Search Results - ((java programming) OR (((names programming) OR (james programming))))

Search alternatives:

Refine Results
  1. 1801
  2. 1802
  3. 1803

    Career development, employment, and disability in rehabilitation : from theory to practice

    Published 2014
    Table of Contents: “…Cardoso -- Ticket to work and self-sufficiency program, and key employment and civil rights legislation : are they working for people with disabilities? …”
    Full text (MFA users only)
    Electronic eBook
  4. 1804

    Mastering Metasploit by Jaswal, Nipun

    Published 2014
    Table of Contents: “…Modeling threatsVulnerability analysis; The exploitation procedure; Exploitation and post exploitation; Using the database to store and fetch results; Generating reports; The dominance of Metasploit; Open source; Support for testing large networks and easy naming conventions; Smart payload generation and switching mechanism; Cleaner exits; The GUI environment; Summary; Chapter 2: Reinventing Metasploit; Ruby -- the heart of Metasploit; Creating your first Ruby program; Interacting with the Ruby shell; Defining methods in the shell; Variables and data types in Ruby; Working with strings.…”
    Full text (MFA users only)
    Electronic eBook
  5. 1805

    People, land, and water : participatory development communication for natural resource management

    Published 2006
    Table of Contents: “…Dick -- From Resource-Poor Users to Natural Resource Managers A Case from West Java / Amri Jahi.…”
    Full text (MFA users only)
    Electronic eBook
  6. 1806

    1688 : the first modern revolution by Pincus, Steven C. A.

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  7. 1807

    Social injustice and public health

    Published 2006
    Table of Contents: “…Larry Brown -- Chronic diseases / Derek Yach -- Mental health / Carles Munaner, Jeanne Geiger-Brown -- Assaultive violence and war / James A. Mercy -- Environmental health / Colin D. …”
    Full text (MFA users only)
    Electronic eBook
  8. 1808

    Medical aspects of chemical warfare

    Published 2008
    Table of Contents: “…Baskin [and others] -- Incapacitating agents / James S. Ketchum and Harry Salem -- Riot control agents / Harry Salem [and others] -- Field management of chemical casualties / Charles H. …”
    Full text (MFA users only)
    Government Document Electronic eBook
  9. 1809

    Effective college and university teaching : strategies and tactics for the new professoriate

    Published 2012
    Table of Contents: “…Goldstein -- Writing and developing your philosophy of teaching / James H. Korn -- Developing student-teacher rapport in the undergraduate classroom / Janie H. …”
    Full text (MFA users only)
    Electronic eBook
  10. 1810

    Culturally sustaining and revitalizing pedagogies : language, culture, and power

    Published 2017
    Table of Contents: “…Lopez -- Dual language programs: language and access / Laura Gomez -- Culturally sustaining pedagogy in action: views from inside a secondary social studies teacher's classroom / Margarita Jimenez-Silva Ruth Luevanos -- Part II: Culture -- Voices from the community: the past embraced / Lisa Unin -- Yupiunrirngaitua/the skirt I refuse to wear / Panigkaq Agatha John-Shields -- Preparing culturally sustaining/revitalizing educators: lessons from field experiences in Alaska native village schools / Timothy E. …”
    Full text (MFA users only)
    Electronic eBook
  11. 1811

    Co-operative Management of Local Fisheries : New Directions for Improved Management and Community Development. by Pinkerton, Evelyn

    Published 2014
    Table of Contents: “…10 The Development of State/Tribal Co-Management of Wisconsin FisheriesPART FOUR: PROVISIONS IN COMPREHENSIVE CLAIMS FOR NATIVE SELF-MANAGEMENT -- 11 Co-Management and the James Bay Agreement -- 12 Co-Management Provisions of the Inuvialuit Final Agreement -- PART FIVE: B.C. …”
    Full text (MFA users only)
    Electronic eBook
  12. 1812

    Kubernetes for Developers : Use Kubernetes to develop, test, and deploy your applications with the help of containers. by Heck, Joseph

    Published 2018
    Table of Contents: “…Kubernetes resource -- DeploymentRepresenting Kubernetes resources; Summary; Chapter 2: Packaging Your Code to Run in Kubernetes; Container images; Container registries; Making your first container; Dockerfile commands; Example -- Python/Flask container image; Building the container; Running your container; Pod name; Port forwarding; Proxy; How did the proxy know to connect to port 5000 on the container?…”
    Full text (MFA users only)
    Electronic eBook
  13. 1813

    Machine Learning for Mobile : Practical Guide to Building Intelligent Mobile Applications Powered by Machine Learning. by Gopalakrishnan, Revathi

    Published 2018
    Table of Contents: “…Interface to hardware accelerationThe architecture of a mobile machine learning application; Understanding the model concepts; Writing the mobile application using the TensorFlow model; Writing our first program; Creating and Saving the TF model; Freezing the graph; Optimizing the model file; Creating the Android app; Copying the TF Model; Creating an activity; Summary; Chapter 5: Regression Using Core ML in iOS; Introduction to regression; Linear regression; Dataset; Dataset naming; Understanding the basics of Core ML; Solving the problem using regression in Core ML; Technical requirements…”
    Full text (MFA users only)
    Electronic eBook
  14. 1814

    Hands on hacking by Hickey, Matthew (Computer security expert), Arcuri, Jennifer

    Published 2020
    Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
    Full text (MFA users only)
    Electronic eBook
  15. 1815

    Past, Present, and Future Contributions of Cognitive Writing Research to Cognitive Psychology. by Berninger, Virginia Wise

    Published 2012
    Table of Contents: “…13 Translating Nonverbal Pictures Into Verbal Word Names: Understanding Lexical Access and Retrieval14 Why Should We Take Graphotactic and Morphological Regularities Into Account When Examining Spelling Acquisition?…”
    Full text (MFA users only)
    Electronic eBook
  16. 1816
  17. 1817

    Machine Learning with Spark - Second Edition. by Dua, Rajdeep

    Published 2016
    Table of Contents: “…Cover -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Up and Running with Spark -- Installing and setting up Spark locally -- Spark clusters -- The Spark programming model -- SparkContext and SparkConf -- SparkSession -- The Spark shell -- Resilient Distributed Datasets -- Creating RDDs -- Spark operations -- Caching RDDs -- Broadcast variables and accumulators -- SchemaRDD -- Spark data frame -- The first step to a Spark program in Scala -- The first step to a Spark program in Java -- The first step to a Spark program in Python -- The first step to a Spark program in R -- SparkR DataFrames -- Getting Spark running on Amazon EC2 -- Launching an EC2 Spark cluster -- Configuring and running Spark on Amazon Elastic Map Reduce -- UI in Spark -- Supported machine learning algorithms by Spark -- Benefits of using Spark ML as compared to existing libraries -- Spark Cluster on Google Compute Engine -- DataProc -- Hadoop and Spark Versions -- Creating a Cluster -- Submitting a Job -- Summary -- Chapter 2: Math for Machine Learning -- Linear algebra -- Setting up the Scala environment in Intellij -- Setting up the Scala environment on the Command Line -- Fields -- Real numbers -- Complex numbers -- Vectors -- Vector spaces -- Vector types -- Vectors in Breeze -- Vectors in Spark -- Vector operations -- Hyperplanes -- Vectors in machine learning -- Matrix -- Types of matrices -- Matrix in Spark -- Distributed matrix in Spark -- Matrix operations -- Determinant -- Eigenvalues and eigenvectors -- Singular value decomposition -- Matrices in machine learning -- Functions -- Function types -- Functional composition -- Hypothesis -- Gradient descent -- Prior, likelihood, and posterior -- Calculus -- Differential calculus -- Integral calculus.…”
    Full text (MFA users only)
    Electronic eBook
  18. 1818

    529 college savings plan made simple by Feigenbaum, Richard A.

    Published 2005
    Full text (MFA users only)
    Electronic eBook
  19. 1819

    Organization, representation, and symbols of power in the ancient Near East : proceedings of the 54th Rencontre assyriologique internationale at Wuerzburg, 20-25 July 2008

    Published 2012
    Table of Contents: “…Contents -- Vorwort -- Abbreviations -- Program -- Das Ansehen eines altorientalischen Herrschers bei seinen Untertanen -- L'exercice du pouvoir par les rois de la Iere Dynastie de Babylone: problemes de methode -- Verwaltungstechnische Aspekte kniglicher Representation: Zwei Urkunden eber den Kult der verstorbenen Knige im mittelassyrischen Assur -- Bild, Macht und Raum im neuassyrischen Reich -- Die Rolle der Schrift in einer Geschichte der frehen hethitischen Staatsverwaltung…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  20. 1820

    Bash Cookbook : Leverage Bash Scripting to Automate Daily Tasks and Improve Productivity. by Brash, Ron

    Published 2018
    Table of Contents: “…. ; Searching for files by name and/or extension; Getting ready; How to do it ... ; How it works ...…”
    Full text (MFA users only)
    Electronic eBook