Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,658
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 357
- Música 348
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
37921Publicado 2024Tabla de Contenidos: “…-- 7.6 Conclusion -- 8: Metacognition -- 8.1 Introduction -- 8.2 Metacognition -- 8.3 Appraisal of Concepts -- 8.4 Reliability of Inference -- 8.5 Coherence in the Cognitive Playground -- 8.6 Conclusion -- Chapter Summary -- 8.1 Introduction -- 8.2 Metacognition -- 8.3 Appraisal of Concepts -- 8.4 Reliability of Inference -- 8.5 Coherence in the Cognitive Playground -- 8.6 Conclusion -- 9: Concluding Thoughts -- 9.1 Deliberating with Concepts: The Picture -- 9.2 Concepts Look Both Ways -- 9.3 Tokening a Concept -- 9.4 Doing in Thought -- 9.5 The Unreasonable Power of Human Cognition -- Chapter Summary -- 9.1 Deliberating with Concepts: The Picture -- 9.2 Concepts Look Both Ways -- 9.3 Tokening a Concept -- 9.4 Doing in Thought -- 9.5 The Unreasonable Power of Human Cognition -- Acknowledgements -- Figure Credits -- References -- Index…”
Libro electrónico -
37922por OECDTabla de Contenidos: “…. -- Some countries have improved information management systems and others plan to do so. -- Initiatives to share compliance assurance information with the public and to promote voluntary compliance -- Planned inspections are mostly set based on risk following newly adopted methodologies -- The use of self-monitoring mechanisms and Pollutant Release and Transfer Registers has expanded -- Some Eastern Europe and Caucasus countries plan to update their environmental penalties with the goal of increasing their dissuasive effect -- Work on environmental liability in the region is progressing to varying extents. -- Policy recommendations -- References -- 5 A focus on finance for green growth in EECCA -- Reforming fossil-fuel subsidies to promote transition towards a green economy in EECCA countries -- Key findings and data on fossil fuel subsidies in EECCA -- Policy recommendations -- Enhancing public financial management for green finance mobilisation in EECCA -- A crucial role for public financial management in promoting green economy transition -- Progress on, and remaining challenges to, developing and financing public investments towards a green economy…”
Publicado 2022
Libro electrónico -
37923Publicado 2021Tabla de Contenidos: “…Assets, Prosperity, and Data in Rural Africa -- Transforming Africa or Leaving Rural Areas Behind? -- How Do We Know about Rural Poverty? -- Assets in Rural Livelihoods -- Conclusion -- 3. …”
Libro electrónico -
37924Publicado 2024Tabla de Contenidos: “…-- Data flow diagrams -- Microsoft Threat Modeling Tool -- Identifying threats with STRIDE -- Spoofing -- Tampering -- Repudiation -- Information Disclosure -- Denial of Service -- Elevation of Privilege -- What are we going to do about it? -- Transferring threat risks -- Eliminating risks -- Accepting risks -- Mitigating risks -- Did we do a good job? …”
Libro electrónico -
37925Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - Getting Started -- Chapter 1: The Impact of Data Quality on Organizations -- The value of this book -- Importance of executive support -- Detailed definition of bad data -- Bad data versus perfect data -- Impact of bad data quality -- Quantification of the impact of bad data -- Impacts of bad data in depth -- Process and efficiency impacts -- Reporting and analytics impacts -- Compliance impacts -- Data differentiation impacts -- Causes of bad data -- Lack of a data culture -- Prioritizing process speed over data governance -- Mergers and acquisitions -- Summary -- References -- Chapter 2: The Principles of Data Quality -- Data quality in the wider context of data governance -- Data governance as a discipline -- Data governance tools and MDM -- How data quality fits into data governance and MDM -- Generally accepted principles and terminology of data quality -- The basic terms of data quality defined -- Data quality dimensions -- Stakeholders in data quality initiatives -- Different stakeholder types and their roles -- The data quality improvement cycle -- Business case -- Data discovery -- Rule development -- Monitoring -- Remediation -- Embedding into BAU -- Summary -- References -- Chapter 3: The Business Case for Data Quality -- Activities, components, and costs -- Activities in a data quality initiative -- Early phases -- Planning and business case phase -- Developing quantitative benefit estimates -- Example - the difficulty of calculating quantitative benefits -- Strategies for quantification -- Developing qualitative benefits -- Surveys and focus groups -- Outlining data quality qualitative risks in depth -- Anticipating leadership challenges -- The "Excel will do the job" challenge…”
Libro electrónico -
37926Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Today's Cloud Networks and Their Security Implications -- Chapter 1: How Do Enterprises Utilize and Implement Cloud Networks? …”
Libro electrónico -
37927por Connors, Christopher D.Tabla de Contenidos: “…Let Go of Control -- High-Performing Teams' "Core Four" -- Focus on the Moment -- Check the "Little Things" -- Commit to a Goal -- Control Attitude and Effort -- Chapter 5 Prioritization (Master the Art of Time Management and Strategy) -- Setting Yourself Up for Success -- Getting Clear on What Matters (and What Doesn't) with the Eisenhower Matrix -- Quadrant I: Urgent and Important (Do) -- Quadrant II: Not Urgent but Important (Plan) -- Quadrant III: Urgent but Not Important (Delegate) -- Quadrant IV: Not Urgent and Not Important (Eliminate) -- Putting Together the Quadrants -- The Classification of Your Time -- Having the Discipline for "Locking It In" -- Making Time for Strategy -- Prioritizing Time for Connection -- Habits and Flow -- Vision and Reflection -- Tools -- Chapter 6 Camaraderie (Create a Team-First Culture) -- Five Keys for Maximizing Leadership Connection -- Personalize Your Message: Speak to the Individual -- Presence in the Moment: Listen with Full Presence and Eliminate Distractions -- Make Your Passion Their Passion (and Make Their Passion Yours): Let Your Fire Shine Through -- Clarity: Make Your Messaging Clear-and Ask for It in Return -- The Unspoken Word: What You Don't Say Is Just asImportant as What You Do -- The Heartbeat of Your Organization: Celebrating the Wins -- The Championship Trio of Connection -- "He Knew the Names of My Kids": What Gifts Can You Give? …”
Publicado 2024
Libro electrónico -
37928por Jodidio, PhilipTabla de Contenidos: “…Conté: Emilio Ambasz: Banca dell'Occhio, Venice-Mestre, Italy; Emilio Ambasz: Ospedale dell'Angelo, Venice-Mestre, Italy; Alejandro Aravena: Saint Edward's University, Residence and Dining Hall, Austin, Texas, USA; Architektur & Landschaft: Lusatian Lakeland Landmark, Senftenberg, Germany; Asymptote: The Yas Hotel, Abu Dhabi, UAE; Atelier-Den / Inahara Archi-Lab: Sano Clinic Therapy Square, Fujinomiya, Shizuoka, Japan; Cecil Balmond: UPENN Weave Bridge, Philadelphia, Pennsylvania, USA; Charles Barclay: Kielder Observatory, Kielder, Northumberland, UK; Barkow Leibinger Architects: Marcus Prize Pavilion, Menomonee Valley, Milwaukee, Wisconsin, USA; Baumschlager Eberle: Nordwesthaus, Fussach, Vorarlberg, Austria; Big: The Mountain, Copenhagen, Denmark; Stefano Boeri: Former Arsenale La Maddalena, House of the Sea, La Maddalena, Sardinia, Italy; Byoung-Soo Cho: Three Box House, Paju, Gyeonggi-do, South Korea; Byoung-Soo Cho: Hanil Cement Information Center and Guesthouse, Pyeongdong-ri, Danyang-gun, South Korea; Santiago Calatrava: Liège-Guillemins TGV Station, Liège, Belgium; Giacomo Costa: The Chronicles of Time…”
Publicado 2001
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra)Libro -
37929por Jeffs, Warren, 1955-Tabla de Contenidos: “…Jesus Christ holy will to President of United States of America, new word of now need of just order to be of full now labor. Now do so. Amen. -- Chapter 8. Jesus Christ message of only peace holy power demonstrating to ruler order to make peace in holy way living -- Chapter 9 -- Proclamation chapter 1. …”
Publicado 2013
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de Pastoral Madrid, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto, Biblioteca Central de Capuchinos de España, Biblioteca del Seminario Diocesano de Jaén)Libro -
37930Tabla de Contenidos: “…Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? …”
Libro electrónico -
37931por OECDTabla de Contenidos: “…Methodology of calculation of indicators Type 1 and 2 -- Indicator Type 1 -- Indicator Type 2 -- Notes -- 3 Re-thinking Indonesia's FDI regime -- Summary and main recommendations -- Main policy recommendations -- Why do barriers to FDI matter for Indonesia? -- Despite significant liberalisation in the past, Indonesia's foreign investment regime remains quite restrictive -- Discriminatory measures against foreign investors harm domestic consumers, as well as firms in downstream industries -- Foreign equity restrictions are the most prevalent type of barrier to FDI, but other operational measures are unusually pervasive in Indonesia -- Stringent local content requirements in some sectors add to the hurdles of carrying foreign investments in Indonesia -- The Omnibus Law on Job Creation: market access issues for consideration -- Ambitious reforms are needed to bring Indonesia closer to ASEAN levels of FDI openness -- The impact of substantial FDI reforms can be sizeable -- Keeping the 'achievements' of the 2007 Investment Law -- References -- Annex 3.A. …”
Publicado 2020
Libro electrónico -
37932por Nomani, QamarTabla de Contenidos: “…-- Threat landscape and the importance of CSPM tools -- Key capabilities and core components of CSPM -- How do CSPM tools work? -- Common cloud misconfigurations and their causes -- Why do misconfigurations occur? …”
Publicado 2024
Libro electrónico -
37933por Frenzel, Louis E., JrTabla de Contenidos: “…-- What Type of Cell Phone Technology Do You Have? -- DIGITAL MODULATION AND WIRELESS TRANSMISSION METHODS -- What Type of Cell Phone Technology Do You Have? …”
Publicado 2018
Libro electrónico -
37934por Leblanc, RichardTabla de Contenidos: “…-- Practical Steps to Improve Your AI Governance -- About the Authors -- References -- Reports -- Standards -- Websites -- Notes -- Chapter 15 Fair Warning Has Been Given: What Do Directors Need to Do Now to Respond to Cyber Risk? …”
Publicado 2024
Libro electrónico -
37935Publicado 2017Tabla de Contenidos: “…-- Comparing the performance of wc.go and wc(1) -- Reading a text file character by character -- Doing some file editing! -- Interprocess communication…”
Libro electrónico -
37936por Braten, SteinTabla de Contenidos: “…-- Speculation on the selective advantage of learning by (m)other-centred mirroring -- When asked to do what the facing instructor is doing -- Face-to-face re-enactment of manual moves - a problem for subjects with autism -- On the background for speculations about possible neurosocial architecture -- May such an altercentric (mirror) system be operative already in human newborns? …”
Publicado 2009
Libro electrónico -
37937Publicado 2024Tabla de Contenidos:Libro electrónico
-
37938Publicado 2023Tabla de Contenidos: “…-- Doing automations without Home Assistant using Node-RED -- Installing and using Node-RED -- Recreating an automation using Node-RED…”
Libro electrónico -
37939Publicado 2023Tabla de Contenidos: “…The importance of good architectural design -- Scalability and elasticity -- Resilience and high availability -- Security and compliance -- Cost efficiency and maintainability -- Azure Virtual Network design -- Architecting VNets -- VNet peering -- Site-to-site VPN -- Point-to-site VPN -- ExpressRoute -- Azure Application Gateway -- Azure Storage design -- Storage design patterns -- Azure design patterns related to messaging -- Messaging patterns -- Azure Service Bus -- Azure Event Grid -- Functions as a service -- Azure Functions -- Azure Durable Functions -- Azure solution design best practices -- Performance -- Security -- Resilience -- Scalability/availability -- Cost management -- Summary -- Chapter 4: Azure Network Infrastructure and Design -- Core networking patterns -- Public facing -- Virtual network isolation -- Peering and network protection -- Hub and spoke -- Networking components -- Core network connectivity -- Traffic routing -- Enterprise network security -- Common cloud networking scenarios -- Enterprise networks -- Micro-segmentation -- Virtual Network Appliances (VNAs) and security perimeters -- Capacity planning -- Failover and disaster recovery -- Monitoring and troubleshooting -- Summary -- Chapter 5: Automating Architecture on Azure -- Introduction -- The importance of defining infrastructure using code -- Why do we need to consider automating architectures on Azure using IaC? …”
Libro electrónico -
37940Publicado 2024Tabla de Contenidos: “…Traditional Manufacturing (TM) -- Additive Manufacturing - Management/Other JPEO-Specific Considerations -- What Can DE Do for JPEO? -- What Does JPEO Need to Do to Prepare for DE in AM? …”
Libro electrónico