Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4721Publicado 2015“…John has been ordered to stay on the sidelines after he was injured during his last practice. …”
Vídeo online -
4722Publicado 2019“…Against this backdrop is the emergence of technologies, both hard and soft, that offer the potential to provide a more intelligent approach to establishing and maintaining livable communities. …”
Libro electrónico -
4723
Grabación musical -
4724Publicado 2019Tabla de Contenidos: “…Explicit consideration of dynamic effects -- Elastic buckling strength of lipped channel section beam restrained on upper flange subjected to bending -- Experimental study on SCFs of empty SHS-SHS T-joints subjected to static out-of-plane bending -- Experimental study of cold-formed high strength steel circular hollow sections -- Towards automated identification of structural steel components from 3D-point clouds to subsequent GMNA-stability-analysis -- Static effects of modular structures made of containers -- Calibration of European web-crippling equations for cross-sections with one web -- Explanatory notes to buckling design of longitudinally welded aluminium compression members -- Buckling of circular hollow section stainless steel columns in fire -- The capacity of bolted cold-formed steel connections in bending -- Study on the deformation and rotation capacity of HSS hollow sections -- An analytical solution for the compressed simply-supported plate with initial geometric imperfections -- Experimental study on the shear connections of composite girders with trapezoidally corrugated web -- Numerical study of end-plate steel connections with two and four bolts-per-row -- Experimental study on square steel tubular columns under compressive force with biaxial bending moment…”
Libro electrónico -
4725Publicado 2018Tabla de Contenidos: “…. -- Stopping the server safely and quickly -- How to do it... -- How it works... -- See also -- Stopping the server in an emergency -- How to do it... -- How it works... -- Reloading the server configuration files -- How to do it... -- How it works... -- There's more... -- Restarting the server quickly -- How to do it... -- There's more... -- Preventing new connections -- How to do it... -- How it works... -- Restricting users to only one session each -- How to do it... -- How it works... -- Pushing users off the system -- How to do it... -- How it works... -- Deciding on a design for multitenancy -- How to do it... -- How it works... -- Using multiple schemas -- Getting ready -- How to do it... -- How it works... -- Giving users their own private database -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Choosing good names for database objects -- Getting ready -- How to do it... -- There's more... -- Handling objects with quoted names -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enforcing the same name and definition for columns -- Getting ready -- How to do it... -- How it works... -- There's more... -- Identifying and removing duplicates -- Getting ready…”
Libro electrónico -
4726Publicado 2018Tabla de Contenidos: “…Running a multiuser cluster -- The case for a multiuser cluster -- Using namespaces for safe multitenancy -- Avoiding namespace pitfalls -- Summary -- Chapter 6: Using Critical Kubernetes Resources -- Designing the Hue platform -- Defining the scope of Hue -- Hue components -- Hue microservices -- Planning workflows -- Automatic workflows -- Human workflows -- Budget-aware workflows -- Using Kubernetes to build the Hue platform -- Using Kubectl effectively -- Understanding Kubectl resource configuration files -- Deploying long-running microservices in pods -- Creating pods -- Decorating pods with labels -- Deploying long-running processes with deployments -- Updating a deployment -- Separating internal and external services -- Deploying an internal service -- Creating the hue-reminders service -- Exposing a service externally -- Ingress -- Using namespace to limit access -- Launching jobs -- Running jobs in parallel -- Cleaning up completed jobs -- Scheduling cron jobs -- Mixing non-cluster components -- Outside-the-cluster-network components -- Inside-the-cluster-network components -- Managing the Hue platform with Kubernetes -- Using liveness probes to ensure your containers are alive -- Using readiness probes to manage dependencies -- Employing Init Containers for orderly pod bring-up -- Sharing with DaemonSet pods -- Evolving the Hue platform with Kubernetes -- Utilizing Hue in enterprises -- Advancing science with Hue -- Educating the kids of the future with Hue -- Summary -- Chapter 7: Handling Kubernetes Storage -- Persistent volumes walk-through -- Volumes -- Using emptyDir for intra-pod communication -- Using HostPath for intra-node communication -- Using local volumes for durable node storage -- Provisioning persistent volumes -- Creating persistent volumes -- Capacity -- Volume mode -- Access modes -- Reclaim policy -- Storage class…”
Libro electrónico -
4727Publicado 2018Tabla de Contenidos:Libro electrónico
-
4728Publicado 2018Tabla de Contenidos: “…Putting it all together -- Training -- Inference -- Loading data -- Creating reverse indices -- Loading models -- Translating a sequence -- Decoding a sequence -- Example translations -- Summary -- Chapter 12: Using Deep Reinforcement Learning -- Reinforcement learning overview -- Markov Decision Processes -- Q Learning -- Infinite state space -- Deep Q networks -- Online learning -- Memory and experience replay -- Exploitation versus exploration -- DeepMind -- The Keras reinforcement learning framework -- Installing Keras-RL -- Installing OpenAI gym -- Using OpenAI gym -- Building a reinforcement learning agent in Keras -- CartPole -- CartPole neural network architecture -- Memory -- Policy -- Agent -- Training -- Results -- Lunar Lander -- Lunar Lander network architecture -- Memory and policy -- Agent -- Training -- Results -- Summary -- Chapter 13: Generative Adversarial Networks -- An overview of the GAN -- Deep Convolutional GAN architecture -- Adversarial training architecture -- Generator architecture -- Discriminator architecture -- Stacked training -- Step 1 - train the discriminator -- Step 2 - train the stack -- How GANs can fail -- Stability -- Mode collapse -- Safe choices for GAN -- Generating MNIST images using a Keras GAN -- Loading the dataset -- Building the generator -- Building the discriminator -- Building the stacked model -- The training loop -- Model evaluation -- Generating CIFAR-10 images using a Keras GAN -- Loading CIFAR-10 -- Building the generator -- Building the discriminator -- The training loop -- Model evaluation -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
4729Publicado 2018Tabla de Contenidos: “…Real world examples of metaprogramming -- Example 1 - Reflection -- Making a class reflect its members -- C++ libraries which simplifies reflection -- Using the reflection -- Evaluating the assembler output of the reflection -- Conditionally overloading global functions -- Testing reflection capabilities -- Example 2 - Creating a generic safe cast function -- Example 3 - Hash strings at compile time -- The advantages of compile-time hash sum calculation -- Implement and verify a compile-time hash function -- Constructing a PrehashedString class -- Forcing PrehashedString to only accept compile time string literals -- Evaluating PrehashedString -- Evaluating get_bitmap_resource() with PrehashedString -- Summary -- Chapter 9: Proxy Objects and Lazy Evaluation -- An introduction to lazy evaluation and proxy objects -- Lazy versus eager evaluation -- Proxy objects -- Comparing concatenated strings using a proxy -- Implementing the proxy -- Performance evaluation -- The r-value modifier -- Assigning a concatenated proxy -- Postponing an sqrt computation when comparing distances -- A simple two-dimensional point class -- The underlying mathematics -- Implementing the DistProxy object -- Expanding DistProxy to something more useful -- Comparing distances with DistProxy -- Calculating distances with DistProxy -- Preventing the misuse of DistProxy -- Performance evaluation -- Creative operator overloading and proxy objects -- The pipe operator as an extension method -- The pipe operator -- The infix operator -- Further reading -- Summary -- Chapter 10: Concurrency -- Understanding the basics of concurrency -- What makes concurrent programming hard? …”
Libro electrónico -
4730Cryptocurrency All-in-One For DummiesCryptocurrency All–in–One For DummiesPublicado 2022Tabla de Contenidos: “…-- Wallets store private keys -- Wallets create and store keys and addresses -- Wallets communicate with the Bitcoin network -- Wallets can be hot or cold -- Exploring Wallet Hardware -- Brain wallets -- Paper wallets -- Metal wallets -- Hardware wallets -- Web wallets -- Dedicated full nodes -- Dedicated hardware full nodes -- Full-node software -- Software wallets -- Finding a Wallet -- Setting Up a Bitcoin Wallet -- Creating and securing your first wallet -- Creating a 24-word seed -- Increasing security with a fake account -- Receiving Bitcoin -- Getting those notifications -- Checking your addresses -- Sending Bitcoin -- Following the money -- Backing up your wallet -- Importing (or recovering) a wallet -- Creating a watch-only wallet -- Exploring multiple-signature wallets -- Using the Lightning Network -- Chapter 4 Keeping Your Bitcoin Safe -- Understanding How You Can Lose Control of Your Bitcoin -- Grasping the Goal: Private Key and Seed Protection -- Making a Choice: Custodial or Private Wallet? …”
Libro electrónico -
4731Financial security for dummiesFinancial Security for DummiesPublicado 2022Tabla de Contenidos: “…Making Sense of Economic Reports -- Keeping Economic Reports in Perspective -- Reports are a (small) snapshot in time -- Beware annualized numbers -- Take a long-term view of the numbers -- Sleuthing Through Economic Reports -- Employment/jobs reports -- Gross Domestic Product -- Consumer confidence -- Corporate profits -- Consumer prices (also known as inflation) -- The reports you can mostly ignore -- Interpreting Media Coverage of Economic Data -- Understanding the short-term and provocative focus -- Keeping an eye out for biases -- Example 1: The COVID-19 pandemic -- Example 2: The 2008 financial crisis -- Chapter 7 Says Who? Weighing "Experts'" Advice -- Understanding Why Particular Pundits Get Attention…”
Libro electrónico -
4732Publicado 2017Tabla de Contenidos: “…. -- Custom arguments -- Chapter 2: Network Exploration -- Introduction -- Discovering hosts with TCP SYN ping scans -- How to do it... -- How it works... -- There's more... -- Privileged versus unprivileged TCP SYN ping scan -- Firewalls and traffic filtering -- Discovering hosts with TCP ACK ping scans -- How to do it... -- How it works... -- There's more... -- Privileged versus unprivileged TCP ACK ping scans -- Selecting ports in TCP ACK ping scans -- Discovering hosts with UDP ping scans -- How to do it... -- How it works... -- There's more... -- Selecting ports in UDP ping scans -- Discovering hosts with ICMP ping scans -- How to do it... -- How it works... -- There's more... -- Local versus remote networks -- ICMP types -- Discovering hosts with SCTP INIT ping scans -- How to do it... -- How it works... -- There's more... -- Unprivileged SCTP INIT ping scans -- Selecting ports in SCTP INIT ping scans…”
Libro electrónico -
4733Publicado 2017Tabla de Contenidos: “…-- Finding the module you need -- Using r10k -- Understanding the Puppetfile -- Managing dependencies with generate-puppetfile -- Using modules in your manifests -- Using puppetlabs/mysql -- Using puppetlabs/apache -- Using puppet/archive -- Exploring the standard library -- Safely installing packages with ensure_packages -- Modifying files in place with file_line -- Introducing some other useful functions -- The pry debugger -- Writing your own modules -- Creating a repo for your module -- Writing the module code -- Creating and validating the module metadata -- Tagging your module -- Installing your module -- Applying your module -- More complex modules -- Uploading modules to the Puppet Forge -- Summary -- Chapter 8: Classes, roles, and profiles -- Classes -- The class keyword -- Declaring parameters to classes -- Automatic parameter lookup from Hiera data -- Parameter data types -- Available data types -- Range parameters -- Content type parameters…”
Libro electrónico -
4734Publicado 2017Tabla de Contenidos: “…. -- Stopping the server safely and quickly -- How to do it... -- How it works... -- See also -- Stopping the server in an emergency -- How to do it... -- How it works... -- Reloading the server configuration files -- How to do it... -- How it works... -- There's more... -- Restarting the server quickly -- How to do it... -- There's more... -- Preventing new connections -- How to do it... -- How it works... -- Restricting users to only one session each -- How to do it... -- How it works... -- Pushing users off the system -- How to do it... -- How it works... -- Deciding on a design for multitenancy -- How to do it... -- How it works... -- Using multiple schemas -- Getting ready -- How to do it... -- How it works... -- Giving users their own private database -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Introduction -- Choosing good names for database objects -- Getting ready -- How to do it…”
Libro electrónico -
4735Publicado 2017Tabla de Contenidos: “…. -- See also -- Shutdown Jenkins safely -- Getting ready -- How to do it... -- Monitoring Jenkins with JavaMelody -- Getting ready -- How to do it... -- There's more... -- Troubleshooting with JavaMelody - memory -- Troubleshooting with JavaMelody - painful jobs -- Monitoring a Jenkins Job using a Build Monitor View -- Getting ready -- How to do it... -- Configuring mail notifications -- Getting ready -- How to do it... -- Signaling the need to archive -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: Managing Security -- Introduction -- Improving security with Jenkins configuration -- Getting ready -- How to do it... -- Configuring Authorization - Matrix-based security -- Getting ready -- How to do it... -- Configuring a Project-based Matrix Authorization Strategy -- Getting ready -- How to do it... -- Jenkins and OpenLDAP integration -- Getting ready -- How to do it... -- There's more... -- Jenkins and Active Directory integration -- Getting ready -- How to do it... -- Jenkins and OWASP Zed Attack Proxy integration -- Getting ready -- How to do it... -- See also -- Testing for OWASP's top 10 security issues -- Getting ready -- How to do it... -- How it works... -- There's more... -- Target practice with WebGoat -- More tools of the trade -- See also…”
Libro electrónico -
4736Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The First Step - Concurrency Design Principles -- Basic concurrency concepts -- Concurrency versus parallelism -- Synchronization -- Immutable object -- Atomic operations and variables -- Shared memory versus message passing -- Possible problems in concurrent applications -- Data race -- Deadlock -- Livelock -- Resource starvation -- Priority inversion -- A methodology to design concurrent algorithms -- The starting point - a sequential version of the algorithm -- Step 1 - analysis -- Step 2 - design -- Step 3 - implementation -- Step 4 - testing -- Step 5 - tuning -- Conclusion -- Java Concurrency API -- Basic concurrency classes -- Synchronization mechanisms -- Executors -- The fork/join framework -- Parallel streams -- Concurrent data structures -- Concurrency design patterns -- Signaling -- Rendezvous -- Mutex -- Multiplex -- Barrier -- Double-checked locking -- Read-write lock -- Thread pool -- Thread local storage -- Tips and tricks for designing concurrent algorithms -- Identifying the correct independent tasks -- Implementing concurrency at the highest possible level -- Taking scalability into account -- Using thread-safe APIs -- Never assume an execution order -- Preferring local thread variables over static and shared when possible -- Finding the easier parallelizable version of the algorithm -- Using immutable objects when possible -- Avoiding deadlocks by ordering the locks -- Using atomic variables instead of synchronization -- Holding locks for as short a time as possible -- Taking precautions using lazy initialization -- Avoiding the use of blocking operations inside a critical section -- Summary -- Chapter 2: Working with Basic Elements - Threads and Runnables…”
Libro electrónico -
4737Publicado 2015Tabla de Contenidos: “…Administering Hadoop -- HDFS -- Persistent Data Structures -- Safe Mode -- Audit Logging -- Tools -- Monitoring -- Logging -- Metrics and JMX -- Maintenance -- Routine Administration Procedures -- Commissioning and Decommissioning Nodes -- Upgrades -- Part IV. …”
Libro electrónico -
4738Publicado 2015Tabla de Contenidos: “…Flow Control -- Boolean Values -- Comparison Operators -- Boolean Operators -- Binary Boolean Operators -- The not Operator -- Mixing Boolean and Comparison Operators -- Elements of Flow Control -- Conditions -- Blocks of Code -- Program Execution -- Flow Control Statements -- if Statements -- else Statements -- elif Statements -- while Loop Statements -- An Annoying while Loop -- break Statements -- continue Statements -- for Loops and the range() Function -- An Equivalent while Loop -- The Starting, Stopping, and Stepping Arguments to range() -- Importing Modules -- from import Statements -- Ending a Program Early with sys.exit() -- Summary -- Practice Questions -- 3. …”
Libro electrónico -
4739
-
4740Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This All-in-One -- Book 1: Introducing R -- Book 2: Describing Data -- Book 3: Analyzing Data -- Book 4: Learning from Data -- Book 5: Harnessing R: Some Projects to Keep You Busy -- What You Can Safely Skip -- Foolish Assumptions -- Icons Used in This Book -- Beyond This Book -- Where to Go from Here -- 1 Introducing R -- Chapter 1 R: What It Does and How It Does It -- The Statistical (and Related) Ideas You Just Have to Know -- Samples and populations -- Variables: Dependent and independent -- Types of data -- A little probability -- Inferential statistics: Testing hypotheses -- Null and alternative hypotheses -- Two types of error -- Getting R -- Getting RStudio -- A Session with R -- The working directory -- Getting started -- R Functions -- User-Defined Functions -- Comments -- R Structures -- Vectors -- Numerical vectors -- Matrices -- Lists -- Data frames -- for Loops and if Statements -- Chapter 2 Working with Packages, Importing, and Exporting -- Installing Packages -- Examining Data -- Heads and tails -- Missing data -- Subsets -- R Formulas -- More Packages -- Exploring the tidyverse -- Importing and Exporting -- Spreadsheets -- CSV files -- Text files -- 2 Describing Data -- Chapter 1 Getting Graphic -- Finding Patterns -- Graphing a distribution -- Bar-hopping -- Slicing the pie -- The plot of scatter -- Of boxes and whiskers -- Doing the Basics: Base R Graphics, That Is -- Histograms -- Graph features -- Bar plots -- Pie graphs -- Dot charts -- Bar plots revisited -- Scatter plots -- A plot twist -- Scatter plot matrix -- Box plots -- Kicking It Up a Notch to ggplot2 -- Histograms -- Bar plots -- Dot charts -- Bar plots re-revisited -- Scatter plots -- About that plot twist . . . -- Scatter plot matrix -- Box plots -- Putting a Bow On It…”
Libro electrónico