Mostrando 126,141 - 126,160 Resultados de 127,182 Para Buscar 'Prowent~', tiempo de consulta: 1.65s Limitar resultados
  1. 126141
    Publicado 2003
    “…Additionally several hitherto little known or entirely neglected paintings, drawings, prints and sculptural works are widening the point of view. While project work still was in progress some possibilities of cooperation with relevant exhibitions and broadcasts were utilized. …”
    Libro electrónico
  2. 126142
    Publicado 2024
    “…Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. …”
    Video
  3. 126143
    Publicado 2023
    “…This project-oriented book gives you a hands-on approach to designing, developing, and templating your Snowflake platform delivery. …”
    Libro electrónico
  4. 126144
    Publicado 2019
    “…Thomas Ley arbeitet als Project Manager im Programm Lebenswerte Kommune der Bertelsmann Stiftung. …”
    Libro electrónico
  5. 126145
    por Barrière, Jean-Paul
    Publicado 2019
    “…Dans cette optique, chaque texte approfondit l’analyse d’un ou de plusieurs des modes d’existence de ces débordements industriels dans la cité, en abordant ou combinant quelques-uns des questionnements spécifiques au domaine de la conflictualité environnementale : nature des enjeux et jeux d’acteurs, statuts et fonctions des territoires, dispositifs à l’origine des débordements et de leur contestation, processus d’émergence du conflit et de sa résolution, négociations à l’œuvre, modalités d’expertise et de qualification, répertoires d’actions et grammaires de la protestation, temporalités et temps du conflit, asymétries des rapports et structures de domination locale... …”
    Electrónico
  6. 126146
    por Decourt, Jean‐Claude
    Publicado 2021
    “…D’autres dormaient dans des recueils accessibles aux seuls spécialistes – et ce ne sont pas les moins vivants ! Tous sont présentés, traduits et rapidement commentés. Ces vingt dernières années, les recherches archéologiques, épigraphiques et historiques ont profondément renouvelé ce que nous savons de Lyon dans l’Antiquité. …”
    Electrónico
  7. 126147
    por OECD
    Publicado 2023
    “…Les résultats permettent aussi de faire des comparaisons internationales quantitatives des coûts de main-d'œuvre et de la situation globale vis-à-vis de l'impôt et des prestations des célibataires et des familles à différents niveaux de revenus. Cette publication présente des taux effectifs moyens et marginaux d'imposition sur les coûts de main-d'œuvre pour huit types de ménages représentatifs dont le niveau du salaire et la composition diffèrent (célibataires, parents isolés, couples avec un ou deux salaires et avec ou sans enfant). …”
    Libro electrónico
  8. 126148
    Publicado 2023
    Tabla de Contenidos: “…Propositions/acts passed by other countries -- Special regulations for children and minority groups -- Promoting equality for minority groups -- Educational initiatives -- International AI initiatives and cooperative actions -- Next steps for trustworthy AI -- Proposed solutions and improvement areas -- Summary -- Further reading -- Part 2: Building Blocks and Patterns for a Next-Generation AI Ecosystem -- Chapter 4: Privacy Management in Big Data and Model Design Pipelines -- Technical requirements -- Designing privacy-proven pipelines -- Big data pipelines -- Architecting model design pipelines -- Incremental/continual ML training and retraining -- Scaling defense pipelines -- Enabling differential privacy in scalable architectures -- Designing secure microservices -- Vault -- Cloud security architecture -- Developing in a sandbox environment -- Managing secrets in cloud orchestration services -- Monitoring and threat detection -- Summary -- Further reading -- Chapter 5: ML Pipeline, Model Evaluation, and Handling Uncertainty -- Technical requirements -- Understanding different components of ML pipelines -- ML tasks and algorithms -- Uncertainty in ML -- Types of uncertainty -- Quantifying uncertainty -- Uncertainty in regression tasks -- Uncertainty in classification tasks -- Tools for benchmarking and quantifying uncertainty -- The Uncertainty Baselines library -- Keras-Uncertainty -- Robustness metrics -- Summary -- References -- Chapter 6: Hyperparameter Tuning, MLOps, and AutoML -- Technical requirements -- Introduction to AutoML -- Introducing H2O AutoML -- Understanding Amazon SageMaker Autopilot -- The need for MLOps -- TFX - a scalable end-to-end platform for AI/ML workflows -- Understanding Kubeflow -- Katib for hyperparameter tuning -- Vertex AI -- Datasets -- Training and experiments in Vertex AI -- Vertex AI Workbench -- Summary…”
    Libro electrónico
  9. 126149
    Publicado 2023
    “…Boost your AI and generative AI accuracy using real-world datasets with over 150 functional object-oriented methods and open source libraries Purchase of the print or Kindle book includes a free PDF eBook Key Features Explore beautiful, customized charts and infographics in full color Work with fully functional OO code using open source libraries in the Python Notebook for each chapter Unleash the potential of real-world datasets with practical data augmentation techniques Book Description Data is paramount in AI projects, especially for deep learning and generative AI, as forecasting accuracy relies on input datasets being robust. …”
    Libro electrónico
  10. 126150
    Publicado 2023
    “…What you will learn Create practical Go unit tests using mocks and assertions with Testify Build table-driven test suites for HTTP web applications Write BDD-style tests using the Ginkgo testing framework Use the Godog testing framework to reliably test web applications Verify microservices architecture using Pact contract testing Develop tests that cover edge cases using property testing and fuzzing Who this book is for If you are an intermediate-level developer or software testing professional who knows Go fundamentals and is looking to deliver projects with Go, then this book is for you. Knowledge of Go syntax, structs, functions, and interfaces will help you get the most out of this book…”
    Libro electrónico
  11. 126151
    Publicado 2023
    “…By the end of this book, you'll be able to create and manage temporal systems, prevent SQL injection attacks, use existing functionalities and define your own robust solutions for date management, and apply time zone and region rules. …”
    Libro electrónico
  12. 126152
    Publicado 2023
    “…The volume focuses on the 17th to 19th centuries, but many of the church and clergy-related phenomena are much older, and some of them extend to the present, so the articles also move beyond this time frame…”
    Libro electrónico
  13. 126153
    Publicado 1987
    “…Após termos procedido à publicação de O Povo Português nos Seus Costumes, Crenças e Tradições, também da autoria de Teófilo Braga, que tem sido considerada a primeira grande obra de conjunto da etnografia nacional, impunha-se esta reedição dos Contos Tradicionais do Povo Português, que decerto formam, juntamente com a recolha de Adolfo Coelho disponível nesta colecção, uma das mais importantes colectâneas de narrativas populares do nosso país. Também na presente reedição se manteve a divisão da obra em dois volumes, tal como sucedia na sua edição original…”
    Libro electrónico
  14. 126154
    Publicado 2002
    “…La Commission recommande non seulement la création de nouvelles institutions devenues depuis part entière de l'éducation québécoise, comme le ministère de l'Éducation ou le cégep, mais elle réclame aussi une uniformisation des droits d'accès à la formation et à l'éducation. Claude Corbo présente le Rapport Parent dans le contexte de l'époque. …”
    Libro electrónico
  15. 126155
    Publicado 1997
    “…Les procès-verbaux publiés des conférences du Bureau d'adresse deviennent ainsi un moyen d'accès privilégié à la connaissance des modèles intellectuels de l'âge baroque comme ils portent témoignage sur la crise d'une pensée qui s'est accomplie sur le fond d'une mutation sociale et politique décisive…”
    Libro electrónico
  16. 126156
    Publicado 2024
    “…The first edition of this bestselling book presented an entirely new concept in Photoshop books--one that's designed from the ground up to get you straight to whatever it is you need to do in Photoshop right now, get your answer fast, and get you back to editing your images in Photoshop. …”
    Libro electrónico
  17. 126157
    por Grover, Vikas
    Publicado 2023
    “…This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud. …”
    Libro electrónico
  18. 126158
    Publicado 2023
    “…What you will learn Understand the tactics, techniques, and procedures of reconnaissance Grasp the importance of attack surface management for organizations Find out how to conceal your identity online as an ethical hacker Explore advanced open source intelligence (OSINT) techniques Perform active reconnaissance to discover live hosts and exposed ports Use automated tools to perform vulnerability assessments on systems Discover how to efficiently perform reconnaissance on web applications Implement open source threat detection and monitoring tools Who this book is for If you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. Cybersecurity professionals will find this book useful in determining the attack surface of their organizations and assets on their network, while understanding the behavior of adversaries…”
    Libro electrónico
  19. 126159
    por Nair, Adarsh
    Publicado 2023
    “…Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standards Purchase of the print or Kindle book includes a free PDF eBook Key Features Familiarize yourself with the clauses and control references of ISO/IEC 27001:2022 Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022 Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022 Book Description ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. …”
    Libro electrónico
  20. 126160
    Publicado 2022
    “…Las fotografías de ID Project pertenecen a la Col·lecció d’Art Banc Sabadell, que se ha implicado desde el inicio en el proyecto para hacerlo realidad…”
    Libro