Mostrando 26,641 - 26,660 Resultados de 26,998 Para Buscar 'RTL9~', tiempo de consulta: 0.78s Limitar resultados
  1. 26641
    Publicado 2023
    “…What you will learn Design algorithms for solving complex problems Become familiar with neural networks and deep learning techniques Explore existing data structures and algorithms found in Python libraries Implement graph algorithms for fraud detection using network analysis Delve into state-of-the-art algorithms for proficient Natural Language Processing illustrated with real-world examples Create a recommendation engine that suggests relevant movies to subscribers Grasp the concepts of sequential machine learning models and their foundational role in the development of cutting-edge LLMs Who this book is for This computer science book is for programmers or developers who want to understand the use of algorithms for problem-solving and writing efficient code. …”
    Libro electrónico
  2. 26642
    Publicado 2023
    “…What You Will Learn Dive into Python's role in data analytics and decision-making Write clear, efficient analytics scripts in Python Master handling numeric, text, and Boolean data types in Python Learn the essentials of Python's virtual environments Control code flow using if, elif, and else statements Learn the basics of Pandas, Series, and DataFrames Audience This course is tailor-made for individuals keen on mastering a versatile skill set that transcends multiple coding languages. …”
    Video
  3. 26643
    Publicado 2023
    “…He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. …”
    Video
  4. 26644
    Publicado 2023
    “…After that, you will create and manage common and local user accounts and roles. Gain expertise in managing PDB lockdown profiles to ensure a secure multitenant container. …”
    Video
  5. 26645
    Publicado 2023
    “…What You Will Learn Master data analysis and reporting using SQL Server Explore database security and configuration Understand how to create and manage views Learn the practical use of variables and functions Understand the use of stored procedures and triggers Audience This course caters to a diverse audience, including beginners looking to establish a solid foundation in SQL Server and T-SQL, database developers aiming to enhance their SQL skills in the SQL Server ecosystem, application developers seeking to expand their SQL knowledge, IT professionals in database administration tasks, data analysts working with SQL Server databases, and career changers considering roles in database development, analysis, or administration. …”
    Video
  6. 26646
    Publicado 2023
    “…Learn how to craft elegant and well-structured software frameworks in a variety of JavaScript environments with this handy guide Key Features Explore the gateway to the constantly evolving world of JavaScript frameworks Navigate the JavaScript development landscape and discover crucial software architecture patterns Build your own framework for a variety of work-related projects Purchase of the print or Kindle book includes a free PDF eBook Book Description JavaScript frameworks play an essential role in web application development; however, no single framework works perfectly for all projects. …”
    Libro electrónico
  7. 26647
    Publicado 2023
    “…This one-stop resource will ensure that professionals venturing into XR development can access all XR-related techniques to build appealing XR applications, without relying on Google every step of the way. This book is your guide to developing XR applications with Unity 2021.3 or later versions, helping you to create VR, AR, and MR experiences of increasing complexity. …”
    Libro electrónico
  8. 26648
    por Battye, Gina
    Publicado 2024
    Tabla de Contenidos: “…-- Ineffective and Effective Implementation -- Psychological Safety versus Inclusive Culture -- Misconceptions -- Navigating Roles and Responsibilities -- Notes -- 2 The Authentic Self -- Your Identity: How People Perceive You at Work -- Your Authentic Self: The Real You -- Bringing Your Authentic Self to Work -- The Obstacles -- The Power of Embracing Your Authentic Self -- A Personal Decision -- 3 The Extent of the Issue -- Absence of Statistics -- Do You Have an Issue? …”
    Libro electrónico
  9. 26649
    por Khanna, Abhirup
    Publicado 2024
    “…In each section, readers will find a rich tapestry of knowledge, case studies, and expert opinions, providing a 360-degree view of AI and ML's role in drug design and development. Whether you are a researcher, scientist, industry professional, policymaker, or simply curious about the future of medicine, this book offers 19 state-of-the-art chapters providing valuable insights and a compass to navigate the exciting journey ahead. …”
    Libro electrónico
  10. 26650
    Publicado 2024
    Tabla de Contenidos: “…Compromising biometric authentication -- Password cracking with GANs -- Malware detection evasion -- GANs in cryptography and stenography -- Generating web attack payloads with GANs -- Generating adversarial attack payloads -- Defenses and mitigations -- Securing GANs -- GAN-assisted adversarial attacks -- Deepfakes, malicious content, and misinformation -- Summary -- Chapter 13: LLM Foundations for Adversarial AI -- A brief introduction to LLMs -- Developing AI applications with LLMs -- Hello LLM with Python -- Hello LLM with LangChain -- Bringing your own data -- How LLMs change Adversarial AI -- Summary -- Chapter 14: Adversarial Attacks with Prompts -- Adversarial inputs and prompt injection -- Direct prompt injection -- Prompt override -- Style injection -- Role-playing -- Impersonation -- Other jailbreaking techniques -- Automated gradient-based prompt injection -- Risks from bringing your own data -- Indirect prompt injection -- Data exfiltration with prompt injection -- Privilege escalation with prompt injection -- RCE with prompt injection -- Defenses and mitigations -- LLM platform defenses -- Application-level defenses -- Summary -- Chapter 15: Poisoning Attacks and LLMs -- Poisoning embeddings in RAG -- Attack scenarios -- Poisoning during embedding generation -- Direct embeddings poisoning -- Advanced embeddings poisoning -- Query embeddings manipulation -- Defenses and mitigations -- Poisoning attacks on fine-tuning LLMs -- Introduction to fine-tuning LLMs -- Fine-tuning poisoning attack scenarios -- Fine-tuning attack vectors -- Poisoning ChatGPT 3.5 with fine-tuning -- Defenses and mitigations against poisoning attacks in fine-tuning -- Summary -- Chapter 16: Advanced Generative AI Scenarios -- Supply-chain attacks in LLMs -- Publishing a poisoned LLM on Hugging Face -- Publishing a tampered LLM on Hugging Face…”
    Libro electrónico
  11. 26651
    Publicado 2012
    Tabla de Contenidos: “…Un ambitieux dispositif de réformes structurelles génère de notables progrès économiques à court terme -- Le rôle de la politique macroéconomique…”
    Libro electrónico
  12. 26652
    por Sommé, Monique
    Publicado 2021
    “…Jusqu’à sa mort en 1471, elle exerça le pouvoir dans des domaines très divers, et occupe à ce titre une place singulière dans l’histoire des princesses du xve siècle. L’auteur révèle son rôle, laissé dans l’ombre par les chroniqueurs, en ayant recours à des sources d’archives étendues, principalement des lettres et des documents financiers. …”
    Electrónico
  13. 26653
    por Audigier, François
    Publicado 2022
    “…L’ouvrage insiste sur ce que révèle cet appareil de sécurité de la culture politique gaulliste : la place de l’informel et de l’officieux, le rôle de la violence et du secret. Il propose une histoire politique et culturelle de la violence militante en France des lendemains de la Seconde Guerre mondiale aux débuts de la Ve République (1947-1959) via une lecture « par le bas » centrée sur le terrain, et sur des acteurs et types d’engagement souvent négligés car jugés mineurs et prosaïques…”
    Electrónico
  14. 26654
    por Benitez, Eugenio
    Publicado 2021
    “…Le plaisir est le bien tel que le désire la vie : qu’arrive-t-il à la pensée quand elle s’y confronte ? Elle n’a pas le beau rôle. Elle peut au moins tenter de ne pas être morose, ou morale, de ne pas « chagriner le plaisir ». …”
    Electrónico
  15. 26655
    Publicado 2022
    “…We will then delve into the risk management scope and roles. We will also understand the various threats and adversaries an organization can stumble upon. …”
    Video
  16. 26656
    Publicado 2021
    “…In Graph-Powered Machine Learning you will learn: The lifecycle of a machine learning project Graphs in big data platforms Data source modeling using graphs Graph-based natural language processing, recommendations, and fraud detection techniques Graph algorithms Working with Neo4J Graph-Powered Machine Learning teaches to use graph-based algorithms and data organization strategies to develop superior machine learning applications. You'll dive into the role of graphs in machine learning and big data platforms, and take an in-depth look at data source modeling, algorithm design, recommendations, and fraud detection. …”
    Grabación no musical
  17. 26657
    Publicado 2021
    “…Five Lines of Code teaches you clear and actionable refactoring rules that you can apply without relying on intuitive judgements such as "code smells." …”
    Video
  18. 26658
    Publicado 2021
    “…In Graph-Powered Machine Learning you will learn: The lifecycle of a machine learning project Graphs in big data platforms Data source modeling using graphs Graph-based natural language processing, recommendations, and fraud detection techniques Graph algorithms Working with Neo4J Graph-Powered Machine Learning teaches to use graph-based algorithms and data organization strategies to develop superior machine learning applications. You'll dive into the role of graphs in machine learning and big data platforms, and take an in-depth look at data source modeling, algorithm design, recommendations, and fraud detection. …”
    Video
  19. 26659
    Publicado 2020
    “…Because companies like Apple, Facebook, and JPMorgan Chase rely on PyTorch, it's a great skill to have as you expand your career options. …”
    Libro electrónico
  20. 26660
    por Edelman, Jason
    Publicado 2024
    Tabla de Contenidos: “…-- Core concepts -- Secrets versus Secrets Groups in Nautobot -- Security considerations -- Accessing secrets in code -- Nautobot Secrets Providers app (plugin) overview -- Using Notes, Tags, Changelog, and Filter forms -- Notes -- Tags -- Change log -- Filter forms -- Best practices for inventory management -- Summary -- Chapter 6: Using Nautobot's Extensibility Features -- Statuses -- Managing statuses -- Applying a status -- Use cases for statuses -- Best practices for statuses -- Tags -- Managing tags -- Applying a tag -- Use cases for tags -- Best practices for tags -- Custom fields -- Managing custom fields -- Diving into custom field attributes -- Validation rules -- Custom field choices -- Applying a custom field -- Use cases for custom fields -- Best practices for custom fields -- Computed fields -- Managing and applying computed fields -- Computed field template context…”
    Libro electrónico