Search Results - ((java programming) OR ((((names OR james) programming) OR (names programming))))

Search alternatives:

Refine Results
  1. 1981

    Medical aspects of chemical warfare

    Published 2008
    Table of Contents: “…Baskin [and others] -- Incapacitating agents / James S. Ketchum and Harry Salem -- Riot control agents / Harry Salem [and others] -- Field management of chemical casualties / Charles H. …”
    Full text (MFA users only)
    Government Document Electronic eBook
  2. 1982

    Effective college and university teaching : strategies and tactics for the new professoriate

    Published 2012
    Table of Contents: “…Goldstein -- Writing and developing your philosophy of teaching / James H. Korn -- Developing student-teacher rapport in the undergraduate classroom / Janie H. …”
    Full text (MFA users only)
    Electronic eBook
  3. 1983

    Culturally sustaining and revitalizing pedagogies : language, culture, and power

    Published 2017
    Table of Contents: “…Lopez -- Dual language programs: language and access / Laura Gomez -- Culturally sustaining pedagogy in action: views from inside a secondary social studies teacher's classroom / Margarita Jimenez-Silva Ruth Luevanos -- Part II: Culture -- Voices from the community: the past embraced / Lisa Unin -- Yupiunrirngaitua/the skirt I refuse to wear / Panigkaq Agatha John-Shields -- Preparing culturally sustaining/revitalizing educators: lessons from field experiences in Alaska native village schools / Timothy E. …”
    Full text (MFA users only)
    Electronic eBook
  4. 1984

    Co-operative Management of Local Fisheries : New Directions for Improved Management and Community Development. by Pinkerton, Evelyn

    Published 2014
    Table of Contents: “…10 The Development of State/Tribal Co-Management of Wisconsin FisheriesPART FOUR: PROVISIONS IN COMPREHENSIVE CLAIMS FOR NATIVE SELF-MANAGEMENT -- 11 Co-Management and the James Bay Agreement -- 12 Co-Management Provisions of the Inuvialuit Final Agreement -- PART FIVE: B.C. …”
    Full text (MFA users only)
    Electronic eBook
  5. 1985

    Machine Learning with Spark - Second Edition. by Dua, Rajdeep

    Published 2016
    Table of Contents: “…Cover -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Up and Running with Spark -- Installing and setting up Spark locally -- Spark clusters -- The Spark programming model -- SparkContext and SparkConf -- SparkSession -- The Spark shell -- Resilient Distributed Datasets -- Creating RDDs -- Spark operations -- Caching RDDs -- Broadcast variables and accumulators -- SchemaRDD -- Spark data frame -- The first step to a Spark program in Scala -- The first step to a Spark program in Java -- The first step to a Spark program in Python -- The first step to a Spark program in R -- SparkR DataFrames -- Getting Spark running on Amazon EC2 -- Launching an EC2 Spark cluster -- Configuring and running Spark on Amazon Elastic Map Reduce -- UI in Spark -- Supported machine learning algorithms by Spark -- Benefits of using Spark ML as compared to existing libraries -- Spark Cluster on Google Compute Engine -- DataProc -- Hadoop and Spark Versions -- Creating a Cluster -- Submitting a Job -- Summary -- Chapter 2: Math for Machine Learning -- Linear algebra -- Setting up the Scala environment in Intellij -- Setting up the Scala environment on the Command Line -- Fields -- Real numbers -- Complex numbers -- Vectors -- Vector spaces -- Vector types -- Vectors in Breeze -- Vectors in Spark -- Vector operations -- Hyperplanes -- Vectors in machine learning -- Matrix -- Types of matrices -- Matrix in Spark -- Distributed matrix in Spark -- Matrix operations -- Determinant -- Eigenvalues and eigenvectors -- Singular value decomposition -- Matrices in machine learning -- Functions -- Function types -- Functional composition -- Hypothesis -- Gradient descent -- Prior, likelihood, and posterior -- Calculus -- Differential calculus -- Integral calculus.…”
    Full text (MFA users only)
    Electronic eBook
  6. 1986

    The handbook of experiential learning in international business

    Published 2014
    Table of Contents: “…A short term study abroad program: why and how -- Gordana Pesakovic 37. Suggestions to develop an internship program in Indonesia -- Liem Gai Sin 38. …”
    Full text (MFA users only)
    Electronic eBook
  7. 1987
  8. 1988

    Database transition : Informix Dynamic Server to DB2 Universal Database

    Published 2004
    Table of Contents: “…Data types -- 10.1 Object names -- 10.2 Data type mapping -- 10.3 Disk considerations -- 10.4 Character types -- 10.4.1 Truncation -- 10.4.2 NCHAR -- 10.4.3 VARCHAR -- 10.4.4 TEXT -- 10.5 Numerical types -- 10.5.1 Numerical limits -- 10.5.2 DECIMAL -- 10.5.3 MONEY.…”
    Full text (MFA users only)
    Electronic eBook
  9. 1989

    The handbook of practice and research in study abroad : higher education and the quest for global citizenship

    Published 2009
    Table of Contents: “…Deardorff -- Here to stay: increasing acceptance of short-term study abroad programs / Lisa Chieffo and Lesa Griffiths -- Going global in the sciences: a case study of Emory University / Philip Wainwright [and others] -- Undergraduate research during study abroad: scope, meaning, and potential / Bernhard T. …”
    Full text (MFA users only)
    Electronic eBook
  10. 1990

    Securing transportation systems

    Published 2015
    Full text (MFA users only)
    Electronic eBook
  11. 1991

    Realizing the Future of Nursing : VA Nurses Tell Their Story. by Nurses, Department of Veteran Affairs

    Published 2015
    Table of Contents: “…Jamie GilliamChapter 6: Expanding the Primary Care RN Care Manager and RN Case Manager Roles in VA Care Program; Storm Morgan, Donna C. Vogel, Patricia Hryzak Lind, Joanne M. …”
    Full text (MFA users only)
    Electronic eBook
  12. 1992

    Juvenile law violators, human rights, and the development of new juvenile justice systems

    Published 2006
    Table of Contents: “…The role of the police within the Spanish juvenile justice system : the results of legal reform in Catalonia / Lola Valles ; Achieving positive results with serious juvenile offenders in a reintegrative framework : strategies essential for rehabilitative effectiveness with the intensive aftercare program (IAP) model / Troy L. Armstrong ; Exploring traditional cultural mechanisms of conflict resolution in American Indian communities / Barbara Mendenhall, James Dumesnil ; The juvenile justice forums of Malawi : a case study of the Lilongwe juvenile justice forum / Desmond Kaunda ; Combining juvenile justice with family law reform in Serbia / Ivana Stevanovic ; The inherent tension of social welfare and criminal social control : policy lessons from the American juvenile court experience / Barry C. …”
    Full text (MFA users only)
    Electronic eBook
  13. 1993

    Public finance in China : reform and growth for a harmonious society

    Published 2008
    Table of Contents: “…Evans and Ke Xu -- Health reform in rural China: challenges and options / Adam Wagstaff and Magnus Lindelow -- Part VI: Social security -- Notional defined contribution accounts: a pension reform model worth considering / Jiange Li, Mark Dorfman, and Yan Wang -- Realizing the potential of China's social security pension system / Martin Feldstein and Jeffrey Liebman -- Part VII: Growth, inequality and fiscal reform -- Does the Di Bao program guarantee a minimum income in China's cities? …”
    Full text (MFA users only)
    Electronic eBook
  14. 1994

    Innovations in child and family policy : multidisciplinary research and perspectives on strengthening children and their families

    Published 2010
    Table of Contents: “…Brady -- 5. contribution of the helping relationship in promoting retention in a home visitation program to prevent child maltreatment / Michelle P. …”
    Full text (MFA users only)
    Electronic eBook
  15. 1995

    Social media : usage and impact

    Published 2011
    Table of Contents: “…Tweets, blogs, Facebook, and the ethics of 21st-century communication technology / James Benjamin.…”
    Full text (MFA users only)
    Electronic eBook
  16. 1996

    Transboundary river governance in the face of uncertainty : the Columbia River Treaty : a project of the Universities Consortium on Columbia River Governance

    Published 2012
    Table of Contents: “…The Columbia exchange : a Canadian perspective on the negotiation of the Columbia River Treaty, 1944-1964 / Jeremy Mouat -- The Columbia River Treaty : managing for uncertainty / James D. Barton and Kelvin Ketchum -- The Columbia River : operation under the 1964 Treaty / Anthony G. …”
    Full text (MFA users only)
    Electronic eBook
  17. 1997

    International collaborations in literacy research and practice

    Published 2014
    Table of Contents: “…Richards -- Active learning and critical thinking: a higher education professional development program in Croatia / Sharon B. Kletzien, Vlasta Vizek Vidovi?…”
    Full text (MFA users only)
    Electronic eBook
  18. 1998

    The second cataract fortress of Dorginarti by Heidorn, Lisa A. (Lisa Ann), 1956-

    Published 2023
    Book
  19. 1999

    Antivirus hacker's handbook. by Koret, Joxean

    Published 2015
    Table of Contents: “…-- Discovering Where and How Malware Is Detected -- Old Tricks for Determining Where Malware Is Detected: Divide and Conquer -- Evading a Simple Signature-Based Detection with the Divide and Conquer Trick -- Binary Instrumentation and Taint Analysis -- Summary -- Chapter 7 Evading Signatures -- File Formats: Corner Cases and Undocumented Cases -- Evading a Real Signature -- Evasion Tips and Tricks for Specific File Formats -- PE Files -- JavaScript -- String Encoding -- Executing Code on the Fly -- Hiding the Logic: Opaque Predicates and Junk Code -- PDF -- Summary -- Chapter 8 Evading Scanners -- Generic Evasion Tips and Tricks -- Fingerprinting Emulators -- Advanced Evasion Tricks -- Taking Advantage of File Format Weaknesses -- Using Anti-emulation Techniques -- Using Anti-disassembling Techniques -- Disrupting Code Analyzers through Anti-analysis -- More Anti-Anti-Anti ... -- Causing File Format Confusion -- Automating Evasion of Scanners -- Initial Steps -- Installing ClamAV -- Installing Avast -- Installing AVG -- Installing F-Prot -- Installing Comodo -- Installing Zoner Antivirus -- MultiAV Configuration -- peCloak -- Writing the Final Tool -- Summary -- Chapter 9 Evading Heuristic Engines -- Heuristic Engine Types -- Static Heuristic Engines.…”
    Full text (MFA users only)
    Electronic eBook
  20. 2000