Mostrando 4,581 - 4,600 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.65s Limitar resultados
  1. 4581
    Publicado 2015
    Tabla de Contenidos: “…Cyber Warfare and Targeted Attacks -- Espionage and Sabotage in Cyberspace -- Industrial Espionage -- Operation Aurora -- Watering Hole Attack -- Breaching the Trusted Third Party -- Casting the Lures -- Spear Phishing -- Pharming -- Cross-Site Scripting -- Search Engine Poisoning -- Drive-by Downloads and the Invisible iframe -- Tangled Malvertising Networks -- Malware Delivery Networks -- Fast-Flux Networks -- Explosion of Domain Names -- Abandoned Sites and Domain Names -- Antivirus Software and End-Point Solutions - The Losing Battle -- Summary -- Chapter 5 Malnet Detection Techniques -- Automated URL Reputation System -- Creating URL Training Sets -- Extracting URL Feature Sets -- Classifier Training -- Dynamic Webpage Content Rating -- Keyword Extraction for Category Construction -- Keyword Categorization -- Detecting Malicious Web Infrastructure -- Detecting Exploit Servers through Content Analysis -- Topology-Based Detection of Dedicated Malicious Hosts -- Detecting C2 Servers -- Detection Based on Download Similarities -- Crawlers -- Detecting Malicious Servers with a Honeyclient -- High Interaction versus Low Interaction -- Capture-HPC: A High-Interaction Honeyclient -- Thug: A Low-Interaction Honeyclient -- Evading Honeyclients -- Summary -- Chapter 6 Writing Policies -- Overview of the ProxySG Policy Language -- Scenarios and Policy Implementation -- Web Access -- Access Logging -- User Authentication -- Safe Content Retrieval -- SSL Proxy -- Reverse Proxy Deployment -- DNS Proxy -- Data Loss Prevention -- E-mail Filtering -- A Primer on SMTP -- E-mail Filtering Techniques -- Summary -- Chapter 7 The Art of Application Classification -- A Brief History of Classification Technology -- Signature Based Pattern Matching Classification -- Extracting Matching Terms - Aho-Corasick Algorithm -- Prefi x-Tree Signature Representation…”
    Libro electrónico
  2. 4582
    Publicado 2025
    Tabla de Contenidos: “…-- Your Online Strategy Drives Your Digital First Impression -- Public vs Private -- How to Manage Your Online Presence -- Curious Five -- Chapter 15 Staying Safe in the Age of AI…”
    Libro electrónico
  3. 4583
    Publicado 2018
    Tabla de Contenidos: “…Current Context What Professional Ethics Say The Benefits of Touch in the Helping Relationships How to Decide to Touch or not to Touch? …”
    Libro electrónico
  4. 4584
    Publicado 2012
    Tabla de Contenidos: “…How does the fund track? -- How safe is my tracker? -- Investment cost is a key factor -- In summary -- The new fundamental indexing revolution -- The rise of the fundamentalists -- What are the choices? …”
    Libro electrónico
  5. 4585
    Publicado 2019
    Tabla de Contenidos: “…Chilongozi & Nadine Bowers du Toit -- Introduction 201 -- Maternal health 202 -- The global initiatives on maternal health 204 -- Factors that lead to maternal deaths and disabilities 205 -- Maternal health as a gender and development issue 208 -- Mercy Oduyoye's theological perspectives on maternal health 209 -- The role of faith-based organisations in maternal health 211 -- The church's role in promoting maternal health 212 -- The Church of Central Africa Presbyterian Synod of Livingstonia 213 -- The health department 214 -- Health Department's Safe Motherhood and Maternal Health Programme 215 -- Conclusion 217 -- Acknowledgements 218 -- Chapter 13: A long walk to reproductive freedom: Reconceiving theologies of abortion in South Africa 219 -- Introduction 219 -- Understanding abortion 220 -- The rise of a reproductive justice framework 222 -- Abortion in South Africa 224 -- A call for a new theology of abortion 227 -- Reconceiving abortion theology through a liberational lens 232 -- Deconstructing procreation, wombs and motherhood 237 -- Towards a reconceived theology of abortion in South Africa 239 -- Conclusion 243 -- Chapter 14: Whose reproductive health matters? …”
    Libro electrónico
  6. 4586
    Publicado 2018
    Tabla de Contenidos: “…Setting up Postman -- Exploring the Vision API -- Face detection -- Request structure -- Constructing the request -- Analyzing the response -- Label detection -- Request structure -- Constructing the request -- Analyzing the response -- Safe search detection -- Request structure -- Constructing the request -- Analyzing the response -- API reference -- Integrating Cloud Vision API with SmartExchange -- Solution design -- Setting up Cloudinary -- Pricing -- API reference -- Signing up with Cloudinary -- Managing the API key -- Setting up the server code -- Installing dependencies -- Defining routes -- Updating the message model -- Defining the controller -- Setting up the client code -- Setting up the ng-bootstrap -- Modifying the view thread component -- Setting up the upload image modal component -- Completing the view thread component -- Creating the Vision API service -- Managing the helpers -- Testing the app -- Deploying to Heroku -- Summary -- Chapter 4: Video Intelligence API -- Video Intelligence API -- Pricing -- Enabling API -- Exploring Video Intelligence API -- Label detection -- Label detection - request structure -- Label detection - constructing the request -- Label detection - analyze response -- Operation status - request structure -- Operation status - constructing the request -- Operation status - analyze response -- API reference -- Integrating Video Intelligence API with SmartExchange -- Solution design -- Get a copy of code from Chapter 3 -- Setting up server code -- Installing dependencies -- Defining routes -- Updating the message model -- Updating the controller -- Setting up client code -- Setting up recordrtc -- Modifying the view thread component -- Setting up the upload video modal component -- Completing the view thread component -- Creating the video API service -- Testing the app -- Deploying to Heroku -- Summary…”
    Libro electrónico
  7. 4587
    Publicado 2023
    Tabla de Contenidos: “…The Language of Value: Resources -- Knowledge as Resource: The Background -- Slippage of Meaning: From Economic Resource to Commodity Resource -- Summing Up: Safe and Unsafe Metaphors-Asset, Capital, or Resource? …”
    Libro electrónico
  8. 4588
    Publicado 2023
    Tabla de Contenidos: “…-- Can we ever be completely safe? What should I do about it? -- Is this cyberwar? …”
    Libro electrónico
  9. 4589
    Publicado 2010
    Tabla de Contenidos: “…India, flujos globales y reafirmaciones locales" -- Arup, Escuela Druk del Loto Blanco, Shey, Ladakh, India -- Morphogenesis, Escuela de Moda Pearl, Jaipur, Rajastán, India -- Studio Mumbai, Casa Palmyra, Bombay, India -- RMA, Campus universitario TISS, Tuljapur, Maharashtra, India -- Anna Heringer, Edificio DESI, Rudrapur, Dinajpur, Bangladesh -- Richard Murphy, Alto Comisionado Británico, Colombo, Sri Lanka -- Williams & Tsien, Conjunto Banyan Park, Bombay, India" - Casa Asia…”
    Libro
  10. 4590
    Publicado 2017
    Tabla de Contenidos: “…-- 7.2 - Probability Theory -- 7.2.1 - The Multiplication Rule -- 7.2.2 - The Addition Rule -- 7.2.3 - The Binomial Theorem -- 7.2.4 - Bayes Theorem -- 7.3 - Reliability of Series Systems -- 7.4 - Redundancy Rules -- 7.4.1 - General Types of Redundant Configuration -- 7.4.2 - Full Active Redundancy (Without Repair) -- 7.4.3 - Partial Active Redundancy (Without Repair) -- 7.4.4 - Conditional Active Redundancy -- 7.4.5 - Standby Redundancy -- 7.4.6 - Load Sharing -- 7.5 - General Features of Redundancy -- 7.5.1 - Incremental Improvement -- 7.5.2 - Further Comparisons of Redundancy -- 7.5.3 - Redundancy and Cost -- Exercises -- Chapter 8 - Methods of Modeling -- 8.1 - Block Diagrams and Repairable Systems -- 8.1.1 - Reliability Block Diagrams -- 8.1.1.1 - Establish failure criteria -- 8.1.1.2 - Create a reliability block diagram -- 8.1.1.3 - Failure mode analysis -- 8.1.1.4 - Calculation of system reliability -- 8.1.1.5 - Reliability allocation -- 8.1.2 - Repairable Systems (Revealed Failures) -- 8.1.3 - Repairable Systems (Unrevealed Failures) -- 8.1.4 - Systems With Cold Standby Units and Repair -- 8.1.5 - Modeling Repairable Systems with Both Revealed and Unrevealed Failures -- 8.1.6 - Allowing for imperfect proof tests -- 8.1.7 - Conventions for Labeling 'Dangerous', 'Safe', Revealed and Unrevealed Failures -- 8.2 - Common Cause (Dependent) Failure -- 8.2.1 - What is CCF? …”
    Libro electrónico
  11. 4591
    Publicado 2014
    Tabla de Contenidos: “…17 The Emergence of Sovereign Wealth Funds in Asia -- 17.1 Introduction -- 17.2 Stylized Facts about Developing Asia's Foreign Exchange Reserves -- 17.3 Informal Examination of the Adequacy of Developing Asia's FOREIGN EXCHANGE Reserves -- 17.4 Sovereign Wealth Funds as a Blueprint for Investing Developing Asia's Excess Reserves -- 17.5 Policy Prescriptions for Developing Asia's SWFs -- 17.6 Conclusion -- References -- 18 China Investment Corporation: China's Sovereign Wealth Fund -- 18.1 Introduction -- 18.2 Overview and Organizational Structure -- 18.2.1 CIC International -- 18.2.2 Central Huijin -- 18.3 Investment Strategy -- 18.3.1 CIC -- 18.3.2 CIC International -- 18.3.3 Central Huijin -- 18.4 Current Problems -- 18.4.1 Ministerial Conflict Between SAFE and the Ministry of Finance -- 18.4.2 Internal Conflict Between CIC International and Central Huijin -- 18.4.3 Unsatisfactory Performance of CIC Investments -- 18.4.4 The Problematic Financing Mechanism of CIC International -- 18.4.5 Low Transparency of CIC -- 18.5 Policy Recommendations -- 18.5.1 Better Coordination Between SAFE and the Ministry of Finance -- 18.5.2 More Sustainable Financing Mechanism -- 18.5.3 Enhance Investment Performance -- 18.5.4 Improve Transparency of its Operation -- 18.5.5 Reorganization of CIC -- 18.6 Conclusion -- References -- 19 Portfolio Allocation Dynamics of China Investment Corporation in the Aftermath of the Global Financial Crisis of 2007-2009 -- 19.1 Introduction -- 19.2 SWFs and China's Economic Policy -- 19.2.1 Large and Growing FX Reserves of China -- 19.2.2 Rising Costs of Sterilization -- 19.2.3 Quest for Higher Returns -- 19.3 CIC: Establishment and Objectives -- 19.3.1 Immediate Circumstances Leading up to Establishment of CIC -- 19.3.2 Establishment of CIC: Policy Disputes -- 19.3.3 CIC: Current Structure -- 19.3.4 Funding of CIC…”
    Libro electrónico
  12. 4592
    por World Health Organization
    Publicado 2022
    Tabla de Contenidos: “…Introduction -- 1.1 General considerations and principles -- 1.1.1 Framework for safe drinking-water -- 1.1.2 Microbial aspects -- 1.1.3 Disinfection -- 1.1.4 Chemical aspects -- 1.1.5 Radiological aspects -- 1.1.6 Acceptability aspects: taste, odour and appearance -- 1.2 Roles and responsibilities in drinking-water safety management -- 1.2.1 Surveillance and quality control -- 1.2.2 Public health authorities -- 1.2.3 Local authorities -- 1.2.4 Water resource management -- 1.2.5 Drinking-water supply agencies -- 1.2.6 Community management -- 1.2.7 Water vendors -- 1.2.8 Individual consumers -- 1.2.9 Certification agencies -- 1.2.10 Plumbing -- 1.3 Supporting resources to the Guidelines -- 1.3.1 Published documents -- 2. …”
    Libro electrónico
  13. 4593
    Publicado 2000
    Tabla de Contenidos: “…8.4.2 Concentration Effects of Safe Third Country- Arrangements -- 8.5 Two Interpretive Approaches -- 8.5.1 Subsidiarity -- 8.5.2 Game Theory -- 8.6 Conclusion -- 9 INTERNATIONAL LAW AND EXTRATERRITORIAL PROTECTION -- 9.1 Protection -- 9.1.1 A Right to Seek and Enjoy Asylum? …”
    Libro electrónico
  14. 4594
    Tabla de Contenidos: “…Verifiche fiscali simultanee -- E. I safe harbour -- F. Accordi preventivi sui prezzi di trasferimento -- G. …”
    Libro electrónico
  15. 4595
    Tabla de Contenidos: “…-- The consequences of global environmental change -- Relocation as a policy response to climate change vulnerability in northern China -- Fighting to include local voices in environmental policy-making in Brazil -- Inclusive wealth and the transition to sustainability -- Indigenous groups and climate change in Colombia -- Between social and planetary boundaries: Navigating pathways in the safe and just space for humanity -- Are increasing greenhouse gas emissions inevitable? …”
    Libro electrónico
  16. 4596
    Publicado 2018
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: From Object-Oriented to Functional Programming -- Java - an introduction -- Java programming paradigms -- Imperative programming -- Real-life imperative example -- Object-oriented paradigm -- Objects and classes -- Encapsulation -- Abstraction -- Inheritance -- Polymorphism -- Declarative programming -- Functional programming -- Working with collections versus working with streams -- An introduction to Unified Modeling Language -- Class relations -- Generalization -- Realization -- Dependency -- Association -- Aggregation -- Composition -- Design patterns and principles -- Single responsibility principle -- Open/closed principle -- Liskov Substitution Principle -- Interface Segregation Principle -- Dependency inversion principle -- Summary -- Chapter 2: Creational Patterns -- Singleton pattern -- Synchronized singletons -- Synchronized singleton with double-checked locking mechanism -- Lock-free thread-safe singleton -- Early and lazy loading -- The factory pattern -- Simple factory pattern -- Static factory -- Simple factory with class registration using reflection -- Simple factory with class registration using Product.newInstance -- Factory method pattern -- Anonymous concrete factory -- Abstract factory -- Simple factory versus factory method versus abstract factory -- Builder pattern -- Car builder example -- Simplified builder pattern -- Anonymous builders with method chaining -- Prototype pattern -- Shallow clone versus deep clone -- Object pool pattern -- Summary -- Chapter 3: Behavioral Patterns -- The chain-of-responsibility pattern -- Intent -- Implementation -- Applicability and examples -- The command pattern -- Intent -- Implementation -- Applicability and examples -- The interpreter pattern -- Intent…”
    Libro electrónico
  17. 4597
    Publicado 2017
    Tabla de Contenidos: “…flatMapValues -- repartitionAndSortWithinPartitions -- coalesce -- foldByKey -- aggregateByKey -- combineByKey -- Advanced actions -- Approximate actions -- Asynchronous actions -- Miscellaneous actions -- Shared variable -- Broadcast variable -- Properties of the broadcast variable -- Lifecycle of a broadcast variable -- Map-side join using broadcast variable -- Accumulators -- Driver program -- Summary -- Chapter 8: Working with Spark SQL -- SQLContext and HiveContext -- Initializing SparkSession -- Reading CSV using SparkSession -- Dataframe and dataset -- SchemaRDD -- Dataframe -- Dataset -- Creating a dataset using encoders -- Creating a dataset using StructType -- Unified dataframe and dataset API -- Data persistence -- Spark SQL operations -- Untyped dataset operation -- Temporary view -- Global temporary view -- Spark UDF -- Spark UDAF -- Untyped UDAF -- Type-safe UDAF: -- Hive integration -- Table Persistence -- Summary -- Chapter 9: Near Real-Time Processing with Spark Streaming -- Introducing Spark Streaming -- Understanding micro batching -- Getting started with Spark Streaming jobs -- Streaming sources -- fileStream -- Kafka -- Streaming transformations -- Stateless transformation -- Stateful transformation -- Checkpointing -- Windowing -- Transform operation -- Fault tolerance and reliability -- Data receiver stage -- File streams -- Advanced streaming sources -- Transformation stage -- Output stage -- Structured Streaming -- Recap of the use case -- Structured streaming - programming model -- Built-in input sources and sinks -- Input sources -- Built-in Sinks -- Summary -- Chapter 10: Machine Learning Analytics with Spark MLlib -- Introduction to machine learning -- Concepts of machine learning -- Datatypes -- Machine learning work flow -- Pipelines -- Operations on feature vectors -- Feature extractors -- Feature transformers…”
    Libro electrónico
  18. 4598
    Publicado 2017
    Tabla de Contenidos: “…. -- Managing passwords safely -- Getting ready -- How to do it... -- How it works... -- Applying configuration changes through the REST API -- Getting ready -- How to do it... -- How it works... -- Chapter 3: Using SLAX to Write Op Scripts -- Introduction -- Making remote procedure calls -- Getting ready -- How to do it... -- How it works... -- Using XPath predicate expressions -- Getting started -- How to do it... -- How it works... -- Working with regular expressions -- Getting ready -- How to do it... -- How it works... -- Working with IP addresses…”
    Libro electrónico
  19. 4599
    Publicado 2023
    Tabla de Contenidos: “…Meet Your Mini 3/Mini 3 Pro -- Your Out-of-Box Experience -- Mini 3/Mini 3 Pro Roadmap -- Key Features and Differences -- Still Image Quality -- Shooting Modes -- Flight Performance -- Video Features -- Next Up -- Chapter 3. Flying Safely and Legally -- Obstacle Avoidance -- BOLO (Be On the Lookout -- APAS 4.0 -- Flight Time/Distance -- Range -- Flight Modes -- Getting Legal -- A Visit to Acronymland -- Airspaces Simplified -- The Recreational UAS Safety Test (TRUST) -- How to Register Your Aircraft -- Remote ID Requirements -- Next Up -- Chapter 4. …”
    Libro electrónico
  20. 4600
    Publicado 2007
    Tabla de Contenidos: “…Alternative Methods -- Summary -- 19 Querying Complex WMI Information -- Understanding WMI Relationships -- Associating WMI Instances -- Writing the Query -- Testing the Query -- Writing the Query in VBScript -- Another Example -- Summary -- 20 Putting It All Together: Your First WMI/ADSI Script -- Designing the Script -- Writing Functions and Subroutines -- Writing the Main Script -- Testing the Script -- Summary -- 21 Testing and Debugging WMI and ADSI Queries -- Debugging Outside the Script -- Debugging WMI Queries -- Debugging ADSI Queries -- Summary -- Part IV: Advanced Scripting Techniques -- 22 Modular Script Programming -- Looking for Modules -- Introduction to Windows Script Components -- Scripting and XML -- Summary -- 23 Scripts Packaging and Protection -- Installing the Script Encoder -- Writing Encoded Scripts -- Running Encoded Scripts -- Encoding: The Downside -- Script Packaging -- Summary -- 24 Scripting Security -- Why Scripting Can Be Dangerous -- Security Improvements in Windows XP and Windows Server 2003 -- Digitally Signing Scripts -- Running Only Signed Scripts -- Ways to Implement Safe Scripting -- Summary -- 25 Introduction to HTML Applications -- Event-Driven Scripting -- How an HTA Is Built -- HTA Differences -- Steps for Writing an HTA -- Summary -- 26 Debugging Tips, Tools, and Techniques -- Types of Bugs -- Preventing Syntax Errors -- Debugging Logic Errors -- Summary -- Part V: Ready-to-Run Examples -- 27 Logon and Logoff Scripts -- NT and Active Directory Logon Scripts -- Active Directory-Specific Logon Scripts -- Active Directory Logoff Scripts -- Summary -- 28 Windows and Domain Administration Scripts -- Automating User Creation -- Finding Inactive Users -- Collecting System Information -- Templates -- Summary -- 29 Network Administration Scripts -- Shutting Down Remote Computers -- Listing Remote Shares…”
    Libro electrónico