Search Results - (((((((kant OR hands) OR granting) OR markant) OR cantor) OR anne) OR shared) OR hints) algorithms.

  1. 41
  2. 42

    Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies by Parisi, Alessandro

    Published 2019
    Table of Contents: “…; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras…”
    Full text (MFA users only)
    Electronic eBook
  3. 43

    Uberland : how algorithms are rewriting the rules of work by Rosenblat, Alex, 1987-

    Published 2018
    Table of Contents: “…Introduction : using an app to go to work-Uber as a symbol of the new economy -- Workers as digital pawns : how Uber uses the sharing economy to exploit everyone -- Motivations to drive : how Uber creates jobs for many at the expense of a few -- Grandiose promises : how Uber proposes entrepreneurship to the masses -- The shady middleman : how Uber plays broker to line its pockets -- Behind the curtain : how Uber rules drivers with algorithms -- In the big leagues : how Uber plays ball -- Conclusion : the new age of Uber-how technology consumption rewrote the rules of work -- Appendix 1. methodology : how I studied Uber -- Appendix 2. ridehailing beyond Uber : meet Lyft, the younger twin.…”
    Full text (MFA users only)
    Electronic eBook
  4. 44

    Reconstructive surgery of the hand and upper extremity by Germann, G. (Günter), 1952-, Levin, L. Scott, Sherman, R. (Randolph)

    Published 2018
    Table of Contents: “…Dorsal Soft Tissue Injury to Finger and Hand -- 24. Volar Soft Tissue Injury to Finger and Hand/Palm -- 25. …”
    Full text (MFA users only)
    Electronic eBook
  5. 45

    Fundamentals of grid computing : theory, algorithms and technologies

    Published 2010
    Table of Contents: “…Cover; Title; Copyright; Contents; List of Figures; List of Tables; Foreword; Preface; Chapter 1: Grid computing overview; Chapter 2: Synchronization protocols for sharing resources in grid environments; Chapter 3: Data replication in grid environments; Chapter 4: Data management in grids; Chapter 5: Future of grids resources management; Chapter 6: Fault-tolerance and availability awareness in computational grids; Chapter 7: Fault tolerance for distributed scheduling in grids; Chapter 8: Broadcasting for grids; Chapter 9: Load balancing algorithms for dynamic networks.…”
    Full text (MFA users only)
    Electronic eBook
  6. 46
  7. 47
  8. 48

    Deep learning with Python : a hands-on introduction by Ketkar, Nikhil

    Published 2017
    Table of Contents: “…Stochastic; Challenges with SGD; Local Minima; Saddle Points; Selecting the Learning Rate; Slow Progress in Narrow Valleys; Algorithmic Variations on SGD; Momentum.…”
    Full text (MFA users only)
    Electronic eBook
  9. 49
  10. 50

    Algorithmic problems of group theory, their complexity, and applications to cryptography

    Published 2015
    Table of Contents: “…Formal Definition -- 3. Shamirâ€?s Secret Sharing Scheme -- 4. Secret Sharing Using Non-commutative Groups -- 5. …”
    Full text (MFA users only)
    Electronic eBook
  11. 51

    Inside Finite Elements. by Weiser, Martin

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  12. 52

    Parallel Scientific Computing. by Magoulès, F. (Frédéric)

    Published 2015
    Table of Contents: “…Performance analysis -- 3 Parallel Algorithm Concepts -- 3.1. Parallel algorithms for recurrences -- 3.2. …”
    Full text (MFA users only)
    Electronic eBook
  13. 53
  14. 54

    Computational technologies. Advanced topics

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  15. 55
  16. 56
  17. 57
  18. 58

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…Metasploit Payloads / Peter Van Eeckhoutte -- Meterpreter / Peter Van Eeckhoutte -- Exploiting WebDAV Default Credentials / Peter Van Eeckhoutte -- Running a Script on the Target Web Server / Peter Van Eeckhoutte -- Uploading a Msfvenom Payload / Peter Van Eeckhoutte -- Exploiting Open phpMyAdmin / Peter Van Eeckhoutte -- Downloading a File with TFTP / Peter Van Eeckhoutte -- Downloading Sensitive Files / Peter Van Eeckhoutte -- Downloading a Configuration File / Peter Van Eeckhoutte -- Downloading the Windows SAM / Peter Van Eeckhoutte -- Exploiting a Buffer Overflow in Third-Party Software / Peter Van Eeckhoutte -- Exploiting Third-Party Web Applications / Peter Van Eeckhoutte -- Exploiting a Compromised Service / Peter Van Eeckhoutte -- Exploiting Open NFS Shares / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 9. …”
    Full text (MFA users only)
    Electronic eBook
  19. 59

    Turing's vision : the birth of computer science by Bernhardt, Chris

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  20. 60

    Adventures in Raspberry Pi by Philbin, Carrie Anne

    Published 2017
    Table of Contents: “…Creating Health-Point-Stealing Sprites -- Improving the Movement of the Adventurer Sprite Using if Blocks -- Creating a Game Over Screen -- Ideas for Improvements to Your Game -- Adventure 4 Programming Shapes with Turtle Graphics -- Scratch Turtle Graphics -- Using Pen Down and Pen Up -- Drawing Simple Shapes -- Using "clear" and Setting a Start Point -- Using Variables Instead of Values -- Changing the Size and Colour of the Pen -- Creating Spiral Patterns -- Using User Input to Determine the Number of Sides -- Python Turtle Graphics -- Introducing Python Modules -- The Python 3 Environment and the Interpreter Window -- Using the Turtle Module in Python -- The range Function -- Other Python Turtle Module Commands -- Some Super Spirals -- Further Adventures with Python Turtle -- Adventure 5 Programming with Python -- Getting Set Up for Python -- Python Programming Language -- The IDLE Environment -- Programming in Python: Using a Function -- Using a Text Editor to Create a Code File -- Using the Python time and random Modules -- Python Text Adventure Game -- Getting User Input -- Using Conditionals -- Using a while Loop -- Using a Variable for Health Points -- Putting It All Together -- Defining Functions -- Creating a Main Game Loop -- Continuing Your Python Adventure -- Adventure 6 Programming Minecraft Worlds on the Raspberry Pi -- Getting Started with Minecraft Pi -- Your First Minecraft Pi Python Program -- Using Coordinates in Minecraft Pi -- Finding the Player's Location -- Changing the Player's Location -- Placing a Block -- Placing Multiple Blocks -- Types of Blocks -- Creating a TNT Chain Reaction -- Creating a Diamond Transporter -- Sharing and Cloning Minecraft Pi Programs -- Adventure 7 Coding Music with Sonic Pi -- Getting Started with Sonic Pi -- The Sonic Pi Interface -- Creating Your First Sounds with Sonic Pi.…”
    Full text (MFA users only)
    Electronic eBook