Mostrando 174,321 - 174,340 Resultados de 175,000 Para Buscar '"B. S."', tiempo de consulta: 0.43s Limitar resultados
  1. 174321
    Publicado 2016
    “…Skill Level • Beginner What You Will Learn • Install and run the software used to develop Android apps • Read and write both Java and XML • Learn object- oriented programming fundamentals • Add interactivity to an app • Use abstraction and inheritance to simplify and reuse code • Create app layouts Who Should Take This Course b> • Anyone with an interest in learning Java or Android development, whether to simply tinker or start a new career Course Requirements • Basic computer knowledge (how to browse the web and install programs) • Ability to draw at a preschool level • No prior programming experience required Lesson Descriptions b> Lesson 1: Answering Common Questions Everyone who is beginning to learn to program has a lot of questions, and this lesson addresses the most common ones. …”
    Video
  2. 174322
    Publicado 2022
    “…Ambos instrumentos alcanzaron los coeficientes de Alpha de Cronbach de ,972 y de ,892 respectivamente garantizando su fiabilidad, los datos obtenidos fueron procesados estadísticamente obteniendo resultados descriptivos e inferenciales que permitieron llegar a la conclusión de que la competencia docente tiene una relación positiva, muy significativa y alta con la educación inclusiva debido a que el p valor es igual a ,000 y el Tau_ b de Kendall de ,556…”
    Libro electrónico
  3. 174323
    Publicado 2019
    “…TABLE OF CONTENTS THE MONOCHROMATIC VISION Past, Present, and Future Thinking in Black and White Contrast Color Implied The Tonal Landscape Visual Implication Seeing in Black and White Pre-Visualization Techniques Black and White Composition Framing Patterns and Lines Shape and Form High Key Low Key Shades of Gray Finding Monochromatic Subjects Black and White at Night Photographing People Portraiture in Black and White BLACK AND WHITE IN THE DIGITAL ERA Digital Black and White Roadmap The RAW Advantage Black and White in Adobe Camera RAW Black and White in Lightroom Grayscale Conversion Using Presets HSL Conversion Exposure Gradients and Adjustments Exporting Virtual Copies into Photoshop as Layers Multiple Layers and Masking in Photoshop Multi-RAW Processing in Photoshop Black and White in Photoshop Blending with Black Using the Channel Mixer Black & White Adjustment Layers Silver Efex Pro Topaz B&W Effects OnOne Perfect B&W The Digital Analog to the Analog Zone System Combining Conversions in Photoshop CREATIVE BLACK AND WHITE OPPORTUNITIES Lighting and Monochromatic Photos Creating High-Key Effects Creating Low-Key Effects HDR in Black and White Shooting for HDR Using HDR Software Toning and Tinting Tinting with a Black & White Adjustment Layer Split Toning The Ansel Adams Effect Selective Color Hand Coloring Using LAB Color Inverting the L Channel Equalizing LAB Channels Swapping Tonalities Using Blending Modes LAB Inversions Soft Focus Adding Soft Focus Pinhole Effect Solarization Using Curves to Solarize an Image Simulating the Blossfeldt Effect Duotone and Tritone Effects Adding and Reducing Noise Film Effects Infrared Camera Conversions Infrared Conversion without an IR Camera Creating X-Ray Images MOBILE BLACK AND WHITE Black and White using a Cell Phone Camera Worki..…”
    Libro electrónico
  4. 174324
    por Neef, Dale, 1959-
    Publicado 2001
    “…Neef begins with an up-to-the-minute overview of t he promise of B2B e-procurement in supporting globalized, extended enterprises. …”
    Libro electrónico
  5. 174325
    por Miller, Michael, 1958-
    Publicado 2013
    “…Squeeze all the confusion out of your content • Make sure you know just enough grammar and punctuation • Combine text and visuals to make them both work better • Choose the right delivery formats • Integrate your copy into an existing web page design • Work well with web designers and developers Detailed, expert guidance for writing: • Web pages • Online articles • Blog posts • Social media updates • Web ads • Email promos & newsletters • Online press releases • Online help & FAQs • Smartphone & tablet content • Web interfaces Michael Miller has written 100+ non-fiction books, including The Ultimate Web Marketing Guide ; B2B Digital Marketing; Using Google® AdWords and AdSense ; Using Google® Search ; The Complete Idiot’s Guide to Search Engine Optimization ; Sams Teach Yourself Google Analytics in 10 Minutes; and Facebook for Grown-Ups . …”
    Libro electrónico
  6. 174326
    Publicado 2005
    “…Taube & Ka-Wai Yiu, M. Waibel, A. Croissant, B. Dahm, H. Schneider, R. Seib and R. Jordan"…”
    Libro electrónico
  7. 174327
    Publicado 2023
    “…The final part teaches you about messaging and security, utilizing Azure App Configuration, Event Hubs, Service Bus, Key Vault, and Azure AD B2C for robust, secure applications. By the end of this book, you'll have mastered Azure's responsive infrastructure for exceptional applications. …”
    Libro electrónico
  8. 174328
    Publicado 2023
    “…Integrate advanced .NET application security with Azure AD and Azure AD B2C, enhancing your application's resilience. By the end of this course, you will be proficient in navigating Azure, provisioning and managing resources, building and deploying applications, optimizing data storage, and ensuring robust security. …”
    Video
  9. 174329
    Publicado 2000
    “…The central message of this collection of papers is: In order to understand how the brain operates as one integrated whole that generates cognition and behaviour, we need to reassemble the brain and mind and put all the conscious and non-conscious pieces back together again. (Series B)…”
    Libro electrónico
  10. 174330
    Publicado 1964
    “…Poldauf, Vladimir Skalička, B. Trnka, P. Trost, N. S. Troubetzkoy, and Josef Vachek…”
    Libro electrónico
  11. 174331
    Publicado 2022
    Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
    Libro electrónico
  12. 174332
    “…The author's purpose is (a) to make this philosophical aspect of his work better known, and (b) to communicate to readers who cannot read Russian the pleasure and interest of an "inspired" life as Pasternak experienced it…”
    Libro electrónico
  13. 174333
    “…Part of cohort 1 (cohort 1B) may be extended to include an F2 generation; in this case, procedures for F1 animals will be similar to those for the P animals…”
    Libro electrónico
  14. 174334
    por Bulka, Dov
    Publicado 2000
    “…With this book, you will have a valuable compendium of the best performance techniques at your fingertips. 0201379503B04062001…”
    Libro electrónico
  15. 174335
    “…Part of cohort 1 (cohort 1B) may be extended to include an F2 generation; in this case, procedures for F1 animals will be similar to those for the P animals…”
    Libro electrónico
  16. 174336
    por Roos, Robin M., 1969-
    Publicado 2003
    “…The companion CD-ROM includes the following JDO implementations:FastObjects, Kodo JDO, LiDO and OpenFusion JDO. 0321123808B08192002…”
    Libro electrónico
  17. 174337
    Publicado 2020
    “…This unique book will amuse and nudge business speakers as well as educate those who don’t yet speak B.S…”
    Libro electrónico
  18. 174338
    por Templar, Richard
    Publicado 2005
    “…Discover how to adapt your style to each team member... get people to bring solutions, not problems... create your own private game plan for success, complete with Plans “B” and “C”... capitalize on luck... manage stress and stay healthy... get respect... …”
    Libro electrónico
  19. 174339
    Publicado 2000
    “…The final three chapters by Cutting, Stanghellini, Schwartz and Wiggins represent anthropologically oriented attempts to situate pathologies of self-experience.(Series B)…”
    Libro electrónico
  20. 174340
    Publicado 2021
    “…She points out the possible influences of scientific personalities (P. G. Bogatyriov, B. Schier et al.), as well as the non-scientific circumstances that influenced Melicherčík's understanding of the subject, methods and instrumentalization of ethnography and folklore studies…”
    Libro electrónico