Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
42281Publicado 2017Tabla de Contenidos: “…Further Reading -- References -- Chapter 3: Controlling the design and development cycle -- 3.1. …”
Libro electrónico -
42282Publicado 2024Tabla de Contenidos: “…Avoiding pitfalls in value proposition design -- Not actually solving a real customer need -- Putting features before benefits -- Failing to differentiate from the crowd -- Not targeting specific buyer personas -- Inconsistency across touchpoints -- Failing to evolve messaging -- Focusing excessively on brand image over benefits -- Relying too heavily on industry jargon -- Summary -- Questions -- Answers -- Part 3: A Successful Product-Focused Strategy -- Chapter 7: The Science of Growth Experimentation and Testing for Product-Led Success -- The significance of growth experimentation and user testing -- Reduced risk -- Accelerated learning -- Improved ROI -- Increased agility -- Fostered innovation -- Data-driven alignment -- Optimized user experiences -- Sustained competitive advantage -- Principles of growth experimentation -- Designing and executing growth experiments with precision -- Selecting strategic metrics -- Crafting controlled experiments -- Planning and executing effective growth experiments -- Designing controlled experiments -- Reducing biases through randomization -- Blinding mitigates perception biases -- Leveraging analytics tools -- Minimizing bias throughout the experiment -- Optimization in action - testing to boost app retention -- Analyzing experiment results and iterating on product features and marketing strategies -- Embracing a growth mindset -- Continuous optimization fuels growth -- Types of growth experiments -- A/B testing - crafting the perfect blend of impact and innovation -- Cohort analysis - understanding the evolution of user groups -- Funnel analysis - paving the path of conversion -- Empowering growth product managers for informed experimentation -- Analytics tools setup - crafting the infrastructure of insights -- Data-informed decision-making - the art of insightful direction…”
Libro electrónico -
42283por Nomani, QamarTabla de Contenidos: “…-- Regulatory frameworks and compliance standards -- GDPR -- HIPAA -- SOC 2 -- Federal Risk and Authorization Management Program -- California Consumer Privacy Act -- California Privacy Rights Act -- Personal Data Protection Act -- Federal Information Security Management Act -- ISO 27001 -- PCI DSS -- NIST Cybersecurity Framework -- Cloud Security Alliance Cloud Controls Matrix -- Center for Internet Security benchmark controls -- Cloud governance frameworks -- AWS WAF -- MCSB -- Adapting cloud governance to the organization's need -- Global versus regional compliance considerations -- Use cases, scenarios, and examples -- Use case #1 - Data protection and privacy -- Use case #2 - Incident reporting and notification -- Use case #3 - Compliance audits -- Challenges, CSPM roles, and future trends -- Challenges in compliance and governance -- CSPM's role in effective compliance management and governance -- Future trends in compliance and governance -- Summary…”
Publicado 2024
Libro electrónico -
42284Publicado 2024Tabla de Contenidos: “…-- Element 59 Small Talk -- Element 60 Positive and Negative Emotions -- The Impact of Positive Emotions in Negotiations -- Navigating Negative Emotions in Negotiations -- Element 61 Maintaining Emotional Control -- Element 62 Cheating, Bluffing, and Little White Lies -- The Epidemic of Cheating -- Is Bluffing So Bad? …”
Libro electrónico -
42285por Das, SubhajitTabla de Contenidos: “…-- Orthogonalization effect in R -- Summary -- References -- Chapter 8: Executing A/B Testing and Controlled Experiments -- Technical requirements -- Designing and conducting A/B tests -- Concepts -- Planning your A/B test -- Implementation details -- Controlled experiments and causal inference -- Enhancing causal inference -- Beyond A/B testing - multi-armed bandit tests and factorial designs -- Ethical considerations -- Common pitfalls and challenges -- Strategies for dealing with incomplete data -- Mitigating spill-over effects -- Adaptive experimentation - when and how to adjust your experiment -- Implementing A/B test analysis in R -- Step 1 - Generating synthetic data -- Step 2 - Exploratory data analysis (EDA) -- Step 3 - Statistical testing -- Step 4 - Multivariate analysis -- Step 5 - Interpreting results -- Step 6 - Checking assumptions of the t-test -- Step 7 - Effect-size calculation -- Step 8 - Power analysis -- Step 9 - Post-hoc analyses -- Step 10 - Visualizing interaction effects -- Summary -- Chapter 9: Implementing Doubly Robust Estimation -- Technical requirements -- What is doubly robust estimation? …”
Publicado 2024
Libro electrónico -
42286Publicado 2018Tabla de Contenidos: “…. -- Cast operator: (target type) -- Expressions -- Statements -- Operator precedence and evaluation order of operands -- Operator precedence -- Evaluation order of operands -- Widening and narrowing reference types -- Widening -- Narrowing -- Widening and narrowing conversion of primitive types -- Widening -- Narrowing -- Methods of primitive type conversion -- Boxing and unboxing between primitive and reference types -- Boxing -- Unboxing -- Method equals() of reference types -- Using the implementation of the base class Object -- Overriding the equals() method -- Using the identification implemented in the parent class -- The equals() method of the String class -- The equals() method in wrapper classes of primitive types -- Exercise - Naming the statements -- Answer -- Summary -- Chapter 10: Control Flow Statements -- What is a control flow? …”
Libro electrónico -
42287Publicado 2022Tabla de Contenidos: “…-- Private keys create public keys -- Public keys create blockchain addresses -- The private key controls the address -- Where Does Crypto Come From? …”
Libro electrónico -
42288por Bruni, PaoloTabla de Contenidos: “…The evolution of DB2 for z/OS -- 2.1 The evolution of DB2 UDB for z/OS -- 2.2 DB2 and Parallel Sysplex industry leadership -- 2.2.1 Extreme availability -- 2.2.2 Near-linear scalability -- 2.2.3 Preservation of investment -- 2.2.4 Controlled enablement of new functionality on version upgrade -- 2.2.5 Rolling maintenance and new releases without an outage -- 2.2.6 Ability to fallback -- 2.2.7 Conclusion -- 2.3 Summary for DB2 -- Chapter 3. …”
Publicado 2005
Libro electrónico -
42289por Rodriguez, Juan R.Tabla de Contenidos: “…Portlet action event handling -- 2.1 Overview -- 2.2 Setup the ActionEvent portlet framework -- 2.2.1 Create the framework with the portlet application wizard -- 2.2.2 Configure the test environment to support this project -- 2.3 Examine and modify source code -- 2.3.1 Examine the model and controller components -- 2.3.2 Examine the HTML source generated by the wizard -- 2.3.3 Modify the source for PDA markup -- 2.3.4 Modify the source for WML markup -- 2.4 Run the project -- Chapter 3. …”
Publicado 2005
Libro electrónico -
42290Publicado 2001Tabla de Contenidos: “…The Linear Address Fields -- Page Table Handling -- Physical Memory Layout -- Process Page Tables -- Kernel Page Tables -- Provisional kernel Page Tables -- Final kernel Page Table when RAM size is less than 896 MB -- Final kernel Page Table when RAM size is between 896 MB and 4096 MB -- Final kernel Page Table when RAM size is more than 4096 MB -- Fix-Mapped Linear Addresses -- Handling the Hardware Cache and the TLB -- Handling the hardware cache -- Handling the TLB -- Processes -- Processes, Lightweight Processes, and Threads -- Process Descriptor -- Process State -- Identifying a Process -- Process descriptors handling -- Identifying the current process -- Doubly linked lists -- The process list -- The lists of TASK_RUNNING processes -- Relationships Among Processes -- The pidhash table and chained lists -- How Processes Are Organized -- Wait queues -- Handling wait queues -- Process Resource Limits -- Process Switch -- Hardware Context -- Task State Segment -- The thread field -- Performing the Process Switch -- The switch_to macro -- The _ _switch_to ( ) function -- Saving and Loading the FPU, MMX, and XMM Registers -- Saving the FPU registers -- Loading the FPU registers -- Using the FPU, MMX, and SSE/SSE2 units in Kernel Mode -- Creating Processes -- The clone( ), fork( ), and vfork( ) System Calls -- The do_fork( ) function -- The copy_process( ) function -- Kernel Threads -- Creating a kernel thread -- Process 0 -- Process 1 -- Other kernel threads -- Destroying Processes -- Process Termination -- The do_group_exit( ) function -- The do_exit( ) function -- Process Removal -- Interrupts and Exceptions -- The Role of Interrupt Signals -- Interrupts and Exceptions -- IRQs and Interrupts -- The Advanced Programmable Interrupt Controller (APIC) -- Exceptions -- Interrupt Descriptor Table…”
Libro electrónico -
42291Publicado 2002Tabla de Contenidos: “…Management node configuration -- 5.1 Install xCAT -- 5.2 Populate tables -- 5.2.1 Site definition -- 5.2.2 Hosts file -- 5.2.3 List of nodes and groups -- 5.2.4 Installation resources -- 5.2.5 Node types -- 5.2.6 Node hardware management -- 5.2.7 MPN topology -- 5.2.8 MPA configuration -- 5.2.9 Power control with APC MasterSwitch -- 5.2.10 MAC address collection using Cisco 3500-series -- 5.2.11 Console server configuration -- 5.2.12 Password table -- 5.3 Configure management node services…”
Libro electrónico -
42292Publicado 2003Tabla de Contenidos: “…-- 8.2 Developing message flows -- 8.2.1 Preparations: creating queue managers and defining queues -- 8.2.2 Using the Control Center -- 8.2.3 Creating message flows -- Chapter 9. …”
Libro electrónico -
42293Publicado 2010Tabla de Contenidos: “…Remote Office Topology -- Data Center Topology -- Traffic Flows -- Network Infrastructure Checklist -- Application Characteristics -- Application Requirements Checklist -- Application Optimizer Requirements -- CIFS Accelerator -- Advanced Features -- File Services Utilization -- File Services Requirements Checklist -- MAPI Accelerator -- MAPI Requirements Checklist -- HTTP Accelerator -- HTTP Requirements Checklist -- NFS Accelerator -- NFS Requirements Checklist -- Video Accelerator -- Video Requirements Checklist -- SSL Accelerator -- SSL Requirements Checklist -- Replication Accelerator -- Platform Requirements -- Platform Requirements Checklist -- Scalability Requirements -- Scalability Requirements Checklist -- Availability Requirements -- Availability Checklist -- Management Requirements -- Cisco WAAS Central Manager and XML-API -- SNMP Trap/Inform Routing -- SNMP Community Strings -- Syslog Servers -- Management Requirements Checklist -- Security Requirements -- Security Requirements Checklist -- Virtualization Requirements -- Virtualization Requirements Checklist -- Summary -- Chapter 4 Network Integration and Interception -- Interface Connectivity -- Link Aggregation Using PortChannel -- PortChannel Configuration -- Using the Standby Interface Feature -- Standby Interface Configuration -- Interception Techniques and Protocols -- Web Cache Communication Protocol -- WCCP Overview -- Service Groups -- Forwarding and Return Methods -- Load Distribution -- Failure Detection -- Flow Protection -- Graceful Shutdown -- Scalability -- Redirect Lists -- Service Group Placement -- WCCP Configuration -- Hardware-Based Platforms -- Policy-Based Routing -- Inline Interception -- Content Switching -- Application Control Engine -- Egress Methods -- Directed Mode -- Network Integration Best Practices -- Summary -- Chapter 5 Branch Office Network Integration…”
Libro electrónico -
42294Publicado 2020Tabla de Contenidos: “…- Gabriel Diniz Junqueira Barbosa and Simone Diniz Junqueira Barbosa 203 -- 5.4 Building a Trustworthy Explainable AI in Healthcare - Retno Larasati and Anna DeLiddo 209 -- 5.5 A View from Outside the Loop - Anders Hedman 215 -- 5.6 Nonverbal Communication in Human-AI Interaction: Opportunities and Challenges - Joshua Newn, Ronal Singh, Fraser Allison, Prashan Madumal, Eduardo Velloso and Frank Vetere 221 -- 5.7 MARVIN: Identifying Design Requirements for an AI powered Conversational User Interface for Extraterrestrial Space Habitats - Youssef Nahas, Christiane Heinicke and Johannes Schoning ̈ 227 -- 5.8 You should not control what you do not understand: the risks of controllability in AI - Gabriel Diniz Junqueira Barbosa and Simone Diniz Junqueira Barbosa 231 -- 5.9 Using AI to Improve Product Teams' Customer Empathy - Valentina Grigoreanu, Monty Hammontree and Travis Lowdermilk 237 -- 5.10 Supporting the Experience of Stakeholders of Multimedia Art Towards an Ontology - Danzhu Li and Gerrit C. van der Veer 243 -- 6 Handling Security, Usability, User Experience and Reliability in User-Centered Development Processes 253 -- 6.1 Characterizing Sets of Systems: Across-Systems Properties and their Representation - Elodie Bouzekri, Alexandre Canny, C`elia Martinie and Philippe Palanque 255 -- 6.2 Aligning Security, Usability, User Experience: A Pattern Approach - Bilal Naqvi, Jari Porras, Shola Oyedeji and Mehar Ullah 267 -- 6.3 Towards Intelligent User Interfaces to Prevent Phishing Attacks - Joseph Aneke, Carmelo Ardito and Giuseppe Desolda 279 -- vi Human Computer Interaction and Emerging Technologies 6.4 Selecting the Best Agile Team for Developing a Web Service - Marta Kristin Larusdottir and Marcel Kyas 289 -- 6.5 A Model-based Framework for Context-aware Augmented Reality Applications - Enes Yigitbas, Ivan Jovanovikj, Stefan Sauer and Gregor Engels 303 -- 7 Pushing the Boundaries of Participatory Design 313 -- 7.1 Adapting UCD for Designing Learning Experiences for Romanian Preschoolers. …”
Libro electrónico -
42295por Faget, DanielTabla de Contenidos: “…Échanges internationaux des ressources de la mer en Méditerranée -- Échanger des ressources alimentaires -- L'Atlantique en Méditerranée -- Marseille et Livourne, ports de décharge de la morue océanique -- Commerce du hareng et consignataires sans frontières -- Négoce marseillais et pêches morutières -- Une ressource alimentaire spécifique: la boutargue méditerranéenne -- Des gonades de muges et de thons -- Représentations et usages -- Une géographie de la boutargue dans la Méditerranée moderne -- Entre mer Baltique et mer Noire: les flux de caviar dans la Méditerranée moderne -- Un produit non alimentaire dominant: l'éponge de Méditerranée -- État des sources et de la recherche -- Le constat d'un vide historiographique -- Réévaluer les sources -- Un nécessaire traitement informatique -- Des usages variés à l'époque moderne -- Volumes et lieux de provenance sous l'Ancien Régime -- Espaces de pêche et de négoce -- Estimation des tonnages distribués au XVIIIe siècle -- Un commerce contrôlé par le négoce de la rive Nord -- Des négociants de Marseille et de Livourne -- Rentabilité du commerce de l'éponge méditerranéenne -- Espèces exploitée et techniques de pêche -- Espèces commerciales et variation des qualités -- Appréhender le marché des éponges modernes -- Le peuple invisible des pêcheurs d'éponges: hommes et techniques -- Poussières de cales -- Exploiter la soie de mer -- Connaître la grande nacre à l'époque moderne -- Géographie et produits de la soie de mer au XVIIIe siècle -- De la soie de mer en Provence ? …”
Publicado 2021
Electrónico -
42296Publicado 2023Tabla de Contenidos: “…-- Evaluating Architectural Fit and Integration -- Evaluating Actual Operational Work Involved -- The Difference between Monitoring and Participation -- Finding the Right Guidance -- HIPAA/HITECH -- HITRUST -- PCI-DSS -- ISO Information Security Management Standards 27001, 27002, 27017, 27018 -- ISO/IEC 27018 - Public Cloud PII Protection -- ISO/IEC 27017 - Cloud Services Security Controls -- Certified Vendors ISO 17021, and Separation of Duties -- American Institute of Certified Public Accountants/Service Organizational Controls Reports -- NIST Cybersecurity Framework (NIST CSF) -- CSA CCM, CAIQ, and STAR Registry -- CURES Act and HITECH Certification Requirements -- What Does This All Mean?…”
Libro electrónico -
42297Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Statistics Essentials -- Chapter 1: Getting Started with R -- Technical requirements -- Introducing R -- Covering the R and RStudio basics -- Common data types in R -- Common data structures in R -- Vector -- Matrix -- Data frame -- List -- Control logic in R -- Relational operators -- Logical operators -- Conditional statements -- Loops -- Exploring functions in R -- Summary -- Chapter 2: Data Processing with dplyr -- Technical requirements -- Introducing tidyverse and dplyr -- Data transformation with dplyr -- Slicing the dataset using the filter() function -- Sorting the dataset using the arrange() function -- Adding or changing a column using the mutate() function -- Selecting columns using the select() function -- Selecting the top rows using the top_n() function -- Combining the five verbs -- Introducing other verbs -- Data aggregation with dplyr -- Counting observations using the count() function -- Aggregating data via group_by() and summarize() -- Data merging with dplyr -- Case study - working with the Stack Overflow dataset -- Summary -- Chapter 3: Intermediate Data Processing -- Technical requirements -- Transforming categorical and numeric variables -- Recoding categorical variables -- Creating variables using case_when() -- Binning numeric variables using cut() -- Reshaping the DataFrame -- Converting from long format into wide format using spread() -- Converting from wide format into long format using gather() -- Manipulating string data -- Creating strings -- Converting numbers into strings -- Connecting strings -- Working with stringr -- Basics of stringr -- Pattern matching in a string -- Splitting a string -- Replacing a string -- Putting it together -- Introducing regular expressions -- Working with tidy text mining…”
Libro electrónico -
42298Publicado 2024Tabla de Contenidos: “…-- How to access and store data with the Windows Registry -- Comparing the Windows Registry to JSON settings files -- Worker Services -- Docker support -- Dissecting the Worker Service -- Controlling the lifetime of the service -- Wrapping up Worker Services -- WMI -- How to use WMI -- Reading the CPU temperature -- Reading the BIOS -- Controlling the Windows Update service -- Watching USB devices -- Registry and WMI - risks and how to avoid them -- The Windows Registry -- Potential risks when dealing with WMI -- Next steps -- Chapter 8: The One with the Network Navigation -- Technical requirements -- The fundamentals -- A walk down the OSI layers -- Exploring the System.Net namespace -- Understanding HTTP/HTTPS -- FTP -- Email protocols -- Working with the System.Net.Sockets namespace -- Steps to take when using sockets -- IPv4 and IPv6 -- Looking up time with sockets -- Async, non-blocking networking -- Making asynchronous calls -- Networking performance -- Connection pooling -- Caching -- Compression and serialization -- Keep-alive connections -- Networking errors and time-outs -- Using the HTTPClient wisely -- Implementing retries with Polly -- The circuit breaker pattern -- Validating network availability -- Monitoring and logging -- Next steps -- Chapter 9: The One with the Hardware Handshakes -- Technical requirements…”
Libro electrónico -
42299Publicado 2020Tabla de Contenidos: “…Front Cover -- Title Page -- Copyright Page -- About the Authors -- Preface -- Organization and New Content -- Featured Figures -- Acknowledgments -- Brief Contents -- Detailed Contents -- Introduction: Evolution and the Foundations of Biology -- Overview Inquiring About Life -- Concept 1.1 The study of life reveals unifying themes -- Theme: New Properties Emerge at Successive Levels of Biological Organization -- Theme: Life's Processes Involve the Expression and Transmission of Genetic Information -- Theme: Life Requires the Transfer and Transformation of Energy and Matter -- Theme: Organisms Interact with Other Organisms and the Physical Environment -- Concept 1.2 The Core Theme: Evolution accounts for the unity and diversity of life -- Classifying the Diversity of Life -- Unity in the Diversity of Life -- Charles Darwin and the Theory of Natural Selection -- The Tree of Life -- Concept 1.3 In studying nature, scientists form and test hypotheses -- Exploration and Discovery -- Gathering and Analyzing Data -- Forming and Testing Hypotheses -- The Flexibility of the Scientific Process -- A Case Study in Scientific Inquiry: Investigating Coat Coloration in Mouse Populations -- Variables and Controls in Experiments -- Theories in Science -- Science as a Social Process -- Unit 1 Chemistry and Cells -- 2 The Chemical Context of Life -- Overview The Importance of Chemistry to Life -- Concept 2.1 Matter consists of chemical elements in pure form and in combinations called compounds -- Elements and Compounds -- The Elements of Life -- Evolution of Tolerance to Toxic Elements -- Concept 2.2 An element's properties depend on the structure of its atoms -- Subatomic Particles -- Atomic Number and Atomic Mass -- Isotopes -- The Energy Levels of Electrons -- Electron Distribution and Chemical Properties…”
Libro electrónico -
42300por Charantimath, Poornima M.Tabla de Contenidos: “…Cover -- About the Author -- Preface -- Acknowledgements -- Contents -- Chapter 1: Modern Small Business Enterprises -- Role of Small-scale Industries -- Impact of Globalisation on SSI in India -- Impact of the WTO on SSIs -- WTO: Pros and Cons -- Concepts and Definitions of SSI -- Calculation of the Value of the Plant and Machinery -- Government Policy and Development of the Small-scale Sector in India -- Industrial Policy 1991 -- Policy Initiatives Since 1999 -- Growth and Performance of Small Scale Industries in India -- Pre-and Post-liberalisation Periods -- Performance of Small-scale Industries in India -- Share of Small-scale Industrial Units in Total Exports -- Third All India Census of SSI Sector -- Small and Medium Enterprises (SME) in Other Countries -- International SME Network (lNSME)-Background -- Composition of INSME Steering Group -- Definitions of SMEs in Various Countries -- Problems for Small-scale Industries -- Prospects of the Small-scale Industries in a Free Economy -- Quality Control -- Marketing Arrangements -- Advertisement -- Recovery of Receivables -- Professionalism in Management -- Inventory Control -- Opportunities -- Summary -- Key Words -- Exercises -- References -- Annexure 1.1 -- Annexure 1.2 -- Chapter 2: Entrepreneurship -- Importance of Entrepreneurship -- Charms of Being an Entrepreneur -- Why Should You Become an Entrepreneur? …”
Publicado 2005
Libro electrónico