Search Results - ((((java programming) OR (james programming))) OR ((james OR names) programming))
Suggested Topics within your search.
Suggested Topics within your search.
- Development 177
- Application software 166
- History 154
- Java (Computer program language) 128
- Computer programs 112
- JavaScript (Computer program language) 109
- Web site development 98
- Programming 84
- Web sites 70
- Design 68
- Social aspects 61
- Research 60
- Data processing 57
- Management 53
- Study and teaching 49
- Education 48
- Internet programming 45
- History and criticism 44
- Politics and government 40
- Medical care 39
- methods 37
- Social conditions 36
- Video games 36
- Government policy 35
- Computer programming 33
- Computer software 32
- Prevention 32
- Web applications 32
- School improvement programs 31
- Children 30
Search alternatives:
- james programming »
- java programming »
-
1981
Mussolini's Rome : rebuilding the Eternal City
Published 2005Full text (MFA users only)
Electronic eBook -
1982
Mastering Metasploit
Published 2014Table of Contents: “…Modeling threatsVulnerability analysis; The exploitation procedure; Exploitation and post exploitation; Using the database to store and fetch results; Generating reports; The dominance of Metasploit; Open source; Support for testing large networks and easy naming conventions; Smart payload generation and switching mechanism; Cleaner exits; The GUI environment; Summary; Chapter 2: Reinventing Metasploit; Ruby -- the heart of Metasploit; Creating your first Ruby program; Interacting with the Ruby shell; Defining methods in the shell; Variables and data types in Ruby; Working with strings.…”
Full text (MFA users only)
Electronic eBook -
1983
People, land, and water : participatory development communication for natural resource management
Published 2006Table of Contents: “…Dick -- From Resource-Poor Users to Natural Resource Managers A Case from West Java / Amri Jahi.…”
Full text (MFA users only)
Electronic eBook -
1984
Kubernetes for Developers : Use Kubernetes to develop, test, and deploy your applications with the help of containers.
Published 2018Table of Contents: “…Kubernetes resource -- DeploymentRepresenting Kubernetes resources; Summary; Chapter 2: Packaging Your Code to Run in Kubernetes; Container images; Container registries; Making your first container; Dockerfile commands; Example -- Python/Flask container image; Building the container; Running your container; Pod name; Port forwarding; Proxy; How did the proxy know to connect to port 5000 on the container?…”
Full text (MFA users only)
Electronic eBook -
1985
Machine Learning for Mobile : Practical Guide to Building Intelligent Mobile Applications Powered by Machine Learning.
Published 2018Table of Contents: “…Interface to hardware accelerationThe architecture of a mobile machine learning application; Understanding the model concepts; Writing the mobile application using the TensorFlow model; Writing our first program; Creating and Saving the TF model; Freezing the graph; Optimizing the model file; Creating the Android app; Copying the TF Model; Creating an activity; Summary; Chapter 5: Regression Using Core ML in iOS; Introduction to regression; Linear regression; Dataset; Dataset naming; Understanding the basics of Core ML; Solving the problem using regression in Core ML; Technical requirements…”
Full text (MFA users only)
Electronic eBook -
1986
Hands on hacking
Published 2020Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
Full text (MFA users only)
Electronic eBook -
1987
Past, Present, and Future Contributions of Cognitive Writing Research to Cognitive Psychology.
Published 2012Table of Contents: “…13 Translating Nonverbal Pictures Into Verbal Word Names: Understanding Lexical Access and Retrieval14 Why Should We Take Graphotactic and Morphological Regularities Into Account When Examining Spelling Acquisition?…”
Full text (MFA users only)
Electronic eBook -
1988
Machine Learning with Spark - Second Edition.
Published 2016Table of Contents: “…Cover -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Up and Running with Spark -- Installing and setting up Spark locally -- Spark clusters -- The Spark programming model -- SparkContext and SparkConf -- SparkSession -- The Spark shell -- Resilient Distributed Datasets -- Creating RDDs -- Spark operations -- Caching RDDs -- Broadcast variables and accumulators -- SchemaRDD -- Spark data frame -- The first step to a Spark program in Scala -- The first step to a Spark program in Java -- The first step to a Spark program in Python -- The first step to a Spark program in R -- SparkR DataFrames -- Getting Spark running on Amazon EC2 -- Launching an EC2 Spark cluster -- Configuring and running Spark on Amazon Elastic Map Reduce -- UI in Spark -- Supported machine learning algorithms by Spark -- Benefits of using Spark ML as compared to existing libraries -- Spark Cluster on Google Compute Engine -- DataProc -- Hadoop and Spark Versions -- Creating a Cluster -- Submitting a Job -- Summary -- Chapter 2: Math for Machine Learning -- Linear algebra -- Setting up the Scala environment in Intellij -- Setting up the Scala environment on the Command Line -- Fields -- Real numbers -- Complex numbers -- Vectors -- Vector spaces -- Vector types -- Vectors in Breeze -- Vectors in Spark -- Vector operations -- Hyperplanes -- Vectors in machine learning -- Matrix -- Types of matrices -- Matrix in Spark -- Distributed matrix in Spark -- Matrix operations -- Determinant -- Eigenvalues and eigenvectors -- Singular value decomposition -- Matrices in machine learning -- Functions -- Function types -- Functional composition -- Hypothesis -- Gradient descent -- Prior, likelihood, and posterior -- Calculus -- Differential calculus -- Integral calculus.…”
Full text (MFA users only)
Electronic eBook -
1989
-
1990
Science with the New Generation of High Energy Gamma-Ray Experiments : the Variable Gamma-Ray Sources.
Published 2007Full text (MFA users only)
Electronic eBook -
1991
Organization, representation, and symbols of power in the ancient Near East : proceedings of the 54th Rencontre assyriologique internationale at Wuerzburg, 20-25 July 2008
Published 2012Table of Contents: “…Contents -- Vorwort -- Abbreviations -- Program -- Das Ansehen eines altorientalischen Herrschers bei seinen Untertanen -- L'exercice du pouvoir par les rois de la Iere Dynastie de Babylone: problemes de methode -- Verwaltungstechnische Aspekte kniglicher Representation: Zwei Urkunden eber den Kult der verstorbenen Knige im mittelassyrischen Assur -- Bild, Macht und Raum im neuassyrischen Reich -- Die Rolle der Schrift in einer Geschichte der frehen hethitischen Staatsverwaltung…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
1992
Bash Cookbook : Leverage Bash Scripting to Automate Daily Tasks and Improve Productivity.
Published 2018Table of Contents: “…. ; Searching for files by name and/or extension; Getting ready; How to do it ... ; How it works ...…”
Full text (MFA users only)
Electronic eBook -
1993
Competency-Based Assessments in Mental Health Practice : Cases and Practical Applications.
Published 2011Full text (MFA users only)
Electronic eBook -
1994
Successful public policy : lessons from Australia and New Zealand
Published 2019Full text (MFA users only)
Electronic eBook -
1995
Czechs, Germans, Jews : National Identity and the Jews of Bohemia.
Published 2012Full text (MFA users only)
Electronic eBook -
1996
Hospital and healthcare security
Published 2015Table of Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients…”
Full text (MFA users only)
Electronic eBook -
1997
Islands and chains : resumption as stranding
Published 2003Full text (MFA users only)
Electronic eBook -
1998
Handbook of language and social interaction
Published 2005Full text (MFA users only)
Electronic eBook -
1999
-
2000
The ecology of place : contributions of place-based research to ecological understanding
Published 2010Full text (MFA users only)
Electronic eBook