Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,441
- Development 2,745
- History 2,708
- Application software 2,127
- Management 1,940
- Engineering & Applied Sciences 1,776
- Gestió de projectes 1,510
- Computer networks 1,289
- Data processing 1,177
- Security measures 1,169
- Computer Science 1,146
- Filosofía 1,111
- Computer security 1,090
- Prevention 1,063
- TFM 1,037
- Computer programs 1,006
- Business & Economics 925
- Artificial intelligence 903
- Computer software 902
- Cloud computing 896
- Education 875
- Design 873
- Universidad Pontificia de Salamanca (España) 860
- Història 859
- Social aspects 807
- Python (Computer program language) 795
- Crítica e interpretación 793
- Project management 784
- Web site development 771
- Computer programming 756
-
5361Publicado 2014“…Master the crucial risk management and procurement tasks that are indispensable to project success! In Mastering Risk and Procurement in Project Management, expert project manager and seasoned professor Wilson addresses every stage of the project where risk management and procurement are relevant, especially planning, monitoring, and control. …”
Libro electrónico -
5362Publicado 2022Tabla de Contenidos: “…Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Introduction -- Chapter 1: The Building Blocks of Computer Vision -- What Is Computer Vision -- Applications -- Classification -- Object Detection and Localization -- Image Segmentation -- Anomaly Detection -- Video Analysis -- Channels -- Convolutional Neural Networks -- Receptive Field -- Local Receptive Field -- Global Receptive Field -- Pooling -- Max Pooling -- Average Pooling -- Global Average Pooling -- Calculation: Feature Map and Receptive Fields -- Kernel -- Stride -- Pooling -- Padding -- Input and Output -- Calculation of Receptive Field -- Understanding the CNN Architecture Type -- Understanding Types of Architecture -- AlexNet -- VGG -- ResNet -- Inception Architectures -- Working with Deep Learning Model Techniques -- Batch Normalization -- Dropouts -- Data Augmentation Techniques -- Introduction to PyTorch -- Installation -- Basic Start -- Summary -- Chapter 2: Image Classification -- Topics to Cover -- Defining the Problem -- Overview of the Approach -- Creating an Image Classification Pipeline -- First Basic Model -- Data -- Data Exploration -- Data Loader -- Define the Model -- The Training Process -- The Second Variation of Model -- The Third Variation of the Model -- The Fourth Variation of the Model -- Summary -- Chapter 3: Building an Object Detection Model -- Object Detection Using Boosted Cascade -- R-CNN -- The Region Proposal Network -- Fast Region-Based Convolutional Neural Network -- How the Region Proposal Network Works -- The Anchor Generation Layer -- The Region Proposal Layer -- Mask R-CNN -- Prerequisites -- YOLO -- YOLO V2/V3 -- Project Code Snippets -- Step 1: Getting Annotated Data -- Step 2: Fixing the Configuration File and Training -- The Model File -- Summary -- Chapter 4: Building an Image Segmentation Model…”
Libro electrónico -
5363
-
5364Publicado 2022Materias: “…Project management…”
Libro electrónico -
5365Publicado 2018“…Determine how to move your project along by discussing what really matters instead of checking off boxes…”
-
5366Publicado 2021“…Between Daily Routine and Violent Protest…”
Libro electrónico -
5367
-
5368
-
5369Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Foreword -- Table of Contents -- Preface -- Part 1: Getting Started with Full-Stack Development -- Chapter 1: Preparing for Full-Stack Development -- Technical requirements -- Motivation to become a full-stack developer -- What is new in this release of Full-Stack React Projects? -- Getting the most out of this book -- Setting up the development environment -- Installing VS Code and extensions -- Setting up a project with Vite -- Setting up ESLint and Prettier to enforce best practices and code style -- Setting up Husky to make sure we commit proper code -- Summary -- Chapter 2 Getting to Know Node.js and MongoDB -- Technical requirements -- Writing and running scripts with Node.js -- Similarities and differences between JavaScript in the browser and in Node.js -- Creating our first Node.js script -- Handling files in Node.js -- Concurrency with JavaScript in the browser and Node.js -- Creating our first web server -- Extending the web server to serve our JSON file -- Introducing Docker, a platform for containers -- The Docker platform -- Installing Docker -- Creating a container -- Accessing Docker via VS Code -- Introducing MongoDB, a document database -- Setting up a MongoDB server -- Running commands directly on the database -- Accessing the database via VS Code -- Accessing the MongoDB database via Node.js -- Summary -- Part 2: Building and Deploying Our First Full-Stack Application with a REST API -- Chapter 3: Implementing a Backend Using Express, Mongoose ODM, and Jest -- Technical requirements -- Designing a backend service -- Creating the folder structure for our backend service -- Creating database schemas using Mongoose -- Defining a model for blog posts -- Using the blog post model -- Defining creation and last update dates in the blog post…”
Libro electrónico -
5370
-
5371Publicado 2006“…Cisco Press networking technology series Advanced host intrusion prevention with CSA…”
Libro electrónico -
5372por Snedaker, SusanTabla de Contenidos: “…Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. …”
Publicado 2006
Libro electrónico -
5373Publicado 2005Tabla de Contenidos: “…Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. APPC Protected Conversation introduction and theory -- 1.1 Introduction to APPC Protected Conversation -- 1.1.1 What it is -- 1.1.2 Why it is needed -- Chapter 2. …”
Libro electrónico -
5374
-
5375Publicado 2008“…Coverage includes Relating the PMBOK R Guide ideals to agile practices: similarities, overlaps, and differences Understanding the role and value of agile techniques such as iteration/release planning and retrospectives Using agile techniques to systematically and continually reduce risk Implementing quality assurance (QA) where it belongs: in analysis, design, defect prevention, and continuous improvement Learning to trust your teams and listen for their discoveries Procuring, purchasing, and contracting for software in agile, collaborative environments Avoiding the common mistakes software teams make in transitioning to agile Coordinating with project management offices and non-agile teams “Selling” agile within your teams and throughout your organization For every project manager who wants to become more agile. …”
Libro electrónico -
5376por Ibrahim, DoganTabla de Contenidos: “…Front Cover; Advanced PIC Microcontroller Projects in C; Copyright Page; Contents; Preface; Acknowledgments; Chapter 1: Microcomputer Systems; 1.1 Introduction; Chapter 2: PIC18F Microcontroller Series; Chapter 3: C Programming Language; Chapter 4: Functions and Libraries in mikroC; Chapter 5: PIC18 Development Tools; Chapter 6: Simple PIC18 Projects; Chapter 7: Advanced PIC18 Projects-SD Card Projects; Chapter 8: Advanced PIC18 Projects-USB Bus Projects; 8.6 mikroC Language USB Bus Library Functions; Chapter 9: Advanced PIC18 Projects-CAN Bus Projects…”
Publicado 2008
Libro electrónico -
5377por Zammetti, Frank W.Tabla de Contenidos: “…The Preliminaries -- Introducing Web Development with Ext JS -- Widgets and Advanced Ext JS -- The Projects -- Ext JS for a Busy Lifestyle: OrganizerExt -- Making Project Management Cool: TimekeeperExt -- A Place for Your Stuff: Code Cabinet Ext -- When the Yellow Pages Just Isn’t Cool Enough: Local Business Search -- Your Dad Had a Workbench, Now So Do You: SQL Workbench -- All Work and No Play: Dueling Cards -- Managing Your Finances: Finance Master…”
Publicado 2009
Libro electrónico -
5378Publicado 2003Tabla de Contenidos: “…Investigations: General Comments; Chapter 12. Security and Protective Lighting; Chapter 13. Crime Prevention through Environmental Design: CPTED; Chapter 14. …”
Libro electrónico -
5379por Bouchoux, Deborah E., 1950-Tabla de Contenidos: “…Intro -- Contents -- Figures -- Preface -- 1 Recognizing and Protecting Your Company's Intellectual Property -- 2 Trademark Basics -- 3 Trademark Selection and Searching -- 4 The Trademark Application Process -- 5 Maintaining, Monitoring, and Transferring Your Trademark -- 6 Trademark Infringement, Cancellations, and Dilution -- 7 Trademarks and the Internet -- 8 Copyright Basics -- 9 The Rights of Copyright Owners -- 10 The Copyright Application Process: Ownership, Registration, Notices, Duration, and Transfers -- 11 Copyright Infringement -- 12 Emerging Copyright Trends: Software Usage and Internet Policies -- 13 Patent Basics -- 14 Patent Searching, Patent Applications, Duration, and Transfers -- 15 Patent Infringement -- 16 Emerging Patent Trends -- 17 Trade Secret Basics -- 18 Unfair Competition -- 19 Owning the Work Product of Your Employees and Independent Contractors -- 20 Internal Processes for Greater Protection: Audits and Infringement Policies -- Appendix Information Resources -- Index…”
Publicado 2001
Libro electrónico -
5380Publicado 2014Tabla de Contenidos: “…Introduction to Raspberry Pi -- LED blinker project -- MP3 player project -- Camera controller -- GPS -- Earthquake detector -- Home automation -- Home security controller -- NFC/RFID reader -- 1-wire weather station -- Local and remote logic controller -- Robotic car -- Radon detector -- Serving up time with an RTC and NTP…”
Libro electrónico