Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,237
- Development 1,058
- Engineering & Applied Sciences 946
- Història 915
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Crítica e interpretación 350
- Education 344
- Bíblia 342
- Web site development 335
- Web sites 333
- Filosofía 323
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Photography 310
- Computer software 303
- Programming 297
-
51841Publicado 2024Tabla de Contenidos:Libro electrónico
-
51842Publicado 2024Tabla de Contenidos: “…Understanding DbContext pooling -- Understanding the difference between tracking versus no-tracking queries -- Understanding the difference between IQueryable and IEnumerable -- Client evaluation versus server evaluation -- Using raw SQL queries -- FromSql() and FromSqlRaw() -- SqlQuery() and SqlQueryRaw() -- ExecuteSql() and ExecuteSqlRaw() -- Using bulk operations -- ExecuteUpdate() -- ExecuteDelete() -- Understanding concurrency conflicts -- Native database-generated concurrency token -- Application-managed concurrency token -- Handling concurrency conflicts -- Reverse engineering -- Other ORM frameworks -- Summary -- Chapter 8: Security and Identity in ASP.NET Core -- Technical requirements -- Getting started with authentication and authorization -- Creating a sample project with authentication and authorization -- Understanding the JWT token structure -- Consuming the API -- Configuring the Swagger UI to support authorization -- Delving deeper into authorization -- Role-based authorization -- Claim-based authorization -- Understanding the authorization process -- Policy-based authorization -- Managing users and roles -- New Identity API endpoints in ASP.NET Core 8 -- Understanding OAuth 2.0 and OpenID Connect -- What is OAuth 2.0? …”
Libro electrónico -
51843Publicado 2024“…Ultimately, armed with the knowledge and skills acquired from this AWS security guide, you'll be well-prepared to pass the exam and design secure AWS solutions with confidence. …”
Libro electrónico -
51844Publicado 2022“…Get a step ahead of your competitors with insights from over 30 Kaggle Masters and Grandmasters. Discover tips, tricks, and best practices for competing effectively on Kaggle and becoming a better data scientist. …”
Libro electrónico -
51845Publicado 2024“…If you're new to React and looking to become a professional React developer, this book is for you. …”
Libro electrónico -
51846Publicado 2024“…By the end of this book, you'll be on your way to becoming a business leader--a changemaker of the future. …”
Libro electrónico -
51847Publicado 2023Tabla de Contenidos: “…-- Leadership styles and their origins -- Natural origins -- Philosophical origins -- Management theory origins -- Engineering leadership style archetypes -- The commander and the servant -- The coach and the delegator -- The communicator and the co-creator -- What is the right leadership style for me? …”
Libro electrónico -
51848Publicado 2023“…You will explore the architecture of popular models such as UNet and FPN, understand the intricacies of upsampling, grasp the nuances of various loss functions, and become fluent in essential evaluation metrics. Moreover, you will apply this knowledge in real-world scenarios, learning how to train a semantic segmentation model on a custom dataset. …”
Video -
51849Publicado 2023“…Go from the bare basics to implementing your own automatic trading algorithm and become a cryptocurrency trading pro Key Features Excel at crypto trading with structured methodologies, practical examples, and real-time trading scenarios Go from the theoretical know-how to developing and testing your own strategy Transform manual trades into an automated algorithm for nonstop trades Purchase of the print or Kindle book includes a free PDF eBook Book Description In today's fast-paced digital age, cryptocurrencies have emerged as a revolutionary financial asset class, capturing the attention of investors and traders worldwide. …”
Libro electrónico -
51850Publicado 2023“…By the end of this book, you'll have learned effective methods of handling cybersecurity risks in any automotive product, from single libraries to entire vehicle architectures. …”
Libro electrónico -
51851Publicado 2023“…In this course, we will embark on an immersive journey through the Azure ecosystem, starting with essential navigation techniques within the Azure Portal. We will become adept at harnessing Azure CLI and Azure PowerShell to efficiently manage resources, mastering the art of provisioning virtual machines and leveraging Azure App Services. …”
Video -
51852por Kerim, AbdulrahmanTabla de Contenidos: “…The impact of the video game industry -- Photorealism and the real-synthetic domain shift -- Time, effort, and cost -- Generating synthetic data using video games -- Utilizing games for general data collection -- Utilizing games for social studies -- Utilizing simulation games for data generation -- Challenges and limitations -- Controllability -- Game genres and limitations on synthetic data generation -- Realism -- Ethical issues -- Intellectual property -- Summary -- Chapter 9: Exploring Diffusion Models for Synthetic Data -- Technical requirements -- An introduction to diffusion models -- The training process of DMs -- Applications of DMs -- Diffusion models - the pros and cons -- The pros of using DMs -- The cons of using DMS -- Hands-on diffusion models in practice -- Context -- Dataset -- ML model -- Training -- Testing -- Diffusion models - ethical issues -- Copyright -- Bias -- Inappropriate content -- Responsibility -- Privacy -- Fraud and identity theft -- Summary -- Part 4: Case Studies and Best Practices -- Chapter 10: Case Study 1 - Computer Vision -- Transforming industries - the power of computer vision -- The four waves of the industrial revolution -- Industry 4.0 and computer vision -- Synthetic data and computer vision - examples from industry -- Neurolabs using synthetic data in retail -- Microsoft using synthetic data alone for face analysis -- Synthesis AI using synthetic data for virtual try-on -- Summary -- Chapter 11: Case Study 2 - Natural Language Processing -- A brief introduction to NLP -- Applications of NLP in practice -- The need for large-scale training datasets in NLP -- Human language complexity -- Contextual dependence -- Generalization -- Hands-on practical example with ChatGPT -- Synthetic data as a solution for NLP problems -- SYSTRAN Soft's use of synthetic data -- Telefónica's use of synthetic data…”
Publicado 2023
Libro electrónico -
51853Publicado 2023Tabla de Contenidos: “…-- Why we chose the Cargo Tracker application -- Installing and running the Cargo Tracker application -- Features of the Cargo Tracker application -- Public Tracking Interface -- Administration Interface -- Mobile Event Logger -- Java EE features used in the Cargo Tracker application -- Enterprise Java Beans -- Persistence (JPA) -- Messaging (JMS) -- Context and Dependency Injection -- Java Service Faces (JSF) -- JAX-RS -- JSON binding -- Transactions -- Batch -- Summary -- Part 2: Modern Jakarta EE -- Chapter 3: Moving from Java EE to Jakarta EE -- Technical requirements -- It's all about namespaces -- Migrating strategies -- Using an open source multiplatform editor -- Sed -- Using a specialized plugin for your IDE -- Upgrading your pom.xml file -- Migrating dependencies -- Upgrading the project -- Upgrading the Payara application server -- Upgrading PrimeFaces -- Red Hat MTA -- Upgrading your application server -- Summary -- Chapter 4: Modernizing Your Application with the Latest Features -- Technical requirements -- The most significant changes to Jakarta EE 10 -- Core Profile -- Using UUIDs as keys -- Multi-part form parameters -- Pure Java Jakarta Faces views -- Authenticating with OpenID -- Improved concurrency…”
Libro electrónico -
51854Publicado 2023“…Master the art of machine learning by using the one-of-a-kind Qlik platform, and take your data analytics skills to the next level Key Features Gain a solid understanding of machine learning concepts and learn to effectively define a problem Explore the application of machine learning principles within the Qlik platform Apply your knowledge of ML to real-world scenarios with the help of practical examples Purchase of the print or Kindle book includes a free PDF eBook Book Description The ability to forecast future trends through data prediction, coupled with the integration of ML and AI, has become indispensable to global enterprises. Qlik, with its extensive machine learning capabilities, stands out as a leading analytics platform enabling businesses to achieve exhaustive comprehension of their data. …”
Libro electrónico -
51855por Meric, Ahmet“…By the end of this book, you'll have become proficient in architectural patterns, testing strategies, and application security. …”
Publicado 2024
Libro electrónico -
51856Publicado 2024“…Become proficient in Amazon Bedrock by taking a hands-on approach to building and scaling generative AI solutions that are robust, secure, and compliant with ethical standards Key Features Learn the foundations of Amazon Bedrock from experienced AWS Machine Learning Specialist Architects Master the core techniques to develop and deploy several AI applications at scale Go beyond writing good prompting techniques and secure scalable frameworks by using advanced tips and tricks Purchase of the print or Kindle book includes a free PDF eBook Book Description The concept of generative artificial intelligence has garnered widespread interest, with industries looking to leverage it to innovate and solve business problems. …”
Libro electrónico -
51857Publicado 2024Tabla de Contenidos: “…Accessing AWS Accounts Using Identity Federation with SAML 2.0 and Microsoft AD -- Using Web Identity Federation for Application Authentication -- Application Authentication and Authorization with Amazon Cognito -- Amazon Cognito User Pools -- Access Backend Resources with a User Pool -- Amazon Cognito Identity Pools -- How AWS STS Generates Temporary Tokens -- Amazon Cognito and the Todo List Application -- Overview of the AWS IAM Identity Center -- Exercise 2.1 - Creating an IAM User and an IAM Group within your Development Account -- Technical Requirements -- Project Task 2.1 - Creating an Amazon Cognito User Pool for the Todo List Application -- Step 1 - Configure Sign-In Experience -- Step 2 - Configure Security Requirements -- Step 3 - Configure Sign-Up Experience -- Step 4 - Configure Message Delivery -- Step 5 - Integrate Your App -- Step 6 - Review and Create -- Step 7 - Testing the Cognito User Pool -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 3: Understanding Object Storage with Amazon S3, Hybrid Storage, and Static Website Hosting -- An Introduction to Storage Options -- Block Storage -- File Storage -- Object Storage -- An Introduction to Object Storage with Amazon S3 -- Amazon S3 Buckets -- Amazon S3 Objects -- An Amazon S3 Object's Key -- Amazon S3 Region Choice -- Read-after-Write Consistency -- Eventual Consistency -- Managing Data Storage Costs with Amazon S3 Storage Classes -- The Amazon S3 Standard Storage Class -- Amazon S3-IA Storage -- Amazon S3 One Zone-IA -- Amazon S3 Intelligent-Tiering -- Amazon S3 Express One Zone -- Amazon S3 Glacier -- Protecting Data from Accidental Deletion in Amazon S3 -- Encryption Options for Amazon S3 -- Using Amazon S3 Versioning with S3 Lifecycle Management -- Implementing Data Protection with Resource-Based Policies -- Securing Access with Pre-Signed URLs…”
Libro electrónico -
51858por Tezuysal, Alkin“…Become well-versed with database modeling and SQL optimization, and gain a deep understanding of transactional systems through practical examples and exercises Key Features Get to grips with fundamental-to-advanced database design and modeling concepts with PostgreSQL and MySQL Explore database integration with web apps, emerging trends, and real-world case studies Leverage practical examples and hands-on exercises to reinforce learning Purchase of the print or Kindle book includes a free PDF eBook Book Description Database Design and Modeling with PostgreSQL and MySQL will equip you with the knowledge and skills you need to architect, build, and optimize efficient databases using two of the most popular open-source platforms. …”
Publicado 2024
Libro electrónico -
51859Publicado 2024Tabla de Contenidos: “…-- Formulating null and alternative hypotheses -- Determining the significance level -- Understanding errors -- Getting to grips with p-values -- Significance tests for a population proportion - making informed decisions about proportions -- The z-test - comparing a sample proportion to a population proportion -- Z-test example made easy -- Significance tests for a population average (mean) -- Writing hypotheses for a significance test about a mean -- Conditions for a t-test about a mean -- When to use z or t statistics in significance tests -- Example - calculating the t-statistic for a test about a mean -- Using a table to estimate the p-value from the t-statistic -- Comparing the p-value from the t-statistic to the significance level -- One-tailed and two-tailed tests -- Walking through a case study -- Summary -- Understanding Regression -- How can I benefit from understanding regression? …”
Libro electrónico -
51860Publicado 2024Tabla de Contenidos: “…Detection and verification -- identifying, assessing, and confirming cybersecurity incidents targeting Windows systems -- Incident detection -- Incident verification -- Incident classification -- Incident analysis and containment -- investigating and stopping the spread of cyberattacks -- Incident analysis -- Incident containment -- Eradication and recovery -- removing the intrusion signs and getting back to normal -- Eradication -- Recovery -- Summary -- Chapter 4: Endpoint Forensic Evidence Collection -- Introduction to endpoint evidence collection -- Collecting data from the endpoints…”
Libro electrónico