Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4581Publicado 2015Tabla de Contenidos: “…Cyber Warfare and Targeted Attacks -- Espionage and Sabotage in Cyberspace -- Industrial Espionage -- Operation Aurora -- Watering Hole Attack -- Breaching the Trusted Third Party -- Casting the Lures -- Spear Phishing -- Pharming -- Cross-Site Scripting -- Search Engine Poisoning -- Drive-by Downloads and the Invisible iframe -- Tangled Malvertising Networks -- Malware Delivery Networks -- Fast-Flux Networks -- Explosion of Domain Names -- Abandoned Sites and Domain Names -- Antivirus Software and End-Point Solutions - The Losing Battle -- Summary -- Chapter 5 Malnet Detection Techniques -- Automated URL Reputation System -- Creating URL Training Sets -- Extracting URL Feature Sets -- Classifier Training -- Dynamic Webpage Content Rating -- Keyword Extraction for Category Construction -- Keyword Categorization -- Detecting Malicious Web Infrastructure -- Detecting Exploit Servers through Content Analysis -- Topology-Based Detection of Dedicated Malicious Hosts -- Detecting C2 Servers -- Detection Based on Download Similarities -- Crawlers -- Detecting Malicious Servers with a Honeyclient -- High Interaction versus Low Interaction -- Capture-HPC: A High-Interaction Honeyclient -- Thug: A Low-Interaction Honeyclient -- Evading Honeyclients -- Summary -- Chapter 6 Writing Policies -- Overview of the ProxySG Policy Language -- Scenarios and Policy Implementation -- Web Access -- Access Logging -- User Authentication -- Safe Content Retrieval -- SSL Proxy -- Reverse Proxy Deployment -- DNS Proxy -- Data Loss Prevention -- E-mail Filtering -- A Primer on SMTP -- E-mail Filtering Techniques -- Summary -- Chapter 7 The Art of Application Classification -- A Brief History of Classification Technology -- Signature Based Pattern Matching Classification -- Extracting Matching Terms - Aho-Corasick Algorithm -- Prefi x-Tree Signature Representation…”
Libro electrónico -
4582Publicado 2025Tabla de Contenidos: “…-- Your Online Strategy Drives Your Digital First Impression -- Public vs Private -- How to Manage Your Online Presence -- Curious Five -- Chapter 15 Staying Safe in the Age of AI…”
Libro electrónico -
4583Publicado 2018Tabla de Contenidos: “…Current Context What Professional Ethics Say The Benefits of Touch in the Helping Relationships How to Decide to Touch or not to Touch? …”
Libro electrónico -
4584Publicado 2012Tabla de Contenidos: “…How does the fund track? -- How safe is my tracker? -- Investment cost is a key factor -- In summary -- The new fundamental indexing revolution -- The rise of the fundamentalists -- What are the choices? …”
Libro electrónico -
4585Publicado 2019Tabla de Contenidos: “…Chilongozi & Nadine Bowers du Toit -- Introduction 201 -- Maternal health 202 -- The global initiatives on maternal health 204 -- Factors that lead to maternal deaths and disabilities 205 -- Maternal health as a gender and development issue 208 -- Mercy Oduyoye's theological perspectives on maternal health 209 -- The role of faith-based organisations in maternal health 211 -- The church's role in promoting maternal health 212 -- The Church of Central Africa Presbyterian Synod of Livingstonia 213 -- The health department 214 -- Health Department's Safe Motherhood and Maternal Health Programme 215 -- Conclusion 217 -- Acknowledgements 218 -- Chapter 13: A long walk to reproductive freedom: Reconceiving theologies of abortion in South Africa 219 -- Introduction 219 -- Understanding abortion 220 -- The rise of a reproductive justice framework 222 -- Abortion in South Africa 224 -- A call for a new theology of abortion 227 -- Reconceiving abortion theology through a liberational lens 232 -- Deconstructing procreation, wombs and motherhood 237 -- Towards a reconceived theology of abortion in South Africa 239 -- Conclusion 243 -- Chapter 14: Whose reproductive health matters? …”
Libro electrónico -
4586Publicado 2018Tabla de Contenidos: “…Setting up Postman -- Exploring the Vision API -- Face detection -- Request structure -- Constructing the request -- Analyzing the response -- Label detection -- Request structure -- Constructing the request -- Analyzing the response -- Safe search detection -- Request structure -- Constructing the request -- Analyzing the response -- API reference -- Integrating Cloud Vision API with SmartExchange -- Solution design -- Setting up Cloudinary -- Pricing -- API reference -- Signing up with Cloudinary -- Managing the API key -- Setting up the server code -- Installing dependencies -- Defining routes -- Updating the message model -- Defining the controller -- Setting up the client code -- Setting up the ng-bootstrap -- Modifying the view thread component -- Setting up the upload image modal component -- Completing the view thread component -- Creating the Vision API service -- Managing the helpers -- Testing the app -- Deploying to Heroku -- Summary -- Chapter 4: Video Intelligence API -- Video Intelligence API -- Pricing -- Enabling API -- Exploring Video Intelligence API -- Label detection -- Label detection - request structure -- Label detection - constructing the request -- Label detection - analyze response -- Operation status - request structure -- Operation status - constructing the request -- Operation status - analyze response -- API reference -- Integrating Video Intelligence API with SmartExchange -- Solution design -- Get a copy of code from Chapter 3 -- Setting up server code -- Installing dependencies -- Defining routes -- Updating the message model -- Updating the controller -- Setting up client code -- Setting up recordrtc -- Modifying the view thread component -- Setting up the upload video modal component -- Completing the view thread component -- Creating the video API service -- Testing the app -- Deploying to Heroku -- Summary…”
Libro electrónico -
4587Publicado 2023Tabla de Contenidos: “…The Language of Value: Resources -- Knowledge as Resource: The Background -- Slippage of Meaning: From Economic Resource to Commodity Resource -- Summing Up: Safe and Unsafe Metaphors-Asset, Capital, or Resource? …”
Libro electrónico -
4588Publicado 2023Tabla de Contenidos: “…-- Can we ever be completely safe? What should I do about it? -- Is this cyberwar? …”
Libro electrónico -
4589Publicado 2010Tabla de Contenidos: “…India, flujos globales y reafirmaciones locales" -- Arup, Escuela Druk del Loto Blanco, Shey, Ladakh, India -- Morphogenesis, Escuela de Moda Pearl, Jaipur, Rajastán, India -- Studio Mumbai, Casa Palmyra, Bombay, India -- RMA, Campus universitario TISS, Tuljapur, Maharashtra, India -- Anna Heringer, Edificio DESI, Rudrapur, Dinajpur, Bangladesh -- Richard Murphy, Alto Comisionado Británico, Colombo, Sri Lanka -- Williams & Tsien, Conjunto Banyan Park, Bombay, India" - Casa Asia…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
4590Publicado 2017Tabla de Contenidos: “…-- 7.2 - Probability Theory -- 7.2.1 - The Multiplication Rule -- 7.2.2 - The Addition Rule -- 7.2.3 - The Binomial Theorem -- 7.2.4 - Bayes Theorem -- 7.3 - Reliability of Series Systems -- 7.4 - Redundancy Rules -- 7.4.1 - General Types of Redundant Configuration -- 7.4.2 - Full Active Redundancy (Without Repair) -- 7.4.3 - Partial Active Redundancy (Without Repair) -- 7.4.4 - Conditional Active Redundancy -- 7.4.5 - Standby Redundancy -- 7.4.6 - Load Sharing -- 7.5 - General Features of Redundancy -- 7.5.1 - Incremental Improvement -- 7.5.2 - Further Comparisons of Redundancy -- 7.5.3 - Redundancy and Cost -- Exercises -- Chapter 8 - Methods of Modeling -- 8.1 - Block Diagrams and Repairable Systems -- 8.1.1 - Reliability Block Diagrams -- 8.1.1.1 - Establish failure criteria -- 8.1.1.2 - Create a reliability block diagram -- 8.1.1.3 - Failure mode analysis -- 8.1.1.4 - Calculation of system reliability -- 8.1.1.5 - Reliability allocation -- 8.1.2 - Repairable Systems (Revealed Failures) -- 8.1.3 - Repairable Systems (Unrevealed Failures) -- 8.1.4 - Systems With Cold Standby Units and Repair -- 8.1.5 - Modeling Repairable Systems with Both Revealed and Unrevealed Failures -- 8.1.6 - Allowing for imperfect proof tests -- 8.1.7 - Conventions for Labeling 'Dangerous', 'Safe', Revealed and Unrevealed Failures -- 8.2 - Common Cause (Dependent) Failure -- 8.2.1 - What is CCF? …”
Libro electrónico -
4591Publicado 2014Tabla de Contenidos: “…17 The Emergence of Sovereign Wealth Funds in Asia -- 17.1 Introduction -- 17.2 Stylized Facts about Developing Asia's Foreign Exchange Reserves -- 17.3 Informal Examination of the Adequacy of Developing Asia's FOREIGN EXCHANGE Reserves -- 17.4 Sovereign Wealth Funds as a Blueprint for Investing Developing Asia's Excess Reserves -- 17.5 Policy Prescriptions for Developing Asia's SWFs -- 17.6 Conclusion -- References -- 18 China Investment Corporation: China's Sovereign Wealth Fund -- 18.1 Introduction -- 18.2 Overview and Organizational Structure -- 18.2.1 CIC International -- 18.2.2 Central Huijin -- 18.3 Investment Strategy -- 18.3.1 CIC -- 18.3.2 CIC International -- 18.3.3 Central Huijin -- 18.4 Current Problems -- 18.4.1 Ministerial Conflict Between SAFE and the Ministry of Finance -- 18.4.2 Internal Conflict Between CIC International and Central Huijin -- 18.4.3 Unsatisfactory Performance of CIC Investments -- 18.4.4 The Problematic Financing Mechanism of CIC International -- 18.4.5 Low Transparency of CIC -- 18.5 Policy Recommendations -- 18.5.1 Better Coordination Between SAFE and the Ministry of Finance -- 18.5.2 More Sustainable Financing Mechanism -- 18.5.3 Enhance Investment Performance -- 18.5.4 Improve Transparency of its Operation -- 18.5.5 Reorganization of CIC -- 18.6 Conclusion -- References -- 19 Portfolio Allocation Dynamics of China Investment Corporation in the Aftermath of the Global Financial Crisis of 2007-2009 -- 19.1 Introduction -- 19.2 SWFs and China's Economic Policy -- 19.2.1 Large and Growing FX Reserves of China -- 19.2.2 Rising Costs of Sterilization -- 19.2.3 Quest for Higher Returns -- 19.3 CIC: Establishment and Objectives -- 19.3.1 Immediate Circumstances Leading up to Establishment of CIC -- 19.3.2 Establishment of CIC: Policy Disputes -- 19.3.3 CIC: Current Structure -- 19.3.4 Funding of CIC…”
Libro electrónico -
4592por World Health OrganizationTabla de Contenidos: “…Introduction -- 1.1 General considerations and principles -- 1.1.1 Framework for safe drinking-water -- 1.1.2 Microbial aspects -- 1.1.3 Disinfection -- 1.1.4 Chemical aspects -- 1.1.5 Radiological aspects -- 1.1.6 Acceptability aspects: taste, odour and appearance -- 1.2 Roles and responsibilities in drinking-water safety management -- 1.2.1 Surveillance and quality control -- 1.2.2 Public health authorities -- 1.2.3 Local authorities -- 1.2.4 Water resource management -- 1.2.5 Drinking-water supply agencies -- 1.2.6 Community management -- 1.2.7 Water vendors -- 1.2.8 Individual consumers -- 1.2.9 Certification agencies -- 1.2.10 Plumbing -- 1.3 Supporting resources to the Guidelines -- 1.3.1 Published documents -- 2. …”
Publicado 2022
Libro electrónico -
4593Publicado 2000Tabla de Contenidos: “…8.4.2 Concentration Effects of Safe Third Country- Arrangements -- 8.5 Two Interpretive Approaches -- 8.5.1 Subsidiarity -- 8.5.2 Game Theory -- 8.6 Conclusion -- 9 INTERNATIONAL LAW AND EXTRATERRITORIAL PROTECTION -- 9.1 Protection -- 9.1.1 A Right to Seek and Enjoy Asylum? …”
Libro electrónico -
4594por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Verifiche fiscali simultanee -- E. I safe harbour -- F. Accordi preventivi sui prezzi di trasferimento -- G. …”
Publicado 2013
Libro electrónico -
4595por International Social Science Council.Tabla de Contenidos: “…-- The consequences of global environmental change -- Relocation as a policy response to climate change vulnerability in northern China -- Fighting to include local voices in environmental policy-making in Brazil -- Inclusive wealth and the transition to sustainability -- Indigenous groups and climate change in Colombia -- Between social and planetary boundaries: Navigating pathways in the safe and just space for humanity -- Are increasing greenhouse gas emissions inevitable? …”
Publicado 2013
Libro electrónico -
4596Publicado 2018Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: From Object-Oriented to Functional Programming -- Java - an introduction -- Java programming paradigms -- Imperative programming -- Real-life imperative example -- Object-oriented paradigm -- Objects and classes -- Encapsulation -- Abstraction -- Inheritance -- Polymorphism -- Declarative programming -- Functional programming -- Working with collections versus working with streams -- An introduction to Unified Modeling Language -- Class relations -- Generalization -- Realization -- Dependency -- Association -- Aggregation -- Composition -- Design patterns and principles -- Single responsibility principle -- Open/closed principle -- Liskov Substitution Principle -- Interface Segregation Principle -- Dependency inversion principle -- Summary -- Chapter 2: Creational Patterns -- Singleton pattern -- Synchronized singletons -- Synchronized singleton with double-checked locking mechanism -- Lock-free thread-safe singleton -- Early and lazy loading -- The factory pattern -- Simple factory pattern -- Static factory -- Simple factory with class registration using reflection -- Simple factory with class registration using Product.newInstance -- Factory method pattern -- Anonymous concrete factory -- Abstract factory -- Simple factory versus factory method versus abstract factory -- Builder pattern -- Car builder example -- Simplified builder pattern -- Anonymous builders with method chaining -- Prototype pattern -- Shallow clone versus deep clone -- Object pool pattern -- Summary -- Chapter 3: Behavioral Patterns -- The chain-of-responsibility pattern -- Intent -- Implementation -- Applicability and examples -- The command pattern -- Intent -- Implementation -- Applicability and examples -- The interpreter pattern -- Intent…”
Libro electrónico -
4597Publicado 2017Tabla de Contenidos: “…flatMapValues -- repartitionAndSortWithinPartitions -- coalesce -- foldByKey -- aggregateByKey -- combineByKey -- Advanced actions -- Approximate actions -- Asynchronous actions -- Miscellaneous actions -- Shared variable -- Broadcast variable -- Properties of the broadcast variable -- Lifecycle of a broadcast variable -- Map-side join using broadcast variable -- Accumulators -- Driver program -- Summary -- Chapter 8: Working with Spark SQL -- SQLContext and HiveContext -- Initializing SparkSession -- Reading CSV using SparkSession -- Dataframe and dataset -- SchemaRDD -- Dataframe -- Dataset -- Creating a dataset using encoders -- Creating a dataset using StructType -- Unified dataframe and dataset API -- Data persistence -- Spark SQL operations -- Untyped dataset operation -- Temporary view -- Global temporary view -- Spark UDF -- Spark UDAF -- Untyped UDAF -- Type-safe UDAF: -- Hive integration -- Table Persistence -- Summary -- Chapter 9: Near Real-Time Processing with Spark Streaming -- Introducing Spark Streaming -- Understanding micro batching -- Getting started with Spark Streaming jobs -- Streaming sources -- fileStream -- Kafka -- Streaming transformations -- Stateless transformation -- Stateful transformation -- Checkpointing -- Windowing -- Transform operation -- Fault tolerance and reliability -- Data receiver stage -- File streams -- Advanced streaming sources -- Transformation stage -- Output stage -- Structured Streaming -- Recap of the use case -- Structured streaming - programming model -- Built-in input sources and sinks -- Input sources -- Built-in Sinks -- Summary -- Chapter 10: Machine Learning Analytics with Spark MLlib -- Introduction to machine learning -- Concepts of machine learning -- Datatypes -- Machine learning work flow -- Pipelines -- Operations on feature vectors -- Feature extractors -- Feature transformers…”
Libro electrónico -
4598Publicado 2017Tabla de Contenidos: “…. -- Managing passwords safely -- Getting ready -- How to do it... -- How it works... -- Applying configuration changes through the REST API -- Getting ready -- How to do it... -- How it works... -- Chapter 3: Using SLAX to Write Op Scripts -- Introduction -- Making remote procedure calls -- Getting ready -- How to do it... -- How it works... -- Using XPath predicate expressions -- Getting started -- How to do it... -- How it works... -- Working with regular expressions -- Getting ready -- How to do it... -- How it works... -- Working with IP addresses…”
Libro electrónico -
4599Publicado 2023Tabla de Contenidos: “…Meet Your Mini 3/Mini 3 Pro -- Your Out-of-Box Experience -- Mini 3/Mini 3 Pro Roadmap -- Key Features and Differences -- Still Image Quality -- Shooting Modes -- Flight Performance -- Video Features -- Next Up -- Chapter 3. Flying Safely and Legally -- Obstacle Avoidance -- BOLO (Be On the Lookout -- APAS 4.0 -- Flight Time/Distance -- Range -- Flight Modes -- Getting Legal -- A Visit to Acronymland -- Airspaces Simplified -- The Recreational UAS Safety Test (TRUST) -- How to Register Your Aircraft -- Remote ID Requirements -- Next Up -- Chapter 4. …”
Libro electrónico -
4600VBScript, WMI and ADSI unleashed : using VBSscript, WMI, and ADSI to automate Windows administrationPublicado 2007Tabla de Contenidos: “…Alternative Methods -- Summary -- 19 Querying Complex WMI Information -- Understanding WMI Relationships -- Associating WMI Instances -- Writing the Query -- Testing the Query -- Writing the Query in VBScript -- Another Example -- Summary -- 20 Putting It All Together: Your First WMI/ADSI Script -- Designing the Script -- Writing Functions and Subroutines -- Writing the Main Script -- Testing the Script -- Summary -- 21 Testing and Debugging WMI and ADSI Queries -- Debugging Outside the Script -- Debugging WMI Queries -- Debugging ADSI Queries -- Summary -- Part IV: Advanced Scripting Techniques -- 22 Modular Script Programming -- Looking for Modules -- Introduction to Windows Script Components -- Scripting and XML -- Summary -- 23 Scripts Packaging and Protection -- Installing the Script Encoder -- Writing Encoded Scripts -- Running Encoded Scripts -- Encoding: The Downside -- Script Packaging -- Summary -- 24 Scripting Security -- Why Scripting Can Be Dangerous -- Security Improvements in Windows XP and Windows Server 2003 -- Digitally Signing Scripts -- Running Only Signed Scripts -- Ways to Implement Safe Scripting -- Summary -- 25 Introduction to HTML Applications -- Event-Driven Scripting -- How an HTA Is Built -- HTA Differences -- Steps for Writing an HTA -- Summary -- 26 Debugging Tips, Tools, and Techniques -- Types of Bugs -- Preventing Syntax Errors -- Debugging Logic Errors -- Summary -- Part V: Ready-to-Run Examples -- 27 Logon and Logoff Scripts -- NT and Active Directory Logon Scripts -- Active Directory-Specific Logon Scripts -- Active Directory Logoff Scripts -- Summary -- 28 Windows and Domain Administration Scripts -- Automating User Creation -- Finding Inactive Users -- Collecting System Information -- Templates -- Summary -- 29 Network Administration Scripts -- Shutting Down Remote Computers -- Listing Remote Shares…”
Libro electrónico