Mostrando 43,701 - 43,720 Resultados de 44,310 Para Buscar 'SEBIN~', tiempo de consulta: 1.16s Limitar resultados
  1. 43701
    Publicado 2024
    “…Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system. The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. …”
    Libro electrónico
  2. 43702
    Publicado 2023
    “…It is one of the most popular deep-learning frameworks nowadays. You will begin with learning the deep learning concept. Dive deeper into tensor handling, acquiring the finesse to create and manipulate tensors while leveraging PyTorch's automatic gradient calculation through Autograd. …”
    Video
  3. 43703
    Publicado 2023
    “…This course empowers beginners with the tools to master web development using Python as their primary resource. Beginning with the fundamental building blocks of web development, you will explore Shiny for Python, a package that revolutionizes the creation of user interfaces, widgets, and interactive features. …”
    Video
  4. 43704
    Publicado 2023
    Tabla de Contenidos: “…Qualitative versus quantitative methods -- Sample size and sampling methods -- Sample size example -- Understanding user motivation and behavior -- Triangulating insights and bridging the qualitative-quantitative divide -- Applying market research insights to drive product excellence -- Creating user personas and Jobs to Be Done -- Personas -- JTBD -- Summary -- Chapter 5: Game Mechanics and Psychology -- Reward systems -- Point redemption -- Punch cards -- Referral systems -- Content unlocks -- Memberships -- Community recognition -- Purchase matching -- Random loot -- Progress tracking -- Points -- Leveling -- Badges -- Achievements -- Completion scores -- Step counters -- Completion rewards -- Tests of knowledge -- Accomplishment splashes -- Save points -- Anniversary call-out -- Narrative and storytelling -- Customer reviews -- Environmental, Social, and Governance -- Year in review -- Inventory systems -- User profiles -- Avatars -- Mentor -- Abandonment capture -- User research artifacts -- Social engagement -- High scores -- Leaderboards -- Live collaboration -- Share button -- Voting -- Reactions -- Chat -- Friends and follow -- Game psychology -- Clues -- Layering -- Experimentation -- Ambiance -- Repetition -- Landmarking -- Easter eggs -- Emergent behavior -- Boss fights -- Combos -- Summary -- Further reading -- Chapter 6: Designing a Gamification Strategy -- Setting goals and objectives -- Defining OKRs -- Defining success metrics -- Selecting your personas and JTBD to design around -- Choosing the right game mechanics -- Hi-Z Fitness -- PMM -- Creating a game loop -- Create progression systems -- Encourage social interaction -- Include challenges and variety -- Incorporating gamification into the user experience -- Creating a user journey map -- Creating a user flow diagram -- Wireframes -- Summary…”
    Libro electrónico
  5. 43705
    Publicado 2023
    Tabla de Contenidos: “…Part 2 of 3 - Pivoting to attack other resources -- Part 3 of 3 - Obtaining the second flag -- Cleaning up -- Summary -- Further reading -- Part 3: Exploring Advanced Strategies and Best Practices in Lab Environment Design -- Chapter 7: Setting Up an IAM Privilege Escalation Lab -- Technical requirements -- Preparing the Cloud9 environment -- Part 1 of 3 - Preparing the EC2 instance role -- Part 2 of 3 - Launching the Cloud9 environment -- Part 3 of 3 - Attaching the IAM role to the EC2 instance of the Cloud9 environment -- Setting up cloud resources and flags manually -- Part 1 of 3 - Preparing the QLDB resource with the first flag -- Part 2 of 3 - Setting up an S3 bucket with the second flag -- Part 3 of 3 - Creating a vulnerable Lambda execution role -- Leveraging Terraform to automatically set up target resources -- Part 1 of 4 - Setting up the file and folder structure -- Part 2 of 4 - Defining the iam_workshop_user module resources -- Part 3 of 4 - Defining the notebook_instance_role module resources -- Part 4 of 4 - Defining the notebook_instance module resources -- Using generative AI tools for exploit code generation -- Part 1 of 3 - Generating a Python function that returns an AWS account ID -- Part 2 of 3 - Generating a Python function that generates a random password -- Part 3 of 3 - Generating Python code that creates a new IAM user -- Simulating penetration testing in the lab environment -- Part 1 of 4 - Retrieving the flag from the S3 bucket -- Part 2 of 4 - Looking for vulnerable resources -- Part 3 of 4 - Using the Lambda execution role for privilege escalation -- Part 4 of 4 - Retrieving the flag from the ledger database -- Cleaning up -- Summary -- Further reading -- Chapter 8: Designing and Building a Vulnerable Active Directory Lab -- Technical requirements -- Preparing the necessary components and prerequisites…”
    Libro electrónico
  6. 43706
    Publicado 2023
    “…Ethereum is a decentralized blockchain network known for supporting smart contracts, self-executing agreements with predefined rules that automatically execute. The course begins with an introduction and progresses to the Remix IDE, covering topics such as Blockchain basics and reading/writing smart contracts. …”
    Video
  7. 43707
    Publicado 2023
    “…This book demystifies NLP and equips you with hands-on strategies spanning healthcare, e-commerce, finance, and more to enable you to leverage Gensim in real-world scenarios. You'll begin by exploring motives and techniques for extracting text information like bag-of-words, TF-IDF, and word embeddings. …”
    Libro electrónico
  8. 43708
    Publicado 2023
    Tabla de Contenidos: “…-- Introducing the distributions -- Debian -- Ubuntu Linux -- Red Hat Enterprise Linux (RHEL) -- Fedora Linux -- CentOS -- Rocky Linux -- Alpine -- Summary -- Chapter 2: Command-Line Basics -- Technical requirements -- The Linux command line - shell -- Getting to know your shell -- I call to thee -- The filesystem structure -- Running a program -- The command to teach you all commands -- Know your environment -- Where in the PATH am I? …”
    Libro electrónico
  9. 43709
    Publicado 2023
    “…Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec considerations Key Features Find out how to attack real-life Microsoft infrastructure Discover how to detect adversary activities and remediate your environment Apply the knowledge you've gained by working on hands-on exercises Purchase of the print or Kindle book includes a free PDF eBook Book Description This book teaches you the tactics and techniques used to attack a Windows-based environment, along with showing you how to detect malicious activities and remediate misconfigurations and vulnerabilities. You'll begin by deploying your lab, where every technique can be replicated. …”
    Libro electrónico
  10. 43710
    Publicado 2023
    Tabla de Contenidos: “…Visualizing BigQuery data using Looker Studio -- Creating the right visualizations -- Hands-on exercise - creating visualizations with Looker Studio -- Commonly created charts -- Calculations in visualization tools -- Data quality discovery while creating visualizations -- Filtering data in visualizations -- Integrating other visualization tools with BigQuery -- Summary -- Further reading -- Part 3: Data Preparation with BigQuery -- Chapter 8: An Overview of Data Preparation Tools -- Technical requirements -- Getting started with data preparation -- Clearly defining your data preparation goals -- Evaluating your current data quality -- Data cleaning and transformation -- Validating prepared data -- Data preparation approaches -- Data preparation tools -- Visual data preparation tools -- Query and code-based tools -- Automated data preparation -- Summary -- Further reading -- Chapter 9: Cleansing and Transforming Data -- Technical requirements -- Using ELT for cleansing and transforming data -- Assessing dataset integrity -- The shape of the dataset -- Skew of the dataset -- Data profiling -- Data validation -- Data visualization -- Using SQL for data cleansing and transformation -- SQL data cleansing strategies and examples -- SQL data transformation strategies and examples -- Writing query results -- Using Cloud Dataprep for visual cleansing and transformation -- Summary -- Further reading -- Chapter 10: Best Practices for Data Preparation, Optimization, and Cost Control -- Technical requirements -- Data preparation best practices -- Understanding your data and business requirements -- Denormalizing your data -- Optimizing schema design -- Considering nested and repeated fields -- Using correct data types -- Data cleansing and validation -- Partitioning and clustering -- Optimizing data loading -- Best practices for optimizing storage…”
    Libro electrónico
  11. 43711
    Publicado 2023
    “…The chapters focus mainly on integrating vector search with Elastic to enhance not only their search but also observability and cybersecurity capabilities. The book begins by teaching you about NLP and the functionality of Elastic in NLP processes. …”
    Libro electrónico
  12. 43712
    Publicado 2023
    “…This book is a step-by-step guide, helping you master the powerful Arduino IoT Cloud ecosystem. This book begins by introducing you to the IoT landscape including its architecture, communication technologies, and protocols and then to the capabilities of the Arduino IoT Cloud platform and the Cloud Editor. …”
    Libro electrónico
  13. 43713
    por Chakraverty, Snehashish
    Publicado 2024
    Tabla de Contenidos: “…5.6 The numerical solution to the model -- 5.6.1 The numerical outcomes -- 5.7 Illustrations with graphics -- 5.8 Conclusion -- Availability of data and materials -- References -- 6 Nonlinear fractional integro-differential equations by using the homotopy perturbation method -- 6.1 Introduction -- 6.2 Preliminaries -- Gamma function (GF) [22,23] -- Lipschitz condition (LC) [19] -- Riemann-Liouville fractional integral (RLFI) [22,23] -- Caputo fractional derivative (CFD) [22,23] -- Riemann-Liouville fractional derivative (RLFD) [23-25] -- 6.3 Model of the FVFIDE -- 6.4 HPM -- 6.5 Illustrative examples -- 6.6 Conclusion -- References -- 7 Fractional prey-predator model with fuzzy initial conditions -- 7.1 Introduction -- 7.1.1 Fuzzy differential equations -- 7.1.2 Fractional differential equations -- 7.1.3 Novelty in this chapter -- 7.2 Basic concepts -- 7.2.1 Fuzzy number -- 7.2.2 Fuzzy number in parametric form -- 7.2.3 Triangular fuzzy number -- 7.2.4 Fuzzy arithmetic operations -- 7.2.5 Riemann-Liouville fractional derivative -- 7.2.6 Generalized Hukuhara derivative -- 7.3 Main result -- 7.3.1 Fuzzy Riemann-Liouville fractional derivative -- 7.3.2 Fuzzy fractional prey-predator model -- 7.4 Numerical illustration -- 7.5 Results and discussion -- 7.6 Conclusion -- References -- 8 Taylor series expansion approach for solving fractional order heat-like and wave-like equations -- 8.1 Introduction -- 8.2 Taylor series expansion method -- 8.2.1 Fundamental approach to solve space-fractional PDEs -- 8.2.2 Fundamental approach to solve time-fractional PDEs -- 8.3 Illustrative applications -- 8.3.1 Solution of HLEs -- 8.3.1.1 One-dimensional HLE [9] -- 8.3.1.2 Two-dimensional HLE [9] -- 8.3.2 Solution of WLEs -- 8.3.2.1 One-dimensional WLE [6] -- 8.3.2.2 Two-dimensional WLE [6] -- 8.4 Conclusion -- References…”
    Libro electrónico
  14. 43714
    Publicado 2022
    “…He cautiously stepped into the realm of data, beginning with a simple Google search for "what does a data scientist do" He was determined to pursue a career in data science to become a data engineer by learning about big data tools and infrastructure design to build scalable systems and pipelines. …”
    Video
  15. 43715
    Publicado 2022
    “…In the first part, you'll begin with an introduction to Quarkus and its features, learning how to bootstrap a Quarkus project from the ground up to create a tested and secure HTTP server for your backend. …”
    Libro electrónico
  16. 43716
    Publicado 2023
    “…Im Anschluss daran kann Fachlichkeit als Gegenstand, Reflexion als Medium und ein „Dazwischen“ als Ort studentischer Professionalisierung verstanden werden…”
    Libro electrónico
  17. 43717
    Publicado 2022
    “…Upon completion of the course, you will gain comprehensive knowledge about the concepts of cybersecurity and what it takes to begin a career in this field. You will learn about the various programs and certifications required to become a cybersecurity professional. …”
    Video
  18. 43718
    Publicado 2022
    “…Let's build a foundation in cyber security with a strong focus on networking, privacy and anonymity, malware, email security, backups and encryption, and Windows 10 Hardening. The course begins with an overview of the networking basics, including TCP/IP and DNS. …”
    Video
  19. 43719
    Publicado 2022
    “…HTML (HyperText Markup Language) is the primary markup language used in creating webpages and formulates the structure of a webpage. It comprises a series of elements that communicate how to display content to the browser. …”
    Video
  20. 43720
    Publicado 2022
    “…They have produced a series of courses mainly dedicated to beginners and newcomers on the techniques and methods of machine learning, statistics, artificial intelligence, and data science. …”
    Video