Mostrando 1,421 - 1,440 Resultados de 2,017 Para Buscar 'Raunk.~', tiempo de consulta: 1.23s Limitar resultados
  1. 1421
    Publicado 2015
    Tabla de Contenidos: “…; What Reverse Does to Influence; Why Self-Preservation Undermines Influence; Fear Is a Killer; Secure Confidence Wins; How to Say I Am Sorry; The Reverse Challenge; Chapter 10: Ranking Your Gear Order; What Is Your Gear Order?; Gear Order Under Stress; Introvert/Extrovert Gear Order; Understanding Others' Gear Order; Section Three: Living and Leading Connected…”
    Libro electrónico
  2. 1422
    por Şuhubi, Erdoğan S.
    Publicado 2013
    Tabla de Contenidos: “…Exterior Algebra; 1.6. Rank of an Exterior Form; I. Exercises; Chapter II: Differentiable Manifolds; 2.1. …”
    Libro electrónico
  3. 1423
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- About the Authors -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Governance -- Organizational Governance -- Organizational Strategy, Goals, and Objectives -- Organizational Structure, Roles, and Responsibilities -- Organizational Culture -- Policies and Standards -- Business Processes -- Organizational Assets -- Risk Governance -- Enterprise Risk Management and Risk Management Frameworks -- Three Lines of Defense -- Risk Profile -- Risk Appetite and Risk Tolerance -- Legal, Regulatory, and Contractual Requirements -- Professional Ethics of Risk Management -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 2 IT Risk Assessment -- IT Risk Identification -- Risk Events -- Threat Modeling and Threat Landscape -- Vulnerability and Control Deficiency Analysis -- Risk Scenario Development -- IT Risk Analysis and Evaluation -- Risk Assessment Concepts, Standards, and Frameworks -- Risk Assessment Standards and Frameworks -- Risk Ranking -- Risk Ownership -- Risk Register -- Risk Analysis Methodologies -- Business Impact Analysis -- Inherent and Residual Risk -- Miscellaneous Risk Considerations -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 3 Risk Response and Reporting -- Risk Response -- Risk and Control Ownership -- Risk Treatment/Risk Response Options -- Third-Party Risk -- Issues, Findings, and Exceptions Management -- Management of Emerging Risk -- Control Design and Implementation -- Control Types and Functions -- Control Standards and Frameworks -- Control Design, Selection, and Analysis -- Control Implementation -- Control Testing and Effectiveness Evaluation -- Risk Monitoring and Reporting -- Risk Treatment Plans -- Data Collection, Aggregation, Analysis, and Validation -- Risk and Control Monitoring Techniques…”
    Libro electrónico
  4. 1424
    por Chandramouli, Subramanian
    Publicado 2016
    Tabla de Contenidos: “…Defect Detection Rate -- Escaped Defects -- Chapter 7 Agile Analysis and Design -- Introduction -- Collecting and Validating Requirements of Agile Projects -- Participatory Decision Model -- Product Vision -- Product Roadmap -- Backlog -- Story Maps -- Agile Modeling -- Business Case Development -- Chartering -- Chapter 8 Product Quality and Process Improvement -- Introduction -- Frequent Verification and Validation -- Test-Driven Development (TDD) -- Definition of Done -- Incremental Delivery -- Feedback Techniques for Product -- Continuous Improvement Process -- Process Analysis and Improvement Techniques -- Value Stream Mapping -- Five Whys -- Cause and Effect/Fishbone Diagrams -- Control Limits -- Chapter 9 Interpersonal Skills -- Emotional Intelligence Quotient (EQ) -- Collaboration -- Adaptive Leadership -- Negotiations -- Conflict Resolution -- Quick Quiz on Conflict Management -- Servant Leadership -- Brainstorming Techniques -- Building Empowered Team -- Coaching and Mentoring -- Team Motivation and Knowledge Sharing -- Leadership Styles -- Problem-solving Steps -- Culture and Team Diversity -- Chapter 10 Value-based Prioritization -- Introduction -- Definition of Value -- ROI, NPV, IRR -- Value-driven Delivery -- Elicit Non-functional Requirements -- Relative Prioritization and Ranking -- Value-based Prioritization -- Minimally Marketable Feature (MMF) -- Agile Compliance -- Regulatory Compliance -- Chapter 11 Agile Project Risk Management -- Introduction -- Approaching risk in Agile Projects -- Identify Risks -- Risk Adjusted Backlog -- Risk Burn-down Graphs -- Perform Qualitative Risk Analysis -- Risk-based Spike -- Architectural Spike -- Plan Risk Responses -- Monitoring and Control Risks -- Checkpoints in Agile Projects -- Chapter 12 PMI Code of Ethics and Professional Conduct -- Introduction -- Structure of the Code…”
    Libro electrónico
  5. 1425
    Publicado 2021
    Tabla de Contenidos: “…COEFICIENTE DE CORRELACIÓN DE PEARSON (R) -- COEFICIENTE DE DETERMINACIÓN (R2) -- 10.3 REGRESIÓN MÚLTIPLE -- PREGUNTAS Y EJERCICIOS PARA EL CAPÍTULO 10 -- CAPÍTULO 11 PRUEBAS NO PARAMÉTRICAS -- 11.1 PRUEBAS ESTADÍSTICAS PARAMÉTRICAS Y NO PARAMÉTRICAS -- UTILIDAD Y DESCRIPCIÓN DE LAS PRUEBAS NO PARAMÉTRICAS -- PRUEBA DE NORMALIDAD -- JI CUADRADO -- 11.2 PRUEBAS DE CORRELACIÓN NO PARAMÉTRICA -- COEFICIENTE DE CORRELACIÓN DE SPEARMAN (RS) -- PRUEBA KENDALL TAU(T) -- COEFICIENTE ALFA DE CRONBACH -- 11.3 PRUEBAS DE HIPÓTESIS NO PARAMÉTRICAS -- PRUEBA KRUSKAL-WALLIS -- PRUEBA DEL SIGNO -- PRUEBA DE MANN-WHITNEY -- WILCONXON SIGNED-RANK -- PREGUNTAS Y EJERCICIOS PARA EL CAPÍTULO 11 -- APÉNDICES -- APÉNDICE A ENLACES RECOMENDADOS -- APÉNDICE B TABLAS PARA LAS ESTADÍSTICAS -- APÉNDICE C FÓRMULAS -- REFERENCIAS -- ÍNDICE -- SOBRE LA OBRA…”
    Libro electrónico
  6. 1426
    Publicado 2021
    Tabla de Contenidos: “…COEFICIENTE DE DETERMINACIÓN DE PEARSON (R2) -- 10.3 REGRESIÓN MÚLTIPLE -- PREGUNTAS Y EJERCICIOS PARA EL CAPÍTULO 10 -- CAPÍTULO 11 PRUEBAS NO PARAMÉTRICAS -- 11.1 PRUEBAS ESTADÍSTICAS PARAMÉTRICAS Y NO PARAMÉTRICAS -- UTILIDAD Y DESCRIPCIÓN DE LAS PRUEBAS NO PARAMÉTRICAS -- PRUEBA DE NORMALIDAD -- PRUEBA DE JI-CUADRADO ( 2) -- 11.2 PRUEBAS DE CORRELACIÓN NO PARAMÉTRICA -- COEFICIENTE DE CORRELACIÓN DE SPEARMAN (RS) -- PRUEBA KENDALL TAU(T) -- 11.3 PRUEBAS DE HIPÓTESIS NO PARAMÉTRICAS -- PRUEBA KRUSKAL-WALLIS -- PRUEBA DEL SIGNO -- PRUEBA DE MANN-WHITNEY -- WILCONXON SIGNED-RANK -- PREGUNTAS Y EJERCICIOS PARA EL CAPÍTULO 11 -- APÉNDICES -- APÉNDICE A ENLACES RECOMENDADOS -- APÉNDICE B TABLAS PARA LAS ESTADÍSTICAS -- APÉNDICE C FÓRMULAS -- REFERENCIAS -- ÍNDICE -- SOBRE LA OBRA…”
    Libro electrónico
  7. 1427
    Publicado 2018
    Tabla de Contenidos: “…-- Challenges of multimodality learning -- Representation -- Translation -- Alignment -- Fusion -- Co-learning -- Image captioning -- Show and tell -- Encoder -- Decoder -- Training -- Testing/inference -- Beam Search -- Other types of approaches -- Datasets -- Evaluation -- BLEU -- ROUGE -- METEOR -- CIDEr -- SPICE -- Rank position -- Attention models -- Attention in NLP -- Attention in computer vision -- The difference between hard attention and soft attention -- Visual question answering -- Multi-source based self-driving -- Summary -- Chapter 8: Deep Reinforcement Learning -- What is reinforcement learning (RL)? …”
    Libro electrónico
  8. 1428
    Publicado 2022
    Tabla de Contenidos: “…Restoring Network -- Restore IT Security Services -- Restore Virtual Machines and/or Cloud Services -- Restore Backup Systems -- Restore Clients, Servers, Applications, Services -- Conduct Unit Testing -- Rebuild Process Summary -- Recovery Process Summary -- Recovering a Windows Computer -- Recovering/Restoring Microsoft Active Directory -- Summary -- Chapter 10 Next Steps -- Paradigm Shifts -- Implement a Data-Driven Defense -- Focus on Root Causes -- Rank Everything! -- Get and Use Good Data -- Heed Growing Threats More -- Row the Same Direction -- Focus on Social Engineering Mitigation -- Track Processes and Network Traffic -- Improve Overall Cybersecurity Hygiene -- Use Multifactor Authentication -- Use a Strong Password Policy -- Secure Elevated Group Memberships -- Improve Security Monitoring -- Secure PowerShell -- Secure Data -- Secure Backups -- Summary -- Chapter 11 What Not to Do -- Assume You Can't Be a Victim -- Think That One Super-Tool Can Prevent an Attack -- Assume Too Quickly Your Backup Is Good -- Use Inexperienced Responders -- Give Inadequate Considerations to Paying Ransom -- Lie to Attackers -- Insult the Gang by Suggesting Tiny Ransom -- Pay the Whole Amount Right Away -- Argue with the Ransomware Gang -- Apply Decryption Keys to Your Only Copy -- Not Care About Root Cause -- Keep Your Ransomware Response Plan Online Only -- Allow a Team Member to Go Rogue -- Accept a Social Engineering Exclusion in Your Cyber-Insurance Policy -- Summary -- Chapter 12 Future of Ransomware -- Future of Ransomware -- Attacks Beyond Traditional Computers -- IoT Ransoms -- Mixed-PurposeHacking Gangs -- Future of Ransomware Defense -- Future Technical Defenses -- Ransomware Countermeasure Apps and Features -- AI Defense and Bots -- Strategic Defenses -- Focus on Mitigating Root Causes -- Geopolitical Improvements -- Systematic Improvements…”
    Libro electrónico
  9. 1429
    por Munagavalasa, Srini
    Publicado 2022
    “…You'll learn how to use tacit business analysis and Salesforce system analysis skills to rank and stack all requirements as well as get buy-in from stakeholders. …”
    Libro electrónico
  10. 1430
    Publicado 2016
    Tabla de Contenidos: “…-- Tools for text summarization -- Naive text summarization using NLTK -- Text summarization using Gensim -- Text summarization using Sumy -- Sumy's Luhn summarizer -- Sumy's TextRank summarizer -- Sumy's LSA summarizer -- Sumy's Edmundson summarizer -- Summary -- Topic Modeling -- What is topic modeling? …”
    Libro electrónico
  11. 1431
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- Working with Rank-N type -- How to do it... -- How it works... -- Working with type family -- How to do it... -- How it works... -- Working with GADTs -- How to do it... -- How it works... -- Chapter 11: Working with Lens and Prism -- Introduction -- Creating lenses -- How to do it... -- How it works... -- Working with lenses -- How to do it... -- How it works... -- Working with Traversal -- How to do it... -- How it works... -- Working with Iso -- How to do it... -- How it works... -- Working with Prism -- How to do it... -- How it works... -- Working with predefined lenses -- Getting ready -- How to do it... -- How it works... -- Chapter 12: Concurrent and Distributed Programming in Haskell -- Introduction -- Working with IORef -- How to do it... -- How it works... -- Working with MVar -- How to do it... -- How it works... -- Working with STM -- How it works... -- How it works... -- Working with strategies -- How to do it... -- How it works... -- Working with monad-par -- How to do it... -- How it works... -- Working with Cloud Haskell -- Getting ready -- How to do it... -- How it works... -- Using Cloud Haskell to start master and slave nodes -- How to do it... -- How it works... -- Using closure to communicate between nodes -- How to do it... -- How it works... -- Index…”
    Libro electrónico
  12. 1432
    por Kloostra, Simon. author
    Publicado 2015
    “…Joomla 3 SEO and Performance is a concise, 150-page book that helps you to build websites that dominate search engine rankings and have super-fast load times, giving your sites an increased audience. …”
    Libro electrónico
  13. 1433
    Publicado 2024
    Tabla de Contenidos: “…-- 6.1.1 Egalitarianism -- 6.1.2 Dignitas Christiana -- 6.1.3 The Raising of the Poor -- 6.1.4 Lumen Orientale -- 6.1.5 The Delphic Maxim -- 6.1.6 Establishing Christmas Liturgy -- 6.1.7 Christian Reading of the Psalms -- 6.1.8 Features of Human Dignity as an Indication of Homonymy Replacing Polysemy -- 6.2 Existing Assessments of the Role of the Patristic Period -- 6.2.1 Did Human Dignity Develop from an Idea of a Rank? -- 6.2.2 Was the Coining of the Category of Human Dignity a Discontinuous Process in European Culture? …”
    Libro electrónico
  14. 1434
    por Sargeant, Adrian
    Publicado 2024
    Tabla de Contenidos: “…A Digital Fundraising Mix -- Search Engine Optmization (Seo) -- Natural or Organic Search -- Pay Per Click -- Ad Rank -- Quality Scores -- Cost Per Action Bidding -- Google Ad Grants -- Digital Public Relations -- Cornerstones of a Digital PR Strategy -- Display Advertising -- Designing an Effective Ad -- Behavioral Targeting -- Paying for Display Advertising -- Google Analytics -- Opt-In Email -- Making Email Work -- Viral Marketing -- Website Design and Optimization -- Giving Page Design -- Mobile -- Benefits of Mobile -- Mobile Apps -- Conclusion -- Discussion Questions -- References -- Chapter 12 Social Media -- Objectives -- Introduction -- The Major Players -- Facebook -- Twitter (Now X) -- LinkedIn -- YouTube -- Instagram -- TikTok -- Pinterest -- Other Social Networks -- Snapchat -- Reddit -- Tumblr -- Periscope -- Flickr -- Developing a Strategy -- People -- Objectives -- Strategy -- Technology -- Formulating a Content Strategy -- Integrating Your Approach -- Website -- Events -- Email -- Direct Mail -- Other Ideas -- Leveraging Fans, Followers, and Influencers -- Algorithms and Getting Your Content Seen -- Measuring the Effectiveness of Your Social Media Efforts -- Safeguarding Contacts -- Summary -- Discussion Questions -- References -- Chapter 13 Donor Retention and Development -- Objectives -- Introduction -- What Do We Mean By Loyalty and Retention? …”
    Libro electrónico
  15. 1435
    por Johnston, Benjamin, author
    Publicado 2022
    Tabla de Contenidos: “…Activity 4.01: Analyzing Sales Data Using Aggregate Functions -- Summary -- Chapter 5: Window Functions for Data Analysis -- Introduction -- Window Functions -- The Basics of Window Functions -- Exercise 5.01: Analyzing Customer Data Fill Rates over Time -- The WINDOW Keyword -- Statistics with Window Functions -- Exercise 5.02: Rank Order of Hiring -- Window Frame -- Exercise 5.03: Team Lunch Motivation -- Activity 5.01: Analyzing Sales Using Window Frames and Window Functions -- Summary -- Chapter 6: Importing and Exporting Data -- Introduction -- The COPY Command -- Running the psql Command -- The COPY Statement -- \COPY with psql -- Creating Temporary Views -- Configuring COPY and \COPY -- Using COPY and \COPY to Bulk Upload Data to Your Database -- Exercise 6.01: Exporting Data to a File for Further Processing in Excel -- Using Python with your Database -- Getting Started with Python -- Improving PostgreSQL Access in Python with SQLAlchemy and pandas -- What is SQLAlchemy? …”
    Libro electrónico
  16. 1436
    Publicado 2023
    Tabla de Contenidos: “…-- Setting up our environment -- Data representation -- Creating tensors -- Tensor rank -- Properties of tensors -- Basic tensor operations -- Hello World in TensorFlow -- Debugging and solving error messages -- Summary -- Questions -- Further reading -- Chapter 3: Linear Regression with TensorFlow -- Technical requirements -- Linear regression with TensorFlow -- Evaluating regression models -- Salary prediction with TensorFlow -- Loading the data -- Data preprocessing -- Model building -- Model evaluation -- Making predictions -- Saving and loading models -- Summary -- Questions -- Further reading -- Chapter 4: Classification with TensorFlow -- Technical requirements -- Classification with TensorFlow -- Evaluating classification models -- Confusion matrix -- A student dropout prediction -- Loading the data -- Exploratory data analysis -- Data preprocessing -- Model building -- Classification performance evaluation -- Summary -- Questions…”
    Libro electrónico
  17. 1437
    Publicado 2020
    Tabla de Contenidos: “…Iteratorkardinalität verstehen -- Kontextübergänge in Iteratoren nutzen -- CONCATENATEX verwenden -- Iteratoren, die Tabellen zurückgeben -- Häufige Aufgabenstellungen mit Iteratoren lösen -- Durchschnitte und gleitende Durchschnitte berechnen -- RANKX verwenden -- Berechnungsgranularität ändern -- Fazit -- Kapitel 8 - Zeitintelligenzberechnungen -- Einführung in die Zeitintelligenz -- Automatik für Datum/Uhrzeit in Power BI -- Automatische Datumsspalten in Power Pivot für Excel -- Datumstabellenvorlage in Power Pivot für Excel -- Datumstabelle erstellen -- CALENDAR und CALENDARAUTO verwenden -- Mit mehreren Datumsangaben arbeiten -- Umgang mit mehreren Beziehungen zur Date-Tabelle -- Mehrere Datumstabellen verwalten -- Grundlegende Zeitintelligenzberechnungen verstehen -- Als Datumstabelle markieren verwenden -- Einführung in grundlegende Zeitintelligenz­­berechnungen -- YTD, QTD und MTD verwenden -- Zeiträume aus früheren Zeiträumen berechnen -- Zeitintelligenzfunktionen kombinieren -- Differenz über frühere Zeiträume berechnen -- Gleitende Jahresgesamtsumme berechnen -- Die richtige Aufrufreihenfolge für verschachtelte Zeitintelligenzfunktionen nutzen -- Semiadditive Berechnungen verstehen -- LASTDATE und LASTNONBLANK verwenden -- Mit Eröffnungs- und Abschlusssaldo arbeiten -- Fortgeschrittene Zeitintelligenzberechnungen verstehen -- To-Date-Zeiträume verstehen -- DATEADD verstehen -- FIRSTDATE, LASTDATE, FIRSTNONBLANK und ­LASTNONBLANK verstehen -- Drillthrough mit Zeitintelligenz verwenden -- Mit benutzerdefinierten Kalendern arbeiten -- Mit Wochen arbeiten -- YTD, QTD und MTD benutzerdefiniert -- Fazit -- Kapitel 9 - Berechnungsgruppen -- Einführung in Berechnungsgruppen -- Berechnungsgruppen erstellen -- Berechnungsgruppen verstehen -- Anwendung von Berechnungselementen verstehen -- Priorität bei Berechnungsgruppen verstehen…”
    Libro electrónico
  18. 1438
    Tabla de Contenidos: “…Scale-Out -- Rack-Optimized Servers -- Blade Servers -- Server Sprawl -- Virtualization -- Server Deployment Today -- Unified Computing System (UCS) -- Chapter 2 Server Architectures -- The Processor Evolution -- Sockets -- Cores -- Threads -- Intel® Hyper-Threading Technology -- Front-Side Bus -- Dual Independent Buses -- Dedicated High-Speed Interconnect -- Intel® QuickPath Interconnect -- The Memory Subsystem -- SRAMs -- DRAMs -- SDRAMs -- DIMMs -- ECC and Chipkill® -- Memory Ranks -- UDIMMs and RDIMMs -- DDR2 and DDR3 -- The I/O Subsystem -- PCI Express® -- Intel Microarchitectures -- Platform Architecture -- CPU Architecture -- Virtualization Support -- Advanced Reliability -- Advanced Encryption Standard -- Trusted Execution Technology -- Chip Design -- Chipset Virtualization Support -- Intel® VT-d for Direct I/O -- Intel® VT-c for Connectivity -- VMDirectPath® -- Chapter 3 UCS Enabling Technologies -- Unified Fabric -- 10 Gigabit Ethernet -- Lossless Ethernet -- Terminology -- PFC (Priority-Based Flow Control) -- DCBX: Data Center Bridging eXchange -- Bandwidth Management -- FCoE (Fibre Channel over Ethernet) -- Virtualization -- Server Virtualization -- SR-IOV -- The IEEE Standard Effort -- Port Extenders and Virtualization -- VNTag -- Fabric Extenders -- VN-Link -- Memory Expansion -- Speed vs. …”
    Libro electrónico
  19. 1439
    Publicado 2015
    Tabla de Contenidos: “…-- Standards and Best Practices for Risk Management -- Methodologies for Assessing Risk Within Industrial Control Systems -- Security Tests -- Security Audits -- Security and Vulnerability Assessments -- Establishing a Testing and Assessment Methodology -- Tailoring a Methodology for Industrial Networks -- Theoretical versus Physical Tests -- Online versus Offline Physical Tests -- System Characterization -- Data Collection -- Scanning of Industrial Networks -- Device Scanners -- Vulnerability Scanners -- Traffic Scanners -- Live Host Identification -- "Quiet" / "Friendly" Scanning Techniques -- Potentially "Noisy"/"Dangerous" Scanning Techniques -- Port Mirroring and Span Ports -- Command Line Tools -- Hardware and Software Inventory -- Data Flow Analysis -- Threat Identification -- Threat Actors/Sources -- Threat Vectors -- Threat Events -- Identification of Threats During Security Assessments -- Vulnerability Identification -- Vulnerability Scanning -- Configuration Auditing -- Vulnerability Prioritization -- Common Vulnerability Scoring System -- Risk Classification and Ranking -- Consequences and Impact…”
    Libro electrónico
  20. 1440
    Publicado 2018
    Tabla de Contenidos: “…Training a fully connected layer as a convolution layer -- Convolution implementation of sliding window -- Thinking about localization as a regression problem -- Applying regression to other problems -- Combining regression with the sliding window -- Detecting objects -- Regions of the convolutional neural network (R-CNN) -- Fast R-CNN -- Faster R-CNN -- Single shot multi-box detector -- Object detection API -- Installation and setup -- Pre-trained models -- Re-training object detection models -- Data preparation for the Pet dataset -- Object detection training pipeline -- Training the model -- Monitoring loss and accuracy using TensorBoard -- Training a pedestrian detection for a self-driving car -- The YOLO object detection algorithm -- Summary -- Chapter 5: Semantic Segmentation -- Predicting pixels -- Diagnosing medical images -- Understanding the earth from satellite imagery -- Enabling robots to see -- Datasets -- Algorithms for semantic segmentation -- The Fully Convolutional Network -- The SegNet architecture -- Upsampling the layers by pooling -- Sampling the layers by convolution -- Skipping connections for better training -- Dilated convolutions -- DeepLab -- RefiNet -- PSPnet -- Large kernel matters -- DeepLab v3 -- Ultra-nerve segmentation -- Segmenting satellite images -- Modeling FCN for segmentation -- Segmenting instances -- Summary -- Chapter 6: Similarity Learning -- Algorithms for similarity learning -- Siamese networks -- Contrastive loss -- FaceNet -- Triplet loss -- The DeepNet model -- DeepRank -- Visual recommendation systems -- Human face analysis -- Face detection -- Face landmarks and attributes -- The Multi-Task Facial Landmark (MTFL) dataset -- The Kaggle keypoint dataset -- The Multi-Attribute Facial Landmark (MAFL) dataset -- Learning the facial key points -- Face recognition…”
    Libro electrónico