Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,658
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 357
- Música 348
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
30901Publicado 2023“…This course's objective is to build applications and solutions with ChatGPT. You will do that by learning more about OpenAI and ChatGPT and how to use their APIs in your platforms. …”
Video -
30902por Webb, Liggy“…There may be occasions in your life where this seems a challenging concept, however there are some very definite things that you can do to make sure that you are happy more often than not. …”
Publicado 2012
Libro electrónico -
30903Publicado 2024“…The important thing to remember is to do it in safe small steps and make good use of automated tools. …”
Vídeo online -
30904Publicado 2024“…The interviewer asks, "How well do you cope with stress?" Your response should be, "Let's fix your environment so we don't have to." …”
Libro electrónico -
30905Publicado 2023Tabla de Contenidos: “…-- Beyond and outside Cyber Essentials -- Structure of this book -- Part 1: Requirements for basic technical protection from cyber attacks -- Chapter 2: Types of attack -- Social engineering -- Denial of service (DoS) -- Password attacks -- Threats outside the perimeter -- Misconfiguration and unpatched vulnerabilities -- Ransomware -- Scoping -- Implementation and documentation -- Chapter 3: Technical control themes -- Technical control theme 1: Firewalls -- Technical control theme 2: Secure configuration -- Technical control theme 3: User access control -- Technical control theme 4: Malware protection -- Technical control theme 5: Security update management -- Further guidance from Cyber Essentials -- Part 2: Gaining cyber essentials certification -- Chapter 4: Certification -- Externally managed services and scope -- Cyber Essentials checklist -- Cyber Essentials certification process -- Getting certified - Cyber Essentials Plus -- Appendix 1: Further assistance -- Practical help and consultancy -- Useful documents and further information -- The next step - cyber security standards -- Staff training -- Cyber resilience -- Appendix 2: IT Governance resources -- Certification only -- Get A Little Help -- Get A Lot Of Help -- Cyber Essentials Plus Health Check -- Penetration testing -- Gap analysis -- GRC eLearning courses -- Further reading…”
Libro electrónico -
30906Publicado 2024“…People are angry with the world—in some cases, rightfully so—and now view companies as they do governments, as targets of their wrath and potential forces for social change. …”
Grabación no musical -
30907Publicado 2024“…In an era where artificial intelligence can create content indistinguishable from reality, how do we separate truth from fiction? In FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, cybersecurity and deception expert Perry Carpenter unveils the hidden dangers of generative artificial intelligence, showing you how to use these technologies safely while protecting yourself and others from cyber scams and threats. …”
Grabación no musical -
30908Publicado 2024“…Gëzim Visoka argues that state derecognition is a highly controversial and unstable practice that has less to do with the unfulfillment of the conditions of statehood by the claimant than with the advancement of the self-interest of the former base state and derecognizing state. …”
Libro electrónico -
30909Publicado 2024“…Bell helps explain why voice technologies came to sound and to operate in the way they do -- influenced as they were by a combination of technical assumptions and limitations, the choices of the corporations that deploy them, and the habits that consumers developed over time. …”
Libro electrónico -
30910Publicado 2019“…And history always takes place in spaces. But what do historians mean when they use the word "spaces"? …”
Libro electrónico -
30911Publicado 2024“…There is an overwhelming amount of things to do, from learning a new tech skill like 3D printing to traditional handiwork like sewing. …”
Libro electrónico -
30912Publicado 2002“…Many good intentions to read the entire Bible have foundered on the rocks of Leviticus, Numbers, and Deuteronomy. Do these books have literary qualities? How does the storyteller tell the story? …”
991004815709706719 -
30913
-
30914
-
30915
-
30916
-
30917
-
30918por Villamediana, Juan de Tassis y Peralta, conde de, 1582-1622Accés lliure
Publicado 1629
991005050199706719 -
30919
-
30920por Terreros y Pando, Esteban, 1707-1782Accés lliure
Publicado 1758
Accés lliure
Accés lliure
Accés lliure
991005059549706719