Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mare de Déu 83
- Historia 65
- Engineering & Applied Sciences 49
- Application software 37
- Computer Science 37
- Development 36
- Culte 32
- Sermons 28
- Història 27
- Obres anteriors al 1800 25
- Python (Computer program language) 24
- Sermons castellans 24
- Big data 23
- Machine learning 22
- Operating systems (Computers) 22
- Amor 20
- Computer networks 20
- Programming 20
- Computer programming 19
- C++ (Computer program language) 18
- Linux 18
- Artificial intelligence 17
- Mercè, Mare de Déu de la 17
- Management 16
- Ascetismo 15
- Cloud computing 15
- Data mining 15
- Java (Computer program language) 15
- C (Computer program language) 14
- Devocionaris 14
-
1121Publicado 2016Tabla de Contenidos: “…. -- How it works... -- There's more... -- See also -- Data exploration -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Feature engineering -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Applying linear regression -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Applying logistic regression on bank marketing data -- Variable identification -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Data exploration -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Feature engineering -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Applying logistic regression -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Real-time intrusion detection using streaming k-means -- Variable identification -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Simulating real-time data -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Applying streaming k-means -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 5: Working with Spark MLlib -- Introduction -- Working with Spark ML pipelines -- Implementing Naive Bayes' classification -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing decision trees -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Building a recommendation system -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
1122Publicado 2015“…After this, major differences between client implementations in PHP, Python, and Ruby are presented. …”
Libro electrónico -
1123Publicado 2015“…Becoming a professional doesn’t have to be boring. Follow the real-life UX process from start-to-finish and apply the skills as you learn, or refresh your memory before the next meeting. …”
Libro electrónico -
1124Publicado 2011“…The new digital media offers us an unprecedented memory capacity, an ubiquitous communication channel and a growing computing power. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1125por Supalov, Alexander. author, Semin, Andrey. author, Dahnken, Christopher. author, Klemm, Michael. author“…These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters. …”
Publicado 2014
Libro electrónico -
1126Publicado 2024“…Get hands-on with GPT 3.5, GPT 4, LangChain, Llama 2, Falcon LLM and more, to build LLM-powered sophisticated AI applications Key Features Embed LLMs into real-world applications Use LangChain to orchestrate LLMs and their components within applications Grasp basic and advanced techniques of prompt engineering Book Description Building LLM Powered Applications delves into the fundamental concepts, cutting-edge technologies, and practical applications that LLMs offer, ultimately paving the way for the emergence of large foundation models (LFMs) that extend the boundaries of AI capabilities. …”
Libro electrónico -
1127Publicado 2023Tabla de Contenidos:Libro electrónico
-
1128Publicado 2022Tabla de Contenidos: “…A combined diamond model and kill chain intrusion analysis -- Attribution -- Summary -- Questions -- Part 2: Evidence Acquisition -- Chapter 5: Collecting Network Evidence -- An overview of network evidence -- Preparation -- A network diagram -- Configuration -- Firewalls and proxy logs -- Firewalls -- Web application firewalls -- Web proxy servers -- NetFlow -- Packet capture -- tcpdump -- WinPcap and RawCap -- Wireshark -- Evidence collection -- Summary -- Questions -- Further reading -- Chapter 6: Acquiring Host-Based Evidence -- Preparation -- Order of volatility -- Evidence acquisition -- Evidence collection procedures -- Acquiring volatile memory -- FTK Imager -- WinPmem -- RAM Capturer -- Virtual systems -- Acquiring non-volatile evidence -- FTK obtaining protected files -- The CyLR response tool -- Kroll Artifact Parser and Extractor -- Summary -- Questions -- Further reading -- Chapter 7: Remote Evidence Collection -- Enterprise incident response challenges -- Endpoint detection and response -- Velociraptor overview and deployment -- Velociraptor server -- Velociraptor Windows collector -- Velociraptor scenarios -- Velociraptor evidence collection -- CyLR -- WinPmem -- Summary -- Questions -- Chapter 8: Forensic Imaging -- Understanding forensic imaging -- Image versus copy -- Logical versus physical volumes -- Types of image files -- SSD versus HDD -- Tools for imaging -- Preparing a staging drive -- Using write blockers -- Imaging techniques -- Dead imaging -- Live imaging -- Virtual systems -- Linux imaging -- Summary -- Questions -- Further reading -- Part 3: Evidence Analysis -- Chapter 9: Analyzing Network Evidence -- Network evidence overview -- Analyzing firewall and proxy logs -- SIEM tools -- The Elastic Stack -- Analyzing NetFlow -- Analyzing packet captures -- Command-line tools -- Real Intelligence Threat Analytics…”
Libro electrónico -
1129por Holman, Tomlinson“…This fresh edition is chockfull of techniques, tricks, and workflow secrets that you can apply to your own projects from preproduction through postproduction.New to this edition:A new feature on "true" 24p shooting and editing systems, as well as single vs. double-system recordingA strong focus on new media, including mini-DVDs, hard disks, memory cards, and standard and high-definition imagery Discussion of camera selection, manual level control, camera and recorder inputs, location scouting, and preproduction planningInstruction in connectors, real-time transfers, and file-based transfers from DVDs, hard drives, and solid state media.Blu-Ray and HD tape formats for mastering and distribution in addition to file-based, DV, and DVD masters. …”
Publicado 2013
Libro electrónico -
1130por Sung, Kelvin. author, Keng-Wei Chang, Jack. author, Zhu, Rob. author, Pavleas, Jebediah. author“…With Learn 2D Game Development with C#, you'll learn your way around the universal building blocks of game development, and how to put them together to create a real working game. C# is increasingly becoming the language of choice for new game developers. …”
Publicado 2013
Libro electrónico -
1131Publicado 2023“…An accessible guide for beginner-to-intermediate programmers to the concepts, real-world applications, and latest features of C# 12 and .NET 8, with hands-on exercises using Visual Studio 2022 and Visual Studio Code. …”
Libro electrónico -
1132Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Blockchains and Rust -- Chapter 1: Blockchains with Rust -- Laying the foundation with the building blocks of blockchains -- Blocks -- Hashes -- Transactions -- Security -- Storage versus compute -- Exploring the backbone of blockchains -- Decentralization -- Peers, nodes, validators, and collators -- Consensus -- Mining -- Forking -- Permissioned versus permissionless -- Understanding decentralization -- Replication -- Governance -- Cryptocurrencies and gas fees -- Decentralized platforms -- Tokens versus coins and ICOs -- Smart contracts and NFTs -- DAOs -- Non-censorable apps -- Digital assets with real-world limits -- Scaling the blockchain -- The blockchain trilemma -- Sharding -- Interoperability -- Consensus for scale -- Parallel processing -- Layer 2s and side chains -- ZK rollups and optimistic rollups -- Introducing smart contracts -- The future of the adoption of blockchains -- Industries disrupted -- Sociocultural and economic changes -- Summary -- Chapter 2: Rust - Necessary Concepts for Building Blockchains -- Introducing Rust -- The benefit of being statically typed -- A dive into Rust's applicability as a systems programming language -- The reliability of Rust -- The Rust ownership memory management model -- Garbage collection -- Speed and performance -- Futures, error handling, and memory safety -- Rust's advantage for blockchains -- Blockchains that use Rust -- Foundry for Ethereum -- The Fe, Move, and ink! …”
Libro electrónico -
1133Tabla de Contenidos: “…Capacity -- Capacity vs. Cost -- How Much Memory Is Required? -- NUMA -- The UCS Approach -- The UCS Advantage -- Chapter 4 I/O Adapters -- Disclaimer…”
Libro electrónico -
1134Publicado 2016“…and find out how to use them to solve real development challenges Put PHP to work for performance and scalability ? …”
Libro electrónico -
1135Publicado 2024Tabla de Contenidos: “…-- Running the performance test -- Flight SQL, the new kid on the block -- Summary -- Chapter 8: Understanding Arrow Database Connectivity (ADBC) -- Technical requirements -- ODBC takes an Arrow to the knee -- Lost in translation -- Arrow adoption in ODBC drivers -- The benefits of standards around connectivity -- The ADBC specification -- ADBC databases -- ADBC connections -- ADBC statements -- ADBC error handling -- Using ADBC for performance and adaptability -- ADBC with C/C++ -- Using ADBC with Python -- Using ADBC with Go -- Summary -- Chapter 9: Using Arrow with Machine Learning Workflows -- Technical requirements -- SPARKing new ideas on Jupyter -- Understanding the integration of Arrow in Spark -- Containerization makes life easier -- SPARKing joy with Arrow and PySpark -- Facehuggers implanting data -- Setting up your environment -- Proving the benefits by checking resource usage -- Using Arrow with the standard tools for ML -- More GPU, more speed! -- Summary -- Part 3: Real-World Examples, Use Cases, and Future Development -- Chapter 10: Powered by Apache Arrow -- Swimming in data with Dremio Sonar -- Clarifying Dremio Sonar's architecture -- The library of the gods...of data analysis -- Spicing up your data workflows -- Arrow in the browser using JavaScript -- Gaining a little perspective…”
Libro electrónico -
1136por Parasram, Shiva V. N.“…This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools. …”
Publicado 2023
Libro electrónico -
1137Publicado 1995Tabla de Contenidos: “…-- 1.5 Typical Microcomputer Addressing Modes and Instructions -- 1.5.1 Introduction -- 1.5.2 Addressing Modes -- 1.5.3 Instruction Types -- 1.6 Basic Features of Microcomputer Development Systems -- 1.7 System Development Flowchart -- 1.7.1 Software Development -- 1.7.2 Hardware Development -- 1.8 Typical Microprocessors -- 1.9 Typical Practical Applications -- 1.9.1 Personal Workstations -- 1.9.2 Fault-Tolerant Systems -- 1.9.3 Real-Time Controllers -- 1.9.4 Robotics -- 1.9.5 Embedded Control -- Questions and Problems -- Chapter 2: Intel 8085 -- 2.1 Introduction -- 2.2 Register Architecture -- 2.3 Memory Addressing…”
Libro electrónico -
1138por Hahn, Marcelo GuerraTabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- About the reviewers -- Table of Contents -- Preface -- Part 1: Under the Hood of C++ Programming -- Chapter 1: Building C++ Applications -- Technical requirements -- Building C++ applications -- Preprocessing -- Compiling -- Linking -- Low-level programming with C++ -- Functions -- Data and memory -- Control flow -- Details of OOP -- Class relationships -- Summary -- Chapter 2: Beyond Object-Oriented Programming -- Technical requirements -- An introduction to OOP and the C++ object model -- Understanding objects -- Low-level details of objects -- High-level details of objects -- C++ object model -- State -- Identity -- Behavior -- Mimicking a class -- Working with classes -- Classes from a compiler perspective -- Initialization and destruction -- Copying objects -- Moving objects -- An lvalue reference -- Rvalue references -- Notes on operator overloading -- Encapsulation and the public interface -- Class relationships -- Aggregation and composition -- Under the hood of inheritance and polymorphism -- Inheritance -- Polymorphism -- Virtual functions under the hood -- Classical design patterns -- The composite pattern -- The decorator pattern -- Design principles -- The single responsibility principle -- The open-closed principle -- The Liskov substitution principle -- The interface segregation principle -- The dependency inversion principle -- More UML in project design -- The sequence diagram -- Summary -- Questions -- Further reading -- Chapter 3: Understanding and Designing Templates -- Technical requirements -- Motivation for using templates -- Function templates -- Syntax -- Instantiation -- Deduction -- Specialization and overloading -- Class templates -- Syntax -- Instantiation -- Specialization -- Understanding variadic templates -- Syntax -- Examples…”
Publicado 2023
Libro electrónico -
1139Publicado 2017“…You'll get tips on avoiding memory leaks using smart-pointers. Next, you'll see how multi-threaded programming can help you achieve concurrency in your applications. …”
Libro electrónico -
1140Publicado 2019“…The second section is a reference to core concepts and APIs that explains how to perform real programming work in the Java environment. Get up to speed on language details, including Java 9-11 changes Learn object-oriented programming, using basic Java syntax Explore generics, enumerations, annotations, and lambda expressions Understand basic techniques used in object-oriented design Examine concurrency and memory, and how they’re intertwined Work with Java collections and handle common data formats Delve into Java’s latest I/O APIs, including asynchronous channels Use Nashorn to execute JavaScript on the Java Virtual Machine Become familiar with development tools in OpenJDK…”
Libro electrónico