Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,134
- History 2,165
- Història 2,100
- Bible 1,923
- Biblia 1,740
- RELIGION 1,290
- Development 1,242
- Management 1,207
- Engineering & Applied Sciences 1,202
- Crítica e interpretación 1,058
- Application software 991
- Filosofía 986
- Bíblia 881
- Computer Science 763
- Computer networks 711
- Mental illness 687
- Data processing 597
- Social aspects 588
- Leadership 586
- Diagnosis 576
- Computer programs 554
- Economics 546
- Business & Economics 537
- Design 534
- Security measures 528
- Examinations 527
- Education 519
- Computer security 511
- Cloud computing 474
- History and criticism 455
-
114481Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding DevOps and DevSecOps -- Chapter 1: Agile, DevOps, and Azure Overview -- Technical requirements -- Defining DevOps - Understanding its concepts and practices -- The why of DevOps - Innovation, velocity, and speed -- Understanding the process aspect of DevOps -- Understanding the five core practices of DevOps -- Understanding the stages in a DevOps workflow -- Understanding the people aspect of DevOps -- The importance of a collaborative culture -- Staying clear of DevOps anti-types -- Understanding the product aspect of DevOps - The toolchain -- The platform approach to DevOps tooling -- An overview of the Azure DevOps platform -- An overview of the GitHub platform -- An overview of the GitLab platform -- Azure services for the DevOps workflow -- Agile, DevOps, and the Cloud - A perfect trio -- Hands-on Exercise 1 - Creating an Azure subscription -- Hands-On Exercise 2 - Creating an Azure DevOps organization (linked to your Azure AD tenant) -- Hands-On Exercise 3 - Creating a GitHub Enterprise Cloud trial account -- Summary -- Further reading -- Chapter 2: Security Challenges of the DevOps Workflow -- Technical requirements -- Security challenges of DevOps -- Understanding the limitations of traditional security in a fast-paced DevOps world -- Understanding how DevOps increases the attack surface -- The case for DevSecOps -- Understanding the cultural aspect of DevSecOps -- Understanding the process aspect of DevSecOps -- Considerations for selecting your DevSecOps toolchain -- DevSecOps and supply chain security -- Summary -- Further reading -- Part 2: Securing the Plan and Code Phases of DevOps -- Chapter 3: Implementing Security in the Plan Phase of DevOps -- Technical requirements…”
Libro electrónico -
114482Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Foreword -- Table of Contents -- Preface -- Part 1: Getting Started with Full-Stack Development -- Chapter 1: Preparing for Full-Stack Development -- Technical requirements -- Motivation to become a full-stack developer -- What is new in this release of Full-Stack React Projects? …”
Libro electrónico -
114483Publicado 2008“…Si elle hésite à définir ses fondements, quelque solides qu ́elle les sache, c ́est qu ́ils sont, en deçà comme au-delà des options partisanes, d ́une diversité que rend très complexe toute tentative de conciliation et inacceptable toute forme de simple unification. …”
Libro -
114484por Geier, Eric, 1984-Materias: “…Microsoft Windows (Computer file)…”
Publicado 2008
Libro electrónico -
114485por Hucaby, David“…Network architect and best-selling author Dave Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. …”
Publicado 2010
Libro electrónico -
114486por Wallace, Kevin“…Senior instructor and best-selling author Kevin Wallace shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. …”
Publicado 2010
Libro electrónico -
114487Publicado 2017“…Faglig kritikk og refleksjon er viktige elementer i all helsefaglig praksis og kunnskapsutvikling. Denne antologien presenterer et bredt spekter av kritiske perspektiver på helsetjenester og helsevitenskap, i hensikt å utfordre og oppfordre leseren til kritisk refleksjon. …”
Libro electrónico -
114488Publicado 2020“…This book presents an in-depth, systematic investigation of the reporting of poverty in Wales, discussing findings from a two-year research project funded by the 'Exploring the Narrative Coalition' (a group of 10 Wales-based third sector organisations), the ESRC, and Cardiff University. …”
Libro electrónico -
114489por Rhodes, Jeffrey M. author“…You will use these new skills to convert a normal SharePoint announcement into a visually compelling page of network alerts. …”
Publicado 2019
Libro electrónico -
114490Publicado 2020“…Finally, you'll move your NN model to production on the AWS Cloud. …”
Libro electrónico -
114491Publicado 2018“…(Griffon is a virtual machine with all data sources and all tools preconfigured) Students should have access to a computer with at least 8 GB of RAM and 20 to 30 GB of hard drive space…”
Video -
114492Publicado 2022“…Next, you'll see how AutoML automates the entire process of training multiple models, optimizing their hyperparameters, as well as explaining their performance. …”
Libro electrónico -
114493Publicado 2022“…Arianne has a following in the Python community, with her well-thought-out live trainings and videos. About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
Video -
114494Publicado 2024“…The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. …”
Video -
114495por Tan, Zhiyong“…As you work through this book, you'll gain not only the skills to successfully interview, but also to do the actual work of great system design. …”
Publicado 2024
Libro electrónico -
114496Publicado 2023Tabla de Contenidos: “…Intro -- inside front cover -- Privacy-Preserving Machine Learning -- Copyright -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A road map -- About the code -- liveBook discussion forum -- about the authors -- about the cover illustration -- Part 1 Basics of privacy-preserving machine learning with differential privacy -- 1 Privacy considerations in machine learning -- 1.1 Privacy complications in the AI era -- 1.2 The threat of learning beyond the intended purpose -- 1.2.1 Use of private data on the fly -- 1.2.2 How data is processed inside ML algorithms -- 1.2.3 Why privacy protection in ML is important -- 1.2.4 Regulatory requirements and the utility vs. privacy tradeoff -- 1.3 Threats and attacks for ML systems -- 1.3.1 The problem of private data in the clear -- 1.3.2 Reconstruction attacks -- 1.3.3 Model inversion attacks -- 1.3.4 Membership inference attacks -- 1.3.5 De-anonymization or re-identification attacks -- 1.3.6 Challenges of privacy protection in big data analytics -- 1.4 Securing privacy while learning from data: Privacy-preserving machine learning -- 1.4.1 Use of differential privacy -- 1.4.2 Local differential privacy -- 1.4.3 Privacy-preserving synthetic data generation -- 1.4.4 Privacy-preserving data mining techniques -- 1.4.5 Compressive privacy -- 1.5 How is this book structured? …”
Libro electrónico -
114497Publicado 2023“…If you are looking to take your programming skills to the next level, Go programming is a must-know language in today's tech landscape. …”
Video -
114498Publicado 2005“…Finally, a third part relates to the crucial question of evaluation. Here still, the diversity of the results is striking: certain experiments are very positive while elsewhere the results are very mixed and sometimes even worrying. …”
Libro electrónico -
114499Publicado 2023“…He is also a corporate trainer providing a wide range of training…”
Video -
114500Publicado 2021“…Moreover, equipment replacement rarely occurs at the end of the piece of equipment's natural life; rather, replacement is driven by the introduction of new technologies and products, all of which lead to less maintenance activities and reduces the importance of the traditional maintenance function. …”
Libro electrónico