Search Results - (((((((ant OR santis) OR wantis) OR hands) OR cantor) OR anne) OR file) OR wsanting) algorithms.

  1. 101
  2. 102

    Hands-On Data Warehousing with Azure Data Factory : ETL techniques to load and transform data from various sources, both on-premises and on cloud. by Kamrat Gutzait, Michelle

    Published 2018
    Table of Contents: “…Ways to directly copy files into the Data LakePrerequisites for the next steps; Creating a Data Lake Analytics resource; Using the data factory to manipulate data in the Data Lake; Task 1 -- copy/import data from SQL Server to a blob storage file using data factory; Task 2 -- run a U-SQL task from the data factory pipeline to summarize data; Service principal authentication; Run U-SQL from a job in the Data Lake Analytics; Summary; Chapter 5: Machine Learning on the Cloud; Machine learning overview; Machine learning algorithms; Supervised learning; Unsupervised learning; Reinforcement learning.…”
    Full text (MFA users only)
    Electronic eBook
  3. 103
  4. 104
  5. 105
  6. 106

    Computational technologies. Advanced topics

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  7. 107
  8. 108

    Oracle 10g/11g data and database management utilities : master twelve must-use utilities to optimize the efficiency, management, and performance of your daily database task by Madrid, Hector R.

    Published 2009
    Table of Contents: “…Cover; Table of Contents; Preface; Chapter 1: Data Pump; Data Pump features; Data Pump architecture; Setting up the practical scenarios; Data Pump export; Data Pump export modes; A simple Data Pump export session; Data Pump export filtering operations; Use of parameter file; Retrieve original data; Data Pump export space estimation; Dump file multiplexing; Transporting data among different versions; Data Pump export interactive mode; Data Pump restart capability; Getting information about the export job; Data Pump import; Remap function; Data Pump import network mode…”
    Full text (MFA users only)
    Electronic eBook
  9. 109
  10. 110
  11. 111
  12. 112
  13. 113

    Reading machines : toward an algorithmic criticism by Ramsay, Stephen

    Published 2011
    Full text (MFA users only)
    Electronic eBook
  14. 114

    ModSecurity 2.5. by Mischel, Magnus

    Published 2009
    Table of Contents: “…Blocking uncommon request methodsRestricting access to certain times of day; Detecting credit card leaks; Detecting credit card numbers; The Luhn algorithm and false positives; Tracking the geographical location of your visitors; GEO collection fields; Blocking users from specific countries; Load balancing requests between servers on different continents; Pausing requests for a specified amount of time; Executing shell scripts; Sending alert emails; Sending more detailed alert emails; Counting file downloads; Blocking brute-force password guessing; Injecting data into responses.…”
    Full text (MFA users only)
    Electronic eBook
  15. 115

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…NTLM Hashing Algorithms / Peter Van Eeckhoutte -- The Trouble with LM Password Hashes / Peter Van Eeckhoutte -- John the Ripper / Peter Van Eeckhoutte -- Cracking Linux Passwords / Peter Van Eeckhoutte -- Cracking Configuration File Passwords / Peter Van Eeckhoutte -- Rainbow Tables / Peter Van Eeckhoutte -- Online Password-Cracking Services / Peter Van Eeckhoutte -- Dumping Plaintext Passwords from Memory with Windows Credential Editor / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 10. …”
    Full text (MFA users only)
    Electronic eBook
  16. 116

    JPEG2000 standard for image compression : concepts, algorithms and VLSI architectures by Acharya, Tinku

    Published 2005
    Table of Contents: “…Preface; 1 Introduction to Data Compression; 2 Source Coding Algorithms; 3 JPEG: Still Image Compression Standard; 4 Introduction to Discrete Wavelet Transform; 5 VLSI Architectures for Discrete Wavelet Transforms; 6 JPEG2000 Standard; 7 Coding Algorithms in JPEG2000; 8 Code-Stream Organization and File Format; 9 VLSI Architectures for JPEG2000; 10 Beyond Part 1 of JPEG2000 Standard; Index; About the Authors.…”
    Full text (MFA users only)
    Electronic eBook
  17. 117
  18. 118
  19. 119
  20. 120

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Table of Contents: “…-- Setting Up the Raspberry Pi -- Downloading and Copying the Raspbian Operating System -- Plugging in the Hardware -- Installing and Configuring the Software -- Exploring the Desktop in Raspbian -- Shutting Down Your Raspberry Pi -- Connecting to a Wi-Fi Network -- Backing Up an SD Card Image -- Adventure 2 Taking Command of Your Raspberry Pi -- Exploring the Terminal -- Commands for Navigating Through Your File System -- Understanding sudo -- Launching Programs from the Command Line -- Managing Files and Directories -- Installing and Updating Applications -- Downloading and Installing Applications -- Learning More About an Application -- Upgrading Your Apps -- Editing Files -- Using Shutdown and Restart Commands -- Continuing Your Text Adventure -- Adventure 3 Creating Stories and Games with Scratch -- Getting Started with Scratch -- The Scratch Interface -- A Quick Hello from Scratch Cat -- Setting the Stage -- Creating Costumes and Original Sprites -- Using the Scratch Sprite Image Library -- Editing an Existing Sprite -- Creating Your Own Original Sprites -- Animating a Crazy Monkey -- Creating an Adventure Role-Playing Game -- Creating Your Sprite and Stage -- Setting the Start Position of the Adventurer Sprite -- Creating Variables: Including Health Points for the Adventurer Sprite -- Controlling the Direction and Movement of the Adventurer Sprite -- Entering a Cave and Switching Backgrounds.…”
    Full text (MFA users only)
    Electronic eBook