Mostrando 4,021 - 4,040 Resultados de 4,352 Para Buscar 'Tarasp~', tiempo de consulta: 1.14s Limitar resultados
  1. 4021
    Publicado 2020
    “…What you will learn Distinguish between hierarchical clustering and the k-means algorithm Understand the process of finding clusters in data Grasp interesting techniques to reduce the size of data Use autoencoders to decode data Extract text from a large collection of documents using topic modeling Create a bag-of-words model using the CountVectorizer Who this book is for If you are a data scientist who is just getting started and want to learn how to implement machine learning algorithms to build predictive models, then this book is for you. …”
    Libro electrónico
  2. 4022
    Publicado 2016
    “…Delegating this opportunity to a social media team is not enough—today’s leaders must personally grasp the tectonic changes arising from today’s social, always-connected customer, and must re-architect business practices and models accordingly. …”
    Libro electrónico
  3. 4023
    Publicado 2017
    “…What You Will Learn Comprehend processes and fles - the core abstraction mechanisms of the Linux kernel that promote effective simplification and dynamism Decipher process scheduling and understand effective capacity utilization under general and real-time dispositions Simplify and learn more about process communication techniques through signals and IPC mechanisms Capture the rudiments of memory by grasping the key concepts and principles of physical and virtual memory management Take a sharp and precise look at all the key aspects of interrupt management and the clock subsystem Understand concurrent execution on SMP platforms through kernel synchronization and locking techniques In Detail Mastering Linux Kernel Development looks at the Linux kernel, its internal arrangement and design, and various core subsystems, helping you to gain significant understanding of this open source marvel. …”
    Libro electrónico
  4. 4024
    Publicado 2019
    “…You'll learn these 17 basic troubleshooting procedures (along with the reasons they can help): Force-quit an app Restart your Mac Log in to another user account Start up from another volume Run disk repair utilities Erase and restore from a backup Repair permissions (in Yosemite and earlier) Start up in safe mode Check preference files Reset NVRAM or SMC Use Activity Monitor Check free disk space Check log files Clear caches Check your RAM Test for reproducibility Get system information Joe also explains how to solve 21 common problems, including: Your Mac won't turn on Your Mac stalls during startup Your Mac keeps turning itself off Your fan runs excessively Your Mac is abnormally slow (read Take Control of Speeding Up Your Mac for full details) You can't empty the Trash An app grinds to a halt An app crashes You experience repeated kernel panics The keyboard or mouse doesn't work You lose your internet connection Printing doesn't work Spotlight searches fail Keychain (seemingly) forgets passwords Apple Mail fails to connect Time Machine misbehaves A volume won't unmount The "Open With" menu contains errors iCloud Data doesn't sync properly Continuity features fail Your laptop's battery misbehaves…”
    Libro electrónico
  5. 4025
    Publicado 2021
    “…This book offers you the opportunity to grasp deep learning in an applied manner with the only requirement being an Internet connection. …”
    Libro electrónico
  6. 4026
    Publicado 2019
    “…Start with the basics, then learn everything you need to know to pass the AWS Solutions Architect exam About This Video Learn the basics of AWS and set up a free AWS account to run an instance Grasp AWS essentials and prepare for the AWS Solutions Architect - Associate certification In Detail Are you looking to learn more about AWS and what it can do for you or your company? …”
    Video
  7. 4027
    por Löwy, Juval
    Publicado 2005
    “…All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. …”
    Libro electrónico
  8. 4028
    Publicado 2022
    “…Once you've learned how to plan, prepare, and implement Check Point infrastructure components and grasped the fundamental principles of their operation, you'll be guided through the creation and modification of access control policies of increasing complexity, as well as the inclusion of additional features. …”
    Libro electrónico
  9. 4029
    Publicado 2022
    “…What you will learn Understand how neural search and legacy search work Grasp the machine learning and math fundamentals needed for neural search Get to grips with the foundation of vector representation Explore the basic components of Jina Analyze search systems with different modalities Uncover the capabilities of Jina with the help of practical examples Who this book is for If you are a machine learning, deep learning, or artificial intelligence engineer interested in building a search system of any kind (text, QA, image, audio, PDF, 3D models, or others) using modern software architecture, this book is for you. …”
    Libro electrónico
  10. 4030
    Publicado 2014
    “…Today, start-ups with minimal experience and no capital can unravel your strategy before you even begin to grasp what's happening. Never mind the "innovator's dilemma"-this is the innovator's disaster. …”
    Grabación no musical
  11. 4031
    Publicado 2022
    “…What you will learn Become well-versed with cloud security concepts Get the hang of managing cloud identities Understand the zero-trust approach Adopt the Azure security cloud infrastructure Protect and encrypt your data Grasp Azure network security concepts Discover how to keep cloud resources secure Implement cloud governance with security policies and rules Who this book is for This book is for Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Azure Security Centre and other Azure security features. …”
    Libro electrónico
  12. 4032
    Publicado 2019
    “…The authors aim at unfolding its material, intellectual and political underpinnings and to grasp the knowledge issues that motivate its protagonists. …”
    Electrónico
  13. 4033
    por Bertrand, Isabelle
    Publicado 2021
    “…The studies compiled here all pertain to the same area, located between the Charente river valley and the Saintonge marshlands, a perpetually shifting and inhospitable setting that constitutes a privileged held of study for grasping the numerous and complex interactions between the human populations and their natural environment A seaside site and a plains site were excavated at the time of a motorway construction protect (the A 837 between Saintes and Rochefort), and the vestiges found illustrate the diversity of settlement and uses of these lands. …”
    Electrónico
  14. 4034
    Publicado 2023
    “…Basic knowledge of containerization, Kubernetes, Docker, and AWS services is needed to grasp the content present in this book…”
    Libro electrónico
  15. 4035
    Publicado 2023
    “…By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal. What you will learn Grasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. …”
    Libro electrónico
  16. 4036
    Publicado 2024
    “…The course begins with an exploration of the foundational elements of web application infrastructure, introducing you to the critical aspects of URLs, HTTP Methods, and the underlying technologies that make the internet tick. You will gain a firm grasp on the workings of Web APIs, Content Management Systems, and Databases, setting the stage for more advanced topics. …”
    Video
  17. 4037
    Publicado 2023
    “…The first section lays the foundation with essential quantum concepts, ensuring that you grasp qubits, their representation, and their transformations. …”
    Libro electrónico
  18. 4038
    Publicado 2023
    “…What you will learn Discover contemporary strategies to make your profile shine in a competitive marketplace Access diverse interview questions, from basic to advanced, to land a React developer job Master React's latest features, performance optimization, and debugging techniques step by step Grasp techniques and tips to cover crucial skills for the React developer role Understand various frameworks and libraries to prepare to answer any React interview question Build fully fledged React-based applications to ace coding assignments Who this book is for This book will aid individuals preparing for React job interviews as well as seasoned developers looking to expand their React knowledge. …”
    Libro electrónico
  19. 4039
    Publicado 2024
    “…What you will learn Explore best practices for participating in bug bounty programs and discover how rewards work Get to know the key steps in security testing, such as information gathering Use the right tools and resources for effective bug bounty participation Grasp strategies for ongoing skill development and ethical bug hunting Discover how to carefully evaluate bug bounty programs to choose the right one Understand basic security concepts and techniques for effective bug hunting Uncover complex vulnerabilities with advanced techniques such as privilege escalation Who this book is for This book is for anyone interested in learning about bug bounties, from cybersecurity and ethical hacking enthusiasts to students and pentesters. …”
    Libro electrónico
  20. 4040
    Publicado 2022
    “…Hardening Your Macs is the perfect roadmap to stopping malicious attacks and bad actors from spying on users through cameras, microphones, and other built-in tools that could potentially be used against users and organizations alike. What You'll Learn Grasp the mindset of attackers--how they plan and execute malicious incursions Implement hardware solutions as well as software safeguards Take advantage of Apple's built-in macOS security features in addition to 3rd party tools Avoid attacks on your system that could compromise sensitive corporate data and personally identifiable information Who This Book Is ForIT admins responsible for managing Mac device security. …”
    Libro electrónico