Mostrando 4,721 - 4,740 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.76s Limitar resultados
  1. 4721
    Publicado 2015
    “…John has been ordered to stay on the sidelines after he was injured during his last practice. …”
    Vídeo online
  2. 4722
    Publicado 2019
    “…Against this backdrop is the emergence of technologies, both hard and soft, that offer the potential to provide a more intelligent approach to establishing and maintaining livable communities. …”
    Libro electrónico
  3. 4723
    “…Stop juggling; start managing everything you need to do at home and at work.It used to be simple: Stay late, turn in flawless work, catch up on sleep later. …”
    Grabación musical
  4. 4724
    Publicado 2019
    Tabla de Contenidos: “…Explicit consideration of dynamic effects -- Elastic buckling strength of lipped channel section beam restrained on upper flange subjected to bending -- Experimental study on SCFs of empty SHS-SHS T-joints subjected to static out-of-plane bending -- Experimental study of cold-formed high strength steel circular hollow sections -- Towards automated identification of structural steel components from 3D-point clouds to subsequent GMNA-stability-analysis -- Static effects of modular structures made of containers -- Calibration of European web-crippling equations for cross-sections with one web -- Explanatory notes to buckling design of longitudinally welded aluminium compression members -- Buckling of circular hollow section stainless steel columns in fire -- The capacity of bolted cold-formed steel connections in bending -- Study on the deformation and rotation capacity of HSS hollow sections -- An analytical solution for the compressed simply-supported plate with initial geometric imperfections -- Experimental study on the shear connections of composite girders with trapezoidally corrugated web -- Numerical study of end-plate steel connections with two and four bolts-per-row -- Experimental study on square steel tubular columns under compressive force with biaxial bending moment…”
    Libro electrónico
  5. 4725
    Publicado 2018
    Tabla de Contenidos: “…. -- Stopping the server safely and quickly -- How to do it... -- How it works... -- See also -- Stopping the server in an emergency -- How to do it... -- How it works... -- Reloading the server configuration files -- How to do it... -- How it works... -- There's more... -- Restarting the server quickly -- How to do it... -- There's more... -- Preventing new connections -- How to do it... -- How it works... -- Restricting users to only one session each -- How to do it... -- How it works... -- Pushing users off the system -- How to do it... -- How it works... -- Deciding on a design for multitenancy -- How to do it... -- How it works... -- Using multiple schemas -- Getting ready -- How to do it... -- How it works... -- Giving users their own private database -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Choosing good names for database objects -- Getting ready -- How to do it... -- There's more... -- Handling objects with quoted names -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enforcing the same name and definition for columns -- Getting ready -- How to do it... -- How it works... -- There's more... -- Identifying and removing duplicates -- Getting ready…”
    Libro electrónico
  6. 4726
    Publicado 2018
    Tabla de Contenidos: “…Running a multiuser cluster -- The case for a multiuser cluster -- Using namespaces for safe multitenancy -- Avoiding namespace pitfalls -- Summary -- Chapter 6: Using Critical Kubernetes Resources -- Designing the Hue platform -- Defining the scope of Hue -- Hue components -- Hue microservices -- Planning workflows -- Automatic workflows -- Human workflows -- Budget-aware workflows -- Using Kubernetes to build the Hue platform -- Using Kubectl effectively -- Understanding Kubectl resource configuration files -- Deploying long-running microservices in pods -- Creating pods -- Decorating pods with labels -- Deploying long-running processes with deployments -- Updating a deployment -- Separating internal and external services -- Deploying an internal service -- Creating the hue-reminders service -- Exposing a service externally -- Ingress -- Using namespace to limit access -- Launching jobs -- Running jobs in parallel -- Cleaning up completed jobs -- Scheduling cron jobs -- Mixing non-cluster components -- Outside-the-cluster-network components -- Inside-the-cluster-network components -- Managing the Hue platform with Kubernetes -- Using liveness probes to ensure your containers are alive -- Using readiness probes to manage dependencies -- Employing Init Containers for orderly pod bring-up -- Sharing with DaemonSet pods -- Evolving the Hue platform with Kubernetes -- Utilizing Hue in enterprises -- Advancing science with Hue -- Educating the kids of the future with Hue -- Summary -- Chapter 7: Handling Kubernetes Storage -- Persistent volumes walk-through -- Volumes -- Using emptyDir for intra-pod communication -- Using HostPath for intra-node communication -- Using local volumes for durable node storage -- Provisioning persistent volumes -- Creating persistent volumes -- Capacity -- Volume mode -- Access modes -- Reclaim policy -- Storage class…”
    Libro electrónico
  7. 4727
    Publicado 2018
    Tabla de Contenidos:
    Libro electrónico
  8. 4728
    Publicado 2018
    Tabla de Contenidos: “…Putting it all together -- Training -- Inference -- Loading data -- Creating reverse indices -- Loading models -- Translating a sequence -- Decoding a sequence -- Example translations -- Summary -- Chapter 12: Using Deep Reinforcement Learning -- Reinforcement learning overview -- Markov Decision Processes -- Q Learning -- Infinite state space -- Deep Q networks -- Online learning -- Memory and experience replay -- Exploitation versus exploration -- DeepMind -- The Keras reinforcement learning framework -- Installing Keras-RL -- Installing OpenAI gym -- Using OpenAI gym -- Building a reinforcement learning agent in Keras -- CartPole -- CartPole neural network architecture -- Memory -- Policy -- Agent -- Training -- Results -- Lunar Lander -- Lunar Lander network architecture -- Memory and policy -- Agent -- Training -- Results -- Summary -- Chapter 13: Generative Adversarial Networks -- An overview of the GAN -- Deep Convolutional GAN architecture -- Adversarial training architecture -- Generator architecture -- Discriminator architecture -- Stacked training -- Step 1 - train the discriminator -- Step 2 - train the stack -- How GANs can fail -- Stability -- Mode collapse -- Safe choices for GAN -- Generating MNIST images using a Keras GAN -- Loading the dataset -- Building the generator -- Building the discriminator -- Building the stacked model -- The training loop -- Model evaluation -- Generating CIFAR-10 images using a Keras GAN -- Loading CIFAR-10 -- Building the generator -- Building the discriminator -- The training loop -- Model evaluation -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  9. 4729
    Publicado 2018
    Tabla de Contenidos: “…Real world examples of metaprogramming -- Example 1 - Reflection -- Making a class reflect its members -- C++ libraries which simplifies reflection -- Using the reflection -- Evaluating the assembler output of the reflection -- Conditionally overloading global functions -- Testing reflection capabilities -- Example 2 - Creating a generic safe cast function -- Example 3 - Hash strings at compile time -- The advantages of compile-time hash sum calculation -- Implement and verify a compile-time hash function -- Constructing a PrehashedString class -- Forcing PrehashedString to only accept compile time string literals -- Evaluating PrehashedString -- Evaluating get_bitmap_resource() with PrehashedString -- Summary -- Chapter 9: Proxy Objects and Lazy Evaluation -- An introduction to lazy evaluation and proxy objects -- Lazy versus eager evaluation -- Proxy objects -- Comparing concatenated strings using a proxy -- Implementing the proxy -- Performance evaluation -- The r-value modifier -- Assigning a concatenated proxy -- Postponing an sqrt computation when comparing distances -- A simple two-dimensional point class -- The underlying mathematics -- Implementing the DistProxy object -- Expanding DistProxy to something more useful -- Comparing distances with DistProxy -- Calculating distances with DistProxy -- Preventing the misuse of DistProxy -- Performance evaluation -- Creative operator overloading and proxy objects -- The pipe operator as an extension method -- The pipe operator -- The infix operator -- Further reading -- Summary -- Chapter 10: Concurrency -- Understanding the basics of concurrency -- What makes concurrent programming hard? …”
    Libro electrónico
  10. 4730
    Cryptocurrency All-in-One For Dummies
    Cryptocurrency All–in–One For Dummies
    Publicado 2022
    Tabla de Contenidos: “…-- Wallets store private keys -- Wallets create and store keys and addresses -- Wallets communicate with the Bitcoin network -- Wallets can be hot or cold -- Exploring Wallet Hardware -- Brain wallets -- Paper wallets -- Metal wallets -- Hardware wallets -- Web wallets -- Dedicated full nodes -- Dedicated hardware full nodes -- Full-node software -- Software wallets -- Finding a Wallet -- Setting Up a Bitcoin Wallet -- Creating and securing your first wallet -- Creating a 24-word seed -- Increasing security with a fake account -- Receiving Bitcoin -- Getting those notifications -- Checking your addresses -- Sending Bitcoin -- Following the money -- Backing up your wallet -- Importing (or recovering) a wallet -- Creating a watch-only wallet -- Exploring multiple-signature wallets -- Using the Lightning Network -- Chapter 4 Keeping Your Bitcoin Safe -- Understanding How You Can Lose Control of Your Bitcoin -- Grasping the Goal: Private Key and Seed Protection -- Making a Choice: Custodial or Private Wallet? …”
    Libro electrónico
  11. 4731
    Financial security for dummies
    Financial Security for Dummies
    Publicado 2022
    Tabla de Contenidos: “…Making Sense of Economic Reports -- Keeping Economic Reports in Perspective -- Reports are a (small) snapshot in time -- Beware annualized numbers -- Take a long-term view of the numbers -- Sleuthing Through Economic Reports -- Employment/jobs reports -- Gross Domestic Product -- Consumer confidence -- Corporate profits -- Consumer prices (also known as inflation) -- The reports you can mostly ignore -- Interpreting Media Coverage of Economic Data -- Understanding the short-term and provocative focus -- Keeping an eye out for biases -- Example 1: The COVID-19 pandemic -- Example 2: The 2008 financial crisis -- Chapter 7 Says Who? Weighing "Experts'" Advice -- Understanding Why Particular Pundits Get Attention…”
    Libro electrónico
  12. 4732
    Publicado 2017
    Tabla de Contenidos: “…. -- Custom arguments -- Chapter 2: Network Exploration -- Introduction -- Discovering hosts with TCP SYN ping scans -- How to do it... -- How it works... -- There's more... -- Privileged versus unprivileged TCP SYN ping scan -- Firewalls and traffic filtering -- Discovering hosts with TCP ACK ping scans -- How to do it... -- How it works... -- There's more... -- Privileged versus unprivileged TCP ACK ping scans -- Selecting ports in TCP ACK ping scans -- Discovering hosts with UDP ping scans -- How to do it... -- How it works... -- There's more... -- Selecting ports in UDP ping scans -- Discovering hosts with ICMP ping scans -- How to do it... -- How it works... -- There's more... -- Local versus remote networks -- ICMP types -- Discovering hosts with SCTP INIT ping scans -- How to do it... -- How it works... -- There's more... -- Unprivileged SCTP INIT ping scans -- Selecting ports in SCTP INIT ping scans…”
    Libro electrónico
  13. 4733
    Publicado 2017
    Tabla de Contenidos: “…-- Finding the module you need -- Using r10k -- Understanding the Puppetfile -- Managing dependencies with generate-puppetfile -- Using modules in your manifests -- Using puppetlabs/mysql -- Using puppetlabs/apache -- Using puppet/archive -- Exploring the standard library -- Safely installing packages with ensure_packages -- Modifying files in place with file_line -- Introducing some other useful functions -- The pry debugger -- Writing your own modules -- Creating a repo for your module -- Writing the module code -- Creating and validating the module metadata -- Tagging your module -- Installing your module -- Applying your module -- More complex modules -- Uploading modules to the Puppet Forge -- Summary -- Chapter 8: Classes, roles, and profiles -- Classes -- The class keyword -- Declaring parameters to classes -- Automatic parameter lookup from Hiera data -- Parameter data types -- Available data types -- Range parameters -- Content type parameters…”
    Libro electrónico
  14. 4734
    Publicado 2017
    Tabla de Contenidos: “…. -- Stopping the server safely and quickly -- How to do it... -- How it works... -- See also -- Stopping the server in an emergency -- How to do it... -- How it works... -- Reloading the server configuration files -- How to do it... -- How it works... -- There's more... -- Restarting the server quickly -- How to do it... -- There's more... -- Preventing new connections -- How to do it... -- How it works... -- Restricting users to only one session each -- How to do it... -- How it works... -- Pushing users off the system -- How to do it... -- How it works... -- Deciding on a design for multitenancy -- How to do it... -- How it works... -- Using multiple schemas -- Getting ready -- How to do it... -- How it works... -- Giving users their own private database -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Introduction -- Choosing good names for database objects -- Getting ready -- How to do it…”
    Libro electrónico
  15. 4735
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Shutdown Jenkins safely -- Getting ready -- How to do it... -- Monitoring Jenkins with JavaMelody -- Getting ready -- How to do it... -- There's more... -- Troubleshooting with JavaMelody - memory -- Troubleshooting with JavaMelody - painful jobs -- Monitoring a Jenkins Job using a Build Monitor View -- Getting ready -- How to do it... -- Configuring mail notifications -- Getting ready -- How to do it... -- Signaling the need to archive -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: Managing Security -- Introduction -- Improving security with Jenkins configuration -- Getting ready -- How to do it... -- Configuring Authorization - Matrix-based security -- Getting ready -- How to do it... -- Configuring a Project-based Matrix Authorization Strategy -- Getting ready -- How to do it... -- Jenkins and OpenLDAP integration -- Getting ready -- How to do it... -- There's more... -- Jenkins and Active Directory integration -- Getting ready -- How to do it... -- Jenkins and OWASP Zed Attack Proxy integration -- Getting ready -- How to do it... -- See also -- Testing for OWASP's top 10 security issues -- Getting ready -- How to do it... -- How it works... -- There's more... -- Target practice with WebGoat -- More tools of the trade -- See also…”
    Libro electrónico
  16. 4736
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The First Step - Concurrency Design Principles -- Basic concurrency concepts -- Concurrency versus parallelism -- Synchronization -- Immutable object -- Atomic operations and variables -- Shared memory versus message passing -- Possible problems in concurrent applications -- Data race -- Deadlock -- Livelock -- Resource starvation -- Priority inversion -- A methodology to design concurrent algorithms -- The starting point - a sequential version of the algorithm -- Step 1 - analysis -- Step 2 - design -- Step 3 - implementation -- Step 4 - testing -- Step 5 - tuning -- Conclusion -- Java Concurrency API -- Basic concurrency classes -- Synchronization mechanisms -- Executors -- The fork/join framework -- Parallel streams -- Concurrent data structures -- Concurrency design patterns -- Signaling -- Rendezvous -- Mutex -- Multiplex -- Barrier -- Double-checked locking -- Read-write lock -- Thread pool -- Thread local storage -- Tips and tricks for designing concurrent algorithms -- Identifying the correct independent tasks -- Implementing concurrency at the highest possible level -- Taking scalability into account -- Using thread-safe APIs -- Never assume an execution order -- Preferring local thread variables over static and shared when possible -- Finding the easier parallelizable version of the algorithm -- Using immutable objects when possible -- Avoiding deadlocks by ordering the locks -- Using atomic variables instead of synchronization -- Holding locks for as short a time as possible -- Taking precautions using lazy initialization -- Avoiding the use of blocking operations inside a critical section -- Summary -- Chapter 2: Working with Basic Elements - Threads and Runnables…”
    Libro electrónico
  17. 4737
    Publicado 2015
    Tabla de Contenidos: “…Administering Hadoop -- HDFS -- Persistent Data Structures -- Safe Mode -- Audit Logging -- Tools -- Monitoring -- Logging -- Metrics and JMX -- Maintenance -- Routine Administration Procedures -- Commissioning and Decommissioning Nodes -- Upgrades -- Part IV. …”
    Libro electrónico
  18. 4738
    Publicado 2015
    Tabla de Contenidos: “…Flow Control -- Boolean Values -- Comparison Operators -- Boolean Operators -- Binary Boolean Operators -- The not Operator -- Mixing Boolean and Comparison Operators -- Elements of Flow Control -- Conditions -- Blocks of Code -- Program Execution -- Flow Control Statements -- if Statements -- else Statements -- elif Statements -- while Loop Statements -- An Annoying while Loop -- break Statements -- continue Statements -- for Loops and the range() Function -- An Equivalent while Loop -- The Starting, Stopping, and Stepping Arguments to range() -- Importing Modules -- from import Statements -- Ending a Program Early with sys.exit() -- Summary -- Practice Questions -- 3. …”
    Libro electrónico
  19. 4739
    Publicado 2023
    Tabla de Contenidos:
    Libro electrónico
  20. 4740
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This All-in-One -- Book 1: Introducing R -- Book 2: Describing Data -- Book 3: Analyzing Data -- Book 4: Learning from Data -- Book 5: Harnessing R: Some Projects to Keep You Busy -- What You Can Safely Skip -- Foolish Assumptions -- Icons Used in This Book -- Beyond This Book -- Where to Go from Here -- 1 Introducing R -- Chapter 1 R: What It Does and How It Does It -- The Statistical (and Related) Ideas You Just Have to Know -- Samples and populations -- Variables: Dependent and independent -- Types of data -- A little probability -- Inferential statistics: Testing hypotheses -- Null and alternative hypotheses -- Two types of error -- Getting R -- Getting RStudio -- A Session with R -- The working directory -- Getting started -- R Functions -- User-Defined Functions -- Comments -- R Structures -- Vectors -- Numerical vectors -- Matrices -- Lists -- Data frames -- for Loops and if Statements -- Chapter 2 Working with Packages, Importing, and Exporting -- Installing Packages -- Examining Data -- Heads and tails -- Missing data -- Subsets -- R Formulas -- More Packages -- Exploring the tidyverse -- Importing and Exporting -- Spreadsheets -- CSV files -- Text files -- 2 Describing Data -- Chapter 1 Getting Graphic -- Finding Patterns -- Graphing a distribution -- Bar-hopping -- Slicing the pie -- The plot of scatter -- Of boxes and whiskers -- Doing the Basics: Base R Graphics, That Is -- Histograms -- Graph features -- Bar plots -- Pie graphs -- Dot charts -- Bar plots revisited -- Scatter plots -- A plot twist -- Scatter plot matrix -- Box plots -- Kicking It Up a Notch to ggplot2 -- Histograms -- Bar plots -- Dot charts -- Bar plots re-revisited -- Scatter plots -- About that plot twist . . . -- Scatter plot matrix -- Box plots -- Putting a Bow On It…”
    Libro electrónico