Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 16
- Application software 10
- Computer security 7
- Machine learning 7
- Python (Computer program language) 7
- Data processing 6
- Web sites 6
- Android (Electronic resource) 5
- Artificial intelligence 5
- Computer software 5
- Management 5
- Web site development 5
- Computer programs 4
- Finance 4
- Security measures 4
- Software engineering 4
- Business enterprises 3
- Computer networks 3
- Computer programming 3
- Graph theory 3
- Graphic methods 3
- Information visualization 3
- Internet marketing 3
- Internet programming 3
- Programming 3
- Web applications 3
- AHP 2
- Authoring programs 2
- Business 2
- Cloud computing 2
-
41por Knapp, Eric D.Tabla de Contenidos: “…Type of service, class of service, and quality of service -- Network hops -- Network security controls -- Safety instrumented systems -- Special considerations -- Wide area connectivity -- Smart grid network considerations -- Advanced metering infrastructure -- Summary -- 6 - Industrial Network Protocols -- Overview of industrial network protocols -- Fieldbus protocols -- Modicon communication bus (Modbus) -- What it does -- How it works -- Variants -- Modbus RTU and Modbus ASCII -- Modbus TCP -- Modbus plus or Modbus+ -- Where it is used -- Security concerns -- Security recommendations -- Distributed network protocol (DNP3) -- What it does -- How it works -- Secure DNP3 -- Where it is used -- Security concerns -- Security recommendations -- Process fieldbus (PROFIBUS) -- Security concerns -- Security recommendations -- Industrial ethernet protocols -- Ethernet industrial protocol (EtherNet/IP) -- Security concerns -- Security recommendations -- PROFINET -- Security concerns -- Security recommendations -- EtherCAT -- Security concerns -- Security recommendations -- Ethernet POWERLINK -- Security concerns -- Security recommendations -- SERCOS III -- Security concerns -- Security recommendations -- Backend protocols -- Object linking and embedding for process control -- What it does -- How it works -- Where it is used -- Security concerns -- Security recommendations -- Intercontrol center communications protocol (ICCP/IEC 60870-6 TASE.2) -- What it does -- How it works -- Where it is used -- Security concerns -- Security improvements over Modbus -- Security recommendations -- IEC 61850, 60870-5-101, and 60870-5-104 -- How they work -- 60870-5-101 and 60870-5-104 -- IEC 61850 -- Security concerns -- Security recommendations -- AMI and the smart grid -- Security concerns -- Security recommendations -- Industrial protocol simulators -- Modbus/TCP -- DNP3…”
Publicado 2024
Libro electrónico -
42Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started: ChatGPT, the OpenAI API, and Prompt Engineering -- Technical requirements -- Setting up a ChatGPT Account -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating an API Key and interacting with OpenAI -- Getting ready -- How to do it... -- How it works... -- There's more... -- Basic Prompting (Application: Finding Your IP Address) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Applying ChatGPT Roles (Application : AI CISO) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enhancing Output with Templates (Application: Threat Report) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Formatting Output as a Table (Application: Security Controls Table) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Setting the OpenAI API Key as an Environment Variable -- Getting ready -- How to do it... -- How it works... -- There's more... -- Sending API Requests and Handling Responses with Python -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using Files for Prompts and API Key Access -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using Prompt Variables (Application: Manual Page Generator) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 2: Vulnerability Assessment -- Technical requirements -- Creating Vulnerability Assessment Plans -- Getting ready -- How to do it... -- How it works... -- There's more... -- Threat Assessment using ChatGPT and the MITRE ATT& -- CK framework -- Getting ready -- How to do it... -- How it works... -- There's more... -- GPT-Assisted Vulnerability Scanning -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
43Publicado 2013Tabla de Contenidos: “…Intro -- Contents -- Editors -- List of Contributors -- Chemicals Alternatives Assessment (CAA): Tools for Selecting Less Hazardous Chemicals -- 1.1 Introduction to Chemicals Alternatives Assessments -- 1.2 Common Traits Among CAA Paradigms -- 1.2.1 Step One: Hazard Assessment Through Literature Search and Data Identification -- 1.2.2 Step Two: Hazard Classification and Benchmarking of Relevant Data -- 1.2.3 Step Three: CAA Report Preparation -- 1.3 Life-cycle Assessment and Chemicals Alternatives Assessment -- 1.4 Chemical Alternatives Assessment Paradigms in Use: a Critical Evaluation -- 1.4.1 US EPA's Design for the Environment (DfE) -- 1.4.2 CPA's GreenScreenTM -- 1.4.3 Cradle to Cradle® (C2C) -- 1.4.4 TURI's Pollution Prevention Options Analysis System (P2OASys) -- 1.4.5 The Chemical Scoring and Ranking Assessment Model (SCRAM) -- 1.4.6 Chemicals Assessment and Ranking System (CARS) -- 1.4.7 SC Johnson & -- Son's GreenlistTM -- 1.4.8 PRIO -- 1.4.9 The Quick Scan -- 1.4.10 The Column Model and GHS Column Model -- 1.4.11 Evaluation Matrix -- 1.5 Challenges Facing Chemicals Alternatives Assessment Methods -- 1.5.1 Chemicals Alternatives Assessments and Data Gaps -- 1.6 Conclusion -- References -- European Initiatives for Selecting Sustainable Flame Retardants -- 2.1 Introduction - What are Flame Retardants? …”
Libro electrónico -
44Publicado 2020“…General education on SEO and organic content marking Understanding which search engines to focus on How SEO and content can solve business problems Building a new brand through SEO and content Identifying who your true competitors are Which Analytics reports you should be regularly monitoring How to establish research channels that can inform your business initiatives Building personas and audience purchase journeys Prioritizing locations, demographics and countries What needs to be in place to maximize free traffic levels to your brands assets Understanding all the key tasks and attributes for an effective content program Data-Driven Content: Detailed instruction on how to use data to inform content responses, ideas and asset types Understanding different content asset types from standard items like articles to highly advanced assets like films, podcasts, white papers and other assets Calculating ROI for SEO and Content initiatives Small business marketing via content and SEO and having the right small business mindset for success Website and content design considerations (accessibility, principles of marketing) Optimizing for the future and looking at other search venues Amazon Optimization YouTube Optimization App Store Optimization (ASO) Podcast Optimization Optimizing Blogs and other off-site content Prepping and optimizing for the newest technologies, including voice search, artificial intelligence, and content discovery vehicles How to build an optimization path and programs that drive results and manage risks In addition to learning the most effective processes to structure your SEO, you will have access to bonus materia..…”
Libro electrónico -
45Publicado 2016Tabla de Contenidos: “…; My Hopes for This Book; Performance Is a Human Issue; Chapter 1. The Psychology of Web Performance; Fast Websites and Apps Create Happier Users; How Fast Do We Expect Web Pages to Be?…”
Libro electrónico -
46por Reiman, CornelisTabla de Contenidos: “…- a business perspective; Introduction; Social media as a marketing tool; Can social media generate new business?…”
Publicado 2012
Libro electrónico -
47Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- Chapter 1 Introduction -- 1.1 Statistical Finance -- 1.2 Risk Management -- 1.3 Portfolio Management -- 1.4 Pricing of Securities -- Part I Statistical Finance -- Chapter 2 Financial Instruments -- 2.1 Stocks -- 2.1.1 Stock Indexes -- 2.1.1.1 Definition of a Stock Index -- 2.1.1.2 Uses of Stock Indexes -- 2.1.1.3 Examples of Stock Indexes -- 2.1.2 Stock Prices and Returns -- 2.1.2.1 Initial Price Data -- 2.1.2.2 Sampling of Prices -- 2.1.2.3 Stock Returns -- 2.2 Fixed Income Instruments -- 2.2.1 Bonds -- 2.2.2 Interest Rates -- 2.2.2.1 Definitions of Interest Rates -- 2.2.2.2 The Risk Free Rate -- 2.2.3 Bond Prices and Returns -- 2.3 Derivatives -- 2.3.1 Forwards and Futures -- 2.3.1.1 Forwards -- 2.3.1.2 Futures -- 2.3.2 Options -- 2.3.2.1 Calls and Puts -- 2.3.2.2 Applications of Options -- 2.3.2.3 Exotic Options -- 2.4 Data Sets -- 2.4.1 Daily S& -- P 500 Data -- 2.4.2 Daily S& -- P 500 and Nasdaq‐100 Data -- 2.4.3 Monthly S& -- P 500, Bond, and Bill Data -- 2.4.4 Daily US Treasury 10 Year Bond Data -- 2.4.5 Daily S& -- P 500 Components Data -- Chapter 3 Univariate Data Analysis -- 3.1 Univariate Statistics -- 3.1.1 The Center of a Distribution -- 3.1.1.1 The Mean and the Conditional Mean -- 3.1.1.2 The Median and the Conditional Median -- 3.1.1.3 The Mode and the Conditional Mode -- 3.1.2 The Variance and Moments -- 3.1.2.1 The Variance and the Conditional Variance -- 3.1.2.2 The Upper and Lower Partial Moments -- 3.1.2.3 The Upper and Lower Conditional Moments -- 3.1.3 The Quantiles and the Expected Shortfalls -- 3.1.3.1 The Quantiles and the Conditional Quantiles -- 3.1.3.2 The Expected Shortfalls -- 3.2 Univariate Graphical Tools -- 3.2.1 Empirical Distribution Function Based Tools -- 3.2.1.1 The Empirical Distribution Function -- 3.2.1.2 The Tail Plots…”
Libro electrónico -
48Publicado 2022“…Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniques Key Features Apply real-world strategies to strengthen the capabilities of your organization's security system Learn to not only defend your system but also think from an attacker's perspective Ensure the ultimate effectiveness of an organization's red and blue teams with practical tips Book Description With small to large companies focusing on hardening their security systems, the term "purple team" has gained a lot of traction over the last couple of years. …”
Libro electrónico -
49Nuxt 3 Projects Build Scalable Applications with Nuxt 3 Using TypeScript, Pinia, and Composition APIPublicado 2024Tabla de Contenidos: “…Authentication UI and Validating Inputs -- Installing Required Modules -- Setting Up Auth Pages -- Using Joi for Input Validation -- Setting Up User Authentication with Supabase -- Creating the Signup Function -- Creating and Managing Personal User Posts -- Adding RLS Policy for the 'Posts' Table -- Using Supabase API for Post Management -- Building the Post Information Page -- Displaying User Posts -- Summary -- Practice Questions -- Further Reading -- Chapter 6: Enhancing a Recipe-Sharing Site While Optimizing SEO Using Nuxt 3 -- Technical requirements -- Essential background - Understanding Search Engine Optimization (SEO) -- Exploring the repository -- Defining metadata for each page -- Setting up the project structure -- Setting up site configuration with nuxt SEO -- Overriding metadata -- Implementing structured data for improved search engine rankings -- Creating a recipe node -- Optimizing recipe images to load pages faster -- Creating a custom og:image for the recipe page -- Generating dynamic site maps for the recipe-sharing site -- Summary -- Practice questions -- Further reading -- Chapter 7: Building a Quiz Game Application to Learn about Testing -- Technical requirements -- Exploring the repository -- Essential background - fundamentals of testing -- Implementing the quiz game app -- Questions data -- Types definitions -- Quiz Pinia store -- The app.vue file -- Writing unit tests for the Pinia store -- Exploring Vitest -- Testing the quiz store -- Writing unit tests for components -- Setting up for component testing -- Creating the Question.spec.ts test file -- Writing the component unit test -- Writing end-to-end tests for the quiz game -- Setting up for E2E testing -- Writing E2E tests -- Exploring Vitest UI and test coverage tools -- Summary -- Practice questions -- Further reading…”
Libro electrónico -
50por Vegh, AaronTabla de Contenidos: “…Chapter 12: Photoshop 101Photoshop Basics; Saving for the Web; Summary; Part IV: Server-Side Development; Chapter 13: Principles of Server-Side Development; Deconstructing a Web Application; The PHP Language; Ruby on Rails Arrives; Installing the Software; Summary; Chapter 14: MySQL Database Server; MySQL Basics; Getting Data into and out of Tables; Getting Relational; MySQL Utilities; Summary; Chapter 15: PHP Introduction; Your First PHP Application; Basic PHP Syntax; Creating a PHP Application; Summary; Chapter 16: Ruby Introduction; Understanding Object-Oriented Code…”
Publicado 2010
Libro electrónico -
51Publicado 2024Tabla de Contenidos:Libro electrónico
-
52Publicado 2022Tabla de Contenidos: “…6.4 Solar position modeling -- 6.4.1 Solar angle -- 6.4.2 Solar tracking angle -- 6.4.3 Direct normal beam insolation -- 6.5 Design of a parabolic through solar thermal power plant -- 6.5.1 Parabolic through collector design -- Geometric configuration -- Solar energy absorption modeling -- Solar receiver design -- Transfer of heat from the absorber to the heat transfer fluid -- Conduction heat transfer through absorber wall -- Transfer of heat from the absorber to the glass envelope -- Vacuum in annulus (p< -- 1 Torr) -- Annulus pressure higher than 1 Torr -- Radiation heat transfer from the absorber to the envelope -- Conductive heat transport through the glass envelope -- Heat transfer from HCE support bracket -- Heat loss from the glass envelope to the atmosphere -- Pressure drops from the piping system -- HTF pump -- 6.6 Design of a solar tower power plant -- 6.6.1 Heliostat field modeling -- 6.6.2 Central receiver modeling -- 6.7 Heat transfer fluid -- 6.7.1 Available heat transfer fluid -- 6.7.2 Correlations for thermophysical property of HTFs -- 6.8 Site selection and mapping -- 6.8.1 Method related to sites selection of solar power plants -- 6.8.2 Evaluation criteria -- 6.8.3 AHP and ANP ranking approach -- 6.8.4 Site selection principle -- 6.8.5 Land selection and site elevation -- 6.9 Design of thermal collector for power plant -- 6.9.1 Flat plate solar collectors -- Convection loss -- Conduction loss -- Radiation loss -- 6.9.2 Evacuated tube collectors -- 6.10 Solar aided power generation -- 6.11 Hybridization of power cycle with solar thermal energy resources -- 6.11.1 Hybridizing with Rankine cycle -- 6.12 Performance analysis -- 6.12.1 Overall efficiency -- 6.12.2 Fuel-based efficiency -- 6.12.3 Solar-to-electric efficiency -- 6.12.4 Solar heat fraction -- 6.12.5 Fuel saving fraction -- References -- 7 - Solar thermal energy storage…”
Libro electrónico -
53Publicado 2023Tabla de Contenidos: “…Mobile Connectivity -- Mobile Marketing Communication -- Mobile Marketing Assets -- Rules and Regulations -- Reaching Mobile Users -- Mobile Marketing Strategy and Planning -- Marketing on Mobile Websites -- Core Mobile Products and Services -- Incentives and Loyalty Programs -- Location-Based Services -- Mobile Marketing Channel Management -- Mobile and Other Marketing Channels -- Mobile Search -- Mobile Advertising -- Understanding Your Mobile Advertising Options -- Google AdWords Pay-per-Click -- Website Banners and Google AdSense -- Video and YouTube Ads -- Social Media Ads -- In-App Ads -- On-Site App Ads -- Choosing Your Mobile Ad Strategy -- Website Only -- App Only -- Website and App -- Mobile Marketing Measurement and Control -- Mobile Marketing Analytics -- Interpreting Your Analytics -- Chapter 9 Email Marketing -- Guiding Principles -- Every Email Is a Wanted Email -- We Are Lawful and Responsible -- We Earn Our High Deliverability -- Establishing Campaign Goals -- Email Metrics and Reporting -- Where Email Marketing Fits -- Email Marketing Work Within Organizations -- Tools for Email Marketing -- Stay Up to Date on What's Possible -- Growing Your Email List -- Building a New Email Marketing List -- Attracting or Repelling Subscribers -- The Data You Collect -- Personalization -- Too Much Personalization -- Segmentation -- List Hygiene -- Avoid Auto-Subscribe -- Scale Down Inactive Subscribers -- Clean Out Poison Addresses -- Deliverability -- Creating Email Content Designed to Persuade and Get to the Inbox -- Format for Email Clients -- Domain and Server Reputation -- Warm Up New Servers -- Compliance with Regulations -- How the History of Email and Spam Affects Your Campaigns Today -- How Spammers and Bad Actors Work and How to Avoid Looking Like Them -- Government Rules and Regulations…”
Libro electrónico -
54Publicado 2015Tabla de Contenidos: “…How to Estimate Consequences and Likelihood -- Risk Ranking -- Risk Reduction and Mitigation -- Summary -- Chapter 9 - Establishing Zones and Conduits -- Information in this Chapter -- Security Zones and Conduits Explained -- Identifying and Classifying Security Zones and Conduits -- Recommended Security Zone Separation -- Network Connectivity -- Caution -- Control Loops -- Supervisory Controls -- Note -- Plant Level Control Processes -- Control Data Storage -- Trading Communications -- Remote Access -- Users and Roles -- Protocols -- Criticality -- Tip -- Tip -- Establishing Security Zones and Conduits -- Summary -- Chapter 10 - Implementing Security and Access Controls -- Information in this Chapter -- Network Segmentation -- Zones and Security Policy Development -- Using Zones within Security Device Configurations -- Implementing Network Security Controls -- Selecting Network Security Devices -- Implementing Network Security Devices -- Firewall Configuration Guidelines -- Intrusion Detection and Prevention (IDS/IPS) Configuration Guidelines -- Recommended IDS/IPS Rules -- Anomaly-Based Intrusion Detection -- Protocol Anomaly Detection -- Application and Protocol Monitoring in Industrial Networks -- Data Diodes and Unidirectional Gateways -- Implementing Host Security and Access Controls -- Selecting Host Cyber Security Systems -- Host Firewalls -- Host IDS -- Anti-virus -- Application Whitelisting -- External Controls -- Patch Management -- Patching as a form of Vulnerability Management -- Leave no Vulnerability Unturned -- Maintaining System Availability -- Comprehensive Predeployment Testing -- Automating the Process -- How Much Security is Enough? …”
Libro electrónico -
55Publicado 2022Tabla de Contenidos: “…2.9.1 Newspapers in US and worldwide -- 2.9.2 TV networks in US -- 2.10 Text editing and formatting languages -- 2.11 Online books sources -- 2.12 Free book download web sites -- 2.13 Data, image, audio and video compression -- 2.13.1 Data compression -- 2.13.2 Huffman coding/encoding -- 2.13.3 Lempel-Ziv - LZ encoding -- 2.13.4 Arithmetic coding -- 2.13.5 Miscellaneous topics on data compression -- 2.13.6 Universal Resource Locator - URL shortener -- 2.13.7 Image compression -- 2.13.8 Video/audio compression -- 2.14 Main memory data compression -- 2.15 Data deduplication in storage systems -- 2.15.1 Data deduplication at Microsoft -- 2.15.2 The Venti prototype at Bell Labs/Lucent -- 2.15.3 Data Domain deduplication -- 2.15.4 Datrium -- 2.15.5 Summary of a major survey on data deduplication -- 2.16 Up and coming data deduplication companies -- 2.17 Storage research at IBM's Almaden Research Center in 1990s -- 2.18 Cleversafe and its information dispersal technology -- 2.19 Recent developments at IBM Research at ARC -- 2.20 Storage research at Hewlett-Packard - HP -- 2.21 Primary storage vendors and enterprise companies in 2020 -- 2.22 All-flash upstart storage companies -- 2.23 Hyperconverged infrastructure for storage systems -- 2.24 Top enterprise storage backup players -- 2.25 Data storage companies: up and coming storage vendors -- 2.26 Parallel file systems -- 2.27 Cloud storage -- 2.27.1 Cloud computing price models -- 2.27.2 Storage as a service in cloud computing -- 2.27.3 Cloud storage elasticity and its benchmarking -- 2.28 Jai Menon's predictions on the future of clouds -- 2.29 Cloud storage companies -- 2.30 Distributed systems research related to clouds -- 2.30.1 OceanStore -- 2.30.2 Inktomi and CAP theorem -- 2.30.3 Replicated data -- 2.30.4 Sky Computing -- 2.31 Data encryption -- 2.31.1 Data encryption for cloud storage…”
Libro electrónico -
56Publicado 2014“…The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. …”
Libro electrónico -
57Publicado 2020Tabla de Contenidos: “…7.8 Minimal Sufficiency and Ancillary Statistics -- 7.9 Sufficiency, Completeness, and Independence -- 8 Optimal Tests of Hypotheses -- 8.1 Most Powerful Tests -- 8.2 Uniformly Most Powerful Tests -- 8.3 Likelihood Ratio Tests -- 8.3.1 Likelihood Ratio Tests for Testing Means of Normal Distributions -- 8.3.2 Likelihood Ratio Tests for Testing Variances of Normal Distributions -- 8.4 *The Sequential Probability Ratio Test -- 8.5 *Minimax and Classification Procedures -- 8.5.1 Minimax Procedures -- 8.5.2 Classification -- 9 Inferences About Normal Linear Models -- 9.1 Introduction -- 9.2 One-Way ANOVA -- 9.3 Noncentral χ2 and F-Distributions -- 9.4 Multiple Comparisons -- 9.5 Two-Way ANOVA -- 9.5.1 Interaction Between Factors -- 9.6 A Regression Problem -- 9.6.1 Maximum Likelihood Estimates -- 9.6.2 *Geometry of the Least Squares Fit -- 9.7 A Test of Independence -- 9.8 The Distributions of Certain Quadratic Forms -- 9.9 The Independence of Certain Quadratic Forms -- 10 Nonparametric and Robust Statistics -- 10.1 Location Models -- 10.2 Sample Median and the Sign Test -- 10.2.1 Asymptotic Relative Efficiency -- 10.2.2 Estimating Equations Based on the Sign Test -- 10.2.3 Confidence Interval for the Median -- 10.3 Signed-Rank Wilcoxon -- 10.3.1 Asymptotic Relative Efficiency -- 10.3.2 Estimating Equations Based on Signed-Rank Wilcoxon -- 10.3.3 Confidence Interval for the Median -- 10.3.4 Monte Carlo Investigation -- 10.4 Mann-Whitney-Wilcoxon Procedure -- 10.4.1 Asymptotic Relative Efficiency -- 10.4.2 Estimating Equations Based on the Mann-Whitney- Wilcoxon -- 10.4.3 Confidence Interval for the Shift Parameter Δ -- 10.4.4 Monte Carlo Investigation of Power -- 10.5 *General Rank Scores -- 10.5.1 Efficacy -- 10.5.2 Estimating Equations Based on General Scores -- 10.5.3 Optimization: Best Estimates -- 10.6 *Adaptive Procedures -- 10.7 Simple Linear Model…”
Libro electrónico -
58Publicado 2020“…Finally, the genesis of Belgium's most famous urban (park) cemeteries, and the funerary heritage in these cities of death, is also brought to life through the analysis of eye-catching funeral monuments. This book is a richly illustrated survey work on the social, political and cultural dimensions of the death of high-ranking figures in 19th- and 20th-century Belgian society…”
Libro electrónico -
59Publicado 2024Tabla de Contenidos: “…Cover -- Title page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Recent Developments in the Field, Installations, and Hello World Applications -- Chapter 1: From Bag-of-Words to the Transformers -- Evolution of NLP approaches -- Recalling traditional NLP approaches -- Language modeling and generation -- Leveraging DL -- Considering the word order with RNN models -- LSTMs and gated recurrent units -- Contextual word embeddings and TL -- Overview of the Transformer architecture -- Attention mechanism -- Multi-head attention mechanisms -- Using TL with Transformers -- Multimodal learning -- Summary -- References -- Chapter 2: A Hands-On Introduction to the Subject -- Technical requirements -- Installing transformer with Anaconda -- Installation on Linux -- Installation on Windows -- Installation on macOS -- Installing TensorFlow, PyTorch, and Transformer -- Installing and using Google Colab -- Working with language models and tokenizers -- Working with community-provided models -- Working with multimodal transformers -- Working with benchmarks and datasets -- Important benchmarks -- GLUE benchmark -- SuperGLUE benchmark -- XTREME benchmark -- XGLUE benchmark -- SQuAD benchmark -- Accessing the datasets with an application programming interface -- Data manipulation using the datasets library -- Sorting, indexing, and shuffling -- Caching and reusability -- Dataset filter and map function -- Processing data with the map function -- Working with local files -- Preparing a dataset for model training -- Benchmarking for speed and memory -- Summary -- Part 2: Transformer Models: From Autoencoders to Autoregressive Models -- Chapter 3: Autoencoding Language Models -- Technical requirements -- BERT - one of the autoencoding language models -- BERT language model pretraining tasks…”
Libro electrónico -
60Publicado 2017“…Create code for the web Get the tools to create a mobile app Discover languages that power data science See the future of coding with machine learning tools With the demand for skilled coders at an all-time high, Coding All-in-One For Dummies is here to propel coding newbies to the ranks of professional programmers…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico