Mostrando 1,661 - 1,680 Resultados de 127,335 Para Buscar 'Prowent~', tiempo de consulta: 3.36s Limitar resultados
  1. 1661
    Publicado 2018
    “…Leverage the power of Python to build DIY robotic projects About This Book Design, build, and stimulate collaborative robots Build high-end robotics projects such as a customized personal Jarvis Leverage the power of Python and ROS for DIY robotic projects Who This Book Is For If building robots is your dream, then this book is made for you. …”
    Libro electrónico
  2. 1662
    Publicado 2021
    “…In the first project, you will create a simple agency site with a contact form, and deploy it to Netlify. …”
    Libro electrónico
  3. 1663
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Predict the Class of a Flower from the Iris Dataset -- A multivariate classification problem -- Understanding multivariate -- Different kinds of variables -- Categorical variables -- Fischer's Iris dataset -- The Iris dataset represents a multiclass, multidimensional classification task -- The training dataset -- The mapping function -- An algorithm and its mapping function -- Supervised learning - how it relates to the Iris classification task -- Random Forest classification algorithm -- Project overview - problem formulation -- Getting started with Spark -- Setting up prerequisite software -- Installing Spark in standalone deploy mode -- Developing a simple interactive data analysis utility -- Reading a data file and deriving DataFrame out of it -- Implementing the Iris pipeline -- Iris pipeline implementation objectives -- Step 1 - getting the Iris dataset from the UCI Machine Learning Repository -- Step 2 - preliminary EDA -- Firing up Spark shell -- Loading the iris.csv file and building a DataFrame -- Calculating statistics -- Inspecting your SparkConf again -- Calculating statistics again -- Step 3 - creating an SBT project -- Step 4 - creating Scala files in SBT project -- Step 5 - preprocessing, data transformation, and DataFrame creation -- DataFrame Creation -- Step 6 - creating, training, and testing data -- Step 7 - creating a Random Forest classifier -- Step 8 - training the Random Forest classifier -- Step 9 - applying the Random Forest classifier to test data -- Step 10 - evaluate Random Forest classifier -- Step 11 - running the pipeline as an SBT application -- Step 12 - packaging the application -- Step 13 - submitting the pipeline application to Spark local -- Summary -- Questions…”
    Libro electrónico
  4. 1664
    Publicado 2018
    “…We'll increase in difficulty throughout the projects, making you learn the nitty-gritty of Xamarin.Forms offerings. …”
    Libro electrónico
  5. 1665
    Publicado 2018
    “…Beginning with an introduction to the language, Julia Programming Projects goes on to illustrate how to analyze the Iris dataset using DataFrames. …”
    Libro electrónico
  6. 1666
    Publicado 2008
    Materias: “…Environmental protection Periodicals…”
    Revista digital
  7. 1667
    Publicado 2021
    Libro electrónico
  8. 1668
    Publicado 2021
    Libro electrónico
  9. 1669
    Publicado 2021
    Materias:
    Video
  10. 1670
    Publicado 2022
    Tabla de Contenidos: “…More Payloads -- Ransomware as a Service -- Typical Ransomware Process and Components -- Infiltrate -- After Initial Execution -- Dial-Home -- Auto-Update -- Check for Location -- Initial Automatic Payloads -- Waiting -- Hacker Checks C&amp -- C -- More Tools Used -- Reconnaissance -- Readying Encryption -- Data Exfiltration -- Encryption -- Extortion Demand -- Negotiations -- Provide Decryption Keys -- Ransomware Goes Conglomerate -- Ransomware Industry Components -- Summary -- Chapter 2 Preventing Ransomware -- Nineteen Minutes to Takeover -- Good General Computer Defense Strategy -- Understanding How Ransomware Attacks -- The Nine Exploit Methods All Hackers and Malware Use -- Top Root-Cause Exploit Methods of All Hackers and Malware -- Top Root-Cause Exploit Methods of Ransomware -- Preventing Ransomware -- Primary Defenses -- Everything Else -- Use Application Control -- Antivirus Prevention -- Secure Configurations -- Privileged Account Management -- Security Boundary Segmentation -- Data Protection -- Block USB Keys -- Implement a Foreign Russian Language -- Beyond Self-Defense -- Geopolitical Solutions -- International Cooperation and Law Enforcement -- Coordinated Technical Defense -- Disrupt Money Supply…”
    Libro electrónico
  11. 1671
  12. 1672
    Publicado 2022
    Materias:
    Libro electrónico
  13. 1673
    Publicado 2010
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments; The Authors; Introduction; SECTION I: Surfing the Green Wave; Chapter 1: Problem Drivers and Indicators; Chapter 2: Green Project Terminology: The Language of the Green Wave; Chapter 3: Understanding Green Project Fundamentals; Chapter 4: Types of Projects: A Rainbow of Green; SECTION II: Hiking the Project; Chapter 5: Project Ideation; Chapter 6: Developing the Project; Chapter 7: Executing the Project; Chapter 8: Taking the Watch (Monitoring and Controlling); SECTION III: Approaching the Finish Line…”
    Libro electrónico
  14. 1674
    Publicado 2012
    Materias: “…Protected areas Management…”
    Libro electrónico
  15. 1675
    Publicado 2020
    “…Several authors reported on the processes of thermal modification and different chemical wood modification techniques, which are among the latest alternative wood protection methods without the use of biocides. New preservatives and assessment methods of preservative-treated wood products are presented, as well as studies on the natural durability of wood, fire-retardant treated wood, the effect of concrete on wood durability and different novel surface modification techniques using plasma. …”
    Libro electrónico
  16. 1676
    “…OECD/G20 Base Erosion and Profit Shifting Project (Series)…”
    Libro electrónico
  17. 1677
    Publicado 2023
    “…They'll also find: Concrete strategies for aligning your security practices with the business Common myths and pitfalls when implementing Zero Trust and how to implement it in a cloud environment Strategies for preventing breaches that encourage efficiency and cost reduction in your company's security practices Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives…”
    Libro electrónico
  18. 1678
    “…OECD/G20 Projekt Gewinnverkürzung und Gewinnverlagerung…”
    Libro electrónico
  19. 1679
    por International Transport Forum.
    Publicado 2014
    “…This paper starts from the premise that the scope of the appraisal of transport projects should depend upon the presence (or absence) of various forms of market failure. …”
    Capítulo de libro electrónico
  20. 1680
    Publicado 2019
    Materias: “…Business presentations…”
    Video