Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 77
- Management 56
- Computer networks 30
- Engineering & Applied Sciences 26
- Business & Economics 24
- Computer security 23
- Security measures 22
- Finance 21
- Leadership 21
- Business 20
- Historia 20
- Social aspects 20
- Computer science 19
- Data processing 18
- Information technology 18
- Development 17
- Examinations 17
- Application software 15
- Computer Science 15
- Electronic data processing 15
- Politics and government 15
- Prevention 15
- Economic aspects 14
- Certification 13
- Social conditions 13
- International business enterprises 12
- Success in business 12
- Technological innovations 12
- Big data 11
- Data mining 11
-
1021
-
1022
-
1023Publicado 2021Libro electrónico
-
1024Publicado 2010Tabla de Contenidos: “…-- The Single Variable -- Locking -- Causes of Concurrency -- Knowing What to Protect -- Deadlocks -- Contention and Scalability -- Conclusion -- 10 Kernel Synchronization Methods -- Atomic Operations -- Atomic Integer Operations -- 64-Bit Atomic Operations -- Atomic Bitwise Operations -- Spin Locks -- Spin Lock Methods -- Other Spin Lock Methods -- Spin Locks and Bottom Halves -- Reader-Writer Spin Locks -- Semaphores -- Counting and Binary Semaphores -- Creating and Initializing Semaphores -- Using Semaphores -- Reader-Writer Semaphores -- Mutexes -- Semaphores Versus Mutexes -- Spin Locks Versus Mutexes -- Completion Variables -- BKL: The Big Kernel Lock -- Sequential Locks -- Preemption Disabling -- Ordering and Barriers -- Conclusion -- 11 Timers and Time Management -- Kernel Notion of Time -- The Tick Rate: HZ -- The Ideal HZ Value -- Advantages with a Larger HZ -- Disadvantages with a Larger HZ -- Jiffies -- Internal Representation of Jiffies -- Jiffies Wraparound -- User-Space and HZ -- Hardware Clocks and Timers -- Real-Time Clock -- System Timer -- The Timer Interrupt Handler -- The Time of Day -- Timers -- Using Timers -- Timer Race Conditions -- Timer Implementation -- Delaying Execution -- Busy Looping -- Small Delays…”
Libro electrónico -
1025Publicado 2016Libro electrónico
-
1026Publicado 2018Tabla de Contenidos: “…Model deployment -- Summary -- Clients Chapter 8: Subscription Assessment for Bank Telemarketing using Deep Neural Networks -- Client subscription assessment through telemarketing -- Dataset description -- Installing and getting started with Apache Zeppelin -- Building from the source -- Starting and stopping Apache Zeppelin -- Creating notebooks -- Exploratory analysis of the dataset -- Label distribution -- Job distribution -- Marital distribution -- Education distribution -- Default distribution -- Housing distribution -- Loan distribution -- Contact distribution -- Month distribution -- Day distribution -- Previous outcome distribution -- Age feature -- Duration distribution -- Campaign distribution -- Pdays distribution -- Previous distribution -- emp_var_rate distributions -- cons_price_idx features -- cons_conf_idx distribution -- Euribor3m distribution -- nr_employed distribution -- Statistics of numeric features -- Implementing a client subscription assessment model -- Hyperparameter tuning and feature selection -- Number of hidden layers -- Number of neurons per hidden layer -- Activation functions -- Weight and bias initialization -- Regularization -- Summary -- Chapter 9: Fraud Analytics Using Autoencoders and Anomaly Detection -- Outlier and anomaly detection -- Autoencoders and unsupervised learning -- Working principles of an autoencoder -- Efficient data representation with autoencoders -- Developing a fraud analytics model -- Description of the dataset and using linear models -- Problem description -- Preparing programming environment -- Step 1 - Loading required packages and libraries -- Step 2 - Creating a Spark session and importing implicits -- Step 3 - Loading and parsing input data -- Step 4 - Exploratory analysis of the input data -- Step 5 - Preparing the H2O DataFrame -- Step 6 - Unsupervised pre-training using autoencoder…”
Libro electrónico -
1027Hire with your head using performance-based hiring to build outstanding diverse teamsHire With Your HeadHire With Your HeadPublicado 2022Tabla de Contenidos: “…-- SUMMARY: AVOID THE 90-DAY WONDERS -- Chapter 4: Developing a Bias-Free Hiring Process -- CONDUCT A PRE-HIRE PERFORMANCE REVIEW -- USE ORGANIZED PANEL INTERVIEWS -- SCRIPT THE INTERVIEW AND GIVE CANDIDATES THE QUESTIONS -- WAIT 30 MINUTES BEFORE MAKING ANY YES OR NO DECISION -- TREAT CANDIDATES AS CONSULTANTS -- MEASURE FIRST IMPRESSIONS LAST -- SUMMARY -- NOTE -- Chapter 5: Using the BEST Test to Reduce Unconscious Bias -- TWO HUGE FLAWS IN PERSONALITY ASSESSMENTS THAT ARE OFTEN IGNORED -- PERSONALITY ASSESSMENTS ARE VALUABLE WHEN USED LATER IN THE HIRING PROCESS…”
Libro electrónico -
1028Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Building a Vulnerable Web Application Lab -- Downloading Mutillidae -- Installing Mutillidae on Windows -- Downloading and installing XAMPP -- Mutillidae installation -- Installing Mutillidae on Linux -- Downloading and installing XAMPP -- Mutillidae installation -- Using Mutillidae -- User registration -- Showing hints and setting security levels -- Application reset -- OWASP Top 10 -- Summary -- Chapter 2: Kali Linux Installation -- Introducing Kali Linux -- Installing Kali Linux from scratch -- Installing Kali on VMware -- Installing Kali on VirtualBox -- Bridged versus NAT versus Internal Network -- Updating Kali Linux -- Summary -- Chapter 3: Delving Deep into the Usage of Kali Linux -- The Kali filesystem structure -- Handling applications and packages -- The Advanced Packaging Tool -- Debian's package management system -- Using dpkg commands -- Handling the filesystem in Kali -- File compression commands -- Security management -- Secure shell protocol -- Configuring network services in Kali -- Setting a static IP on Kali -- Checking active connections in Kali -- Process management commands -- Htop utility -- Popular commands for process management -- System info commands -- Summary -- Chapter 4: All About Using Burp Suite -- An introduction to Burp Suite -- A quick example -- Visualizing the application structure using Burp Target -- Intercepting the requests/responses using Burp Proxy -- Setting the proxy in your browser -- BURP SSL certificate -- Burp Proxy options -- Crawling the web application using Burp Spider -- Manually crawling by using the Intruder tool -- Automated crawling and finding hidden spots -- Looking for web vulnerabilities using the scanner -- Replaying web requests using the Repeater tab…”
Libro electrónico -
1029por Brown, Jason“…You'll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. …”
Publicado 2023
Libro electrónico -
1030Publicado 2018“…Discover how: Fast-data systems ingest, analyze, act upon, and export data while meeting stringent non-functional requirements Openet evolved its mediation product with a VoltDB system to process 1 trillion real-time events per day Nokia seamlessly transitioned to NFV and SDN to deliver converged broadband and IoT communication Emagine used VoltDB to provide real-time analysis of network subscriber data based on event triggers Nimble upgraded its predictive analytics platform to predict, diagnose, and prevent performance problems in IoT storage arrays…”
Libro electrónico -
1031
-
1032Publicado 2022Libro electrónico
-
1033
-
1034Publicado 2021Tabla de Contenidos: “…Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Acknowledgments -- Foreword -- Part I: Overview -- Chapter 1: Introduction -- Chapter 2: What Is Zero Trust? …”
Libro electrónico -
1035Publicado 2024Libro electrónico
-
1036
-
1037Publicado 2017Libro electrónico
-
1038
-
1039Publicado 2017“…To learn about current national and international efforts to develop the capacity to communicate effectively during times of infectious disease outbreaks, and to explore gaps in the research agenda that may help address communication needs to advance the field, the Forum on Microbial Threats of the National Academies of Sciences, Engineering, and Medicine convened a 1.5 day workshop on December 13 and 14, 2016, in Washington, DC. …”
Libro electrónico -
1040Publicado 2021Tabla de Contenidos: “…-- At COP26, Governments Must Make the Leap On Enforceable and Rising Carbon Pricing -- Pricing Can Trigger Rapid Changes in Behaviours -- Time to Announce a 'C-Day' -- The Price of Carbon - Set a Minimum, a Timeline, and an Adjustable Glidepath -- Cap-and-trade Schemes -- Europe's ETS - the World Leader, Despite Troubles -- China's ETS - a Lot of Room to Grow -- Whither the US On Carbon Pricing -- A Thin Regional Patchwork, With Some Successes -- A National US ETS is Needed -- Learn Lessons and Apply Them Globally and Locally -- Carbon Prices: How High is High Enough? …”
Libro electrónico