Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,665
- Bible 1,923
- Bíblia 1,428
- Historia 1,177
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 551
- Computer Science 516
- Història 512
- History 456
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
52561“…While this moderation is often encouraged by governments - on the pretext that terrorism, bullying, pornography, “hate speech” and “fake news” will slowly disappear from the internet - it enables tech companies to censure our society. It is the social media companies who define what is blacklisted in their community standards. …”
Electrónico -
52562Publicado 2014“…As an example, asymmetric cell division enables one stem cell to generate a stem cell daughter and a daughter with a distinct identity. …”
Libro electrónico -
52563Publicado 2016“…Recent advances in computer technologies and research now enable to simulate realistic social interaction thanks to the use of increasingly complex computer models. …”
Libro electrónico -
52564Publicado 2008“…Los pueblos mesoamericanos observaban los cambios estacionales, los registraban y veneraban con rituales que tenían el doble valor de pedir y agradecer por la lluvia o el aire. …”
Libro electrónico -
52565Publicado 2007“…Since the codes can be worked with directly, they will enable the reader to improve on them and solve problem instances that still remain challenging, or to use them as a starting point for solving related application problems. …”
Libro electrónico -
52566por Jacobson, JessicaTabla de Contenidos: “…Front Matter -- Contents -- List of Boxes, Figures and Tables -- Notes on Contributors -- Acknowledgements -- Foreword -- Introduction -- Policy and Practice Supporting Lay Participation -- Conceptualising Participation: Practitioner Accounts -- Observed Realities of Participation -- Looking Ahead: Towards a Principled Approach to Supporting Participation -- Index…”
Publicado 2020
Libro electrónico -
52567por Krynen, Jean“…Aujourd’hui, y compris pour les croyants, la mystique chrétienne a rejoint les parages de la Fable. Ce livre retrace par quelle lente métamorphose, quel drame interne, la foi chrétienne a pu être vidée de sa mystique. …”
Publicado 2020
Electrónico -
52568por Fleuriaud Geoffrey“…Durant l’entre-deux-guerres, au sein de la chronique locale de la presse quotidienne régionale, pas un seul jour ne se passait sans que le journaliste n’informe son lecteur de la grave menace dont il était à chaque instant la cible : chapardage, filouterie, entôlage, cambriolage, agression, meurtre ! …”
Publicado 2019
Electrónico -
52569por Alivizatos, Nikos K.“…The Mataroa, a military vessel chartered by the French Institute at Athens in December 1945, enabled more than a hundred young Greeks to leave Greece, reaching first Taranto, Italy, and finally arriving in Paris. …”
Publicado 2021
Electrónico -
52570Publicado 2017“…Anaconda downloads are available for Apple OS X, Microsoft Windows, and most Linux distributions. …”
-
52571Publicado 2018“…You will learn to configure the Spring Cloud server and run the Eureka server to enable service registration and discovery. Then you will learn about techniques related to load balancing and circuit breaking and utilize all features of the Feign client. …”
Libro electrónico -
52572Publicado 2020“…What you will learn Explore and apply different interactive data visualization techniques Manipulate plotting parameters and styles to create appealing plots Customize data visualization for different audiences Design data visualizations using interactive libraries Use Matplotlib, Seaborn, Altair and Bokeh for drawing appealing plots Customize data visualization for different scenarios Who this book is for This book intends to provide a solid training ground for Python developers, data analysts and data scientists to enable them to present critical data insights in a way that best captures the user's attention and imagination. …”
Libro electrónico -
52573Publicado 2016“…Before SAFe, I would not know how to help my teams but now I have many tools to enable the teams. My job is really fun and the bottom line is I have never enjoyed my job more!” …”
Libro electrónico -
52574Publicado 2018Tabla de Contenidos: “…4.11 VoLTE KPI Evaluation 221 -- 4.12 Use Cases and Recommendations 223 -- 4.13 Conclusions 226 -- References 228 -- 5 Evaluation of LTE-Advanced Features 230 -- 5.1 Introduction to LTE-Advanced Features 230 -- 5.2 Carrier Aggregation in LTE-A and LTE-A Pro 231 -- 5.3 Higher-order Modulation (HOM) for Uplink and Downlink 242 -- 5.4 LTE-A Feature Dependencies 247 -- 5.5 Other Enhancements Towards Advanced LTE Deployments 252 -- References 263 -- 6 LTE Network Capacity Analysis 264 -- 6.1 Overview 264 -- 6.2 Introduction 264 -- 6.3 Users and Traffic Utilization 266 -- 6.4 Downlink Analysis 270 -- 6.5 DL KPI Analysis 274 -- 6.6 UL KPI Analysis 289 -- 6.7 Data Connection Performance 302 -- 6.8 Link Reliability Analysis 305 -- 6.9 Main KPI Comparison for Different Operators 307 -- References 309 -- 7 IoT Evolution Towards a Super-connected World 310 -- 7.1 Overview 310 -- 7.2 Introduction to the IoT 310 -- 7.3 IoT Standards 312 -- 7.4 IoT Platform 314 -- 7.5 IoT Gateways, Devices, and “Things” Management 318 -- 7.6 Edge and Fog Computing 319 -- 7.7 IoT Sensors 322 -- 7.8 IoT Protocols 323 -- 7.9 IoT Networks 327 -- 7.10 3GPP Standards for IoT 337 -- 7.11 3GPP NB-IoT 341 -- 7.12 NB-IoT DL Specifications 343 -- 7.13 NB-IoT UL Specifications 352 -- 7.14 Release 13 Machine-type Communications Overview 358 -- 7.15 Link Budget Analysis 359 -- 7.16 NB-IoT Network Topology 364 -- 7.17 Architecture Enhancement for CIoT 367 -- 7.18 Sample IoT Use Cases 374 -- References 380 -- 8 5G Evolution Towards a Super-connected World 382 -- 8.1 Overview 382 -- 8.2 Introduction 382 -- 8.3 5G New Radio (NR) and Air Interface 385 -- 8.4 What is Next for LTE-A Pro Evolution? …”
Libro electrónico -
52575Publicado 2018“…This book will gear you up for using golang by taking you through recipes that will teach you how to leverage the standard library to implement a particular solution. This will enable Go developers to take advantage of using a rock-solid standard library instead of third-party frameworks. …”
Libro electrónico -
52576Publicado 2017“…This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. …”
Libro electrónico -
52577Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Security Posture -- The current threat landscape -- The credentials - authentication and authorization -- Apps -- Data -- Cybersecurity challenges -- Old techniques and broader results -- The shift in the threat landscape -- Enhancing your security posture -- The Red and Blue Team -- Assume breach -- References -- Summary -- Chapter 2: Incident Response Process -- Incident response process -- Reasons to have an IR process in place -- Creating an incident response process -- Incident response team -- Incident life cycle -- Handling an incident -- Best practices to optimize incident handling -- Post-incident activity -- Real-world scenario -- Lessons learned -- Incident response in the cloud -- Updating your IR process to include cloud -- References -- Summary -- Chapter 3: Understanding the Cybersecurity Kill Chain -- External reconnaissance -- Scanning -- NMap -- Metasploit -- John the Ripper -- THC Hydra -- Wireshark -- Aircrack-ng -- Nikto -- Kismet -- Cain and Abel -- Access and privilege escalation -- Vertical privilege escalation -- Horizontal privilege escalation -- Exfiltration -- Sustainment -- Assault -- Obfuscation -- Threat life cycle management -- References -- Summary -- Chapter 4: Reconnaissance -- External reconnaissance -- Dumpster diving -- Social media -- Social engineering -- Pretexting -- Diversion theft -- Phishing -- Phone phishing (vishing) -- Spear phishing -- Water holing -- Baiting -- Quid pro quo -- Tailgating -- Internal reconnaissance -- Sniffing and scanning -- Prismdump -- tcpdump -- NMap -- Wireshark -- Scanrand -- Cain and Abel -- Nessus -- Metasploit -- Aircrack-ng -- Wardriving -- Conclusion of the reconnaissance chapter -- References -- Summary -- Chapter 5: Compromising the System…”
Libro electrónico -
52578Publicado 2015“…Drawing on their experience as principal process architects working with dozens of CEOs and executive teams, and hundreds of senior executives and staff professionals, they show you how to develop a compelling and potent corporate transformation game plan that enables you to align your organization behind just a few core initiatives; bias your people toward speed; create leaders at every level; integrate in new “disruptive” tools to accelerate progress; and achieve traction and accountability in all phases of execution. …”
Libro electrónico -
52579Publicado 2020“…What you will learn Get to grips with developing environment-aware robots Gain insights into how your robots will react in physical environments Break down a desired behavior into a chain of robot actions Relate data from sensors with context to produce adaptive responses Apply reinforcement learning to allow your robot to learn by trial and error Implement deep learning to enable your robot to recognize its surroundings Who this book is for If you are an engineer looking to build AI-powered robots using the ROS framework, this book is for you. …”
Libro electrónico -
52580Publicado 2018“…Then, you'll learn how to apply what you've learned by creating some simple calculations in Tableau and using Table Calculations to help drive greater analysis from your data. …”
Libro electrónico