Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,658
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 357
- Música 348
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
29721Publicado 2018“…The enigma is not so much the refusal of the feminine dimension as such; it has more to do with rejecting its erotic and genital aspects, as well as its creation through sexual ecstatic pleasure. …”
Libro electrónico -
29722Publicado 2018“…Using the frameworks of psychoanalysis, group relations, systemic organisational observation, consulting and research, this book explores the relationship between the health of the work force and the health of organisations. It seeks to do this through an exploration of experience that has three dimensions linked in a single matrix: The bodily, the emotional and the social. …”
Libro electrónico -
29723por Danesi, Marcel, 1946-“…"Humans are the only animals who create and solve puzzles -- for the sheer pleasure of it -- and there is no obvious genetic reason why we would do this. Marcel Danesi explores the psychology of puzzles and puzzling, with scores of classic examples. …”
Publicado 2002
Libro electrónico -
29724por Michelli, Nicholas M. Jacobowitz, Tina J. Campo, Stacey Jahnsen, Diana“…This timely book encourages readers to consider what we can do to enhance social justice in education and society. …”
Publicado 2023
Libro electrónico -
29725Publicado 2023“…Yes-you can either get owned by change or decide to own change yourself. Learn how to do just that with tips and advice for every individual, including the manager, the entrepreneur, the employee, or just the average person who fears getting derailed by change. …”
Grabación no musical -
29726Publicado 2023“…But the prospect of sharing potentially negative news can be overwhelming. How do you construct your message so that it's not only well received but also expressed in a way that encourages change? …”
Grabación no musical -
29727Publicado 2022“…The present study focuses on the following question: How do the Controlled Language (CL) rules impact the Machine Translation (MT) output individually? …”
Libro electrónico -
29728Publicado 2020“…You'll understand what quantum computers can do and learn how to identify the types of problems they can solve…”
Libro electrónico -
29729Publicado 2023“…The morbidity and mortality of the infection caused by SARS-CoV-2 has been significant, and various waves of disease outbreaks initially overwhelmed hospitals and clinics in many countries and continue to do so. This influences everyone, and public health countermeasures have been dramatic in terms of their impact on employment, social systems, and mental health. …”
Libro electrónico -
29730Publicado 2022“…Over 30 industry professionals, composers, directors, educators and business agents at all levels dispel myths about the industry and provide practical advice on topics such as how to break into the field; how to develop, nurture, and navigate business relationships; and how to do creative work under pressure. Readers will also learn about the entrepreneurial expectations in relation to marketing, strategies for contending with the emotional highs and lows of composing, and money management whilst pursuing a career in composing. …”
Libro electrónico -
29731Publicado 2023“…How detailed they should be? Where do they belong in the process and WHO exactly should be writing them? …”
Video -
29732Publicado 2020“…The number of bilingual and multilingual speakers around the world is steadily growing, leading to the questions: How do bilinguals manage two or more language systems in their daily interactions, and how does being bilingual/multilingual affect brain functioning and vice versa? …”
Libro electrónico -
29733Publicado 2018“…Many other gluten planets do indeed exist and deserve the attention of researchers and clinicians alike. …”
Libro electrónico -
29734Publicado 2017“…Innovation is increasingly based on distributed knowledge sources, given that firms often do not possess all competencies necessary for fundamental innovations. …”
Libro electrónico -
29735Publicado 2021“…Only when materials are shaped do their various qualities emerge, and these qualities are, to a greater or lesser extent, transferred to objects. …”
Libro electrónico -
29736Publicado 2022“…We're obsessed by our lengthening to-do lists, our overfilled inboxes, the struggle against distraction, and the sense that our attention spans are shrivelling. …”
Libro -
29737Publicado 2023“…Updated for the era of remote and hybrid work, this book provides actionable answers to product management's most persistent and confounding questions, starting with: What exactly am I supposed to do all day? With this book, you'll learn what the day-to-day work of product management entails-and how to excel at it; why no job title or description will resolve the ambiguity of your role; how to bridge the false dichotomy between "strategy" and "execution"; why the temptation to focus on decks and documentation can be bad for your team (and for you); and how to prioritize your time and pick your battles…”
Grabación no musical -
29738Publicado 2023“…She describes the impact of bullying on an organization's bottom line; explains what you can do to combat bullying against yourself or your coworkers; analyzes the common characteristics of bullies; and helps listeners understand how to face each style of bullying behavior. …”
Grabación no musical -
29739Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
Video -
29740Publicado 2022“…Assim, reunir esses textos, frutos de pesquisa, experiências e estudos intensos de alguns educadores, alunos do Programa de Pós-Graduação em Educação da UNESP, Campus de Marília, é sinônimo de reconhecimento e concretude de que a educação, como instrumento social, reflete as necessidades, bem como as demandas de uma época sem precedentes…”
Libro electrónico