Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,647
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 351
- Música 343
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
36501Publicado 2012Tabla de Contenidos: “…Cover -- About the Authors -- Contents -- Foreword -- Preface -- Eight Steps for PMI-ACP® Exam Preparation -- Tips and Tricks for PMI-ACP® Exam -- Chapter 1: Introduction to Project Management -- Introduction -- Project Management Body of Knowledge -- Process -- Project -- Definition -- The Temporary Nature of a Project -- The Unique Nature of a Project -- Outcome of a Project -- Progressive Elaboration: Integrating the Unique and the Temporary -- Projects Versus Operations -- Projects and Strategic Planning -- Environmental Factors that Mandate Projects in Organizations -- Project Management -- The Nine Knowledge Areas of Project Management as Applied to a Training Course -- Discussion Points -- Why do Project Managers Need Interpersonal Relationship Skills? …”
Libro electrónico -
36502Publicado 2023Tabla de Contenidos: “…Part 3 - Software Engineering for PLCs -- Chapter 8: Libraries - Write Once, Use Anywhere -- Technical requirements -- Investigating libraries -- Why do we need libraries? -- Libraries versus frameworks -- Distribution -- Third-party libraries -- Installing a library -- Guiding principles for library development -- Rule 1 - Keep it simple, stupid (KISS) -- Rule 2 - Abstraction and encapsulation -- Rule 3 - Patterns make for perfection -- Rule 4 - Documentation -- Building custom libraries -- Requirements -- Implementation -- Final project - part computation library -- Requirements -- Implementation -- Summary -- Questions -- Further reading -- Chapter 9: The SDLC - Navigating the SDLC to Create Great Code -- Technical requirements -- Understanding the SDLC -- Why care about the SDLC? …”
Libro electrónico -
36503Publicado 2017Tabla de Contenidos: “…Why Google Plus Is Important for Your Business -- Check Out My LinkedIn Profile -- Tweet Your Thoughts to the World -- Social Networking and Personal Branding -- The CIA Joins Twitter -- The Sharing More Than Selling Rule -- Make 85 Percent Sharing and Engaging -- Make 10 Percent Original Content -- Make 5 Percent or Less a Promotion about What You Do -- Connecting with Fans -- How Amanda Palmer Raised a Million Dollars via Social Networking -- Which Social Networking Site Is Right for You? …”
Libro electrónico -
36504Publicado 2024Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Contents -- Preface -- Editor Biographies -- List of Contributors -- Chapter 1 Introduction to Social Engineering: The Human Element of Hacking -- 1.1 Introduction -- 1.1.1 Why Do We Need to Know about Social Engineering? -- 1.1.2 Open-Source Intelligence (OSINT) and Social Engineering -- 1.2 Impact of Social Engineering -- 1.2.1 Financial Losses -- 1.2.2 Loss of Productivity -- 1.2.3 Cyberattacks Cause Business Disruption -- 1.2.4 Loss of Reputation -- 1.3 Types of Social Engineering Attacks -- 1.3.1 Phishing Attacks -- 1.3.2 What Attributes Make Some People More Susceptible to Phishing Attacks than Others -- 1.3.3 Identification of a Social Engineering Attack -- 1.4 Use of AI in Social Engineering Attacks -- 1.4.1 Most Infamous Cases of Social Engineering -- 1.5 Conclusion -- Chapter 2 Social Engineering -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Methodology -- 2.3.1 Reconnaissance -- 2.3.2 Planning -- 2.3.3 Building Trust -- 2.3.4 Exploitation -- 2.3.5 Exit/Escape -- 2.4 Discussion -- 2.5 Conclusion -- Chapter 3 Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks -- 3.1 Introduction -- 3.2 Social Engineering and Its Role in Cyber-Theft -- 3.2.1 The Role of Social Engineering in Cyber-Theft -- 3.3 Vulnerabilities -- 3.3.1 Risks and Challenges -- 3.4 Current Cybersecurity Risks -- 3.4.1 Cybersecurity Challenges -- 3.4.2 Mitigating the Threat of Social Engineering -- 3.5 Conclusion -- Chapter 4 A Case Study on Packet Sniffers: Tools, Techniques, and Tactics -- 4.1 Introduction -- 4.2 Objective -- 4.3 Sniffing in a Wireless Network -- 4.4 Types of Sniffing Methods -- 4.4.1 Sniffing Can Be Done in Two Ways -- 4.5 Sniffing Uses -- 4.5.1 Ethical Uses -- 4.5.2 Unethical Uses -- 4.6 Sniffing Procedure -- 4.7 Use of Sniffer Tools -- 4.7.1 Ettercap Sniffer Tool…”
Libro electrónico -
36505Publicado 2009Tabla de Contenidos: “…5.7 The goto Statement -- 5.8 The switch Statement -- 5.9 Nested switch () Case -- 5.10 The switch () Case and Nested IFS -- Summary -- Exercises -- Chapter 6: Loop Control Statements -- 6.1 Introduction -- 6.2 The for Loop -- 6.3 Nested for Loops -- 6.4 The while Loop -- 6.5 The do-while -- 6.6 The do-while Statement with while Loop -- Summary -- Exercises -- Chapter 7: Arrays -- 7.1 Introduction -- 7.2 Array Initialization -- 7.3 Definition of Array -- 7.4 Characteristic of Array -- 7.5 One-dimensional Array -- 7.6 Predefined Streams -- 7.7 Two-dimensional Array -- 7.8 Three- or Multi-dimensional Arrays -- 7.9 The sscanf () and sprintf () Functions -- Summary -- Exercises -- Chapter 8: Working with Strings & Standard Functions -- 8.1 Introduction -- 8.2 Declaration and Initialization of String -- The Output will be SANJAY -- 8.3 Display of Strings with Different Formats -- Where, the text is 'PRABHAKAR' -- 8.4 String Standard Functions -- 8.5 Applications of Strings -- Summary -- Exercises -- Chapter 9: Pointers -- 9.1 Introduction -- 9.2 Features of Pointers -- 9.3 Pointer Declaration -- 9.4 Arithmetic Operations with Pointers -- 9.5 Pointers and Arrays -- 9.6 Pointers and Two-dimensional Arrays -- 9.7 Array of Pointers -- 9.8 Pointers to Pointers -- 9.9 Pointers and Strings -- 9.10 Void Pointers -- Summary -- Exercises -- Chapter 10: Functions -- 10.1 Introduction -- 10.2 Definition of a Function -- Why use Functions -- How a Function Works -- 10.3 Declaration of a Function -- 10.4 The Return Statement -- 10.5 Types of Functions -- 10.6 Call by Value and Reference -- 10.7 Function Returning More Values -- 10.8 Function as an Argument -- 10.9 Functions with Arrays and Pointers -- 10.10 Recursion -- Summary -- Exercises -- Chapter 11: Preprocessor Directives -- 11.1 Introduction -- 11.2 The #define Directive -- 11.3 Undefining a Macro -- Syntax…”
Libro electrónico -
36506Publicado 2012Tabla de Contenidos: “…Perfect Phrases for Discussing Interim Deliverables -- Perfect Phrases to Define Interim Deliverables -- Perfect Phrases to Define Where the Project Will Begin and End -- Perfect Phrases to Identify the Items That Are and Are Not a Part of the Project Scope -- Perfect Phrases for Creating the Project Work Breakdown Structure (WBS) -- Perfect Phrases for Discussing the Work Breakdown Structure (WBS) -- Perfect Phrases for Organizing the Team on Subprojects -- Perfect Phrases for Creating the Task List -- Perfect Phrases to Clarify What Major Tasks the Project Team Will Be Expected to Do -- Perfect Phrases to Clarify What Tasks the Project Team Will Not Do on the Project -- Perfect Phrases to Deal with Fuzzy Areas or Interfaces with Other Projects -- Perfect Phrases to Identify Who Is Going to Make the Product / Deliverable -- Perfect Phrases to Identify Who Is Going to Put the Product / Deliverable in Place -- Tools for Managing Project Progress -- Perfect Phrases for Selecting and Using a Project Scheduling Application -- CHAPTER 6 - Perfect Phrases to EstimateTime and Resources Neededto Do the Work -- Perfect Phrases for Addressing Effort and Cost Estimates -- Perfect Phrases to Describe Ranges of Time Acceptable for Delivering Project Results -- Perfect Phrases to Describe Ranges of Resources and Costs Needed to Complete Work -- Perfect Phrases to Identify the Type of Person to Add to the Project Team -- Perfect Phrases to Show How Assigned People Can Affect Completion Schedules -- CHAPTER 7 - Perfect Phrases to Lead theTeam's Project Planning -- Perfect Phrases to Describe the Initial Plan -- Perfect Phrases to Request People's Involvement in the Planning Process -- Perfect Phrases to Manage Team Member and Project Customer Expectations -- Perfect Phrases to Elicit Sponsor and Management Input into the Plan…”
Libro electrónico -
36507Publicado 2023Tabla de Contenidos: “…-- Players have limited budgets -- Using season passes for monetization -- Tips for creating a high-performing season pass -- Why do some games fail to monetize? -- Poor goal setting -- Content is not desirable -- Poor balancing (too easy or too hard) -- Monetization works but is inherently low performing -- Monetization tips and tricks -- Earn an opportunity to spend -- Player spending should build up your community, not divide it -- Disappointments and regrets cost dearly! …”
Libro electrónico -
36508por Gucer, VasfiTabla de Contenidos: “…WebSphere Interchange Server Monitoring -- 8.1 OMEGAMON XE for WebSphere InterChange Server overview -- 8.1.1 What does OMEGAMON XE for WICS do? -- 8.1.2 How does OMEGAMON XE for WICS help you? …”
Publicado 2005
Libro electrónico -
36509por Sloan, Joseph D. 1950-“…They range from very specialized tools that do one particular task, to generalized suites that do just about everything except replace bad Ethernet cables. …”
Publicado 2001
Libro electrónico -
36510por Viega, JohnTabla de Contenidos: “…Insecure Cryptography; 1.4. What SSL Doesn&t Do Well; 1.4.2. Non-Repudiation; 1.4.3. Protection Against Software Flaws…”
Publicado 2002
Libro electrónico -
36511por Brown, Patrick J.Tabla de Contenidos: “…2.1.5 Bonds with Sinking Funds2.1.6 Step-Up or Graduated-Rate Bonds; 2.1.7 Annuities; 2.2 Floating-Rate Notes; 2.2.1 Undated or Perpetual Floating-Rate Notes; 2.3 Index-Linked Bonds; 2.4 Hybrid Bonds; 2.5 Other Instrument Types; 2.5.1 Treasury Bills; 2.5.2 Certificates of Deposit; 2.5.3 Commercial Paper; 2.5.4 Medium-Term Notes; 2.5.5 Preference Shares; 2.5.6 Permanent Interest Bearing Shares; 3 How Do You Price and Value a Bond?; 3.1 Compound Interest; 3.2 Discounting and Yield Considerations; 3.3 Accrued Interest; 3.4 How Bonds are Quoted; 3.5 Bond Pricing; 3.6 Yields and Related Measures…”
Publicado 2006
Libro electrónico -
36512Publicado 2021Tabla de Contenidos: “…Cover -- Half Title -- Series -- Title -- Copyright -- Dedication -- Contents -- Acknowledgements -- Introduction -- Glossary of terms, acronyms, and abbreviations -- Glossary of recording attributes -- Part I Before recording -- 1 Acoustics and the recording venue -- 1.1 Brief introduction to room acoustics -- 1.2 What to be aware of when looking at a venue -- 1.3 What can you do to help with poor acoustics? -- 2 Studio techniques and working on location -- 2.1 Equipment -- 2.2 Practicalities at the recording venue -- 2.3 Rigging microphones and running cables -- 2.4 The control room -- 2.5 Studio communications: talkback, telephones, and cue lights -- 2.6 Optimising recording workflow -- 2.7 Running the session -- Part II Recording -- 3 Basic two-microphone stereo techniques -- 3.1 Co-incident microphone techniques -- 3.2 Spaced omnis -- 3.3 Spaced and angled cardioids -- 4 Solo instruments -- 4.1 Classical guitar and flamenco guitar -- 4.2 Harp -- 4.3 Violin -- 4.4 Cello -- 4.5 Woodwinds -- 4.6 Harpsichord -- 5 The piano -- 5.1 The nature of the sound of a piano -- 5.2 The physical layout of a grand piano -- 5.3 The piano lid -- 5.4 Recording aims -- 5.5 Recording a solo piano: the spaced pair -- 5.6 The Decca piano technique -- 5.7 Techniques for other scenarios -- 5.8 Practical issues when recording pianos -- 6 Voice: solo and accompanied -- 6.1 The singer in a recording session -- 6.2 The classical voice and microphone placement -- 6.3 Using two microphones on the voice -- 6.4 Microphone choice -- 6.5 Use of ambient pairs -- 6.6 Concert recording layout -- 6.7 Studio recording and reverse concert positions -- 6.8 Classical voice and lute/theorbo/guitar -- 6.9 Mixing and fader riding for a singer -- 7 Solo instruments and piano -- 7.1 Violin and piano in concert -- 7.2 Violin and piano: studio layout -- 7.3 Cello and piano in concert…”
Libro electrónico -
36513Publicado 2010“…SEE IT DONE. DO IT YOURSELF. It’s that Easy! Easy Microsoft Windows 7 teaches you the fundamentals of working with Microsoft’s latest operating system. …”
Libro electrónico -
36514Publicado 2013Tabla de Contenidos: “…Checking Appliance and Air Conditioner Voltage -- What to Do If You Smell Gas -- Chapter 3: Tools Needed for Installation and Repair -- Safety Precautions -- Individual Safety Precautions -- Safety Precautions When Handling Tools -- Screwdrivers -- Nut Drivers -- Wrenches -- Hammers -- Prying Tools -- Pliers -- Cutting Tools -- Power Tools -- Specialty Tools -- Test Meters -- Advantages of Digital Meters -- Chapter 4: Becoming a Professional Technician -- What Is Customer Satisfaction? …”
Libro electrónico -
36515Publicado 2021Tabla de Contenidos: “…Front Cover -- Title Page -- Copyright Page -- About the Authors -- Brief Contents -- Detailed Contents -- Applying Macroeconomics to the Real World -- Symbols Used in This Book -- Preface -- Part 1 Introduction -- Chapter 1 Introduction to Macroeconomics -- 1.1 What Macroeconomics Is About -- Long-Run Economic Growth -- Business Cycles -- Unemployment -- Inflation -- The International Economy -- Macroeconomic Policy -- Aggregation -- 1.2 What Macroeconomists Do -- Macroeconomic Forecasting -- Macroeconomic Analysis -- Macroeconomic Research -- Data Development -- In Touch with Data and Research: Developing and Testing an Economic Theory -- 1.3 Why Macroeconomists Disagree -- Classicals Versus Keynesians -- A Unified Approach to Macroeconomics -- Chapter 2 The Measurement and Structure of the National Economy -- 2.1 National Income Accounting: The Measurement of Production, Income, and Expenditure -- In Touch with Data and Research: The National Income and Product Accounts in Malaysia -- Why the Three Approaches Are Equivalent -- 2.2 Gross Domestic Product -- The Product Approach to Measuring GDP -- In Touch with Data and Research: Natural Resources, the Environment, and the National Income Accounts -- The Expenditure Approach to Measuring Gdp -- The Income Approach to Measuring GDP -- 2.3 Saving and Wealth -- Measures of Aggregate Saving -- The Uses of Private Saving -- Relating Saving and Wealth -- 2.4 Real GDP, Price Indexes, and Inflation -- Real GDP -- Price Indexes -- In Touch with Data and Research: The Computer Revolution and Chain-Weighted GDP -- In Touch with Data and Research: CPI Inflation Versus Core Inflation -- Application The Federal Reserve's Preferred Inflation Measures -- 2.5 Interest Rates -- Part 2 Long-Run Economic Performance -- Chapter 3 Productivity, Output, and Employment…”
Libro electrónico -
36516por Gavin, LeeTabla de Contenidos: “…-- 6.4 What are maps? -- 6.4.1 What do they do in the solution? -- 6.5 What are relationships? …”
Publicado 2004
Libro electrónico -
36517Publicado 2022Tabla de Contenidos: “…-- Pivotal Changes in Big Data Technology -- Optimized Big Data -- Cloud Data - What It Is, What You Can Do, Benefits, and Drawbacks -- Cloud Benefits and Drawbacks -- Cloud Storage -- "Other Big Data Promises", Data Lakes, Data Swamps, Reservoirs, Muddy Water, Analytic Sandboxes, and Whatever We Can Think to Call It Tomorrow -- Summary -- References -- Additional Resources -- Data Lakes and Architecture -- Some Terms to Consider Exploring -- 7 Data Virtualization -- Introduction -- The Typical Story of Data Growth, Data Complexity, and Data Needs -- DV - What Is It? …”
Libro electrónico -
36518Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Author -- About the Technical Editor -- Contents at a Glance -- Contents -- Introduction -- About This Book -- The SSCP Seven Domains -- Using This Book to Defeat the Cybersecurity Kill Chain -- Where Do You Go from Here? -- The SSCP CBK and Your Professional Growth Path -- Maintaining the SSCP Certification -- Join a Local Chapter -- Let's Get Started! …”
Libro electrónico -
36519Publicado 2023Tabla de Contenidos: “…Concern for Community -- How Do We Build Black Wealth?: Understanding the Limits ofBlack Capitalism -- The Enduring Appeal of Black Capitalism -- Black Capitalism's Shortfalls -- Capitalism and Inequality -- Can Racial Capitalism Be Reformed? …”
Libro electrónico -
36520Publicado 2024Tabla de Contenidos:Libro electrónico