Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
42561por Rybaric, RobertTabla de Contenidos: “…Solution dependencies -- Solution segmentation -- Patching and updating solutions -- Solution patch -- Solution updates -- Microsoft updates -- Major Power Platform updates -- First-party applications updates -- Power Platform hotfixes -- Introducing Azure DevOps for the Power Platform -- Overview of Power Platform Build Tools -- Helper and quality check tasks -- Solution tasks -- Environment tasks -- Azure DevOps with Power Platform Build Tools -- Committing a solution to the source control -- Distributing solutions between development environments -- Distributing solutions out of development -- Pipeline versus Release -- Introducing GitHub for the Power Platform -- Application lifecycle management for Power BI -- Environments in Power BI -- Power BI components -- Power BI ALM approach -- Power BI deployment pipelines -- Application lifecycle management for other solution components -- Application lifecycle management best practices -- Solution best practices -- General practices -- Unmanaged versus managed -- Structuring solutions -- Using segmentation -- Using source control -- Solution publishers' best practices -- Power BI best practices -- Contoso Inc. …”
Publicado 2023
Libro electrónico -
42562Publicado 2022Tabla de Contenidos: “…: Completing the Profile -- All in the details: Channel and Videos settings -- Controlling the signal: From privacy to connected third parties -- Learning at the Feet of Masters: Following and Subscribing to Twitch Channels -- Following on Twitch -- Subscribing on Twitch -- Other Twitch Resources -- Chapter 2 Turning a Console into a Streamer's Studio -- What's Your Preferred Platform? …”
Libro electrónico -
42563Publicado 2022Tabla de Contenidos: “…-- The DevOps controls -- Separation/segregation of duties -- How to manage the relationship with your regulator -- Summary -- Part 4: Adopt, Scale, and Sustain -- Chapter 9: The DevOps Portfolio Classification and Governance -- What is the value proposition of portfolio classification in the DevOps 360° evolution? …”
Libro electrónico -
42564Publicado 2019Tabla de Contenidos: “…-- Overview of the 10 Project Management Knowledge Areas -- Project Integration Management -- Project Scope Management -- Project Schedule Management -- Project Cost Management -- Project Quality Management -- Quality Planning Process -- Quality Assurance Process -- Quality Control Process -- Project Resource Management -- Project Communications Management -- Who Are the Project Stakeholders? …”
Libro electrónico -
42565Publicado 2024Tabla de Contenidos: “…La reintroducción de controles y “devoluciones en caliente” en las fronteras interiores del espacio Schengen. …”
Libro electrónico -
42566Publicado 2023Tabla de Contenidos: “…. -- Chapter 4: Server Control -- An overview of controlling the database server -- Starting the database server manually -- Getting ready -- How to do it... -- How it works... -- Stopping the server safely and quickly -- How to do it... -- How it works... -- See also -- Stopping the server in an emergency -- How to do it... -- How it works... -- Reloading server configuration files -- How to do it... -- How it works... -- There's more... -- Restarting the server quickly -- How to do it... -- There's more... -- Preventing new connections -- How to do it... -- How it works... -- Restricting users to only one session each -- How to do it... -- How it works... -- Pushing users off the system -- How to do it... -- How it works... -- Deciding on a design for multitenancy -- How to do it... -- How it works... -- Using multiple schemas -- Getting ready -- How to do it... -- How it works... -- Giving users their own private databases -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Running multiple PgBouncer on the same port to leverage multiple cores -- Getting ready -- How to do it...…”
Libro electrónico -
42567por Encalada-Encarnación, Vicente RenéTabla de Contenidos: “…Clases de tecnología -- 3.3. Sistema de control de gestión -- 3.4. Principales indicadores de gestión -- 3.4.1. …”
Publicado 2023
Libro electrónico -
42568
-
42569Publicado 2010Tabla de Contenidos: “…Modifying Code with the Tag Inspector -- Rapid Tag Modification with the Quick Tag Editor -- Adding Java Applets -- Managing JavaScript and VBScript -- Validating Your XML Pages -- Inserting Symbols and Special Characters -- Summary -- Chapter 6: Building Style Sheet Web Pages -- Understanding Cascading Style Sheets -- Working with the CSS Styles Panel -- Creating and Applying Styles -- Styles and Their Attributes -- Design-Time Style Sheets -- Summary -- Chapter 7: Working with Text -- Starting with Headings -- Working with Paragraphs -- Checking Your Spelling -- Using Find and Replace -- Controlling Whitespace -- Working with Microsoft Office Documents -- Styling Your Text -- Modifying Text Format -- Incorporating Dates -- Commenting Your Code -- Summary -- Chapter 8: Inserting Images -- Using Images Inline -- Adding Background Images -- Dividing the Web Page with Horizontal Rules -- Including Banner Ads -- Inserting Rollover Images -- Summary -- Chapter 9: Establishing Web Links -- Understanding URLs -- Surfing the Web with Hypertext -- Adding an E-mail Link -- Navigating with Anchors -- Targeting Your Links -- Summary -- Part III: Adding Advanced Design Features -- Chapter 10: Working with Divs and AP Elements -- Divs and AP Elements 101 -- Placing < -- div> -- Tags -- Creating AP Elements with Dreamweaver -- Modifying an AP Element -- Creating Your Page Design with AP Elements -- Activating AP Elements with Behaviors -- Summary -- Chapter 11: Using Behaviors -- Understanding Behaviors, Events, and Actions -- Attaching a Behavior -- Installing, Managing, and Modifying Behaviors -- Summary -- Chapter 12: Setting Up Tables -- HTML Table Fundamentals -- Inserting Tables in Dreamweaver -- Modifying Tables -- Sorting Tables -- Importing Tabular Data -- Summary -- Chapter 13: Interactive Forms -- How HTML Forms Work…”
Libro electrónico -
42570Publicado 2018Tabla de Contenidos: “…Introduction to reactive programming -- Spring Reactive -- ReactiveX -- Introduction to Command Query Responsibility Segregation -- Introduction to the Event Sourcing pattern -- Introduction to Eventual consistency -- Building an event-driven Reactive Asynchronous System -- Introducing Spring Cloud Streaming -- Adding Kafka to your application -- Installing and running Kafka -- Configuration properties for Kafka -- Service used to write to Kafka -- Rest API controller -- Listening to a Kafka topic -- Summary -- Chapter 10: Building Resilient Systems Using Hystrix and Turbine -- Circuit-breaker pattern -- Using the Hystrix library with a reference implementation -- Configuring Hystrix in your application -- Maven dependency -- Enabling circuit-breaker -- Adding the Hystrix annotation in services -- Error propagation -- Implementing a REST controller in customer service -- Building and testing customer service -- Customizing the default configuration -- Hystrix Metrics Stream -- Implementing Hystrix Dashboard in our project -- Turbine dashboard -- Turbine stream -- REST consumer with Hystrix and Feign -- Summary -- Chapter 11: Testing Spring Boot Application -- Test-driven development -- Unit testing -- Advantages -- Disadvantages -- Other mock libraries -- Integration testing -- Benefits of testing with Spring -- Activating profiles for a test class -- JUnit tests for the Spring Boot application -- Using Mockito for mocking services -- Postman for testing RESTful service contracts -- Summary -- Chapter 12: Containerizing Microservice -- Introducing containers to the microservice architecture -- Virtual machines versus containers -- Benefits of a container-oriented approach -- Drawbacks of a container-oriented approach -- Key concepts of the containers-oriented approach -- Getting started with Docker -- Installing Docker -- Installing Docker on Linux…”
Libro electrónico -
42571Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Control bloat using transaction age -- Getting ready -- How to do it... -- How it works... -- 10. …”
Libro electrónico -
42572Publicado 2017Tabla de Contenidos: “…The curse of dimensionality, the data science plague -- Optimizing KMeans -- Story mutation -- The Equilibrium state -- Tracking stories over time -- Building a streaming application -- Streaming KMeans -- Visualization -- Building story connections -- Summary -- Chapter 11: Anomaly Detection on Sentiment Analysis -- Following the US elections on Twitter -- Acquiring data in stream -- Acquiring data in batch -- The search API -- Rate limit -- Analysing sentiment -- Massaging Twitter data -- Using the Stanford NLP -- Building the Pipeline -- Using Timely as a time series database -- Storing data -- Using Grafana to visualize sentiment -- Number of processed tweets -- Give me my Twitter account back -- Identifying the swing states -- Twitter and the Godwin point -- Learning context -- Visualizing our model -- Word2Graph and Godwin point -- Building a Word2Graph -- Random walks -- A Small Step into sarcasm detection -- Building features -- #LoveTrumpsHates -- Scoring Emojis -- Training a KMeans model -- Detecting anomalies -- Summary -- Chapter 12: TrendCalculus -- Studying trends -- The TrendCalculus algorithm -- Trend windows -- Simple trend -- User Defined Aggregate Functions -- Simple trend calculation -- Reversal rule -- Introducing the FHLS bar structure -- Visualize the data -- FHLS with reversals -- Edge cases -- Zero values -- Completing the gaps -- Stackable processing -- Practical applications -- Algorithm characteristics -- Advantages -- Disadvantages -- Possible use cases -- [Chart annotation] -- Chart annotation -- Co-trending -- Data reduction -- Indexing -- Fractal dimension -- Streaming proxy for piecewise linear regression -- Summary -- Chapter 13: Secure Data -- Data security -- The problem -- The basics -- Authentication and authorization -- Access control lists (ACL) -- Role-based access control (RBAC) -- Access -- Encryption…”
Libro electrónico -
42573Publicado 2012Tabla de Contenidos: “…Perfect Phrases for Gathering Useful Data -- Perfect Phrases to Control Project Costs -- Perfect Phrases to Improve Work Efficiency -- Perfect Phrases to Identify and Prevent "Scope Creep" -- Perfect Phrases to Report Progress to Others -- CHAPTER 14 - Perfect Phrases to TroubleshootProject Problems -- Perfect Phrases to Find Out If There Are Variances from the Plan -- Perfect Phrases to Distinguish Big Problems from Small Problems -- Perfect Phrases to Verify That Project Changes Have Been Included in the Plan -- Perfect Phrases to Explain Why Deviation/Variance Happens and How to Correct It -- Perfect Phrases to Check Team Guidance on Making Time-Cost-Quality Trade-Offs -- Perfect Phrases to Get Management Agreement on "How Late Is 'Late'?" …”
Libro electrónico -
42574por Rothman, DenisTabla de Contenidos: “…Cover -- Copyright -- Packt Page -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with Next-Generation Artificial Intelligence through Reinforcement Learning -- Reinforcement learning concepts -- How to adapt to machine thinking and become an adaptive thinker -- Overcoming real-life issues using the three-step approach -- Step 1 - describing a problem to solve: MDP in natural language -- Watching the MDP agent at work -- Step 2 - building a mathematical model: the mathematical representation of the Bellman equation and MDP -- From MDP to the Bellman equation -- Step 3 - writing source code: implementing the solution in Python -- The lessons of reinforcement learning -- How to use the outputs -- Possible use cases -- Machine learning versus traditional applications -- Summary -- Questions -- Further reading -- Chapter 2: Building a Reward Matrix - Designing Your Datasets -- Designing datasets - where the dream stops and the hard work begins -- Designing datasets -- Using the McCulloch-Pitts neuron -- The McCulloch-Pitts neuron -- The Python-TensorFlow architecture -- Logistic activation functions and classifiers -- Overall architecture -- Logistic classifier -- Logistic function -- Softmax -- Summary -- Questions -- Further reading -- Chapter 3: Machine Intelligence - Evaluation Functions and Numerical Convergence -- Tracking down what to measure and deciding how to measure it -- Convergence -- Implicit convergence -- Numerically controlled gradient descent convergence -- Evaluating beyond human analytic capacity -- Using supervised learning to evaluate a result that surpasses human analytic capacity -- Summary -- Questions -- Further reading -- Chapter 4: Optimizing Your Solutions with K-Means Clustering -- Dataset optimization and control -- Designing a dataset and choosing an ML/DL model…”
Publicado 2020
Libro electrónico -
42575Publicado 2008Tabla de Contenidos: “…Configuration Examples: Frame Relay -- Part X: Network Security -- Chapter 28 IP Access Control List Security -- Access List Numbers -- Using Wildcard Masks -- ACL Keywords -- Creating Standard ACLs -- Applying Standard ACLs to an Interface -- Verifying ACLs -- Removing ACLs -- Creating Extended ACLs -- Applying Extended ACLs to an Interface -- The established Keyword (Optional) -- Creating Named ACLs -- Using Sequence Numbers in Named ACLs -- Removing Specific Lines in Named ACLs Using Sequence Numbers -- Sequence Number Tips -- Including Comments About Entries in ACLs -- Restricting Virtual Terminal Access -- Configuration Examples: ACLs -- Chapter 29 Security Device Manager -- Security Device Manager: Connecting with CLI -- Security Device Manager: Connecting with GUI -- SDM Express Wizard with No CLI Preconfiguration -- Resetting the Router to Factory Defaults Using SDM -- SDM User Interfaces -- SDM Monitor Mode -- Using SDM to Configure a Router to Act as a DHCP Server -- Using SDM to Configure an Interface as a DHCP Client -- Using SDM to Configure NAT/PAT -- What to Do If You Lose SDM Connectivity Because of an erase startup-config Command -- Part XI: Appendixes -- Appendix A: Binary/Hex/Decimal Conversion Chart -- Appendix B: Create Your Own Journal Here…”
Libro electrónico -
42576por Iwazaki, DaltonTabla de Contenidos: “…Troubleshooting WebLogic Server 12c -- Introduction -- Changing log levels to debug -- Getting ready -- How to do it... -- How it works... -- There's more... -- Changing the log levels using WLST -- See also -- Including the time taken field in access.log -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding the time taken field using WLST -- See also -- Enabling verbose garbage collection logging -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enabling the verbose GC with jrcmd -- See also -- Taking thread dumps -- Getting ready -- How to do it... -- How it works... -- See also -- Enabling the JRockit Mission Control Flight Recorder -- Getting ready -- How to do it…”
Publicado 2013
Libro electrónico -
42577Publicado 2014Tabla de Contenidos: “…. -- There's more... -- Adding custom controls in the notebook toolbar -- How to do it... -- There's more... -- See also -- Customizing the CSS style in the notebook -- Getting ready -- How to do it... -- There's more... -- See also -- Using interactive widgets - a piano in the notebook -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating a custom JavaScript widget in the notebook - a spreadsheet editor for pandas -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Processing webcam images in real time from the notebook -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- 4. …”
Libro electrónico -
42578Publicado 2018Tabla de Contenidos: “…Power Consumption Analysis -- 3.2. Managing the Control Signals -- 4. Strategy 1: Revisiting Processor Allocation -- 4.1. …”
Libro electrónico -
42579Publicado 2020Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Chromebook -- Chapter 1 Choosing and Set ting Up Your Chromebook -- Checking Under the Hood of the Chromebook -- The software -- The hardware -- Choosing a Chromebook -- Setting Up Your Chromebook -- Turning on your device -- Selecting a language -- Connecting to the Internet -- Agreeing to the Terms of Service -- Logging In for the First Time -- Logging in using an existing Google Account -- Creating a new Google Account -- Using Chromebook as a guest -- Transitioning to a Chromebook from Mac, Linux, or Windows -- Where to Go Next -- Chapter 2 Working with the Chromebook Desktop -- Accessing the Chromebook Shelf -- Using the Launcher: Chromebook's Start Button -- Navigating the Launcher -- Organizing Launcher Icons -- Setting Up App Shortcuts -- Pinning app shortcuts to your shelf -- Removing app shortcuts from your shelf -- Getting the Scoop in the Status Area -- Taking Charge of Window Controls -- Multitasking with Multiple Windows -- Setting Up a Printer -- Direct connect printing -- Wi-Fi printing -- Cloud printing -- Chapter 3 Sur veying the Chrome Browser -- Navigating the Chrome Browser -- Sizing the Chrome window -- Working with tabs -- Using the Omnibox and the navigation buttons -- Saving your place with the bookmark bar -- Customizing and Controlling Chrome -- Managing bookmarks -- Managing your history and downloads -- Erasing your browsing history -- Going incognito -- Changing Search Engine Providers -- Using Other Browsers -- Chapter 4 Getting Your Hands on the Keyboard and Touchpad -- The Chromebook Keyboard at a Glance -- Using Shortcut Key Combinations -- Configuring Keyboard Settings…”
Libro electrónico -
42580Publicado 2015Tabla de Contenidos: “…Using a Debugger to Intercept Passwords -- Purchased Products -- Password change policies -- Auditing failed logins -- Renaming the SA account -- Disabling the SA account -- Securing endpoints -- Certificate Endpoint Authentication -- Stored procedures as a security measure -- Access to Base Tables Is Not Required -- Enabling Cross Database Chaining -- Minimum permissions possible -- Instant file initialization -- Linked servers -- Securing Linked Servers -- Using SQL Server Management Studio for Linked Server Security Configuration -- Using T-SQL for Linked Server Security Configuration -- Only Allowing Some Groups to Use a Linked Server -- Using policies to secure your instance -- SQL azure specific settings -- Instances that leave the office -- Securing AlwaysOn availability groups -- Securing contained databases -- Contained Databases and AlwaysOn -- SQL CLR -- Extended stored procedures -- Protecting your connection strings -- Database firewalls -- Clear virtual memory pagefile -- User access control (UAC) -- Other domain policies to adjust -- Summary -- Chapter 7 - Analysis Services -- Information in this chapter: -- Logging into analysis services -- Granting Administrative Rights -- Granting Rights to an Analysis Services Database -- Securing analysis services objects -- Data Sources -- Cubes -- Cell Data -- Dimensions -- Dimension Data -- Mining Structures -- Summary -- Chapter 8 - Reporting Services -- Information in this chapter -- Setting up SSRS -- Service Account -- Web Service URL -- Database -- Report Manager URL -- Email Settings -- Execution Account -- Encryption Keys -- Scale-out Deployment -- Logging onto SQL Server Reporting Services for the first time -- Security within reporting services -- Item Roles -- System Roles -- Adding System Roles -- Adding Folder Roles -- Reporting services authentication options…”
Libro electrónico