Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,216
- Historia 640
- Management 562
- Development 453
- Economics 371
- Engineering & Applied Sciences 355
- Social aspects 344
- Business & Economics 322
- Education 293
- Economic conditions 268
- Computer networks 266
- Politics and government 259
- Filosofía 255
- Leadership 254
- Application software 243
- Computer Science 236
- Crítica e interpretación 232
- Economic policy 220
- History and criticism 218
- Philosophy 218
- Data processing 209
- Economic aspects 208
- Technological innovations 208
- Computer security 206
- Security measures 206
- Information technology 204
- Cloud computing 196
- Artificial intelligence 194
- Rilke, Rainer Maria 192
- Atles 188
-
26641Publicado 2023“…What you will learn Design algorithms for solving complex problems Become familiar with neural networks and deep learning techniques Explore existing data structures and algorithms found in Python libraries Implement graph algorithms for fraud detection using network analysis Delve into state-of-the-art algorithms for proficient Natural Language Processing illustrated with real-world examples Create a recommendation engine that suggests relevant movies to subscribers Grasp the concepts of sequential machine learning models and their foundational role in the development of cutting-edge LLMs Who this book is for This computer science book is for programmers or developers who want to understand the use of algorithms for problem-solving and writing efficient code. …”
Libro electrónico -
26642Publicado 2023“…What You Will Learn Dive into Python's role in data analytics and decision-making Write clear, efficient analytics scripts in Python Master handling numeric, text, and Boolean data types in Python Learn the essentials of Python's virtual environments Control code flow using if, elif, and else statements Learn the basics of Pandas, Series, and DataFrames Audience This course is tailor-made for individuals keen on mastering a versatile skill set that transcends multiple coding languages. …”
Video -
26643Publicado 2023“…He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. …”
Video -
26644Publicado 2023“…After that, you will create and manage common and local user accounts and roles. Gain expertise in managing PDB lockdown profiles to ensure a secure multitenant container. …”
Video -
26645Publicado 2023“…What You Will Learn Master data analysis and reporting using SQL Server Explore database security and configuration Understand how to create and manage views Learn the practical use of variables and functions Understand the use of stored procedures and triggers Audience This course caters to a diverse audience, including beginners looking to establish a solid foundation in SQL Server and T-SQL, database developers aiming to enhance their SQL skills in the SQL Server ecosystem, application developers seeking to expand their SQL knowledge, IT professionals in database administration tasks, data analysts working with SQL Server databases, and career changers considering roles in database development, analysis, or administration. …”
Video -
26646Publicado 2023“…Learn how to craft elegant and well-structured software frameworks in a variety of JavaScript environments with this handy guide Key Features Explore the gateway to the constantly evolving world of JavaScript frameworks Navigate the JavaScript development landscape and discover crucial software architecture patterns Build your own framework for a variety of work-related projects Purchase of the print or Kindle book includes a free PDF eBook Book Description JavaScript frameworks play an essential role in web application development; however, no single framework works perfectly for all projects. …”
Libro electrónico -
26647Publicado 2023“…This one-stop resource will ensure that professionals venturing into XR development can access all XR-related techniques to build appealing XR applications, without relying on Google every step of the way. This book is your guide to developing XR applications with Unity 2021.3 or later versions, helping you to create VR, AR, and MR experiences of increasing complexity. …”
Libro electrónico -
26648por Battye, GinaTabla de Contenidos: “…-- Ineffective and Effective Implementation -- Psychological Safety versus Inclusive Culture -- Misconceptions -- Navigating Roles and Responsibilities -- Notes -- 2 The Authentic Self -- Your Identity: How People Perceive You at Work -- Your Authentic Self: The Real You -- Bringing Your Authentic Self to Work -- The Obstacles -- The Power of Embracing Your Authentic Self -- A Personal Decision -- 3 The Extent of the Issue -- Absence of Statistics -- Do You Have an Issue? …”
Publicado 2024
Libro electrónico -
26649por Khanna, Abhirup“…In each section, readers will find a rich tapestry of knowledge, case studies, and expert opinions, providing a 360-degree view of AI and ML's role in drug design and development. Whether you are a researcher, scientist, industry professional, policymaker, or simply curious about the future of medicine, this book offers 19 state-of-the-art chapters providing valuable insights and a compass to navigate the exciting journey ahead. …”
Publicado 2024
Libro electrónico -
26650Publicado 2024Tabla de Contenidos: “…Compromising biometric authentication -- Password cracking with GANs -- Malware detection evasion -- GANs in cryptography and stenography -- Generating web attack payloads with GANs -- Generating adversarial attack payloads -- Defenses and mitigations -- Securing GANs -- GAN-assisted adversarial attacks -- Deepfakes, malicious content, and misinformation -- Summary -- Chapter 13: LLM Foundations for Adversarial AI -- A brief introduction to LLMs -- Developing AI applications with LLMs -- Hello LLM with Python -- Hello LLM with LangChain -- Bringing your own data -- How LLMs change Adversarial AI -- Summary -- Chapter 14: Adversarial Attacks with Prompts -- Adversarial inputs and prompt injection -- Direct prompt injection -- Prompt override -- Style injection -- Role-playing -- Impersonation -- Other jailbreaking techniques -- Automated gradient-based prompt injection -- Risks from bringing your own data -- Indirect prompt injection -- Data exfiltration with prompt injection -- Privilege escalation with prompt injection -- RCE with prompt injection -- Defenses and mitigations -- LLM platform defenses -- Application-level defenses -- Summary -- Chapter 15: Poisoning Attacks and LLMs -- Poisoning embeddings in RAG -- Attack scenarios -- Poisoning during embedding generation -- Direct embeddings poisoning -- Advanced embeddings poisoning -- Query embeddings manipulation -- Defenses and mitigations -- Poisoning attacks on fine-tuning LLMs -- Introduction to fine-tuning LLMs -- Fine-tuning poisoning attack scenarios -- Fine-tuning attack vectors -- Poisoning ChatGPT 3.5 with fine-tuning -- Defenses and mitigations against poisoning attacks in fine-tuning -- Summary -- Chapter 16: Advanced Generative AI Scenarios -- Supply-chain attacks in LLMs -- Publishing a poisoned LLM on Hugging Face -- Publishing a tampered LLM on Hugging Face…”
Libro electrónico -
26651Publicado 2012Tabla de Contenidos: “…Un ambitieux dispositif de réformes structurelles génère de notables progrès économiques à court terme -- Le rôle de la politique macroéconomique…”
Libro electrónico -
26652por Sommé, Monique“…Jusqu’à sa mort en 1471, elle exerça le pouvoir dans des domaines très divers, et occupe à ce titre une place singulière dans l’histoire des princesses du xve siècle. L’auteur révèle son rôle, laissé dans l’ombre par les chroniqueurs, en ayant recours à des sources d’archives étendues, principalement des lettres et des documents financiers. …”
Publicado 2021
Electrónico -
26653por Audigier, François“…L’ouvrage insiste sur ce que révèle cet appareil de sécurité de la culture politique gaulliste : la place de l’informel et de l’officieux, le rôle de la violence et du secret. Il propose une histoire politique et culturelle de la violence militante en France des lendemains de la Seconde Guerre mondiale aux débuts de la Ve République (1947-1959) via une lecture « par le bas » centrée sur le terrain, et sur des acteurs et types d’engagement souvent négligés car jugés mineurs et prosaïques…”
Publicado 2022
Electrónico -
26654por Benitez, Eugenio“…Le plaisir est le bien tel que le désire la vie : qu’arrive-t-il à la pensée quand elle s’y confronte ? Elle n’a pas le beau rôle. Elle peut au moins tenter de ne pas être morose, ou morale, de ne pas « chagriner le plaisir ». …”
Publicado 2021
Electrónico -
26655Publicado 2022“…We will then delve into the risk management scope and roles. We will also understand the various threats and adversaries an organization can stumble upon. …”
Video -
26656Publicado 2021“…In Graph-Powered Machine Learning you will learn: The lifecycle of a machine learning project Graphs in big data platforms Data source modeling using graphs Graph-based natural language processing, recommendations, and fraud detection techniques Graph algorithms Working with Neo4J Graph-Powered Machine Learning teaches to use graph-based algorithms and data organization strategies to develop superior machine learning applications. You'll dive into the role of graphs in machine learning and big data platforms, and take an in-depth look at data source modeling, algorithm design, recommendations, and fraud detection. …”
Grabación no musical -
26657Publicado 2021“…Five Lines of Code teaches you clear and actionable refactoring rules that you can apply without relying on intuitive judgements such as "code smells." …”
Video -
26658Publicado 2021“…In Graph-Powered Machine Learning you will learn: The lifecycle of a machine learning project Graphs in big data platforms Data source modeling using graphs Graph-based natural language processing, recommendations, and fraud detection techniques Graph algorithms Working with Neo4J Graph-Powered Machine Learning teaches to use graph-based algorithms and data organization strategies to develop superior machine learning applications. You'll dive into the role of graphs in machine learning and big data platforms, and take an in-depth look at data source modeling, algorithm design, recommendations, and fraud detection. …”
Video -
26659Publicado 2020“…Because companies like Apple, Facebook, and JPMorgan Chase rely on PyTorch, it's a great skill to have as you expand your career options. …”
Libro electrónico -
26660por Edelman, JasonTabla de Contenidos: “…-- Core concepts -- Secrets versus Secrets Groups in Nautobot -- Security considerations -- Accessing secrets in code -- Nautobot Secrets Providers app (plugin) overview -- Using Notes, Tags, Changelog, and Filter forms -- Notes -- Tags -- Change log -- Filter forms -- Best practices for inventory management -- Summary -- Chapter 6: Using Nautobot's Extensibility Features -- Statuses -- Managing statuses -- Applying a status -- Use cases for statuses -- Best practices for statuses -- Tags -- Managing tags -- Applying a tag -- Use cases for tags -- Best practices for tags -- Custom fields -- Managing custom fields -- Diving into custom field attributes -- Validation rules -- Custom field choices -- Applying a custom field -- Use cases for custom fields -- Best practices for custom fields -- Computed fields -- Managing and applying computed fields -- Computed field template context…”
Publicado 2024
Libro electrónico