Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,641
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 351
- Música 343
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
36641Publicado 2006Tabla de Contenidos: “…; HOW MUCH OF A PROBLEM IS ONLINE STALKING?; WHAT CAN YOU DO IF YOU ARE A VICTIM?; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Electronic Attacks; INTRODUCTION; RECONNAISSANCE PHASE; ATTACK PHASE; DETECTION AVOIDANCE PHASE; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING…”
Libro electrónico -
36642por Eltschinger, Cyrill, 1965-Tabla de Contenidos: “…-- Captive versus partner -- Build-operate-transfer -- Dual-shore delivery -- Going captive and avoiding the expat trap -- Ten lessons learned -- What works elsewhere does not necessarily work in China -- Develop a vision of the future beyond the next shareholder meeting -- Establish the right partnerships from the beginning -- Do your homework -- Commit for the long haul -- Prepare yourself for an unprecedented speed of change -- Choose an outsourcing city based on-- -- People, people, people -- Never give up -- It is all about face -- Winning the talent war -- English makes the world go round -- Recruiting staff -- Salaries on the rise -- Chinese work ethics -- Retaining staff: employee retention and loyalty programs -- China's outsourcing cities -- Beijing -- Shanghai -- Dalian -- Chengdu -- Xi'an -- Jinan -- Hangzhou -- Guangzhou -- Nanjing -- Shenzhen -- IT outsourcing, business process outsourcing, and knowledge process outsourcing in China -- Scope of outsourcing -- Global outsourcing options for customers -- Advantages of outsourcing to China -- Disadvantages to outsourcing to China -- Selection of vendor partners -- Due diligence of the capabilities of vendors -- Importance of business process standards -- Importance of standards in BPO -- Application of standards to different process types -- Process selection for outsourcing -- China's legal framework -- Market entry and establishing a business in China -- Intellectual property rights protection -- Employment issues -- Government policy -- Currency and taxation -- Dispute resolution and litigation -- China 2020 -- Pillar of the economy: focus on the high-tech sector -- Growth of the services sector -- Satisfying a fast-growing global IT and business processes services demand -- Overseas promotions leap forward -- Stable China market economic prospects -- Rise of globalization: in the front row -- China 2020: wild cards -- Appendix A: Exclusive survey of selected cities in cooperation with MOFCOM-- Appendix B: Case studies -- Appendix C: Contact information for major government offices, outsourcing centers, and online resources -- Index…”
Publicado 2007
Libro electrónico -
36643por Swinford, EchoTabla de Contenidos: “…Contents; Introduction; Do You Need This Book?; What's Covered in This Book?…”
Publicado 2006
Libro electrónico -
36644por Lind-WaldockTabla de Contenidos: “…Chapter 4: Letting the Pros Trade Your AccountWHY MANAGED FUTURES?; WHERE DO YOU START?; EVALUATING TRADING PROGRAMS; INVESTING IN MANAGED FUTURES; Chapter 5: Using an Auto-Executing Trading System; WHY AN AUTO-EXECUTING TRADING SYSTEM?…”
Publicado 2005
Libro electrónico -
36645por Lawson, Raef A., 1954-Tabla de Contenidos: “…Chapter 5: Design of a Scorecard System I: The Organizing Framework ORGANIZING FRAMEWORK; WHAT IS AN ORGANIZING FRAMEWORK AND WHY DO WE NEED ONE?; POPULAR FRAMEWORKS; FRAMEWORKS TYPICALLY CHOSEN; INDUSTRY EXAMPLE; CAN AN ORGANIZATION HAVE MULTIPLE FRAMEWORKS?…”
Publicado 2008
Libro electrónico -
36646
-
36647por Sammon, RickTabla de Contenidos: “…Acknowledgments; Foreword; Preface: Evolution of a Photo Shoot; Introduction: The Camera Looks Both Ways; Part I: Cameras Don't Take Pictures, People Do; Jumpstart Your Photo Session; Lesson 1: A Quick Look at Gear; Part II: Photo Philosophies; Lesson 2: Making Pictures Versus Taking Pictures; Lesson 3: From Head to Toe; Lesson 4: Creating a Sense of Place; Lesson 5: Dead Center Is Deadly; Lesson 6: Horizontal and/or Vertical; Lesson 7: Silence Is Deadly; Lesson 8: Being There and Being Aware; Lesson 9: Portraits Versus Environmental Portraits; Lesson 10: The All-Important Background…”
Publicado 2008
Libro electrónico -
36648Publicado 2010Tabla de Contenidos: “…s Accessibility Features""; ""Using Voice Recognition and Speech""; ""Book II: Beyond the Basics""; ""Chapter 1: Doing More with Dashboard Widgets""; ""Getting to Know Your Dashboard Widgets""; ""Adding and Removing Widgets""; ""Finding New Widgets""; ""Disabling and Deleting Widgets from Dashboard""; ""Peeking at Other Widget Programs""…”
Libro electrónico -
36649por Cohen, William A., 1937-Tabla de Contenidos: “…t Yet Exist""; ""How to Determine What Is Likely to Happen""; ""Drucker on the Information the Leader Needs and What to Do with It""; ""Chapter 4: Methodology: Developing Drucker-Based Strategies""; ""Strategy Not by Formula""; ""Druckerâ€?…”
Publicado 2009
Libro electrónico -
36650por Funes, MarianaTabla de Contenidos: “…You and the knowledge management revolution . . . or evolution?What can technology do for you?; Supporting thinking and decisions; Accessing information through structured storage; Interpreting data; Disseminating information; Facilitating the emergence of cross-functional teams; What might be your first step?…”
Publicado 1998
Libro electrónico -
36651por Wiles, JackTabla de Contenidos: “…; An Authentication War Story from 20 Years Ago: The Outside Job; A Second Authentication War Story; Let's Do Something about This Authentication Problem; A Third Authentication War Story; Security Threats in the Future; The Inside Job; A Final Authentication War Story; Key Loggers 101; Some 21st Century Solutions to Authentication; Security Awareness Training; The Rest of the Book; Chapter 2: Digital Forensics: An Overview; Introduction…”
Publicado 2007
Libro electrónico -
36652por Flower, Darren R.Tabla de Contenidos: “…Systems biologyThe immunome; Databases and databanks; The relational database; The XML database; The protein universe; Much data, many databases; What proteins do; What proteins are; The amino acid world; The chiral nature of amino acids; Naming the amino acids; The amino acid alphabet; Defining amino acid properties; Size, charge and hydrogen bonding; Hydrophobicity, lipophilicity and partitioning; Understanding partitioning; Charges, ionization, and pka; Many kinds of property; Mapping the world of sequences; Biological sequence databases; Nucleic acid sequence databases…”
Publicado 2008
Libro electrónico -
36653por Boslaugh, SarahTabla de Contenidos: “…Bayes's TheoremEnough Exposition, Let's Do Some Statistics!; Dice, Coins, and Playing Cards; Exercises; Problem; Solution; Problem; Solution; Alternative solution; Problem; Solution; Alternative solution; Problem; Solution; Mathematical solution; Problem; Solution; Mathematical solution; Problem:; Solution; Mathematical solution; Problem; Solution; Problem; Solution; Closing Note: The Connection Between Statistics and Gambling; Data Management; An Approach, Not a Set of Recipes; The Chain of Command; Codebooks; The Rectangular Data File; Spreadsheets and Relational Databases…”
Publicado 2008
Libro electrónico -
36654Publicado 2005Tabla de Contenidos: “…Chapter 21: Meet Minimum Requirements-Anything More Is Too Much; Chapter 22: Do Not Make Long-Term Project Commitments; Chapter 23: The Effect of Multitasking on Productivity; Chapter 24: Contingency Buffer: Expect the Unexpected; Chapter 25: Scope Creep: Runaway Train or Good Business?…”
Libro electrónico -
36655Publicado 2008Tabla de Contenidos: “…CHAPTER 8 Your Station Is the Logical SolutionPART II: Writing Genius Creative Whether You're a Creative Genius or Not; CHAPTER 9 Recognizing Creative Problems; CHAPTER 10 Creating a Centerpiece for Your Commercial; CHAPTER 11 Making the Spot Emotional; CHAPTER 12 Solving Consumer Problems Without Clichés; CHAPTER 13 Telling Your Target Market What to Do; PART III: Demonstrating That Using Your Station Is Not a Gamble, but a Good, Calculated Risk; CHAPTER 14 Calculating Return on Investment (ROI) and Managing Client Expectations; CHAPTER 15 Explaining the Pure Logic of Buying Your Station…”
Libro electrónico -
36656por Bernal, JoeyTabla de Contenidos: “…Consider Caching -- Rational Performance Tester -- Conclusion -- Chapter 9 Managing a Changing Social World -- The New "Virtual" Water Cooler -- Where Do You Start? -- A Three-Stage Roadmap -- Defining Goals and Business Requirements -- Getting Acceptance and Adoption -- Assessing Your Strategy -- Governance for Social Networking -- Web 2.0 and Agile Development -- Conclusion -- Chapter 10 IBM Case Studies -- Lotus Greenhouse -- Helping Customers Grow and Learn -- IBM in the Cloud -- IdeaJam -- Technology Adoption Program -- My developerWorks -- Conclusion -- Index…”
Publicado 2010
Libro electrónico -
36657Publicado 2006Tabla de Contenidos: “…The First Ancillary Window: Video DistributionThe Second Ancillary Window: Premium Cable Television; The Third Ancillary Window: Network or Cable Television Premiere; The Fourth Ancillary Window: Free Television Syndication; Other Ancillary Rights; Chapter Postscript; Chapter 5 Entertainment Banking; The Banking Business; Basis of Lending Decisions; The Loan Approval Process; Production Financing Worksheet; Types of Loans; Gap Financing; When to Approach the Bank; Chapter Postscript; Chapter 6 Completion Guarantors; What Completion Guarantees Do…”
Libro electrónico -
36658Publicado 2007Tabla de Contenidos: “…Weber -- There's never time to do it right: a relay task / Russell J. Denz -- The flip-it company: exploring the impact of work quotas / James L. …”
Libro electrónico -
36659por Sheldrake, Philip, 1971-Tabla de Contenidos: “…Intro -- The Business of Influence -- Contents -- Foreword -- Acknowledgements -- Introduction -- The questions this book seeks to answer -- The business context -- Influenceprofessional.com -- 1 Where We Are Today -- The Cluetrain and Permission Marketing -- Marketing and public relations -- Marketing -- Public relations -- Integrated marketing communications -- Summary -- 2 The Six Influence Flows -- A clean sheet -- Some definitions -- Mapping the interactions -- Mapping the influence flows -- Contrasting the six influence flows with the traditional emphases -- The 2nd flow and the Internet -- A new stakeholder -- Summary -- 3 Influence -- Summary -- 4 The Social Web -- Social Web analytics -- Characteristics of social Web analytics services -- Achieving an 'Awesome Analytics Advantage' -- Summary -- 5 Measurement, Complexity and Influence-centricity -- Measurement -- The Barcelona Principles -- Influencer-centric -- No standard for influence -- The complexity of influence -- Innovation-driven complexity -- Why do we think it's not complex? -- Influence-centric -- Focus on the influenced -- Tracing influence -- Summary -- 6 The Balanced Scorecard -- An overview -- Business 101 - the problem -- The Balanced Scorecard perspectives -- The right metrics -- Cause and effect -- Strategy maps -- Office of strategy management -- Return on investment -- Back to influence -- Summary -- 7 The Influence Scorecard -- The Balanced Scorecard and the Influence Scorecard -- Taking a lead -- Influence objectives -- Influence strategy -- The CMO's dilemma -- Mapping the influence strategy -- The Influence Scorecard and OSM -- Constructing the Influence Scorecard -- Selecting your metrics -- The AMEC grid -- Budgeting -- ROI -- In the face of chaos -- Influence capability maturity model -- Another scorecard…”
Publicado 2011
Libro electrónico -
36660Publicado 2010Tabla de Contenidos: “…""Who Breaks into Computer Systems""""Why They Do It""; ""Planning and Performing Attacks""; ""Maintaining Anonymity""; ""Chapter 3: Developing Your Ethical Hacking Plan""; ""Establishing Your Goals""; ""Determining Which Systems to Hack""; ""Creating Testing Standards""; ""Selecting Security Assessment Tools""; ""Chapter 4: Hacking Methodology""; ""Setting the Stage for Testing""; ""Seeing What Others See""; ""Scanning Systems""; ""Determining Whatâ€?…”
Libro electrónico