Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 452
- Application software 417
- Historia 237
- Java (Computer program language) 200
- Application program interfaces (Computer software) 185
- Tàpies, Antoni 161
- Engineering & Applied Sciences 150
- Historia y crítica 132
- Computer Science 128
- Cloud computing 121
- Web site development 121
- Computer programming 117
- Management 114
- Crítica e interpretación 112
- Programming 111
- Python (Computer program language) 107
- Health & Biological Sciences 104
- JavaScript (Computer program language) 99
- Communauté de Taizé 92
- Història 85
- Tapices 81
- Web applications 81
- Microsoft .NET Framework 76
- Design 75
- Computer networks 74
- Computer programs 74
- Data processing 73
- Mobile computing 73
- Android (Electronic resource) 71
- Computer software 70
-
8081Publicado 2024Tabla de Contenidos: “…-- Summary -- Chapter 4: State Management Patterns and Their Implementations -- Technical requirements -- Diving into the world of MVX patterns -- Defining criteria for the state management pattern -- Embracing data binding with MVVM in Flutter -- Extracting data logic into the Model -- Emitting data via the Streams API -- Encapsulating state in CartState -- Implementing the MVVM and MVI patterns with flutter_bloc -- What is a cubit? …”
Libro electrónico -
8082Publicado 2018Tabla de Contenidos: “…Compiling and running chaincode -- Installing and instantiating chaincode -- Invoking chaincode -- Creating a chaincode -- The chaincode interface -- Setting up the chaincode file -- The Invoke method -- Access control -- ABAC -- Registering a user -- Enrolling a user -- Retrieving user identities and attributes in chaincode -- Implementing chaincode functions -- Defining chaincode assets -- Coding chaincode functions -- Creating an asset -- Reading and modifying an asset -- Main function -- Testing chaincode -- SHIM mocking -- Testing the Init method -- Testing the Invoke method -- Running tests -- Chaincode design topics -- Composite keys -- Range queries -- State queries and CouchDB -- Indexes -- ReadSet and WriteSet -- Multiversion concurrency control -- Logging output -- Configuration -- Logging API -- SHIM logging levels -- Stdout and stderr -- Additional SHIM API functions -- Summary -- Chapter 5: Exposing Network Assets and Transactions -- Building a complete application -- The nature of a Hyperledger Fabric application -- Application and transaction stages -- Application model and architecture -- Building the application -- Middleware - wrapping and driving the chaincode -- Installation of tools and dependencies -- Prerequisites for creating and running the middleware -- Installation of dependencies -- Creating and running the middleware -- Network configuration -- Endorsement policy -- User records -- Client registration and enrollment -- Creating a channel -- Joining a channel -- Installation of chaincode -- Instantiation of chaincode -- Invoking the chaincode -- Querying the chaincode -- Completing the loop - subscribing to blockchain events -- Putting it all together -- User application - exporting the service and API -- Applications -- User and session management -- Designing an API -- Creating and launching a service…”
Libro electrónico -
8083Publicado 2023Tabla de Contenidos: “…Accessing Shop Settings -- Change the Channel: Setting Up Sales Channels -- Chapter 8 Policy Academy: Setting Your Shop's Policies -- Fair Play: General Policy Tips -- Policy Wonk: Using Etsy's Policy Settings -- Returns & -- Exchanges -- Cancellations -- Privacy -- Viewing fixed policies -- Viewing your shop policies -- Hey, EU! …”
Libro electrónico -
8084Publicado 2024Tabla de Contenidos: “…Evaluating parallelism in software design - balancing performance and complexity -- Summary -- Questions -- Chapter 4: Java Concurrency Utilities and Testing in the Cloud Era -- Technical requirements -- Uploading your JAR file to AWS Lambda -- Introduction to Java concurrency tools - empowering cloud computing -- Real-world example - building a scalable application on AWS -- Taming the threads - conquering the cloud with the Executor framework -- The symphony of cloud integration and adaptation -- Real-world examples of thread pooling and task scheduling in cloud architectures -- Example 1 - keeping data fresh with scheduled tasks -- Example 2 - adapting to the cloud's dynamics -- Utilizing Java's concurrent collections in distributed systems and microservices architectures -- Navigating through data with ConcurrentHashMap -- Processing events with ConcurrentLinkedQueue -- Best practices for using Java's concurrent collections -- Advanced locking strategies for tackling cloud concurrency -- Revisiting lock mechanisms with a cloud perspective -- Advanced concurrency management for cloud workflows -- Sophisticated Java synchronizers for cloud applications -- Utilizing tools for diagnosing concurrency problems -- Thread dumps - the developer's snapshot -- Lock monitors - the guardians of synchronization -- The quest for clarity - advanced profiling techniques -- Weaving the web - integrating profiling tools into CI/CD pipelines -- Service mesh and APM - your cloud performance powerhouse -- Incorporating concurrency frameworks -- Mastering concurrency in cloud-based Java applications - testing and debugging tips -- Summary -- Questions -- Chapter 5: Mastering Concurrency Patterns in Cloud Computing -- Technical requirements -- Core patterns for robust cloud foundations -- The Leader-Follower pattern…”
Libro electrónico -
8085Publicado 2024Tabla de Contenidos: “…-- Reviewing predictions through shared folders -- Summary -- Chapter 5: IA Process and Work Queue Designs for HITL -- Technical requirements -- Single-Process, single-Work Queue designs -- Asynchronous (non-blocking) reviews -- Synchronous (blocking) reviews -- Multiple-Process, single-Work Queue designs -- Independent manual review logic -- Multiple-process, multiple-work queue designs -- Fully independent manual reviews -- Separating ML predictions and manual reviews into their own Processes and Work Queues -- Design comparison -- Design 1 - asynchronous reviews (one Process, one Work Queue) -- Design 2 - synchronous (polling) reviews (one Process, one Work Queue) -- Design 3 - independent HITL review logic (two Processes, one Work Queue) -- Design 4 - fully independent HITL reviews (two Processes, two Work Queues) -- Design 5 - full separation (three Processes, three Work Queues) -- Summary -- Chapter 6: Reusable IA Components -- Technical requirements -- IA session control -- Forcing HITL review -- Disabling HITL review -- Forcing review data recreation -- Example 1 - three IA Session Variables -- ML prediction kill switch -- Example 2 - kill switch -- ML model versioning -- Two different ways of calling web APIs -- Calling a web API using an Object when a new endpoint is provided -- Calling a web API using an Object when the vendor reuses an existing endpoint -- Example 3 - versioning ML endpoints manually -- Calling Web API Services -- New ML model evaluation -- Example 4 - new ML model evaluation Process template -- Reusable IA components review -- Summary…”
Libro electrónico -
8086por Mountjoy, JonTabla de Contenidos: “…WebLogic: The Definitive Guide; Organization; Managing the WebLogic Environment; WebLogic Enterprise APIs; Online Documentation; Conventions Used in This Book; Using Code Examples; Comments and Questions; Acknowledgments; 1. …”
Publicado 2004
Libro electrónico -
8087por Ali, Maher“…Apple's iPhone SDK has been updated and includes more than one thousand new APIs that developers will want to get their hands on. …”
Publicado 2009
Libro electrónico -
8088
-
8089Publicado 2006Tabla de Contenidos: “…Front Cover; 3D Game Engine Design: A Practical Approach to Real-Time Computer Graphics; Copyright Page; Trademarks; About the Author; CONTENTS; Preface; Chapter 1 Introduction; 1.1 The Evolution of Graphics Hardware and Games; 1.2 The Evolution of This Book and Its Software; 1.3 A Summary of the Chapters; Chapter 2 The Graphics System; 2.1 The Foundation; 2.2 Transformations; 2.3 Cameras; 2.4 Culling and Clipping; 2.5 Rasterizing; 2.6 Vertex Attributes; 2.7 Issues of Software, Hardware, and APIs; 2.8 API Conventions; Chapter 3 Renderers; 3.1 Software Rendering; 3.2 Hardware Rendering…”
Libro electrónico -
8090Publicado 2017Tabla de Contenidos: “…-- Practical parallelization with R -- Using C++ and Fortran to accelerate calculations -- Using an old-school approach with Fortran -- Using a modern approach with C++ -- Looking back at what we have achieved -- Other topics of interest to enhance performance -- Preallocating memory to avoid duplication -- Making R code a bit faster with byte code compilation -- Just-in-time (JIT) compilation of R code -- Using memoization or cache layers -- Improving our data and memory management -- Using specialized packages for performance -- Flexibility and power with cloud computing -- Specialized R distributions -- Summary -- Chapter 10: Adding Interactivity with Dashboards -- Required packages…”
Libro electrónico -
8091Publicado 2011Tabla de Contenidos: “…-- Isolated Storage -- Saving and Loading Data -- The IsolatedStorageFile Object -- XNA Game Studio Storage -- Recreating the Project on Xbox -- Devices and Containers -- Getting a Device -- Looking at the API -- Loading Loose Files from Your Project -- Summary -- 15 Gamer Services -- GamerServicesComponent -- Guide Class -- Trial Mode -- Now the Bad News -- Platform-Specific Guide Functionality -- Gamers and Profiles -- GameDefaults -- Presence -- Privileges…”
Libro electrónico -
8092Publicado 2022Tabla de Contenidos: “…Private Addressing -- Firewall Rules -- Cloud Router -- Cloud Armor -- Virtual Private Clouds -- VPC Subnets -- Shared VPC -- VPC Network Peering -- Hybrid-Cloud Networking -- Hybrid-Cloud Design Considerations -- Hybrid-Cloud Implementation Options -- Service-Centric Networking -- Private Service Connect for Google APIs…”
Libro electrónico -
8093Publicado 2022Tabla de Contenidos: “…Increment and Decrement Operators -- Working with Binary Arithmetic Operators -- Arithmetic Operators -- Numeric Promotion -- Assigning Values -- Assignment Operator -- Casting Values -- Compound Assignment Operators -- Return Value of Assignment Operators -- Comparing Values -- Equality Operators -- Relational Operators -- Logical Operators -- Conditional Operators -- Making Decisions with the Ternary Operator -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Making Decisions -- Creating Decision-Making Statements -- Statements and Blocks -- The if Statement -- The else Statement -- Shortening Code with Pattern Matching -- Applying switch Statements -- The switch Statement -- The switch Expression -- Writing while Loops -- The while Statement -- The do/while Statement -- Infinite Loops -- Constructing for Loops -- The for Loop -- The for-each Loop -- Controlling Flow with Branching -- Nested Loops -- Adding Optional Labels -- The break Statement -- The continue Statement -- The return Statement -- Unreachable Code -- Reviewing Branching -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Core APIs -- Creating and Manipulating Strings -- Concatenating -- Important String Methods -- Method Chaining -- Using the StringBuilder Class -- Mutability and Chaining -- Creating a StringBuilder -- Important StringBuilder Methods -- Understanding Equality -- Comparing equals() and == -- The String Pool -- Understanding Arrays -- Creating an Array of Primitives -- Creating an Array with Reference Variables -- Using an Array -- Sorting -- Searching -- Comparing -- Using Methods with Varargs -- Working with Multidimensional Arrays -- Calculating with Math APIs -- Finding the Minimum and Maximum -- Rounding Numbers -- Determining the Ceiling and Floor -- Calculating Exponents -- Generating Random Numbers -- Working with Dates and Times…”
Libro electrónico -
8094Publicado 2024Tabla de Contenidos:Libro electrónico
-
8095Publicado 2024Tabla de Contenidos: “…Encryption and key management -- Tokenization -- Hashing -- Data loss prevention (DLP) -- Data de-identification -- Masking -- Implementing Data Discovery -- Structured data -- Unstructured data -- Semi-structured data -- Data location -- Chapter 6 Domain 2: Cloud Data Security, Part 2 -- Planning and Implementing Data Classification -- Data classification policies -- Data mapping -- Data labeling -- Sensitive data -- Personally Identifiable Information (PII) -- Protected health information (PHI) -- Cardholder data -- Designing and Implementing Information Rights Management (IRM) -- Objectives -- Appropriate tools -- Planning and Implementing Data Retention, Deletion, and Archiving Policies -- Data retention policies -- Data deletion procedures and mechanisms -- Data archiving procedures and mechanisms -- Legal hold -- Designing and Implementing Auditability, Traceability, and Accountability of Data Events -- Defining event sources and requirements of identity attribution -- SaaS event sources -- PaaS event sources -- IaaS event sources -- Identity attribution -- Logging, storing, and analyzing data events -- Collection -- Verification -- Storage and analysis -- Chain of custody and nonrepudiation -- Chapter 7 Domain 3: Cloud Platform and Infrastructure Security, Part 1 -- Comprehending Cloud Infrastructure and Platform Components -- Physical environment -- Network and communications -- Compute -- VMs -- Containers -- Reservations, limits, and shares -- Virtualization -- Storage -- Volume storage -- Object storage -- Management plane -- Designing a Secure Data Center -- Logical design -- Physical design -- Location, location, location! …”
Libro electrónico -
8096Publicado 2023Tabla de Contenidos: “…Google Cloud Memorystore -- Google Cloud's big data services -- Google Cloud Pub/Sub -- Google Cloud BigQuery -- Google Cloud Dataflow -- Google Cloud Dataproc -- Google Cloud Looker -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Chapter 10: Google Cloud AI Services -- Google Cloud Vertex AI -- Vertex AI datasets -- Dataset labeling -- Vertex AI Feature Store -- Workbench and notebooks -- Vertex AI custom models -- Vertex Explainable AI -- Vertex AI prediction -- Vertex AI Model Monitoring -- Vertex AI Pipelines -- Vertex AI TensorBoard and Metadata -- Vertex AI AutoML -- Google Cloud ML APIs -- Sight API -- Conversational API -- Google Cloud generative AI services -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Chapter 11: Google Cloud Security Services -- Google Cloud IAM -- Google Cloud users and groups -- Google Cloud service accounts -- Google Cloud IAM roles -- Google Cloud endpoint security -- GCE VM security -- GCS security -- Google Cloud network security -- Google Cloud data security -- Data classification and data lineage -- Data encryption -- GCP DLP -- Google Cloud Monitoring and Logging -- Google Cloud Security Command Center (SCC) -- SCC asset discovery -- SCC scan findings -- SCC integration with Cloud DLP -- SHA -- The latest SCC features -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Part 3: Mastering Azure Cloud Services -- Chapter 12: Microsoft Azure Cloud Foundation Services -- Azure cloud resource hierarchy -- Azure cloud compute -- Azure cloud VMs -- Azure cloud container services -- Azure serverless computing -- Azure cloud storage -- Object storage -- File storage -- Block storage -- Archive storage -- Azure cloud networking -- Azure Cloud Foundation service implementation -- Summary…”
Libro electrónico -
8097Publicado 2023Tabla de Contenidos: “…Designing a strategy for SIEM and SOAR -- Evaluating security workflows -- Security strategies for incident management and response -- Security workflows -- Evaluating a security operations strategy for the incident management life cycle -- Evaluating a security operations strategy for sharing technical threat intelligence -- Summary -- Chapter 4: Designing an Identity Security Strategy -- Zero Trust for identity and access management -- Designing a strategy for access to cloud resources -- Recommending an identity store -- Azure AD tenant synchronization with SCIM -- B2B -- B2C -- Recommending an authentication and authorization strategy -- Hybrid identity infrastructure -- Secure authorization methods -- Designing a strategy for CA -- Designing a strategy for role assignment and delegation -- Designing a security strategy for privileged role access -- Azure AD PIM -- Designing a security strategy for privileged activities -- Privileged access reviews -- Entitlement management (aka permission management) -- Cloud tenant administration -- Case study - designing a Zero Trust architecture -- Summary -- Part 3: Evaluating Governance, Risk, and Compliance (GRC) Technical Strategies and Security Operations Strategies -- Chapter 5: Designing a Regulatory Compliance Strategy -- Interpreting compliance requirements and translating them into specific technical capabilities -- Evaluating infrastructure compliance by using Microsoft Defender for Cloud -- Interpreting compliance scores and recommending actions to resolve issues or improve security -- Designing the implementation of Azure Policy -- Designing for data residency requirements -- Translating privacy requirements into requirements for security solutions -- Case study - designing for regulatory compliance -- Summary…”
Libro electrónico -
8098Publicado 2023Tabla de Contenidos: “…-- Prerequisites -- How to Find Tables Without Primary Keys -- How to Add Surrogate Primary Keys -- How to Set Up HA -- Setup HA (Create DB System) -- Enable HA (Existing DB System) -- Disable HA (Existing HA DB System) -- How to Use MDS HA -- Limitations -- Advanced Topics -- Summary…”
Libro electrónico -
8099por Korstanje, JoosTabla de Contenidos: “…Application of the MA Model -- Multistep Forecasting with Model Retraining -- Grid Search to Find the Best MA Order -- Key Takeaways -- Chapter 5: The ARMA Model -- The Idea Behind the ARMA Model -- The Mathematical Definition of the ARMA Model -- An Example: Predicting Sunspots Using ARMA -- Fitting an ARMA(1,1) Model -- More Model Evaluation KPIs -- Automated Hyperparameter Tuning -- Grid Search: Tuning for Predictive Performance -- Key Takeaways -- Chapter 6: The ARIMA Model -- ARIMA Model Definition -- Model Definition -- ARIMA on the CO2 Example -- Key Takeaways -- Chapter 7: The SARIMA Model -- Univariate Time Series Model Breakdown -- The SARIMA Model Definition -- Example: SARIMA on Walmart Sales -- Key Takeaways -- Part III: Multivariate Time Series Models -- Chapter 8: The SARIMAX Model -- Time Series Building Blocks -- Model Definition -- Supervised Models vs. …”
Publicado 2021
Libro electrónico -
8100Publicado 2017Tabla de Contenidos: “…Items required for this project -- Adafruit HUZZAH ESP8266 breakout -- USB FTDI connector -- WS2811 NeoPixels LED strip -- 5V and 3.3V (optional) power supply -- 1000μF capacitor -- Logic level shifting IC -- 400-600Ω resistor -- JST SM or JST PH connectors (optional) -- Getting the CheerLights code set up -- Set up the Arduino IDE -- Installing the NeoPixel library -- Testing the ESP8266 -- Connect the ESP8266 Huzzah to the USB FTDI connector (FT232RL) and your computer -- Switching the ESP8266& -- #160 -- Huzzah& -- #160 -- into deployment mode -- Deploying your code -- Connecting it all together -- Connecting the data pins -- Power the NeoPixels -- Power up the ESP8266 -- Programming the ESP8266 Huzzah for CheerLights -- Let's try a simple single-color display -- Let's try some interesting modifications -- Summary -- Chapter 4: Erase Parking Headaches with OpenCV and Raspberry Pi -- Introduction to smart parking systems -- Sensor devices for smart parking -- Presence sensor -- Ultrasonic sensor& -- #160 -- -- Camera -- Configure the camera -- Accessing our Raspberry Pi via SSH -- Machine vision systems -- Introduction to machine vision -- Testing the camera -- Installing OpenCV on the Raspberry Pi -- Detecting the vehicle plate number -- OpenALPR -- Integrating the library -- Programming the script for Python -- Cloud API -- PHP REST API script for OpenALPR -- Architecture of the parking system -- Logging spaces in a database -- Configuring a MySQL database server -- Installing MySQL -- Installing the MySQL driver for PHP -- Testing PHP and MySQL -- Installing phpMyAdmin for administrating databases -- Configuring the Apache server -- Entering the phpMyAdmin remote panel -- Integrating the Raspberry Pi and camera into the database -- Programming the script software -- Node Express app for openALPR -- Amazon Web Services IoT…”
Libro electrónico