Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,448
- Development 2,745
- History 2,709
- Application software 2,127
- Management 1,940
- Engineering & Applied Sciences 1,776
- Gestió de projectes 1,510
- Computer networks 1,289
- Data processing 1,177
- Security measures 1,169
- Computer Science 1,146
- Filosofía 1,108
- Computer security 1,090
- Prevention 1,063
- TFM 1,037
- Computer programs 1,006
- Business & Economics 925
- Artificial intelligence 903
- Computer software 902
- Cloud computing 896
- Education 875
- Design 873
- Història 871
- Universidad Pontificia de Salamanca (España) 860
- Social aspects 807
- Crítica e interpretación 796
- Python (Computer program language) 795
- Project management 784
- Web site development 771
- Computer programming 756
-
1661Publicado 2018“…Leverage the power of Python to build DIY robotic projects About This Book Design, build, and stimulate collaborative robots Build high-end robotics projects such as a customized personal Jarvis Leverage the power of Python and ROS for DIY robotic projects Who This Book Is For If building robots is your dream, then this book is made for you. …”
Libro electrónico -
1662Publicado 2021“…In the first project, you will create a simple agency site with a contact form, and deploy it to Netlify. …”
Libro electrónico -
1663Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Predict the Class of a Flower from the Iris Dataset -- A multivariate classification problem -- Understanding multivariate -- Different kinds of variables -- Categorical variables -- Fischer's Iris dataset -- The Iris dataset represents a multiclass, multidimensional classification task -- The training dataset -- The mapping function -- An algorithm and its mapping function -- Supervised learning - how it relates to the Iris classification task -- Random Forest classification algorithm -- Project overview - problem formulation -- Getting started with Spark -- Setting up prerequisite software -- Installing Spark in standalone deploy mode -- Developing a simple interactive data analysis utility -- Reading a data file and deriving DataFrame out of it -- Implementing the Iris pipeline -- Iris pipeline implementation objectives -- Step 1 - getting the Iris dataset from the UCI Machine Learning Repository -- Step 2 - preliminary EDA -- Firing up Spark shell -- Loading the iris.csv file and building a DataFrame -- Calculating statistics -- Inspecting your SparkConf again -- Calculating statistics again -- Step 3 - creating an SBT project -- Step 4 - creating Scala files in SBT project -- Step 5 - preprocessing, data transformation, and DataFrame creation -- DataFrame Creation -- Step 6 - creating, training, and testing data -- Step 7 - creating a Random Forest classifier -- Step 8 - training the Random Forest classifier -- Step 9 - applying the Random Forest classifier to test data -- Step 10 - evaluate Random Forest classifier -- Step 11 - running the pipeline as an SBT application -- Step 12 - packaging the application -- Step 13 - submitting the pipeline application to Spark local -- Summary -- Questions…”
Libro electrónico -
1664Publicado 2018“…We'll increase in difficulty throughout the projects, making you learn the nitty-gritty of Xamarin.Forms offerings. …”
Libro electrónico -
1665Publicado 2018“…Beginning with an introduction to the language, Julia Programming Projects goes on to illustrate how to analyze the Iris dataset using DataFrames. …”
Libro electrónico -
1666Publicado 2008Materias: “…Environmental protection Periodicals…”
Revista digital -
1667Publicado 2021Libro electrónico
-
1668
-
1669
-
1670Publicado 2022Tabla de Contenidos: “…More Payloads -- Ransomware as a Service -- Typical Ransomware Process and Components -- Infiltrate -- After Initial Execution -- Dial-Home -- Auto-Update -- Check for Location -- Initial Automatic Payloads -- Waiting -- Hacker Checks C& -- C -- More Tools Used -- Reconnaissance -- Readying Encryption -- Data Exfiltration -- Encryption -- Extortion Demand -- Negotiations -- Provide Decryption Keys -- Ransomware Goes Conglomerate -- Ransomware Industry Components -- Summary -- Chapter 2 Preventing Ransomware -- Nineteen Minutes to Takeover -- Good General Computer Defense Strategy -- Understanding How Ransomware Attacks -- The Nine Exploit Methods All Hackers and Malware Use -- Top Root-Cause Exploit Methods of All Hackers and Malware -- Top Root-Cause Exploit Methods of Ransomware -- Preventing Ransomware -- Primary Defenses -- Everything Else -- Use Application Control -- Antivirus Prevention -- Secure Configurations -- Privileged Account Management -- Security Boundary Segmentation -- Data Protection -- Block USB Keys -- Implement a Foreign Russian Language -- Beyond Self-Defense -- Geopolitical Solutions -- International Cooperation and Law Enforcement -- Coordinated Technical Defense -- Disrupt Money Supply…”
Libro electrónico -
1671
-
1672Publicado 2022Materias:Libro electrónico
-
1673Publicado 2010Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments; The Authors; Introduction; SECTION I: Surfing the Green Wave; Chapter 1: Problem Drivers and Indicators; Chapter 2: Green Project Terminology: The Language of the Green Wave; Chapter 3: Understanding Green Project Fundamentals; Chapter 4: Types of Projects: A Rainbow of Green; SECTION II: Hiking the Project; Chapter 5: Project Ideation; Chapter 6: Developing the Project; Chapter 7: Executing the Project; Chapter 8: Taking the Watch (Monitoring and Controlling); SECTION III: Approaching the Finish Line…”
Libro electrónico -
1674
-
1675Publicado 2020“…Several authors reported on the processes of thermal modification and different chemical wood modification techniques, which are among the latest alternative wood protection methods without the use of biocides. New preservatives and assessment methods of preservative-treated wood products are presented, as well as studies on the natural durability of wood, fire-retardant treated wood, the effect of concrete on wood durability and different novel surface modification techniques using plasma. …”
Libro electrónico -
1676por Organisation for Economic Co-operation and Development“…OECD/G20 Base Erosion and Profit Shifting Project (Series)…”
Publicado 2021
Libro electrónico -
1677Publicado 2023“…They'll also find: Concrete strategies for aligning your security practices with the business Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives…”
Libro electrónico -
1678por Organisation for Economic Co-operation and Development.“…OECD/G20 Projekt Gewinnverkürzung und Gewinnverlagerung…”
Publicado 2016
Libro electrónico -
1679por International Transport Forum.“…This paper starts from the premise that the scope of the appraisal of transport projects should depend upon the presence (or absence) of various forms of market failure. …”
Publicado 2014
Capítulo de libro electrónico -
1680