Search Results - (( Web observers Computer program. ) OR ( Web observer Computer program. ))
Suggested Topics within your search.
Suggested Topics within your search.
- Research 8
- Application software 6
- Development 5
- Data processing 4
- JavaScript (Computer program language) 4
- Methodology 4
- PHP (Computer program language) 3
- Public health 3
- Web site development 3
- Computer security 2
- Design 2
- Discourse analysis 2
- Ecology 2
- Internet 2
- Language and languages 2
- Management 2
- Programming 2
- Sociolinguistics 2
- Technological innovations 2
- Telemedicine 2
- Virtual reality in medicine 2
- Web applications 2
- Web sites 2
- sociolinguistics 2
- Accounting 1
- Anxiety 1
- Applied anthropology 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Auditing 1
Search alternatives:
-
1
-
2
-
3
MobX quick start guide : supercharge the client state in your React apps with MobX
Published 2018Full text (MFA users only)
Electronic eBook -
4
-
5
-
6
-
7
-
8
Real-world solutions for developing high-quality PHP frameworks and applications
Published 2011Full text (MFA users only)
Electronic eBook -
9
-
10
Professional swift
Published 2015Table of Contents: “…-- Designing Concurrent Programs -- Concurrency in iOS and OS X -- Understanding Event Loops -- Understanding Run Loops -- Understanding Asynchronous Methods -- Understanding NSTimer -- Understanding NSThread -- Understanding Grand Central Dispatch -- Summary -- Chapter 5: Interfacing with Web Services -- Understanding Web Services -- Implementing a Web Services Client -- Signing Up for a Firebase Account -- Laying Out the User Interface -- Hooking Up the Add Album View Controller -- Adding the Album Creation View Controller -- Hooking Up the Segue -- Creating the Album Model -- Communicating with Firebase -- Creating the Firebase Connector -- Making Asynchronous Web Requests -- Processing JSON Data -- Creating New Albums -- Deleting Albums -- Wiring Up the View and Data Models -- Wiring Up the Segue -- Run the Application -- Summary -- Chapter 6: Storing Data with Core Data -- What Is Core Data? …”
Full text (MFA users only)
Electronic eBook -
11
Observing the user experience : a practitioner's guide to user research
Published 2012Full text (MFA users only)
Electronic eBook -
12
-
13
-
14
-
15
Online teaching and learning : sociocultural perspectives
Published 2013Full text (MFA users only)
Electronic eBook -
16
-
17
Cyber breach response that actually works : organizational approach to managing residual risk
Published 2020Table of Contents: “…Cyber Threat Intelligence -- Laws and Regulations -- Changing Business Objectives -- Incorporating Cyber Breach Response into a Cybersecurity Program -- Strategic Planning -- Designing a Program -- Implementing Program Components -- Program Operations -- Continual Improvement -- Strategy Development -- Strategic Assessment -- Strategy Definition -- Strategy Execution -- Roadmap Development -- Governance -- Establishing Policies -- Identifying Key Stakeholders -- Business Alignment -- Continual Improvement -- Summary -- Notes -- Chapter 2 Building a Cybersecurity Incident Response Team…”
Full text (MFA users only)
Electronic eBook -
18
Advanced data structures : theory and applications
Published 2020Full text (MFA users only)
Electronic eBook -
19
Artificial intelligence and data mining approaches in security frameworks
Published 2021Table of Contents: “…Rashmi Agrawal -- 2.1 Introduction 11 -- 2.2 Data Mining Techniques and Their Role in Classification and Detection 14 -- 2.3 Clustering 19 -- 2.4 Privacy Preserving Data Mining (PPDM) 21 -- 2.5 Intrusion Detection Systems (IDS) 22 -- 2.5.1 Types of IDS 23 -- 2.5.1.1 Network-Based IDS 23 -- 2.5.1.2 Host-Based IDS 24 -- 2.5.1.3 Hybrid IDS 25 -- 2.6 Phishing Website Classification 26 -- 2.7 Attacks by Mitigating Code Injection 27 -- 2.7.1 Code Injection and Its Categories 27 -- 2.8 Conclusion 28 -- References 29 -- 3 Role of Artificial Intelligence in Cyber Security and Security Framework 33 Shweta Sharma -- 3.1 Introduction 34 -- 3.2 AI for Cyber Security 36 -- 3.3 Uses of Artificial Intelligence in Cyber Security 38 -- 3.4 The Role of AI in Cyber Security 40 -- 3.4.1 Simulated Intelligence Can Distinguish Digital Assaults 41 -- 3.4.2 Computer-Based Intelligence Can Forestall Digital Assaults 42 -- 3.4.3 Artificial Intelligence and Huge Scope Cyber Security 42 -- 3.4.4 Challenges and Promises of Artificial Intelligence in Cyber Security 43 -- 3.4.5 Present-Day Cyber Security and its Future with Simulated Intelligence 44 -- 3.4.6 Improved Cyber Security with Computer-Based Intelligence and AI (ML) 45 -- 3.4.7 AI Adopters Moving to Make a Move 45 -- 3.5 AI Impacts on Cyber Security 46 -- 3.6 The Positive Uses of AI Based for Cyber Security 48 -- 3.7 Drawbacks and Restrictions of Using Computerized Reasoning For Digital Security 49 -- 3.8 Solutions to Artificial Intelligence Confinements 50 -- 3.9 Security Threats of Artificial Intelligence 51 -- 3.10 Expanding Cyber Security Threats with Artificial Consciousness 52 -- 3.11 Artificial Intelligence in Cybersecurity – Current Use-Cases and Capabilities 55 -- 3.11.1 AI for System Danger Distinguishing Proof 56 -- 3.11.2 The Common Fit for Artificial Consciousness in Cyber Security 56 -- 3.11.3 Artificial Intelligence for System Danger ID 57 -- 3.11.4 Artificial Intelligence Email Observing 58 -- 3.11.5 Simulated Intelligence for Battling Artificial Intelligence Dangers 58 -- 3.11.6 The Fate of Computer-Based Intelligence in Cyber Security 59 -- 3.12 How to Improve Cyber Security for Artificial Intelligence 60 -- 3.13 Conclusion 61 -- References 62 -- 4 Botnet Detection Using Artificial Intelligence 65 Astha Parihar and Prof. …”
Full text (MFA users only)
Electronic eBook -
20
Machine learning in cognitive IoT
Published 2020Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgements -- List of Figures -- List of Tables -- 1 Internet of Things -- 1.1 IoT History -- 1.2 IoT Architecture -- 1.3 IoT Elements -- 1.3.1 Wireless Sensor Networks (WSN) -- 1.3.2 Radio Frequency Identification (RFID) -- 1.3.2.1 RFID Applications -- 1.3.3 Data Storage -- 1.3.4 Challenging Issues -- 1.4 Data Analytics -- 1.4.1 IoT Data Sources -- 1.4.1.1 Industrial Data -- 1.4.1.2 Business Applications -- 1.4.1.3 Sensors and Devices -- 1.4.1.4 Smartphones -- 1.4.2 Data Processing -- 1.4.2.1 Data Acquisition -- 1.4.2.2 Data Transport -- 1.4.2.3 Data Preprocessing -- 1.4.3 IoT Technologies -- 1.4.3.1 Wireless Communication Technologies -- 1.4.3.2 Data Analysis Schemes -- 1.4.3.3 Machine Learning -- 1.4.4 Optimization Techniques -- 1.4.4.1 Edge Computing Technology -- 1.4.4.2 Refining the Results -- 1.5 Steps of Data Preprocessing -- 1.5.1 Data Formatting -- 1.5.2 Data Cleaning -- 1.5.2.1 Duplicate Observations -- 1.5.2.2 Irrelevant Observations -- 1.5.2.3 Handling Missing Data -- 1.5.2.4 Detecting Outliers -- 1.5.3 Data Reduction Schemes -- 1.5.3.1 Feature Extraction -- 1.5.3.2 Feature Selection -- 1.6 IoT Protocols -- 1.6.1 Infrastructure Layer (Network/Transport Layer) -- 1.6.2 Data Protocols -- 1.6.3 Physical Layer -- 1.6.4 LPWAN: Low Power Wide Area Network -- 1.7 IoT Applications -- 1.7.1 Logistics and Transportation -- 1.7.2 Home and Workplace -- 1.7.3 Personal and Social -- 1.7.4 Health Domain -- 1.8 Book Outline -- 1.9 Target Audience -- 1.10 Summary and What's Next? …”
Full text (MFA users only)
Electronic eBook