2010
    “…Proper punctuation isn't just for school teachers-it's for anyone in the workplace who wants to communicate professionally...and clearly!…”
    Libro electrónico
  16. 1036
    Publicado 2016
    “…Experience is vital for a leader's success, but merely having an experience (such as a challenging new job, a stretch assignment, or an unexpected hardship) isn't enough…”
    Libro electrónico
  17. 1037
    Publicado 2021
    “…In light of the aforementioned, numerous investigations are being conducted to identify, process, and create materials that are concurrently innocuous towards the environment and have superior properties. …”
    Libro electrónico
  18. 1038
    Publicado 2010
    “…Sumergiéndose en algunos de los lugares más peligrosos del planeta, bajo espesas placas de hielo del Ártico, en los misteriosos agujeros negros del Caribe y en las profundas cuevas ignotas de Mallorca, nos revelan parajes aún desconocidos de nuestro entorno. …”
    BluRay
  19. 1039
    Publicado 2010
    “…Sumergiéndose en algunos de los lugares más peligrosos del planeta, bajo espesas placas de hielo del Ártico, en los misteriosos agujeros negros del Caribe y en las profundas cuevas ignotas de Mallorca, nos revelan parajes aún desconocidos de nuestro entorno. …”
    Ver más información
    Disco de vídeo
  20. 1040
    por Montgomery, L. M. 1874-1942
    Publicado 1996
    “…Anne, now sixteen years old and a school teacher at a private school, finds that she isn't much different than her mischievous and spirited pupils…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico