Mostrando 52,561 - 52,580 Resultados de 53,879 Para Buscar 'NPBL~', tiempo de consulta: 0.99s Limitar resultados
  1. 52561
    “…While this moderation is often encouraged by governments - on the pretext that terrorism, bullying, pornography, “hate speech” and “fake news” will slowly disappear from the internet - it enables tech companies to censure our society. It is the social media companies who define what is blacklisted in their community standards. …”
    Electrónico
  2. 52562
    Publicado 2014
    “…As an example, asymmetric cell division enables one stem cell to generate a stem cell daughter and a daughter with a distinct identity. …”
    Libro electrónico
  3. 52563
    Publicado 2016
    “…Recent advances in computer technologies and research now enable to simulate realistic social interaction thanks to the use of increasingly complex computer models. …”
    Libro electrónico
  4. 52564
    Publicado 2008
    “…Los pueblos mesoamericanos observaban los cambios estacionales, los registraban y veneraban con rituales que tenían el doble valor de pedir y agradecer por la lluvia o el aire. …”
    Libro electrónico
  5. 52565
    Publicado 2007
    “…Since the codes can be worked with directly, they will enable the reader to improve on them and solve problem instances that still remain challenging, or to use them as a starting point for solving related application problems. …”
    Libro electrónico
  6. 52566
    por Jacobson, Jessica
    Publicado 2020
    Tabla de Contenidos: “…Front Matter -- Contents -- List of Boxes, Figures and Tables -- Notes on Contributors -- Acknowledgements -- Foreword -- Introduction -- Policy and Practice Supporting Lay Participation -- Conceptualising Participation: Practitioner Accounts -- Observed Realities of Participation -- Looking Ahead: Towards a Principled Approach to Supporting Participation -- Index…”
    Libro electrónico
  7. 52567
    por Krynen, Jean
    Publicado 2020
    “…Aujourd’hui, y compris pour les croyants, la mystique chrétienne a rejoint les parages de la Fable. Ce livre retrace par quelle lente métamorphose, quel drame interne, la foi chrétienne a pu être vidée de sa mystique. …”
    Electrónico
  8. 52568
    por Fleuriaud Geoffrey
    Publicado 2019
    “…Durant l’entre-deux-guerres, au sein de la chronique locale de la presse quotidienne régionale, pas un seul jour ne se passait sans que le journaliste n’informe son lecteur de la grave menace dont il était à chaque instant la cible : chapardage, filouterie, entôlage, cambriolage, agression, meurtre ! …”
    Electrónico
  9. 52569
    por Alivizatos, Nikos K.
    Publicado 2021
    “…The Mataroa, a military vessel chartered by the French Institute at Athens in December 1945, enabled more than a hundred young Greeks to leave Greece, reaching first Taranto, Italy, and finally arriving in Paris. …”
    Electrónico
  10. 52570
    Publicado 2017
    “…Anaconda downloads are available for Apple OS X, Microsoft Windows, and most Linux distributions. …”
    Video
  11. 52571
    Publicado 2018
    “…You will learn to configure the Spring Cloud server and run the Eureka server to enable service registration and discovery. Then you will learn about techniques related to load balancing and circuit breaking and utilize all features of the Feign client. …”
    Libro electrónico
  12. 52572
    Publicado 2020
    “…What you will learn Explore and apply different interactive data visualization techniques Manipulate plotting parameters and styles to create appealing plots Customize data visualization for different audiences Design data visualizations using interactive libraries Use Matplotlib, Seaborn, Altair and Bokeh for drawing appealing plots Customize data visualization for different scenarios Who this book is for This book intends to provide a solid training ground for Python developers, data analysts and data scientists to enable them to present critical data insights in a way that best captures the user's attention and imagination. …”
    Libro electrónico
  13. 52573
    Publicado 2016
    “…Before SAFe, I would not know how to help my teams but now I have many tools to enable the teams. My job is really fun and the bottom line is I have never enjoyed my job more!” …”
    Libro electrónico
  14. 52574
    Publicado 2018
    Tabla de Contenidos: “…4.11 VoLTE KPI Evaluation 221 -- 4.12 Use Cases and Recommendations 223 -- 4.13 Conclusions 226 -- References 228 -- 5 Evaluation of LTE-Advanced Features 230 -- 5.1 Introduction to LTE-Advanced Features 230 -- 5.2 Carrier Aggregation in LTE-A and LTE-A Pro 231 -- 5.3 Higher-order Modulation (HOM) for Uplink and Downlink 242 -- 5.4 LTE-A Feature Dependencies 247 -- 5.5 Other Enhancements Towards Advanced LTE Deployments 252 -- References 263 -- 6 LTE Network Capacity Analysis 264 -- 6.1 Overview 264 -- 6.2 Introduction 264 -- 6.3 Users and Traffic Utilization 266 -- 6.4 Downlink Analysis 270 -- 6.5 DL KPI Analysis 274 -- 6.6 UL KPI Analysis 289 -- 6.7 Data Connection Performance 302 -- 6.8 Link Reliability Analysis 305 -- 6.9 Main KPI Comparison for Different Operators 307 -- References 309 -- 7 IoT Evolution Towards a Super-connected World 310 -- 7.1 Overview 310 -- 7.2 Introduction to the IoT 310 -- 7.3 IoT Standards 312 -- 7.4 IoT Platform 314 -- 7.5 IoT Gateways, Devices, and “Things” Management 318 -- 7.6 Edge and Fog Computing 319 -- 7.7 IoT Sensors 322 -- 7.8 IoT Protocols 323 -- 7.9 IoT Networks 327 -- 7.10 3GPP Standards for IoT 337 -- 7.11 3GPP NB-IoT 341 -- 7.12 NB-IoT DL Specifications 343 -- 7.13 NB-IoT UL Specifications 352 -- 7.14 Release 13 Machine-type Communications Overview 358 -- 7.15 Link Budget Analysis 359 -- 7.16 NB-IoT Network Topology 364 -- 7.17 Architecture Enhancement for CIoT 367 -- 7.18 Sample IoT Use Cases 374 -- References 380 -- 8 5G Evolution Towards a Super-connected World 382 -- 8.1 Overview 382 -- 8.2 Introduction 382 -- 8.3 5G New Radio (NR) and Air Interface 385 -- 8.4 What is Next for LTE-A Pro Evolution? …”
    Libro electrónico
  15. 52575
    Publicado 2018
    “…This book will gear you up for using golang by taking you through recipes that will teach you how to leverage the standard library to implement a particular solution. This will enable Go developers to take advantage of using a rock-solid standard library instead of third-party frameworks. …”
    Libro electrónico
  16. 52576
    Publicado 2017
    “…This book tells you how you can enable continuous security, continuous auditing, and continuous compliance by automating your security in AWS with the tools, services, and features it provides. …”
    Libro electrónico
  17. 52577
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Security Posture -- The current threat landscape -- The credentials - authentication and authorization -- Apps -- Data -- Cybersecurity challenges -- Old techniques and broader results -- The shift in the threat landscape -- Enhancing your security posture -- The Red and Blue Team -- Assume breach -- References -- Summary -- Chapter 2: Incident Response Process -- Incident response process -- Reasons to have an IR process in place -- Creating an incident response process -- Incident response team -- Incident life cycle -- Handling an incident -- Best practices to optimize incident handling -- Post-incident activity -- Real-world scenario -- Lessons learned -- Incident response in the cloud -- Updating your IR process to include cloud -- References -- Summary -- Chapter 3: Understanding the Cybersecurity Kill Chain -- External reconnaissance -- Scanning -- NMap -- Metasploit -- John the Ripper -- THC Hydra -- Wireshark -- Aircrack-ng -- Nikto -- Kismet -- Cain and Abel -- Access and privilege escalation -- Vertical privilege escalation -- Horizontal privilege escalation -- Exfiltration -- Sustainment -- Assault -- Obfuscation -- Threat life cycle management -- References -- Summary -- Chapter 4: Reconnaissance -- External reconnaissance -- Dumpster diving -- Social media -- Social engineering -- Pretexting -- Diversion theft -- Phishing -- Phone phishing (vishing) -- Spear phishing -- Water holing -- Baiting -- Quid pro quo -- Tailgating -- Internal reconnaissance -- Sniffing and scanning -- Prismdump -- tcpdump -- NMap -- Wireshark -- Scanrand -- Cain and Abel -- Nessus -- Metasploit -- Aircrack-ng -- Wardriving -- Conclusion of the reconnaissance chapter -- References -- Summary -- Chapter 5: Compromising the System…”
    Libro electrónico
  18. 52578
    Publicado 2015
    “…Drawing on their experience as principal process architects working with dozens of CEOs and executive teams, and hundreds of senior executives and staff professionals, they show you how to develop a compelling and potent corporate transformation game plan that enables you to align your organization behind just a few core initiatives; bias your people toward speed; create leaders at every level; integrate in new “disruptive” tools to accelerate progress; and achieve traction and accountability in all phases of execution. …”
    Libro electrónico
  19. 52579
    Publicado 2020
    “…What you will learn Get to grips with developing environment-aware robots Gain insights into how your robots will react in physical environments Break down a desired behavior into a chain of robot actions Relate data from sensors with context to produce adaptive responses Apply reinforcement learning to allow your robot to learn by trial and error Implement deep learning to enable your robot to recognize its surroundings Who this book is for If you are an engineer looking to build AI-powered robots using the ROS framework, this book is for you. …”
    Libro electrónico
  20. 52580
    Publicado 2018
    “…Then, you'll learn how to apply what you've learned by creating some simple calculations in Tableau and using Table Calculations to help drive greater analysis from your data. …”
    Libro electrónico