Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 265
- Engineering & Applied Sciences 260
- Application software 213
- History 206
- Development 187
- Software engineering 175
- Computer programming 169
- Software Engineering/Programming and Operating Systems 143
- Electrical & Computer Engineering 137
- Database management 128
- Telecommunications 127
- Design 126
- Computer Science 121
- Web sites 117
- Web site development 109
- Java (Computer program language) 98
- Management 96
- Police 94
- Computer networks 91
- Microsoft .NET Framework 91
- Policía 89
- Operating systems (Computers) 84
- Computer programs 83
- Web Development 81
- Database Management 77
- Social aspects 77
- Oracle (Computer file) 73
- Programming languages (Electronic computers) 72
- History and criticism 69
- Python (Computer program language) 66
-
8221Publicado 2009“…Sharing the lessons learned about program design and delivery with candid narrations about the design, development, and delivery of such programs, and narrated by authentic voices in the field, authors from around the world contribute to the emerging knowledge base of international (or blended shore) adult education. …”
Libro electrónico -
8222Publicado 2018“…What you will learn Understand the basics of meta learning methods, algorithms, and types Build voice and face recognition models using a siamese network Learn the prototypical network along with its variants Build relation networks and matching networks from scratch Implement MAML and Reptile algorithms from scratch in Python Work through imitation learning and adversarial meta learning Explore task agnostic meta learning and deep meta learning Who this book is for Hands-On Meta Learning with Python is for machine learning enthusiasts, AI researchers, and data scientists who want to explore meta learning as an advanced approach for training machine learning models. …”
Libro electrónico -
8223Publicado 2017“…The Belle of Amherst, the distinctive American voice, the singer of the soul's mysteries: Emily Dickinson. …”
Libro electrónico -
8224por Hennessy, Sara. author“…The inquiry exploited the collaborators’ complementary professional knowledge bases. Teachers’ voices are particularly audible in co-authored case study chapters. …”
Publicado 2014
Libro electrónico -
8225Publicado 2021“…The stories highlighting reciprocal interactions of the researcher and the research participants across the research process bring forth various voices and perspectives that conventionally are not considered as part of the research report. …”
Libro electrónico -
8226Publicado 2017Tabla de Contenidos: “…Verification of camera function -- The web interface -- Camera setup for the web interface -- Buttons for robot control -- Troubleshooting tips -- Project enhancements -- Summary -- Chapter 10: Home Automation Using the Raspberry Pi Zero -- Voice activated personal assistant -- Installing requisite packages -- How does it work? …”
Libro electrónico -
8227Publicado 2016“…Calagione shared the challenges of evolving from a founder-driven entrepreneurial company where he was the sole creative and strategic director into a more collaborative collective where he is now one of many creative and strategic voices in the company. Discover the methods and approaches dogfish head has used to grow a rich diverse leadership t..…”
Libro electrónico -
8228Publicado 2017“…Microsoft OS problems, databases, voice, and video over IP Identify and locate faults in detecting security failures and security breaches in the network In Detail This Learning Path starts off installing Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. …”
Libro electrónico -
8229Publicado 2015“…You'll learn: Why the 30-Day Rule is critical for keeping the pipeline full Why understanding the Law of Replacement is the key to avoiding sales slumps How to leverage the Law of Familiarity to reduce prospecting friction and avoid rejection The 5 C's of Social Selling and how to use them to get prospects to call you How to use the simple 5 Step Telephone Framework to get more appointments fast How to double call backs with a powerful voice mail technique How to leverage the powerful 4 Step Email Prospecting Framework to create emails that compel prospects to respond How to get text working for you with the 7 Step Text Message Prospecting Framework And there is so much more! …”
Libro electrónico -
8230Publicado 2024Tabla de Contenidos: “…-- Different types of prompts can lead to different types of responses -- Exploratory prompts -- Customised prompts -- Context prompts -- Step-by-step prompts -- Evaluation prompts -- Follow-up prompts -- Voice-to-text -- There's no longer such a thing as writer's block -- Get your ChatGPT radar tuned in -- Copyright and plagiarism -- What about being polite to ChatGPT? …”
Libro electrónico -
8231Publicado 2024“…What you will learn Ingest data from different sources and write it to the required sinks Profile and validate data pipelines for better quality control Get up to speed with grouping, merging, and joining structured data Handle missing values and outliers in structured datasets Implement techniques to manipulate and transform time series data Apply structure to text, image, voice, and other unstructured data Who this book is for Whether you're a data analyst, data engineer, data scientist, or a data professional responsible for data preparation and cleaning, this book is for you. …”
Libro electrónico -
8232Publicado 2007Tabla de Contenidos: “…Exercise Objective -- Network Diagram -- Command List -- Task 1: Configure and Verify BackboneFast -- Task 2: Configure and Verify UplinkFast -- Task 3: Configure and Verify Root Guard -- Task 4: Configure and Verify PortFast -- Configuration Exercise: Identify and Resolve a Layer 2 Loop -- Required Resources -- Exercise Objective -- Network Diagram -- Command List -- Task 1: Identifying the Layer 2 Loop -- Task 2: Divide and Conquer (Disconnect Redundancy) -- Task 3: Find Root Cause of Layer 2 Loop (Investigate Network and Hardware) -- Task 4 (optional): Check Software Statistics -- Review Questions -- Chapter 7 Enhancing Network Stability, Functionality, Reliability, and Performance Using Advanced Features -- EtherChannel -- PAgP Modes -- LACP Modes -- EtherChannel Guidelines -- EtherChannel Configuration Example -- EtherChannel Load Balancing -- CDP -- Voice VLAN and CDP -- Security Issues -- Multiple Default Gateways -- MAC Address Notification -- Layer 3 Protocol Filtering -- DHCP for Management IP Configuration -- Debounce Timer Feature -- Broadcast and Multicast Suppression -- Baby Giants and Jumbo Frames -- Error-Disable Feature -- IEEE 802.3 Flow Control -- UDLD and Aggressive Mode UDLD -- Case Study: Function of Aggressive Mode UDLD -- Study Tips -- Summary -- Configuration Exercise -- Required Resources -- Exercise Objective -- Network Diagram -- Command List -- Task 1: Configure and Verify EtherChannel -- Task 2: Configure and Verify LACP EtherChannel -- Task 3: Configure and Verify CDP -- Task 4: Configure and Verify Aggressive Mode UDLD -- Task 5: Configure and Verify Jumbo Frame -- Task 6: Configure and Verify Error-Disable -- Review Questions -- Chapter 8 Understanding and Configuring Inter-VLAN Routing -- IP Address Hierarchy in a Multilayer Switched Network -- Introduction to Inter-VLAN Routing…”
Libro electrónico -
8233“…Efficiently install, configure, and troubleshoot Cisco Wireless LAN Controllers Move autonomous wireless network solutions to LWAPP/CAPWAP Integrate LWAPP/CAPWAP solutions into existing wired networks Understand the next-generation WLC architecture Use Hybrid REAP and Home AP solutions to centrally configure and control branch/remote access points without deploying controllers in every location Use Mobility Groups to provide system-wide mobility easily and cost-effectively Use Cisco WLC troubleshooting tools, and resolve client-related problems Maximize quality in wireless voice applications Build efficient wireless mesh networks Use RRM to manage RF in real-time, optimizing efficiency and performance Reference the comprehensive WLC and AP debugging guide Part of the CCIE Professional Development Series, this is the first book to offer authoritative training for the new CCIE Wireless Exam. …”
Libro electrónico -
8234por Fisher, Kenneth L.“…Chapter by chapter, this book offers practical investment advice from a leading market voice, while: Looking at Fisher's market analysis over the years and providing an industry insider's view of major, and not-so-major, market events Examining how Fisher called three of the last four bear markets Showing that what many commonly think impacts markets doesn't—and some very surprising things that do impact markets that few are aware of. …”
Publicado 2010
Libro electrónico -
8235Publicado 2013“…He also offers new advice on making persuasive political and scripted speeches, developing a richer public speaking voice, interviewing others, demonstrating products, and much more. …”
Libro electrónico -
8236por Orzach, Yoram“…Get to grips with network-based attacks and learn to defend your organization's network and network devices Key Features Exploit vulnerabilities and use custom modules and scripts to crack authentication protocols Safeguard against web, mail, database, DNS, voice, video, and collaboration server attacks Monitor and protect against brute-force attacks by implementing defense mechanisms Book Description With the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. …”
Publicado 2022
Libro electrónico -
8237Publicado 2020“…What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is for This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field…”
Libro electrónico -
8238Publicado 2015“…How do photographers develop and define their own voice? In The Visual Palette: Defining Your Photographic Style , photographer Brian Matiash outlines and illustrates mindsets, approaches, and techniques that photographers can implement in order to apply their own unique stamp on their photos. …”
Libro electrónico -
8239por Lee, Kok-Keong“…The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. …”
Publicado 2005
Libro electrónico -
8240Publicado 2007“…With these documents as your guide, you will review key concepts required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network. These fact-filled Quick Reference Sheets allow you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts. …”
Libro electrónico