Mostrando 53,261 - 53,280 Resultados de 53,879 Para Buscar 'NPBL~', tiempo de consulta: 1.06s Limitar resultados
  1. 53261
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Setting Up the Local Environment -- Technical requirements -- Choosing the best operating system -- Installing the required applications and services -- Preparing the technology stack for AC -- Installing WSL 2 on Windows -- Virtualization with Docker -- Installing Docker and the Docker Compose plugin -- Installing Docker on Windows -- Installing Docker on macOS -- Installing Docker on Linux -- Wrapping things up -- Preparing a Docker manager -- What is Warden? …”
    Libro electrónico
  2. 53262
    por Chinchilla, Chris
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Why, Who, and How of Tech Writing -- Why should you care about tech writing? …”
    Libro electrónico
  3. 53263
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Secrets Hiding in Plain Sight - Unveiling the Power of OSINT -- Introduction to OSINT -- Let's talk about information and intelligence -- Passive and active OSINT -- Why OSINT matters in the digital age -- Why is OSINT so cool? …”
    Libro electrónico
  4. 53264
    Publicado 2024
    “…The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. …”
    Libro electrónico
  5. 53265
    Publicado 2024
    “…By the end of the course, learners will have a solid grasp of how to efficiently abstract logic through functions, enabling the construction of more sophisticated and scalable programs. …”
    Video
  6. 53266
    por Maxwell, Ramona
    Publicado 2024
    “…What You Will Learn Discover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilities Streamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practices Use Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governance Apply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflect Uncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable direction…”
    Libro electrónico
  7. 53267
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Part 1: Building the Fundamentals -- Chapter 1: Preparing for Success -- Supporting tools and information -- Common sales challenges -- Managing the sales pipeline -- Forecasting accuracy -- Increasing sales productivity -- Achieving sales and marketing alignment -- Alignment with company strategy and values -- The importance of adoption -- What is adoption? …”
    Libro electrónico
  8. 53268
    Publicado 2024
    Tabla de Contenidos: “…-- Understanding the foundational elements of NEAR -- Learning about the advanced concepts of NEAR -- Transactions and gas -- Data flow -- Tokens and avoiding loss -- Storage options -- Validators and consensus -- NEAR SDK -- Getting started with the NEAR blockchain -- The Contract class -- State and data structures -- Transfers and actions -- Cross contract calls -- NEAR CLI deep dive -- Creating our first project with NEAR -- Understanding the structure and rules of the crossword game -- Setting up the development environment -- Creating a smart contract skeleton -- Testing and deployment -- Interacting with the contract -- Summary -- Part 4: Polkadot and Substrate -- Chapter 9: Exploring Polkadot, Kusama, and Substrate -- Introducing Polkadot -- Interoperability -- Relay chain -- Parathreads -- Bridges -- Accounts -- Transactions -- Tokens and assets -- NFTs -- Understanding the core concepts of PolkaDot -- XCM -- Shared security -- Pallets -- Staking -- Advanced staking concepts -- Main actors -- NPoS election algorithms -- Learning about Kusama -- Governance and on-chain upgrades -- Chaos and experimentation -- Introducing Substrate -- Substrate architecture -- Client and runtime -- Network types -- Node types -- Diving deep into Substrate -- Runtime interfaces -- Core primitives -- FRAME -- Building custom pallets -- Forkless and runtime upgrades -- Consensus -- Summary -- Chapter 10: Hands-On with Substrate -- Technical requirements -- Installing Substrate -- Building our own blockchain -- Starting a local node -- Installing a frontend template -- Starting the frontend template -- Transferring the funds -- Simulating a network -- Starting the first blockchain node -- Adding more nodes…”
    Libro electrónico
  9. 53269
    Publicado 2023
    “…Image segmentation is a key technology in the field of computer vision, which enables computers to understand the content of an image at a pixel level. …”
    Video
  10. 53270
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Table of Contents -- Preface -- Part 1: Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture -- Chapter 1: Introducing the Vehicle Electrical/Electronic Architecture -- Overview of the basic building blocks of the E/E architecture -- Electronic control units -- Looking at MCU-based ECUs -- Looking at SoC-based ECUs -- Looking inside the MCU and SoC software layers -- ECU domains -- Fuel-based powertrain domain -- Electric drive powertrain domain -- Chassis safety control domain -- Interior cabin domain -- Infotainment and connectivity domain -- Cross-domain -- Exploring the in-vehicle network -- CAN -- FlexRay -- LIN -- UART -- SENT -- GMSL -- I2C -- Ethernet -- J1939 -- Sensors and actuators -- Sensor types -- Actuators -- Exploring the vehicle architecture types -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Zone architecture -- Commercial truck architecture types -- Summary -- Answers to discussion points -- Further reading -- Chapter 2: Cybersecurity Basics for Automotive Use Cases -- Exploring the attack classes -- Passive attacks -- Active attacks -- Identifying security objectives -- Integrity -- Authenticity -- Confidentiality -- Accountability -- Availability -- Cryptography applied to automotive use cases -- Building blocks -- One-way hash functions -- Message authentication code algorithms -- Random number generators -- Public key cryptography -- Key management -- NIST defined security strength -- Chinese cryptography -- PQC algorithms -- Security principles -- Defense in depth -- Domain separation -- Least privilege -- Least sharing -- Mediated access -- Protective defaults -- Anomaly detection -- Distributed privilege -- Hierarchical protection and zero trust -- Minimal trusted elements -- Least persistence…”
    Libro electrónico
  11. 53271
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Concepts of Machine Learning -- Chapter 1: Introduction to Machine Learning with Qlik -- Introduction to Qlik tools -- Insight Advisor -- Qlik AutoML -- Advanced Analytics Integration -- Basic statistical concepts with Qlik solutions -- Types of data -- Mean, median, and mode -- Variance -- Standard deviation -- Standardization -- Correlation -- Probability -- Defining a proper sample size and population -- Defining a sample size -- Training and test data in machine learning -- Concepts to analyze model performance and reliability -- Regression model scoring -- Multiclass classification scoring and binary classification scoring -- Feature importance -- Summary -- Chapter 2: Machine Learning Algorithms and Models with Qlik -- Regression models -- Linear regression -- Logistic regression -- Lasso regression -- Clustering algorithms, decision trees, and random forests -- K-means clustering -- ID3 decision tree -- Boosting algorithms and Naive Bayes -- XGBoost -- Gaussian Naive Bayes -- Neural networks, deep learning, and natural-language models -- Summary -- Chapter 3: Data Literacy in a Machine Learning Context -- What is data literacy? …”
    Libro electrónico
  12. 53272
    por Raghavendra, Sujay
    Publicado 2024
    “…By the end, you’ll have the expertise to address advanced scenarios, such as working with iframes, and know how TestNG enhances Selenium automation, enabling structured tests, data-driven insights, and swift parallel executions. …”
    Libro electrónico
  13. 53273
    por Chow, Dennis
    Publicado 2024
    Tabla de Contenidos: “…Automating LLM interactions -- Lab 4.3 - Generating Splunk SPL content from news -- Summary -- Part 2: Automating Validations within CI/CD Pipelines -- Chapter 5: Implementing Logical Unit Tests -- Technical requirements -- Validating syntax and linting -- Lab 5.1 - CrowdStrike syntax validation -- Performing metadata and taxonomy checks -- Lab 5.2 - Google Chronicle payload validation -- Performing data input checks -- Lab 5.3 - Palo Alto signature limitation tests -- Lab 5.4 - Suricata simulation testing -- Lab 5.5 - Git pre-commit hook protections -- Summary -- Further reading -- Chapter 6: Creating Integration Tests -- Technical requirements -- Mapping and Using Synthetic Payloads -- Lab 6.1 - Splunk SPL Detection Testing -- Testing In-Line Payloads -- Lab 6.2 - AWS CloudTrail Detection Tests -- Executing Live-Fire Asynchronous Tests -- Lab 6.3 - CrowdStrike Falcon Payload Testing -- Lab 6.4 - Deploying Caldera BAS -- Summary -- Further reading -- Chapter 7: Leveraging AI for Testing -- Technical requirements -- Synthetic testing with LLMs -- Lab 7.1 - Poe Bot synthetic CI/CD unit testing -- Evaluating data security and ROI -- Lab 7.2 - CodeRabbit augmented peer review -- Implementing multi-LLM model validation -- Summary -- Part 3: Monitoring Program Effectiveness -- Chapter 8: Monitoring Detection Health -- Technical requirements -- Identifying telemetry sources -- Measuring use case performance -- Upstream detection performance -- Downstream detection performance -- Lab 8.1 - Google Chronicle detection insights -- Extending dashboard use cases -- Lab 8.2 - Mock SOAR disable excessive firing rule -- Summary -- Further reading -- Chapter 9: Measuring Program Efficiency -- Technical requirements -- Creating program KPIs -- Locating data for metrics -- Signal to Noise Ratio -- MITRE ATT&amp -- CK coverage…”
    Libro electrónico
  14. 53274
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction -- Chapter 1: Why Go? …”
    Libro electrónico
  15. 53275
    Publicado 2024
    “…Finally, you'll build your own Netflix-like app, integrating video playback functionality with ExoPlayer for both foreground and background operations, and enabling casting to other devices. By the end of this book, you'll have crafted three fully functional projects across multiple platforms and gained the expertise to solve the most common challenges in Android development confidently. …”
    Libro electrónico
  16. 53276
    Publicado 2024
    “…Generative AI with Amazon Bedrock takes a practical approach to enabling you to accelerate the development and integration of several generative AI use cases in a seamless manner. …”
    Libro electrónico
  17. 53277
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding the Threat Landscape and Attack Life Cycle -- Chapter 1: Introduction to the Threat Landscape -- Getting familiar with the cyber threat landscape -- Types of threat actors and their motivations -- APTs -- Cybercriminals -- Hacktivists -- Competitors -- Insider threats -- Terrorist groups -- Script kiddies -- Wrapping up -- Building the cyber threat landscape -- Summary -- Chapter 2: Understanding the Attack Life Cycle -- Phase 1 -- gaining an initial foothold…”
    Libro electrónico
  18. 53278
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Learning about the Internals of Node.js Dividing Code into Modules and Packages Choosing a Package Manager Using Different Flavors of JavaScript Enhancing Code Quality with Linters and Formatters Building Web Apps with Bundlers Improving Reliability with Testing Tools Publishing npm Packages Structuring Code in Monorepos Integrating Native Code with WebAssembly Using Alternative Runtimes…”
    Libro electrónico
  19. 53279
    por Ratan, Ujjwal
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Introducing Machine Learning and the AWS Machine Learning Stack Exploring Key AWS Machine Learning Services for Healthcare and Life Sciences Machine Learning for Patient Risk Stratification Using Machine Learning to Improve Operational Efficiency for Healthcare Providers Implementing Machine Learning for Healthcare Payors Implementing Machine Learning for Medical Devices and Radiology Images Applying Machine Learning to Genomics Applying Machine Learning to Molecular Data Applying Machine Learning to Clinical Trials and Pharmacovigilance Utilizing Machine Learning in the Pharmaceutical Supply Chain Understanding Common Industry Challenges and Solutions Understanding Current Industry Trends and Future Applications…”
    Libro electrónico
  20. 53280
    por OECD
    Publicado 2022
    “…La politique budgétaire doit trouver un équilibre entre un resserrement progressif et l'octroi d'un soutien temporaire bien ciblé aux ménages vulnérables à la hausse du coût de la vie, en soutenant la croissance et en répondant aux importants besoins d'investissement. …”
    Libro electrónico