Search Results - ((((java programming) OR (james programming))) OR ((james OR names) programming))

Search alternatives:

Refine Results
  1. 1981

    Mussolini's Rome : rebuilding the Eternal City by Painter, Borden W.

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  2. 1982

    Mastering Metasploit by Jaswal, Nipun

    Published 2014
    Table of Contents: “…Modeling threatsVulnerability analysis; The exploitation procedure; Exploitation and post exploitation; Using the database to store and fetch results; Generating reports; The dominance of Metasploit; Open source; Support for testing large networks and easy naming conventions; Smart payload generation and switching mechanism; Cleaner exits; The GUI environment; Summary; Chapter 2: Reinventing Metasploit; Ruby -- the heart of Metasploit; Creating your first Ruby program; Interacting with the Ruby shell; Defining methods in the shell; Variables and data types in Ruby; Working with strings.…”
    Full text (MFA users only)
    Electronic eBook
  3. 1983

    People, land, and water : participatory development communication for natural resource management

    Published 2006
    Table of Contents: “…Dick -- From Resource-Poor Users to Natural Resource Managers A Case from West Java / Amri Jahi.…”
    Full text (MFA users only)
    Electronic eBook
  4. 1984

    Kubernetes for Developers : Use Kubernetes to develop, test, and deploy your applications with the help of containers. by Heck, Joseph

    Published 2018
    Table of Contents: “…Kubernetes resource -- DeploymentRepresenting Kubernetes resources; Summary; Chapter 2: Packaging Your Code to Run in Kubernetes; Container images; Container registries; Making your first container; Dockerfile commands; Example -- Python/Flask container image; Building the container; Running your container; Pod name; Port forwarding; Proxy; How did the proxy know to connect to port 5000 on the container?…”
    Full text (MFA users only)
    Electronic eBook
  5. 1985

    Machine Learning for Mobile : Practical Guide to Building Intelligent Mobile Applications Powered by Machine Learning. by Gopalakrishnan, Revathi

    Published 2018
    Table of Contents: “…Interface to hardware accelerationThe architecture of a mobile machine learning application; Understanding the model concepts; Writing the mobile application using the TensorFlow model; Writing our first program; Creating and Saving the TF model; Freezing the graph; Optimizing the model file; Creating the Android app; Copying the TF Model; Creating an activity; Summary; Chapter 5: Regression Using Core ML in iOS; Introduction to regression; Linear regression; Dataset; Dataset naming; Understanding the basics of Core ML; Solving the problem using regression in Core ML; Technical requirements…”
    Full text (MFA users only)
    Electronic eBook
  6. 1986

    Hands on hacking by Hickey, Matthew (Computer security expert), Arcuri, Jennifer

    Published 2020
    Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
    Full text (MFA users only)
    Electronic eBook
  7. 1987

    Past, Present, and Future Contributions of Cognitive Writing Research to Cognitive Psychology. by Berninger, Virginia Wise

    Published 2012
    Table of Contents: “…13 Translating Nonverbal Pictures Into Verbal Word Names: Understanding Lexical Access and Retrieval14 Why Should We Take Graphotactic and Morphological Regularities Into Account When Examining Spelling Acquisition?…”
    Full text (MFA users only)
    Electronic eBook
  8. 1988

    Machine Learning with Spark - Second Edition. by Dua, Rajdeep

    Published 2016
    Table of Contents: “…Cover -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Up and Running with Spark -- Installing and setting up Spark locally -- Spark clusters -- The Spark programming model -- SparkContext and SparkConf -- SparkSession -- The Spark shell -- Resilient Distributed Datasets -- Creating RDDs -- Spark operations -- Caching RDDs -- Broadcast variables and accumulators -- SchemaRDD -- Spark data frame -- The first step to a Spark program in Scala -- The first step to a Spark program in Java -- The first step to a Spark program in Python -- The first step to a Spark program in R -- SparkR DataFrames -- Getting Spark running on Amazon EC2 -- Launching an EC2 Spark cluster -- Configuring and running Spark on Amazon Elastic Map Reduce -- UI in Spark -- Supported machine learning algorithms by Spark -- Benefits of using Spark ML as compared to existing libraries -- Spark Cluster on Google Compute Engine -- DataProc -- Hadoop and Spark Versions -- Creating a Cluster -- Submitting a Job -- Summary -- Chapter 2: Math for Machine Learning -- Linear algebra -- Setting up the Scala environment in Intellij -- Setting up the Scala environment on the Command Line -- Fields -- Real numbers -- Complex numbers -- Vectors -- Vector spaces -- Vector types -- Vectors in Breeze -- Vectors in Spark -- Vector operations -- Hyperplanes -- Vectors in machine learning -- Matrix -- Types of matrices -- Matrix in Spark -- Distributed matrix in Spark -- Matrix operations -- Determinant -- Eigenvalues and eigenvectors -- Singular value decomposition -- Matrices in machine learning -- Functions -- Function types -- Functional composition -- Hypothesis -- Gradient descent -- Prior, likelihood, and posterior -- Calculus -- Differential calculus -- Integral calculus.…”
    Full text (MFA users only)
    Electronic eBook
  9. 1989

    529 college savings plan made simple by Feigenbaum, Richard A.

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  10. 1990
  11. 1991

    Organization, representation, and symbols of power in the ancient Near East : proceedings of the 54th Rencontre assyriologique internationale at Wuerzburg, 20-25 July 2008

    Published 2012
    Table of Contents: “…Contents -- Vorwort -- Abbreviations -- Program -- Das Ansehen eines altorientalischen Herrschers bei seinen Untertanen -- L'exercice du pouvoir par les rois de la Iere Dynastie de Babylone: problemes de methode -- Verwaltungstechnische Aspekte kniglicher Representation: Zwei Urkunden eber den Kult der verstorbenen Knige im mittelassyrischen Assur -- Bild, Macht und Raum im neuassyrischen Reich -- Die Rolle der Schrift in einer Geschichte der frehen hethitischen Staatsverwaltung…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  12. 1992

    Bash Cookbook : Leverage Bash Scripting to Automate Daily Tasks and Improve Productivity. by Brash, Ron

    Published 2018
    Table of Contents: “…. ; Searching for files by name and/or extension; Getting ready; How to do it ... ; How it works ...…”
    Full text (MFA users only)
    Electronic eBook
  13. 1993
  14. 1994
  15. 1995
  16. 1996

    Hospital and healthcare security by York, Tony W.

    Published 2015
    Table of Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients…”
    Full text (MFA users only)
    Electronic eBook
  17. 1997

    Islands and chains : resumption as stranding by Boeckx, Cedric

    Published 2003
    Full text (MFA users only)
    Electronic eBook
  18. 1998

    Handbook of language and social interaction

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  19. 1999

    The price of racial reconciliation by Walters, Ronald W.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  20. 2000