Search Results - (((((((ant OR manthe) OR file) OR semantic) OR cantor) OR anne) OR halted) OR wwanting) algorithms.

  1. 101
  2. 102
  3. 103

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Table of Contents: “…-- Setting Up the Raspberry Pi -- Downloading and Copying the Raspbian Operating System -- Plugging in the Hardware -- Installing and Configuring the Software -- Exploring the Desktop in Raspbian -- Shutting Down Your Raspberry Pi -- Connecting to a Wi-Fi Network -- Backing Up an SD Card Image -- Adventure 2 Taking Command of Your Raspberry Pi -- Exploring the Terminal -- Commands for Navigating Through Your File System -- Understanding sudo -- Launching Programs from the Command Line -- Managing Files and Directories -- Installing and Updating Applications -- Downloading and Installing Applications -- Learning More About an Application -- Upgrading Your Apps -- Editing Files -- Using Shutdown and Restart Commands -- Continuing Your Text Adventure -- Adventure 3 Creating Stories and Games with Scratch -- Getting Started with Scratch -- The Scratch Interface -- A Quick Hello from Scratch Cat -- Setting the Stage -- Creating Costumes and Original Sprites -- Using the Scratch Sprite Image Library -- Editing an Existing Sprite -- Creating Your Own Original Sprites -- Animating a Crazy Monkey -- Creating an Adventure Role-Playing Game -- Creating Your Sprite and Stage -- Setting the Start Position of the Adventurer Sprite -- Creating Variables: Including Health Points for the Adventurer Sprite -- Controlling the Direction and Movement of the Adventurer Sprite -- Entering a Cave and Switching Backgrounds.…”
    Full text (MFA users only)
    Electronic eBook
  4. 104
  5. 105

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  6. 106
  7. 107

    Language production and interpretation : linguistics meets cognition by Zeevat, Henk, 1952-

    Published 2014
    Table of Contents: “…Provisional English; 2.3. The Production Algorithm; 2.3.1. Procedural Interpretation of the Constraints; 2.4. …”
    Full text (MFA users only)
    Electronic eBook
  8. 108
  9. 109

    Learning predictive analytics with python : gain practical insights into predictive modelling by implementing Predictive Analytics algorithms on public datasets with Python by Kumar, Ashish

    Published 2016
    Table of Contents: “…Various methods of importing data in PythonCase 1 -- reading a dataset using the read_csv method; The read_csv method; Use cases of the read_csv method; Case 2 -- reading a dataset using the open method of Python; Reading a dataset line by line; Changing the delimiter of a dataset; Case 3 -- reading data from a URL; Case 4 -- miscellaneous cases; Reading from an .xls or .xlsx file; Writing to a CSV or Excel file; Basics -- summary, dimensions, structure; Handling missing values; Checking for missing values; What constitutes missing data?…”
    Full text (MFA users only)
    Electronic eBook
  10. 110
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115
  16. 116
  17. 117

    Mastering Active Directory by Francis, Dishan

    Published 2017
    Table of Contents: “…-- The update sequence number -- Directory Service Agent GUID and invocation ID -- The high watermark vector table -- The up-to-dateness vector table -- The read-only domain controllers -- Active Directory database maintenance -- The ntds.dit file -- The edb.log file -- The edb.chk file -- The temp.edb file -- Offline defragmentation -- Active Directory backup and recovery -- Preventing accidental deletion of objects -- Active Directory Recycle Bin -- Active Directory snapshots -- Active Directory system state backup -- Active Directory recovery from system state backup -- Summary -- Chapter 12: Active Directory Certificate Services -- PKI in action -- Symmetric keys versus asymmetric keys -- Digital encryption -- Digital signatures -- Signing, encryption, and decryption -- Secure Sockets Layer certificates -- Types of certification authorities -- How do certificates work with digital signatures and encryption? …”
    Full text (MFA users only)
    Electronic eBook
  18. 118
  19. 119

    Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis by Bramwell, Phil

    Published 2018
    Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
    Full text (MFA users only)
    Electronic eBook
  20. 120