Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 457
- Law 453
- History 438
- Economic conditions 352
- Droit 324
- Economic history 301
- Història 298
- Law reviews 280
- Politics and government 231
- Management 223
- Law and legislation 201
- Education 189
- Social conditions 189
- Agronomy 177
- Agronomía 174
- Biblia 160
- Crítica e interpretación 157
- Agronomia 148
- Histoire 142
- Development 140
- Filosofía 135
- Study and teaching 135
- Research 133
- Música 130
- Animal science 118
- Revues de droit 116
- Artificial intelligence 113
- Economics 111
- Bíblia 109
- Geología 109
-
23081por Cleland, David I.Tabla de Contenidos: “…Additional Sources of Information -- 3.9. Discussion Questions…”
Publicado 2006
Libro electrónico -
23082por Hull, MatthewTabla de Contenidos: “…-SWA approach to ENMs post 2009 -- 3.7 Emerging from the shadow: 2009 SWA report -- 3.8 A big shift: 2010-2012 -- 3.9 A move toward higher levels of control -- 3.10 Conclusions -- Acknowledgment -- References -- 2 PROGRESS -- 4 Characterization of Nanomaterials for NanoEHS Studies -- 4.1 Introduction -- 4.2 Morphology -- 4.3 Chemical composition -- 4.4 Standard reference materials and method standards -- 4.5 Incidental nanoparticles and nanoparticle cycles under relevant conditions -- 4.6 Advanced measurement techniques -- 4.7 Routine analysis -- 4.8 Reporting recommendations -- 4.9 Conclusions -- References…”
Publicado 2014
Libro electrónico -
23083Publicado 2018Tabla de Contenidos: “…Case Study (Advanced): Identifiers in Image Headers -- Section 3.9. Case Study: One-Way Hashes -- Glossary -- References -- Chapter 4: Metadata, Semantics, and Triples -- Section 4.1. …”
Libro electrónico -
23084por World Health OrganizationTabla de Contenidos: “…Velar por que los acuerdos de servicio obligatorio respeten los derechos del personal de salud y vayan acompañados de las ayudas e incentivos pertinentes -- 3.8.2 Consideraciones relativas a la aplicación -- 3.9 Recomendación 9. Vincular las ayudas a la formación del personal de salud a acuerdos de restitución del servicio en zonas rurales y remotas…”
Publicado 2021
Libro electrónico -
23085por Hemanth, D. JudeTabla de Contenidos: “…Proposed system: Materials and methodology -- 3.1 IMU sensor -- 3.2 System architecture -- 3.3 System implementation -- 3.4 Installation of mircopython on ESP32 -- 3.5 Interfacing MPU9250 with ESP32 -- 3.6 Graphical user interface -- 3.7 Updating the database on the server end -- 3.8 Detecting the angle of the set -- 3.9 Graphical report -- 4. Experimental results and discussion -- 4.1 Quantitative measures -- 4.2 Quality measures -- 5. …”
Publicado 2023
Libro electrónico -
23086Publicado 2022Tabla de Contenidos: “…Hormone therapy -- 3.8. Medications -- 3.9. Risk factors for breast cancer -- 3.10. Breast cancer survival rate -- 3.11. …”
Libro electrónico -
23087por Patel, Ram N.Tabla de Contenidos: “…MATLAB® Graphics and Plotting -- 3.1 Introduction -- 3.2 2-Dimensional Plots -- 3.3 Plot Aesthetics -- 3.3.1 Changing the Axes -- 3.3.2 Adding Text -- 3.4 Multiple Plots -- 3.4.1 Multiple Plots on a Window -- 3.4.2 Some Important Functions on Multiple Plots -- 3.5 Subplotting -- 3.6 Some Other Useful 2-D Plots -- 3.7 Advanced Concepts on Plot Annotation and Labeling -- 3.7.1 Using Handle Graphics -- 3.7.2 An Easier Way to Plot Editing -- 3.8 3-D Graphics -- 3.9 Function Plotters -- Programming Tips and Pitfalls -- Summary -- Exercises -- 4. …”
Publicado 2014
Libro electrónico -
23088por Mathura, SanyaTabla de Contenidos: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- About the Editor -- Contributors -- Foreword: Katie Mehnert -- About the Author -- Preface - Women in STEM -- Overview -- Inspiring the Future -- Non-Traditional Paths -- Leading the Way -- Acknowledgements -- Section I: Inspiring the Future -- Chapter 1: Space for Women: Defining Career Lessons -- 1.1 Opening Doors and Ensuring Women Walk through Them -- 1.2 Life's Lessons -- 1.3 Take Advantage of Every Opportunity -- 1.3.1 Changing Our Lives and Those of Others -- 1.4 Try Anyway, Even When the Odds Are Against You, Don't Give Up -- 1.4.1 Success Doesn't Just Depend on the Goal but the Process -- 1.5 Don't Fear the Unknown -- 1.5.1 Moving Outside Your Comfort Zone -- 1.6 SpaceX: A Lesson in Overcoming Failure -- 1.7 The Importance of Mentoring -- 1.8 Taking Chances -- 1.9 Closing Thoughts -- About the Author -- Bibliography -- Chapter 2: Be the Change You Want to See -- 2.1 Recognise Your Privilege and Use It to Drive Positive Change -- 2.2 Engineering Opens Doors -- 2.3 Finding Belonging in Community -- 2.4 Before Confidence -- 2.5 STEMAZING Was Born -- About the Author -- Chapter 3: I #DERRtobedifferent, I Dare to Be Me -- 3.1 The Path to My Own True Identity - A Chronological Quick Run-Through -- 3.2 Turning Point and Walking in the Fog -- 3.3 Here and Now -- 3.4 Kazakhstan - Where My Path Began -- 3.5 Moving to Germany - New Beginnings and Making the 'Impossible' Possible -- 3.6 My Very First Job in Tech and the Important Role of Mentoring in My Career -- 3.7 The Study of Chemistry -- 3.8 PhD in Materials Science - The Importance of Patience and Perseverance, as Well as Healthy Habits and Networking -- 3.9 Moving to Switzerland -- 3.10 The Search for Meaning: You'll Find What's Meant for You -- 3.11 Epilogue -- About the Author…”
Publicado 2024
Libro electrónico -
23089Publicado 2024Tabla de Contenidos: “…Maximum likelihood estimation -- 3.9. Fitting mixture regression models using R -- 4. …”
Libro electrónico -
23090por Hidalgo de Bolaños, Matheo, LicenciadoTabla de Contenidos: “…. : s.n., s.a.] [3], 39 h. ; Fol. Texto firmado por el doct. don Antonio de Veleña. …”
Publicado 1634
Colección -
23091por Capitel, Antón, 1947-Tabla de Contenidos: “…Fin de siglo y los primeros "ismos" del XX : 1890-1917 / por Simón Marchán Fiz (5a ed. 2000). -- v. 39. Las vanguardias históricas y sus sombras : 1917-1930 / por Simón Marchán Fiz (4a ed. 2001). -- v. 40. …”
Publicado 1996
Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Diocesana de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
23092Publicado 2024Tabla de Contenidos: “…Pendulums -- 16.1 Physical pendulums -- 16.2 Period for small amplitudes -- 16.2.1 Project 39. Study of an oscillating ring -- 16.3 Counter-intuitive pendulum -- 16.3.1 Preliminary exercises -- 16.3.2 Project 40. …”
Libro -
23093
-
23094Publicado 2017Tabla de Contenidos: “…Caracterización de las Aguas Residuales -- 3.1 El origen de las aguas residuales -- 3.2 Contaminantes en aguas residuales -- 3.3 DBO y DQO -- 3.4 Persona equivalente y carga por habitante -- 3.5 Componentes principales -- 3.6 Componentes especiales -- 3.7 Microorganismos -- 3.8 Aguas residuales especiales y corrientes internas reciclables de las plantas -- 3.9 Relación entre contaminantes -- 3.10 Variaciones -- 3.11 Caudales de aguas residuales -- 3.12 Residuos generadas en los hogares -- 3.13 Diseño de aguas residuales aplicado a los hogares -- 3.14 Aguas residuales y las fracciones de biomasa -- 3.15 Lista de símbolos de las variables para los modelos -- 3.16 Protocolos de caracterización -- 3.17 Ejemplo de composición de un afluente, bioreactor y efluente -- 3.18 La huella de las aguas residuales -- Referencias -- 4. …”
Libro electrónico -
23095Publicado 2022Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
Libro electrónico -
23096por Izaguirre Sotomayor, Manuel HernánTabla de Contenidos: “…Enfoque de las actividades de marketing -- Figura 3.9. Primera brecha de la empresa turística y hotelera: brecha del conocimiento -- Figura 5.1. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23097por Gómez Gutiérrez, Juan AntonioTabla de Contenidos: “….) -- 3.5 MAPA 3D -- 3.5.1 CINTA DE OPCIONES -- 3.5.2 PASEO -- 3.5.3 ESCENA -- 3.5.4 CAPA -- 3.5.5 MAPA -- 3.5.6 INSERTAR -- 3.5.7 HORA -- 3.5.8 VER -- 3.6 MINIGRÁFICOS -- 3.6.1 LÍNEA -- 3.6.2 COLUMNA -- 3.6.3 +/- -- 3.7 FILTROS -- 3.7.1 SEGMENTACIÓN DE DATOS -- 3.7.2 ESCALA DE TIEMPO -- 3.8 VÍNCULOS -- 3.8.1 HIPERVÍNCULO -- 3.9 TEXTO -- 3.9.1 CUADRO DE TEXTO -- 3.9.2 ENCABEZADO PIE PÁGINA -- 3.9.3 WORDART -- 3.9.4 LÍNEA DE FIRMA -- 3.9.5 OBJETO -- 3.10 SÍMBOLOS -- 3.10.1 ECUACIÓN -- 3.10.2 SÍMBOLO -- 4. …”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23098por Amaya Amaya, JairoTabla de Contenidos: “…Tipos de sistemas de información -- Figura 39. Interdependencia de sistemas -- Figura 40. Fases de un proyecto de sistemas -- Figura 41. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23099por Ortega Candel, José ManuelTabla de Contenidos: “….) -- 3.8.1 AXIS 2 -- 3.8.2 CXF -- 3.8.3 JAX-WS -- 3.9 SEGURIDAD EN API REST CON JAVA JAX-RS -- 3.9.1 AUTENTICACIÓN EN JAX-RS -- 3.9.2 AUTORIZACIÓN EN JAX-RS…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23100por Medina Pabón, Juan EnriqueTabla de Contenidos: “…BIENES DE DERECHO PRIVADO -- 39. LA TIERRA Y SUS COMPONENTES…”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico