Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,196
- Development 1,058
- Engineering & Applied Sciences 946
- Història 917
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Bíblia 346
- Education 344
- Web site development 335
- Web sites 333
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Filosofía 315
- Photography 310
- Computer software 303
- Programming 297
- Crítica e interpretación 295
-
50881Publicado 2023“…You will explore the architecture of popular models such as UNet and FPN, understand the intricacies of upsampling, grasp the nuances of various loss functions, and become fluent in essential evaluation metrics. Moreover, you will apply this knowledge in real-world scenarios, learning how to train a semantic segmentation model on a custom dataset. …”
Video -
50882Publicado 2023“…Go from the bare basics to implementing your own automatic trading algorithm and become a cryptocurrency trading pro Key Features Excel at crypto trading with structured methodologies, practical examples, and real-time trading scenarios Go from the theoretical know-how to developing and testing your own strategy Transform manual trades into an automated algorithm for nonstop trades Purchase of the print or Kindle book includes a free PDF eBook Book Description In today's fast-paced digital age, cryptocurrencies have emerged as a revolutionary financial asset class, capturing the attention of investors and traders worldwide. …”
Libro electrónico -
50883Publicado 2023“…By the end of this book, you'll have learned effective methods of handling cybersecurity risks in any automotive product, from single libraries to entire vehicle architectures. …”
Libro electrónico -
50884Publicado 2023“…In this course, we will embark on an immersive journey through the Azure ecosystem, starting with essential navigation techniques within the Azure Portal. We will become adept at harnessing Azure CLI and Azure PowerShell to efficiently manage resources, mastering the art of provisioning virtual machines and leveraging Azure App Services. …”
Video -
50885por Kerim, AbdulrahmanTabla de Contenidos: “…The impact of the video game industry -- Photorealism and the real-synthetic domain shift -- Time, effort, and cost -- Generating synthetic data using video games -- Utilizing games for general data collection -- Utilizing games for social studies -- Utilizing simulation games for data generation -- Challenges and limitations -- Controllability -- Game genres and limitations on synthetic data generation -- Realism -- Ethical issues -- Intellectual property -- Summary -- Chapter 9: Exploring Diffusion Models for Synthetic Data -- Technical requirements -- An introduction to diffusion models -- The training process of DMs -- Applications of DMs -- Diffusion models - the pros and cons -- The pros of using DMs -- The cons of using DMS -- Hands-on diffusion models in practice -- Context -- Dataset -- ML model -- Training -- Testing -- Diffusion models - ethical issues -- Copyright -- Bias -- Inappropriate content -- Responsibility -- Privacy -- Fraud and identity theft -- Summary -- Part 4: Case Studies and Best Practices -- Chapter 10: Case Study 1 - Computer Vision -- Transforming industries - the power of computer vision -- The four waves of the industrial revolution -- Industry 4.0 and computer vision -- Synthetic data and computer vision - examples from industry -- Neurolabs using synthetic data in retail -- Microsoft using synthetic data alone for face analysis -- Synthesis AI using synthetic data for virtual try-on -- Summary -- Chapter 11: Case Study 2 - Natural Language Processing -- A brief introduction to NLP -- Applications of NLP in practice -- The need for large-scale training datasets in NLP -- Human language complexity -- Contextual dependence -- Generalization -- Hands-on practical example with ChatGPT -- Synthetic data as a solution for NLP problems -- SYSTRAN Soft's use of synthetic data -- Telefónica's use of synthetic data…”
Publicado 2023
Libro electrónico -
50886Publicado 2023Tabla de Contenidos: “…-- Why we chose the Cargo Tracker application -- Installing and running the Cargo Tracker application -- Features of the Cargo Tracker application -- Public Tracking Interface -- Administration Interface -- Mobile Event Logger -- Java EE features used in the Cargo Tracker application -- Enterprise Java Beans -- Persistence (JPA) -- Messaging (JMS) -- Context and Dependency Injection -- Java Service Faces (JSF) -- JAX-RS -- JSON binding -- Transactions -- Batch -- Summary -- Part 2: Modern Jakarta EE -- Chapter 3: Moving from Java EE to Jakarta EE -- Technical requirements -- It's all about namespaces -- Migrating strategies -- Using an open source multiplatform editor -- Sed -- Using a specialized plugin for your IDE -- Upgrading your pom.xml file -- Migrating dependencies -- Upgrading the project -- Upgrading the Payara application server -- Upgrading PrimeFaces -- Red Hat MTA -- Upgrading your application server -- Summary -- Chapter 4: Modernizing Your Application with the Latest Features -- Technical requirements -- The most significant changes to Jakarta EE 10 -- Core Profile -- Using UUIDs as keys -- Multi-part form parameters -- Pure Java Jakarta Faces views -- Authenticating with OpenID -- Improved concurrency…”
Libro electrónico -
50887Publicado 2023“…Master the art of machine learning by using the one-of-a-kind Qlik platform, and take your data analytics skills to the next level Key Features Gain a solid understanding of machine learning concepts and learn to effectively define a problem Explore the application of machine learning principles within the Qlik platform Apply your knowledge of ML to real-world scenarios with the help of practical examples Purchase of the print or Kindle book includes a free PDF eBook Book Description The ability to forecast future trends through data prediction, coupled with the integration of ML and AI, has become indispensable to global enterprises. Qlik, with its extensive machine learning capabilities, stands out as a leading analytics platform enabling businesses to achieve exhaustive comprehension of their data. …”
Libro electrónico -
50888por Meric, Ahmet“…By the end of this book, you'll have become proficient in architectural patterns, testing strategies, and application security. …”
Publicado 2024
Libro electrónico -
50889Publicado 2024“…Become proficient in Amazon Bedrock by taking a hands-on approach to building and scaling generative AI solutions that are robust, secure, and compliant with ethical standards Key Features Learn the foundations of Amazon Bedrock from experienced AWS Machine Learning Specialist Architects Master the core techniques to develop and deploy several AI applications at scale Go beyond writing good prompting techniques and secure scalable frameworks by using advanced tips and tricks Purchase of the print or Kindle book includes a free PDF eBook Book Description The concept of generative artificial intelligence has garnered widespread interest, with industries looking to leverage it to innovate and solve business problems. …”
Libro electrónico -
50890Publicado 2024Tabla de Contenidos: “…Accessing AWS Accounts Using Identity Federation with SAML 2.0 and Microsoft AD -- Using Web Identity Federation for Application Authentication -- Application Authentication and Authorization with Amazon Cognito -- Amazon Cognito User Pools -- Access Backend Resources with a User Pool -- Amazon Cognito Identity Pools -- How AWS STS Generates Temporary Tokens -- Amazon Cognito and the Todo List Application -- Overview of the AWS IAM Identity Center -- Exercise 2.1 - Creating an IAM User and an IAM Group within your Development Account -- Technical Requirements -- Project Task 2.1 - Creating an Amazon Cognito User Pool for the Todo List Application -- Step 1 - Configure Sign-In Experience -- Step 2 - Configure Security Requirements -- Step 3 - Configure Sign-Up Experience -- Step 4 - Configure Message Delivery -- Step 5 - Integrate Your App -- Step 6 - Review and Create -- Step 7 - Testing the Cognito User Pool -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 3: Understanding Object Storage with Amazon S3, Hybrid Storage, and Static Website Hosting -- An Introduction to Storage Options -- Block Storage -- File Storage -- Object Storage -- An Introduction to Object Storage with Amazon S3 -- Amazon S3 Buckets -- Amazon S3 Objects -- An Amazon S3 Object's Key -- Amazon S3 Region Choice -- Read-after-Write Consistency -- Eventual Consistency -- Managing Data Storage Costs with Amazon S3 Storage Classes -- The Amazon S3 Standard Storage Class -- Amazon S3-IA Storage -- Amazon S3 One Zone-IA -- Amazon S3 Intelligent-Tiering -- Amazon S3 Express One Zone -- Amazon S3 Glacier -- Protecting Data from Accidental Deletion in Amazon S3 -- Encryption Options for Amazon S3 -- Using Amazon S3 Versioning with S3 Lifecycle Management -- Implementing Data Protection with Resource-Based Policies -- Securing Access with Pre-Signed URLs…”
Libro electrónico -
50891por Tezuysal, Alkin“…Become well-versed with database modeling and SQL optimization, and gain a deep understanding of transactional systems through practical examples and exercises Key Features Get to grips with fundamental-to-advanced database design and modeling concepts with PostgreSQL and MySQL Explore database integration with web apps, emerging trends, and real-world case studies Leverage practical examples and hands-on exercises to reinforce learning Purchase of the print or Kindle book includes a free PDF eBook Book Description Database Design and Modeling with PostgreSQL and MySQL will equip you with the knowledge and skills you need to architect, build, and optimize efficient databases using two of the most popular open-source platforms. …”
Publicado 2024
Libro electrónico -
50892Publicado 2024Tabla de Contenidos: “…-- Formulating null and alternative hypotheses -- Determining the significance level -- Understanding errors -- Getting to grips with p-values -- Significance tests for a population proportion - making informed decisions about proportions -- The z-test - comparing a sample proportion to a population proportion -- Z-test example made easy -- Significance tests for a population average (mean) -- Writing hypotheses for a significance test about a mean -- Conditions for a t-test about a mean -- When to use z or t statistics in significance tests -- Example - calculating the t-statistic for a test about a mean -- Using a table to estimate the p-value from the t-statistic -- Comparing the p-value from the t-statistic to the significance level -- One-tailed and two-tailed tests -- Walking through a case study -- Summary -- Understanding Regression -- How can I benefit from understanding regression? …”
Libro electrónico -
50893Publicado 2024Tabla de Contenidos: “…Detection and verification -- identifying, assessing, and confirming cybersecurity incidents targeting Windows systems -- Incident detection -- Incident verification -- Incident classification -- Incident analysis and containment -- investigating and stopping the spread of cyberattacks -- Incident analysis -- Incident containment -- Eradication and recovery -- removing the intrusion signs and getting back to normal -- Eradication -- Recovery -- Summary -- Chapter 4: Endpoint Forensic Evidence Collection -- Introduction to endpoint evidence collection -- Collecting data from the endpoints…”
Libro electrónico -
50894Publicado 2022“…As you advance, you'll become well-versed with the Swiss Army Knife for frontend developers - the bundler. …”
Libro electrónico -
50895Publicado 2022“…The themes addressed in the essays concern the systematic frameworks of neo-Kantian methodology and their reflections in multiple disciplinary applications, from jurisprudence to linguistics, from aesthetics to philosophical historiography, from sociology to psychology. …”
Libro electrónico -
50896Publicado 2022“…It represents a broad consensus about the most critical security risks to web applications and has become such an important cyber security resource today. …”
Video -
50897Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Preparing Data -- Chapter 1: Introduction to CompTIA Data+ -- Understanding Data+ -- CompTIA Data+: DAO-001 -- Data science -- Introducing the exam domains -- Data Concepts and Environments -- Exam format -- Who should take the exam? …”
Libro electrónico -
50898por Lewinson, ErykTabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Acquiring Financial Data -- Getting data from Yahoo Finance -- Getting data from Nasdaq Data Link -- Getting data from Intrinio -- Getting data from Alpha Vantage -- Getting data from CoinGecko -- Summary -- Chapter 2: Data Preprocessing -- Converting prices to returns -- Adjusting the returns for inflation -- Changing the frequency of time series data -- Different ways of imputing missing data -- Converting currencies -- Different ways of aggregating trade data -- Summary -- Chapter 3: Visualizing Financial Time Series -- Basic visualization of time series data -- Visualizing seasonal patterns -- Creating interactive visualizations -- Creating a candlestick chart -- Summary -- Chapter 4: Exploring Financial Time Series Data -- Outlier detection using rolling statistics -- Outlier detection with the Hampel filter -- Detecting changepoints in time series -- Detecting trends in time series -- Detecting patterns in a time series using the Hurst exponent -- Investigating stylized facts of asset returns -- Summary -- Chapter 5: Technical Analysis and Building Interactive Dashboards -- Calculating the most popular technical indicators -- Downloading the technical indicators -- Recognizing candlestick patterns -- Building an interactive web app for technical analysis using Streamlit -- Deploying the technical analysis app -- Summary -- Chapter 6: Time Series Analysis and Forecasting -- Time series decomposition -- Testing for stationarity in time series -- Correcting for stationarity in time series -- Modeling time series with exponential smoothing methods -- Modeling time series with ARIMA class models -- Finding the best-fitting ARIMA model with auto-ARIMA -- Summary -- Chapter 7: Machine Learning-Based Approaches to Time Series Forecasting…”
Publicado 2022
Libro electrónico -
50899Publicado 2022“…This book will cover the whole process, from the basic concepts like stateful and stateless serving to the advantages and challenges of each. …”
Libro electrónico -
50900Publicado 2022Tabla de Contenidos: “…Migration considerations -- About the Zero-Downtime Migration tool -- Migrating on-premises database to Autonomous Database using ZDM -- Implementing migration to Autonomous Database using ZDM -- Installing and configuring ZDM software on a dedicated host -- Target Autonomous Database creation -- Generating an OCI API key pair in the pem format -- Installing the OCI CLI -- Preparing an SSH key pair -- Creating an Object Store bucket -- Creating an OCI user authentication token -- Keeping the same time zone -- Database character set -- Setting up the GoldenGate Microservices hub in the OCI marketplace -- Setting up the OCI CLI in the source database server for file transfer -- Preparing a ZDM response file for migration -- A dry run of ZDM -- Run the migration job -- Summary -- Questions -- Answers -- Chapter 4: ADB Disaster Protection with Autonomous Data Guard -- Overview and associated terminologies -- AuDG -- Local standby -- Remote standby (cross-region standby) -- Associated specifications in AuDG -- Region and roles specification -- RTO and RPO in an AuDG configuration -- Status and operation in AuDG -- Implementing AuDG -- Enabling AuDG -- Performing a manual switchover operation - local standby -- Performing a manual switchover operation - remote standby -- Disabling AuDG -- Leveraging OCI Events Service for AuDG operations -- Points to remember about AuDG -- Summary -- Questions -- Answers -- Further reading: -- Chapter 5: Backup and Restore with Autonomous Database in OCI -- Technical requirements -- Understanding the backup types -- Working with automated backup in the OCI portal -- Learning how to take a manual backup -- Restoring database backups -- Manual database backup using Data Pump -- Creating a dump set -- Creating a Data Pump backup directly to object storage -- Data Pump import backup -- Refreshing Autonomous Database schemas…”
Libro electrónico