Search Results - ((java programming) OR (((names programming) OR (james programming))))
Suggested Topics within your search.
Suggested Topics within your search.
- Development 177
- Application software 166
- History 154
- Java (Computer program language) 128
- Computer programs 112
- JavaScript (Computer program language) 109
- Web site development 98
- Programming 84
- Web sites 70
- Design 68
- Social aspects 61
- Research 60
- Data processing 57
- Management 53
- Study and teaching 49
- Education 48
- Internet programming 45
- History and criticism 44
- Politics and government 40
- Medical care 39
- methods 37
- Social conditions 36
- Video games 36
- Government policy 35
- Computer programming 33
- Computer software 32
- Prevention 32
- Web applications 32
- School improvement programs 31
- Children 30
Search alternatives:
- names programming »
- james programming »
- java programming »
-
1801
Robot ethics : the ethical and social implications of robotics
Published 2012Full text (MFA users only)
Electronic eBook -
1802
Handbook of healthcare operations management : methods and applications
Published 2013Full text (MFA users only)
Electronic eBook -
1803
Career development, employment, and disability in rehabilitation : from theory to practice
Published 2014Table of Contents: “…Cardoso -- Ticket to work and self-sufficiency program, and key employment and civil rights legislation : are they working for people with disabilities? …”
Full text (MFA users only)
Electronic eBook -
1804
Mastering Metasploit
Published 2014Table of Contents: “…Modeling threatsVulnerability analysis; The exploitation procedure; Exploitation and post exploitation; Using the database to store and fetch results; Generating reports; The dominance of Metasploit; Open source; Support for testing large networks and easy naming conventions; Smart payload generation and switching mechanism; Cleaner exits; The GUI environment; Summary; Chapter 2: Reinventing Metasploit; Ruby -- the heart of Metasploit; Creating your first Ruby program; Interacting with the Ruby shell; Defining methods in the shell; Variables and data types in Ruby; Working with strings.…”
Full text (MFA users only)
Electronic eBook -
1805
People, land, and water : participatory development communication for natural resource management
Published 2006Table of Contents: “…Dick -- From Resource-Poor Users to Natural Resource Managers A Case from West Java / Amri Jahi.…”
Full text (MFA users only)
Electronic eBook -
1806
-
1807
Social injustice and public health
Published 2006Table of Contents: “…Larry Brown -- Chronic diseases / Derek Yach -- Mental health / Carles Munaner, Jeanne Geiger-Brown -- Assaultive violence and war / James A. Mercy -- Environmental health / Colin D. …”
Full text (MFA users only)
Electronic eBook -
1808
Medical aspects of chemical warfare
Published 2008Table of Contents: “…Baskin [and others] -- Incapacitating agents / James S. Ketchum and Harry Salem -- Riot control agents / Harry Salem [and others] -- Field management of chemical casualties / Charles H. …”
Full text (MFA users only)
Government Document Electronic eBook -
1809
Effective college and university teaching : strategies and tactics for the new professoriate
Published 2012Table of Contents: “…Goldstein -- Writing and developing your philosophy of teaching / James H. Korn -- Developing student-teacher rapport in the undergraduate classroom / Janie H. …”
Full text (MFA users only)
Electronic eBook -
1810
Culturally sustaining and revitalizing pedagogies : language, culture, and power
Published 2017Table of Contents: “…Lopez -- Dual language programs: language and access / Laura Gomez -- Culturally sustaining pedagogy in action: views from inside a secondary social studies teacher's classroom / Margarita Jimenez-Silva Ruth Luevanos -- Part II: Culture -- Voices from the community: the past embraced / Lisa Unin -- Yupiunrirngaitua/the skirt I refuse to wear / Panigkaq Agatha John-Shields -- Preparing culturally sustaining/revitalizing educators: lessons from field experiences in Alaska native village schools / Timothy E. …”
Full text (MFA users only)
Electronic eBook -
1811
Co-operative Management of Local Fisheries : New Directions for Improved Management and Community Development.
Published 2014Table of Contents: “…10 The Development of State/Tribal Co-Management of Wisconsin FisheriesPART FOUR: PROVISIONS IN COMPREHENSIVE CLAIMS FOR NATIVE SELF-MANAGEMENT -- 11 Co-Management and the James Bay Agreement -- 12 Co-Management Provisions of the Inuvialuit Final Agreement -- PART FIVE: B.C. …”
Full text (MFA users only)
Electronic eBook -
1812
Kubernetes for Developers : Use Kubernetes to develop, test, and deploy your applications with the help of containers.
Published 2018Table of Contents: “…Kubernetes resource -- DeploymentRepresenting Kubernetes resources; Summary; Chapter 2: Packaging Your Code to Run in Kubernetes; Container images; Container registries; Making your first container; Dockerfile commands; Example -- Python/Flask container image; Building the container; Running your container; Pod name; Port forwarding; Proxy; How did the proxy know to connect to port 5000 on the container?…”
Full text (MFA users only)
Electronic eBook -
1813
Machine Learning for Mobile : Practical Guide to Building Intelligent Mobile Applications Powered by Machine Learning.
Published 2018Table of Contents: “…Interface to hardware accelerationThe architecture of a mobile machine learning application; Understanding the model concepts; Writing the mobile application using the TensorFlow model; Writing our first program; Creating and Saving the TF model; Freezing the graph; Optimizing the model file; Creating the Android app; Copying the TF Model; Creating an activity; Summary; Chapter 5: Regression Using Core ML in iOS; Introduction to regression; Linear regression; Dataset; Dataset naming; Understanding the basics of Core ML; Solving the problem using regression in Core ML; Technical requirements…”
Full text (MFA users only)
Electronic eBook -
1814
Hands on hacking
Published 2020Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
Full text (MFA users only)
Electronic eBook -
1815
Past, Present, and Future Contributions of Cognitive Writing Research to Cognitive Psychology.
Published 2012Table of Contents: “…13 Translating Nonverbal Pictures Into Verbal Word Names: Understanding Lexical Access and Retrieval14 Why Should We Take Graphotactic and Morphological Regularities Into Account When Examining Spelling Acquisition?…”
Full text (MFA users only)
Electronic eBook -
1816
Grappling with the bomb : Britain's Pacific H-bomb tests
Published 2017Full text (MFA users only)
Electronic eBook -
1817
Machine Learning with Spark - Second Edition.
Published 2016Table of Contents: “…Cover -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Up and Running with Spark -- Installing and setting up Spark locally -- Spark clusters -- The Spark programming model -- SparkContext and SparkConf -- SparkSession -- The Spark shell -- Resilient Distributed Datasets -- Creating RDDs -- Spark operations -- Caching RDDs -- Broadcast variables and accumulators -- SchemaRDD -- Spark data frame -- The first step to a Spark program in Scala -- The first step to a Spark program in Java -- The first step to a Spark program in Python -- The first step to a Spark program in R -- SparkR DataFrames -- Getting Spark running on Amazon EC2 -- Launching an EC2 Spark cluster -- Configuring and running Spark on Amazon Elastic Map Reduce -- UI in Spark -- Supported machine learning algorithms by Spark -- Benefits of using Spark ML as compared to existing libraries -- Spark Cluster on Google Compute Engine -- DataProc -- Hadoop and Spark Versions -- Creating a Cluster -- Submitting a Job -- Summary -- Chapter 2: Math for Machine Learning -- Linear algebra -- Setting up the Scala environment in Intellij -- Setting up the Scala environment on the Command Line -- Fields -- Real numbers -- Complex numbers -- Vectors -- Vector spaces -- Vector types -- Vectors in Breeze -- Vectors in Spark -- Vector operations -- Hyperplanes -- Vectors in machine learning -- Matrix -- Types of matrices -- Matrix in Spark -- Distributed matrix in Spark -- Matrix operations -- Determinant -- Eigenvalues and eigenvectors -- Singular value decomposition -- Matrices in machine learning -- Functions -- Function types -- Functional composition -- Hypothesis -- Gradient descent -- Prior, likelihood, and posterior -- Calculus -- Differential calculus -- Integral calculus.…”
Full text (MFA users only)
Electronic eBook -
1818
-
1819
Organization, representation, and symbols of power in the ancient Near East : proceedings of the 54th Rencontre assyriologique internationale at Wuerzburg, 20-25 July 2008
Published 2012Table of Contents: “…Contents -- Vorwort -- Abbreviations -- Program -- Das Ansehen eines altorientalischen Herrschers bei seinen Untertanen -- L'exercice du pouvoir par les rois de la Iere Dynastie de Babylone: problemes de methode -- Verwaltungstechnische Aspekte kniglicher Representation: Zwei Urkunden eber den Kult der verstorbenen Knige im mittelassyrischen Assur -- Bild, Macht und Raum im neuassyrischen Reich -- Die Rolle der Schrift in einer Geschichte der frehen hethitischen Staatsverwaltung…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
1820
Bash Cookbook : Leverage Bash Scripting to Automate Daily Tasks and Improve Productivity.
Published 2018Table of Contents: “…. ; Searching for files by name and/or extension; Getting ready; How to do it ... ; How it works ...…”
Full text (MFA users only)
Electronic eBook