Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Artificial intelligence 204
- Historia 157
- History 156
- Management 110
- Development 96
- Engineering & Applied Sciences 95
- Computer networks 93
- Philosophy 75
- Application software 72
- Computer programs 72
- Data processing 71
- Computer Science 67
- Research & information: general 67
- Medicine 66
- Universidad Pontificia de Salamanca (España) 66
- Filosofía 60
- Machine learning 60
- Cloud computing 57
- Social aspects 56
- Agents tensioactius 52
- Technology: general issues 52
- Python (Computer program language) 50
- Intelligent agents (Computer software) 48
- Terapéutica farmacológica 48
- Computer security 47
- Security measures 47
- Agentes comerciales 44
- Derecho 44
- Prevention 44
- Treatment 44
-
5761
-
5762por Villalba Saló, Juan CarlosTabla de Contenidos: “…EL GRANIZO Y LA LLUVIA DE DARDOS -- 2.6. LOS ELEMENTOS COMO AGENTES DE LA DESTRUCCIÓN: VIENTO, TIERRA-ROCA, AIRE, FUEGO, RAYO -- 2.6.1. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5763por Carrillo Urrego, AbelardoTabla de Contenidos: “….) -- 3.2.6 FACTORES Y/O AGENTES MODERADORES O INTENSIFICADORES DE LOS CASTIGOS (...) -- 3.3 EL PAPEL DEL ORIGEN RURAL O URBANO EN LAS RELACIONES ENTRE PADRES, (...) -- 3.3.1 EL CUIDADO DE LAS HIJ AS Y LOS HIJOS -- 3.3.2 TRATO DIFERENCIADO HACIA LAS Y LOS HIJ OS POR PARTE DE LOS PADRES U (...) -- 3.3.3 DISCIPLINAMIENTO DE LAS HIJAS Y LOS HIJOS -- 3.3.4 LA PERCEPCIÓN DE LAS CAUSAS Y LOS MOTIVOS DE LOS CASTIGOS -- 3.4 VALORACIONES DE LAS PRÁCTICAS DISCIPLINARIAS QUE LOS PADRES LES (...)…”
Publicado 2020
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5764Publicado 2017Tabla de Contenidos: “…Referencias -- Interfaz predador-presa-ecosistema aplicado a un modelo teórico: helmintos asociados al oso de anteojos (Tremarctos ornatus) -- Generalidades de la especie -- Revisión de la dieta de origen animal consumida por el oso andino -- Patrones importantes para seguimiento del oso andino -- Estrategia para búsqueda de información -- Registros de helmintos en úrsidos -- Nematodos -- Cestodos -- Trematodos -- Acantocéfalos -- Géneros y especies compatibles con las presas del oso andino -- Especies priorizadas -- Conclusiones -- Agradecimientos -- Referencias -- Interfaz huésped-parásito-ecosistema: el caso de la nutria neotropical -- Nutria neotropical, un huésped de diversos helmintos -- Relación ser humano-nutria en el Bajo Sinú -- Conclusiones -- Agradecimientos -- Referencias -- Potencialidades para aproximarse a la historia natural de garrapatas de un ecosistema de la subregión de la altillanura (Orinoquía) con ocurrencia previa de síndrome febril en humanos -- Generalidades -- Caracterización de la altillanura -- Desarrollo agropecuario de la altillanura -- Desarrollos de investigación en la altillanura -- Perspectivas de investigación en la altillanura -- Investigación, planes de desarrollo departamentales y Conpes en la altillanura -- Rickettsiosis como enfermedad transmitida por garrapatas -- Garrapatas y rickettsiosis -- Conclusiones -- Agradecimientos -- Referencias -- Los macro- y microparásitos registrados para pecaríes y su importancia en la interfaz con especies de producción -- Interacción pecarí-cerdo-humano -- Estrategia para búsqueda de información -- Agentes infecciosos en pecaríes -- Macroparásitos -- Garrapatas -- Ácaros -- Piojos -- Pulgas -- Hongos -- Nematodos -- Microparásitos -- Bacterias -- Virus -- Protozoos -- Conclusiones -- Referencias -- Parte 4. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
5765Publicado 2022Tabla de Contenidos: “…Sources of Information -- Using Automated Tools -- Interpretations -- The Effect of an Inability to Obtain Evidential Matter Relating to Income Tax Accruals -- Auditor of Participating Employer in a Governmental Cost-Sharing Multiple-Employer Pension Plan -- Auditor of Participating Employer in a Governmental Agent Multiple-Employer Pension Plan -- Chapter 16 AU-C 501 Audit Evidence-Specific Considerations for Selected Items -- Technical Alert -- Scope -- Objectives of AU-C Section 501 -- Definition of Term -- Requirements-Investments in Securities and Derivative Instruments -- Required Risk Assessment in Planning -- Assessing Inherent Risk for an Assertion about a Derivative Instrument or a Security -- Control Risk Assessment -- The Effect of a Service Organization on Audit Approaches and Procedures for Securities and Derivative Instruments -- Designing Auditing Procedures -- Importance of Identifying and Testing Controls -- Designing Substantive Procedures Based on Risk Assessment -- Completeness Assertion for Derivatives -- Valuation -- Additional Considerations Related to Gathering Evidential Matter about Hedging Activities -- Special Skill or Knowledge Might Be Needed to Plan or Perform Auditing Procedures Related to Derivatives or Securities1 -- Illustrations-Investments in Securities and Derivative Instruments -- Requirements-Inventory Existence and Condition -- Practice Alert -- Timing and Extent of Inventory Observation -- Inventory Held by a Third Party -- Steps in the Observation of Inventory -- Planning the Physical Inventory -- Taking the Physical Inventory -- Outside Inventory-Taking Firm -- Inventory Observation Checklist -- AU-C 501 Illustrations-Inventory Observation -- Requirements-Litigation, Claims, and Assessments Involving the Entity -- Accounting Considerations -- Audit Procedures Other Than Inquiry of Lawyers…”
Libro electrónico -
5766Publicado 2018Tabla de Contenidos: “…Increasing predictability -- Controlling the target's environment -- Casting doubt -- Making the target powerless -- Punishing the target -- Intimidation -- Positive manipulation tips and tactics -- Summary -- Chapter 4: Information Gathering -- Introduction -- Gathering information about targets -- Technical information-gathering methods -- BasKet -- Dradis -- Websites -- Search engines -- Pipl -- Whois.net -- Social media -- Phishing and spear phishing -- Watering holes -- Blogs -- Telephone -- Nontechnical methods -- Dumpster diving -- Intrusion and impersonation -- Tailgating -- Shoulder surfing -- Observation -- Tips -- Summary -- Chapter 5: Targeting and Recon -- Introduction -- Banks -- Old organizations -- Organizational employees -- IT personnel -- Customer support agents -- Senior-level staff -- Finance personnel -- Elderly people -- Well-wishers -- Tips -- Summary -- Chapter 6: Elicitation -- Introduction -- Getting into conversations with strangers -- Preloading -- Avoiding elicitation -- Appealing to egos -- Showing mutual interest -- Falsifying statements -- Flattering -- Volunteering information -- Assuming knowledge -- Using ignorance -- Capitalizing on alcoholic drinks -- Being a good listener -- Using intelligently-posed questions -- Assumptive questions -- Bracketing -- Learning the skill of elicitation -- Tips -- Summary -- Chapter 7: Pretexting -- Introduction -- Principles and planning of pretexting -- Doing research -- Google hacking -- The power of Google hacking -- Feedback from the victims -- Google hacking secrets -- Operators -- Using personal interests -- Practicing dialects -- Using phones -- Choosing simple pretexts -- Spontaneity -- Providing logical conclusions -- Successful pretexting -- HP information leak -- Stanley Rifkin -- DHS hack -- Internal Revenue Service scams -- Phone calls -- Emails…”
Libro electrónico -
5767Publicado 2022Tabla de Contenidos: “…Environmental Controls -- Hot and Cold Aisles -- Fire Suppression -- Water-Based Fire Suppression Systems -- Halon-Based Fire Suppression Systems -- Clean-Agent Fire Suppression Systems -- Handheld Fire Extinguishers -- Fire Detection Devices -- Electromagnetic Environment -- Power Protection -- UPS -- Backup Power and Cable Shielding -- Generator -- Dual Supply -- Managed Power Distribution Units (PDUs) -- Drones/UAVs -- Chapter 8 Review -- Chapter 9 Network Fundamentals -- Network Architectures -- Network Topology -- Wireless -- Ad Hoc -- Segregation/Segmentation/Isolation -- Physical Separation -- Enclaves -- Logical (VLAN) -- Virtualization -- Airgaps -- Zones and Conduits -- Zero Trust -- Security Zones -- DMZ -- Internet -- East-West Traffic -- Intranet -- Extranet -- Wireless -- Guest -- Honeynets -- Flat Networks -- Network Protocols -- Protocols -- Packets -- Internet Protocol -- IP Packets -- TCP vs. …”
Libro electrónico -
5768Publicado 2009Tabla de Contenidos: “…Questions and Exercises -- Chapter 4: Formulation of Research Problems -- Introduction -- Approaches to Management Research Problem -- Management Problem is Posed to the Researcher -- Investigation of an Idea by an Experienced Researcher -- Pilot Study -- Initiatiation of a Novice/Student to Research -- Exploration for Problem Identification -- Literature Survey -- System Study -- Errors of Problem Identification in Research -- Hypothesis Generation -- Introduction -- Variables -- Characteristics of a Good Hypothesis -- Origins of a Hypothesis -- Process of Hypothesis Generation -- Hypothesis Generation Using Qualitative Methods -- Formulation of The Problem -- Model Building Context -- Decision Maker and His Objectives -- Environment -- Alternative Courses of Action -- Scenarios and Structural Modelling -- Interpretive Structural Modelling (ISM) -- Formulation of Effectiveness Function -- Summary -- Annexure 4.1-An Example of Taxonomy -- Annexure 4.2-An Example for Meta Analysis -- Annexure 4.3-An Illustrative Example of Theoretical Framework -- Annexure 4.4-Examples of Hypothesis Generation -- Annexure 4.5-System Study and Problem Formulation-Allocation of Assembly Manpower (Karthikeyan 1986) -- Annexure 4.6 -- Suggested Readings -- Questions and Exercises -- Chapter 5: Research Proposal -- Research Proposal -- Purpose of a Research Proposal -- Types of Research Proposals -- Development of the Proposals -- Formatting the Research Proposal -- Contents of the Research Proposal -- Requirements of the Sponsoring Agent -- Evaluation of Research Proposals -- Some Implicit Considerations -- Summary -- Annexure 5.1-Sample (Real) Research Proposal (Krishnaswamy et al, 1997) -- Suggested Readings -- Questions and Exercises -- Part C: Research Design-Types of Research -- Chapter 6: Experimental Research -- Experimental Research -- Principles of Experiment…”
Libro electrónico -
5769Publicado 2017Tabla de Contenidos: “…. -- Blocking malicious user agents -- How to do it... -- How it works... -- There's more... -- Redirecting all calls to HTTPS to secure your site -- How to do it... -- There's more... -- See also -- Redirecting pages and directories -- How to do it... -- Single page redirect -- Full directory redirect -- How it works... -- See also -- Redirecting 404 errors through a search page -- How to do it... -- How it works... -- Chapter 7: Reverse Proxy -- Introduction…”
Libro electrónico -
5770Publicado 2023Tabla de Contenidos: “…Preparing Team Members for Change -- Change management in a traditional environment -- Change management in an agile environment -- Chapter 5 Understanding What Requirements Truly Entail -- Defining Needs -- Business needs -- Stakeholder needs -- Defining Requirements -- Business requirements -- Stakeholder requirements -- Using stakeholder analysis to identify stakeholder requirements -- When requirements collide: Addressing conflict between stakeholder requirements -- Solution requirements -- Using a vision statement to define the solution -- Breaking your solution requirements into categories -- Transition requirements -- Technology requirements -- Technology (technical) requirements for the solution -- Technology requirements for the business -- Making Your Requirements Excellent -- Complete -- Correct -- Unambiguous -- Verifiable -- Necessary -- Feasible -- Prioritized -- Focusing on the Four Core Components -- Data -- Entities -- Attributes -- Relationships -- Process (use cases) -- External agents and actors -- Business rules -- Facing the special challenges of discovering business rules -- Considering cardinality for business rules -- Chapter 6 Hunting for the Right Information, Part 1: The Process -- Elicit, Don't Gather: Developing the Right Questions -- Identifying the type of question you want to ask -- "What" questions -- "Who" questions -- "Why" questions -- "Where" questions -- "When" questions -- "How" questions -- Identifying appropriate sources of information -- Choosing an Approach -- Using Clear, Consistent Language -- Choosing terms consistently -- Using language that's consistent with the company's language -- Framing questions that clearly reveal core needs -- Planning Your Elicitation Sessions -- Elicitation in an Agile Team -- Chapter 7 Hunting for the Right Information, Part 2: The Techniques…”
Libro electrónico -
5771Publicado 2022Tabla de Contenidos: “…-- Registering for the Exam -- About the CISSP Examination -- After the Examination -- Chapter 2 Putting Your Certification to Good Use -- Networking with Other Security Professionals -- Being an Active (ISC)2 Member -- Considering (ISC)2 Volunteer Opportunities -- Writing certification exam questions -- Speaking at events -- Helping at (ISC)2 conferences -- Reading and contributing to (ISC)2 publications -- Supporting the (ISC)2 Center for Cyber Safety and Education -- Participating in bug-bounty programs -- Participating in (ISC)2 focus groups -- Joining the (ISC)2 community -- Getting involved with a CISSP study group -- Helping others learn more about data security -- Becoming an Active Member of Your Local Security Chapter -- Spreading the Good Word about CISSP Certification -- Leading by example -- Using Your CISSP Certification to Be an Agent of Change -- Earning Other Certifications -- Other (ISC)2 certifications -- CISSP concentrations -- Non-(ISC)2 certifications -- Choosing the right certifications -- Finding a mentor, being a mentor -- Building your professional brand -- Pursuing Security Excellence -- Part 2 Certification Domains -- Chapter 3 Security and Risk Management…”
Libro electrónico -
5772Publicado 2023Tabla de Contenidos: “…Managing Roles in Microsoft 365 and Azure AD -- Planning for Role Assignments -- Managing Roles in the Microsoft 365 Admin Center -- Managing Role Groups for Microsoft Defender, Microsoft Purview, and Microsoft 365 Workloads -- Microsoft Defender -- Microsoft Purview -- Microsoft 365 Workloads -- Managing Administrative Units -- Creating Administrative Units -- Viewing and Updating Administrative Units -- Planning and Implementing Privileged Identity Management -- Creating a Role Assignment -- Reviewing Role Assignments -- Alerting -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 4: Implementing and Managing Identity Synchronization with Azure AD -- Preparing for Identity Synchronization by Using IdFix -- Configuring and Managing Directory Synchronization by Using Azure AD Connect -- Planning and Sizing -- Installing the Synchronization Service -- Configuring Azure AD Connect Filters -- Domain and Organizational Unit-Based Filtering -- Group-Based Filtering -- Attribute-Based Filtering -- Monitoring Synchronization by Using Azure AD Connect Health -- Azure AD Connect Health -- Azure AD Connect Health for Sync -- Azure AD Connect Health for Directory Services -- Azure AD Connect Health for Active Directory Federation Services -- Troubleshooting Azure AD Connect Synchronization -- Configuring and Managing Directory Synchronization by Using Azure AD Connect Cloud Sync -- Installing the Provisioning Agent -- Configuring the Provisioning Service -- Customizing the Provisioning Service -- Scoping Filters -- Attribute Mapping -- Troubleshooting Azure AD Connect Cloud Sync Synchronization -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 5: Implementing and Managing Authentication -- Implementing and Managing Authentication Methods -- Choosing an Authentication Mechanism -- Windows Hello for Business…”
Libro electrónico -
5773Publicado 2017Tabla de Contenidos: “…. -- See also -- Automating tasks with the scripting agent -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using multiple cmdlets with the OnComplete API -- See also -- Scripting an Exchange server installation -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 3: Managing Recipients -- Introduction -- Performing some basic steps -- Creating, modifying, and removing mailboxes -- How to do it... -- How it works... -- There's more... -- Setting Active Directory attributes -- See also -- Working with contacts -- How to do it... -- How it works... -- There's more... -- See also -- Managing distribution groups -- How to do it... -- How it works... -- There's more... -- See also -- Managing resource mailboxes -- How to do it... -- How it works... -- There's more... -- Converting mailboxes -- See also -- Creating recipients in bulk using a CSV file -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
5774Publicado 2017Tabla de Contenidos: “…-- 3-way handshake -- Modes of firewall -- Stateful packet inspection -- Stateless packet inspection -- Architecting firewall rules -- The deny all and allow some approach -- The allow all and deny some approach -- Firewall justification document -- A sample firewall justification document -- Inbound rules -- Outbound rules -- Tracking firewall changes with alarms -- Best practices -- Application layer security -- Intrusion Prevention Systems -- Overview architecture of IPS -- IPS in a cloud environment -- Implementing IPS in the cloud -- Deep Security -- Anti-malware -- Application control -- The IPS functionality -- A real-world example -- Implementation -- Advantages that IPS will bring to a cloud environment -- A web application firewall -- Architecture -- Implementation -- Network segmentation -- Understanding a flat network -- Segmented network -- Network segmentation in cloud environments -- Segmentation in cloud environments -- Rule of thumb -- Accessing management -- Bastion hosts -- The workings of bastion hosts -- The workings of SSH agent forwarding -- Practical implementation of bastion hosts -- Security of bastion hosts -- Benefits of bastion hosts -- Disadvantages of bastion hosts -- Virtual Private Network -- Routes - after VPN is connected -- Installation of OpenVPN -- Security for VPN -- Recommended tools for VPN -- Approaching private hosted zones for DNS -- Public hosted zones -- Private hosted zones -- Challenge -- Solution -- Summary -- Chapter 4: Server Hardening -- The basic principle of host-based security -- Keeping systems up-to-date -- The Windows update methodology -- The Linux update methodology -- Using the security functionality of YUM…”
Libro electrónico -
5775Publicado 2018Tabla de Contenidos: “…Basic post-exploitation commands -- The help menu -- The background command -- Reading from a channel -- File operation commands -- Desktop commands -- Screenshots and camera enumeration -- Advanced post-exploitation with Metasploit -- Obtaining system privileges -- Changing access, modification, and creation time with timestomp -- Additional post-exploitation modules -- Gathering wireless SSIDs with Metasploit -- Gathering Wi-Fi passwords with Metasploit -- Getting the applications list -- Gathering Skype passwords -- Gathering USB history -- Searching files with Metasploit -- Wiping logs from the target with the clearev command -- Advanced extended features of Metasploit -- Using pushm and popm commands -- Speeding up development using the reload, edit, and reload_all commands -- Making use of resource scripts -- Using AutoRunScript in Metasploit -- Using the multiscript module in AutoRunScript option -- Privilege escalation using Metasploit -- Finding passwords in clear text using mimikatz -- Sniffing traffic with Metasploit -- Host file injection with Metasploit -- Phishing Windows login passwords -- Summary and exercises -- Chapter 9: Evasion with Metasploit -- Evading Meterpreter using C wrappers and custom encoders -- Writing a custom Meterpreter encoder/decoder in C -- Evading intrusion detection systems with Metasploit -- Using random cases for fun and profit -- Using fake relatives to fool IDS systems -- Bypassing Windows firewall blocked ports -- Using the reverse Meterpreter on all ports -- Summary and exercises -- Chapter 10: Metasploit for Secret Agents -- Maintaining anonymity in Meterpreter sessions -- Maintaining access using vulnerabilities in common software -- DLL search order hijacking -- Using code caves for hiding backdoors -- Harvesting files from target systems -- Using venom for obfuscation…”
Libro electrónico -
5776
-
5777Publicado 2022Tabla de Contenidos: “…Intro -- inside front cover -- Getting Started with Natural Language Processing -- Copyright -- dedication -- contents -- front matter -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A road map -- About the code -- liveBook discussion forum -- Other online resources -- about the author -- about the cover illustration -- 1 Introduction -- 1.1 A brief history of NLP -- 1.2 Typical tasks -- 1.2.1 Information search -- 1.2.2 Advanced information search: Asking the machine precise questions -- 1.2.3 Conversational agents and intelligent virtual assistants -- 1.2.4 Text prediction and language generation -- 1.2.5 Spam filtering -- 1.2.6 Machine translation -- 1.2.7 Spell- and grammar checking -- Summary -- Solution to exercise 1.1 -- 2 Your first NLP example -- 2.1 Introducing NLP in practice: Spam filtering -- 2.2 Understanding the task -- 2.2.1 Step 1: Define the data and classes -- 2.2.2 Step 2: Split the text into words -- 2.2.3 Step 3: Extract and normalize the features -- 2.2.4 Step 4: Train a classifier -- 2.2.5 Step 5: Evaluate the classifier -- 2.3 Implementing your own spam filter -- 2.3.1 Step 1: Define the data and classes -- 2.3.2 Step 2: Split the text into words -- 2.3.3 Step 3: Extract and normalize the features -- 2.3.4 Step 4: Train the classifier -- 2.3.5 Step 5: Evaluate your classifier -- 2.4 Deploying your spam filter in practice -- Summary -- Solutions to miscellaneous exercises -- 3 Introduction to information search -- 3.1 Understanding the task -- 3.1.1 Data and data structures -- 3.1.2 Boolean search algorithm -- 3.2 Processing the data further -- 3.2.1 Preselecting the words that matter: Stopwords removal -- 3.2.2 Matching forms of the same word: Morphological processing -- 3.3 Information weighing -- 3.3.1 Weighing words with term frequency…”
Libro electrónico -
5778Publicado 2022Tabla de Contenidos: “…Macroscopic Simulation -- 4.7.2.1. Agent-Based Simulation (ABS) -- 4.7.2.2. Object-Based Simulation (OBS) -- 4.8. …”
Libro electrónico -
5779Publicado 2023Tabla de Contenidos: “…Cover -- Copyright -- Table of Contents -- Preface -- Chapter 1 : Blockchain 101 -- The growth of blockchain technology -- Progress towards maturity -- Rising interest -- Distributed systems -- CAP theorem -- PACELC theorem -- The history of blockchain -- Bitcoin -- Electronic cash -- Introducing blockchain -- Blockchain architecture -- Blockchain by layers -- Blockchain in business -- Generic elements of a blockchain -- Blockchain functionality -- Benefits and features of blockchain -- Limitations of blockchain technology -- Types of blockchain -- Distributed ledgers -- Shared ledger -- Public blockchains -- Private blockchains -- Semi-private blockchains -- Permissioned ledger -- Fully private and proprietary blockchains -- Tokenized blockchains -- Tokenless blockchains -- Layer 1 blockchains -- Monolithic and polylithic blockchains -- Layer 2 blockchains -- Sidechains -- Summary -- Chapter 2 : Decentralization -- Introducing decentralization -- Methods of decentralization -- Disintermediation -- Contest-driven decentralization -- Quantifying decentralization -- Benefits of decentralization -- Evaluating requirements -- Full-ecosystem decentralization -- Storage -- Communication -- Computing power -- Decentralization in practice -- Smart contracts -- Autonomous agents -- Decentralized organizations -- Decentralized autonomous organizations -- Decentralized autonomous corporations -- Decentralized autonomous societies -- Decentralized applications -- Criteria for a DApp -- Operations of a DApp -- Design of a DApp -- Innovative trends -- Decentralized web -- Web 1 -- Web 2 -- Web 3 -- Summary -- Chapter 3 : Symmetric Cryptography -- Introducing cryptography -- Services provided by cryptography -- Cryptographic primitives -- Keyless primitives -- Random numbers -- Hash functions -- Symmetric key primitives -- Message authentication codes…”
Libro electrónico -
5780Publicado 2024Tabla de Contenidos: “…Segmentation beyond the surface -- Refining targeting strategies -- Predictive analysis - the game-changer -- Dynamics 365 - a bedrock of quality data -- Real-world impact - a clothing brand case study -- Predictive lead scoring and opportunity management -- Anatomy of predictive lead scoring in Dynamics 365 AI -- The transformative nature of predictive scoring in sales -- Holistic opportunity management with Dynamics 365 AI -- Deep dive into predictive analysis and its implications -- An illustration of predictive lead scoring -- Personalization and recommendation engines for sales effectiveness -- Data-driven personalization in Dynamics 365 AI -- Recommendation engines - beyond the obvious -- Feedback loops and iterative refinement -- Personalization in action - a real-world glimpse -- Examples -- Example 1 - ElevateApparel's customer segmentation triumph -- Example 2 - ProTech Solutions and the predictive power -- Example 3 - NovelReads' personalized book journey -- Limitations and pitfalls of using AI for sales -- Summary -- Questions -- Answers -- Chapter 4: Driving Customer Service Excellence with Dynamics 365 AI -- Enhancing customer experience with virtual agents and chatbots -- The mechanics of continuous learning -- Feedback loops and data analysis -- Example of adaptation in action -- Training with synthetic data -- Real-time performance adjustments -- Evolving with consumer trends -- Integration with human feedback -- AI-powered sentiment analysis and customer sentiment tracking -- Technical aspects of sentiment analysis -- ML for enhanced sentiment detection -- Real-time sentiment tracking and response adaptation -- Predictive analytics in sentiment analysis -- Sentiment analysis for personalized marketing -- Data-driven strategy adjustments -- Challenges and ethical and security considerations…”
Libro electrónico