Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,658
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 357
- Música 348
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
37841por Woodcock, Mike“…All the activities employ the principle of ""learning by doing"" to ensure that the skills the participants learn can be applied to real work situations. …”
Publicado 1989
Libro electrónico -
37842Publicado 2021“…Most operators, in fact, focus on identifying the operational set-ups (entry levels, stop-loss, take profit, trailing-stop) and do not consider the impact, very often decisive, that a proper money management could have on the final results of its operations. …”
Libro electrónico -
37843Publicado 2021“…What does a changing job market mean for future generations? What do waves of disruption mean for business leaders? …”
Libro electrónico -
37844Show, Don't Tell Education and Historical Representations on Screen and Stage in Germany and the USAPublicado 2020“…Historical representations on screen and stage do not "teach" us history but rather influence our ideas and interpretations of it. …”
Libro electrónico -
37845por Schiera, Pierangelo“…It is inserted in a long line of work that starts from awareness, of the peculiarity that constitutional history can represent in the wide range of studies that are dedicated to the understanding of the political system, in its structural constituent elements, that never they can do without a historiographical perspective. The concept of constitution is of an unquestionably German matrix, it is something that is between the political-social structure of an era and the political unity of a given human population. …”
Publicado 2012
Libro electrónico -
37846Publicado 2013Libro electrónico
-
37847Publicado 2014“…The next generation must awaken to the problem of treating financial wealth as more important than it is and therefore not developing a sense of self separate from the wealth.The book will: Explain the challenge that wealth poses to rising generations--the challenge of silence Discuss the "rising generations" and what their future might look like Share strategies that help members of the rising generation find their voices The Voice of the Rising Generation will discuss the successors of family wealth and what they can do to keep focused on human capital rather than putting too much emphasis to the role of financial wealth"-- "This book explains the challenges that family wealth poses to the "rising generation" and shares strategies that help members of that generation find their voices"--…”
Libro electrónico -
37848por Zambon, Giulio. author“…But how are the clues generated? Where do those quasi-symmetrical configurations come from? …”
Publicado 2015
Libro electrónico -
37849Publicado 2013Tabla de Contenidos: “…-- How many samples should I include? -- How do I show published work? -- Should I include my sketchbooks? …”
Libro electrónico -
37850Publicado 2022Tabla de Contenidos: “…<P>Foreword</P><P>Preface </P><P>Acknowledgements</P><P>About the Author</P><P>Introduction</P><P></P><B><P>Part 1: New Age Selling: What it Takes to Sell in Today's Evolving Marketplace</P><P>Chapter 1: </P><P>What is an Unstoppable Sales Machine (and why do I need one)? </P><UL><UL></B><P><LI>The four things that are stopping your sales</LI><P></P><P><LI>Old school "feet on the street" selling is dead.…”
Libro electrónico -
37851por Pogodda, Cilli, author“…The fact that media technologies influence our feelings seems obvious. But how do digital cameras or MP3 players change how we perceive, feel, and emotionally assess the world? …”
Publicado 2022
Tesis -
37852Publicado 2022“…Bridging social contract theories, both mainstream and critical, and the experiences of informal workers - self-employed, wage employed and sub-contracted - this book sheds light on how many existing social contract models stigmatize informal workers and do not offer legal or social protection. Instead of ideologically driven 'top-down' calls to revitalize the social contract, it advocates for 'bottom-up' initiatives focused on the demands of the working poor in the informal economy. …”
Libro electrónico -
37853Publicado 2024Tabla de Contenidos: “…Testing for SQL injection -- Classic SQL injection -- Stacked SQL injection -- Union SQL injection -- Hidden union SQL injection -- Boolean SQL injection -- Exploiting SQL injection on a vulnerable API -- Testing for NoSQL injection -- Syntax injection -- Object injection -- Operator injection -- Exploiting NoSQL injection on crAPI -- Validating and sanitizing user input -- Input validation for user registration -- Sanitizing query parameters -- Validating file uploads -- Input validation for numeric input -- Sanitizing HTML input to prevent XSS attacks -- Summary -- Further reading -- Chapter 6: Error Handling and Exception Testing -- Technical requirements -- Identifying error codes and messages -- Fuzzing for exception handling vulnerabilities -- Leveraging error responses for information disclosure -- Summary -- Further reading -- Chapter 7: Denial of Service and Rate-Limiting Testing -- Technical requirements -- Testing for DoS vulnerabilities -- Getting to know Mockoon -- Interacting with Mockoon's endpoints -- Leveraging Scapy to attack Mockoon -- Mockoon with hping3 - initial tests -- Sending random data with hping3 -- Sending fragmented packets with hping3 -- Flooding Mockoon with hping3 packets -- Making the attack more interesting - the "fast" switch -- Identifying rate-limiting mechanisms -- Fixed window counters -- Rolling window logs -- Leaky buckets -- A rate-limiting detection lab -- Circumventing rate limitations -- Summary -- Further reading -- Part 4: API Advanced Topics -- Chapter 8: Data Exposure and Sensitive Information Leakage -- Technical requirements -- Identifying sensitive data exposure -- Elasticsearch and more -- ripgrep -- Testing for information leakage -- Preventing data leakage -- Summary -- Further reading -- Chapter 9: API Abuse and Business Logic Testing -- Technical requirements…”
Libro electrónico -
37854Publicado 2023Tabla de Contenidos:Libro electrónico
-
37855por Luis, de Granada, 1504-1588Accés Lliure
Publicado 1800
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
991005987609706719 -
37856
-
37857
-
37858
-
37859Publicado 1614Tabla de Contenidos: “…Contiene: Sermon predicado en la Santa Yglesia Cathedral de Malaga, en las honras del Ilustrissimo y Reverendissimo Señor Don Ian Alonso do Moscoso ... / por Fray Hyacinto de Colmenares, [36] p., con port. propia ; Sermon que predico el muy reverendo padre lector Fr. …”
Libro -
37860Publicado 1614Tabla de Contenidos: “…Contiene: Sermon predicado en la Santa Yglesia Cathedral de Malaga, en las honras del Ilustrissimo y Reverendissimo Señor Don Ian Alonso do Moscoso ... / por Fray Hyacinto de Colmenares, [36] p., con port. propia ; Sermon que predico el muy reverendo padre lector Fr. …”
Libro