Mostrando 7,161 - 7,180 Resultados de 13,603 Para Buscar '"Beyonder"', tiempo de consulta: 0.20s Limitar resultados
  1. 7161
    por Cheng, Tai-Heng
    Publicado 2012
    Tabla de Contenidos: “…Conclusion -- Chapter Nine: Law Beyond Laws -- I. Reframing Debates -- II. Situating Among Theories -- III. …”
    Libro
  2. 7162
    Publicado 2015
    Tabla de Contenidos: “…The Romanian PhD students at CERN: the Bologna Process and Beyond. Alexandru Nicolin, Florin Buzatu -- Part VII Quality Assurance -- 7. …”
    Libro electrónico
  3. 7163
    Publicado 2017
    Tabla de Contenidos: “…-- 10.3 To Singularity and Beyond -- Chapter 11 Deep-Dives (Case Studies) -- 11.1 Hitting the TV Screen -- IPTV/Hybrid TV and OTT -- 11.1.1 The Taxonomy of OTT Video -- 11.1.2 Arqiva Connect and Freeview Plus -- 11.2 Creating Nasdaq's Cloud-Based Virtual Workflow -- 11.2.1 The Genesis of a Virtual Workflow -- 11.2.2 The Technology Behind the Workflow -- 11.2.3 Why Amazon EC2? …”
    Libro electrónico
  4. 7164
    Publicado 2022
    Tabla de Contenidos: “…More Payloads -- Ransomware as a Service -- Typical Ransomware Process and Components -- Infiltrate -- After Initial Execution -- Dial-Home -- Auto-Update -- Check for Location -- Initial Automatic Payloads -- Waiting -- Hacker Checks C&amp -- C -- More Tools Used -- Reconnaissance -- Readying Encryption -- Data Exfiltration -- Encryption -- Extortion Demand -- Negotiations -- Provide Decryption Keys -- Ransomware Goes Conglomerate -- Ransomware Industry Components -- Summary -- Chapter 2 Preventing Ransomware -- Nineteen Minutes to Takeover -- Good General Computer Defense Strategy -- Understanding How Ransomware Attacks -- The Nine Exploit Methods All Hackers and Malware Use -- Top Root-Cause Exploit Methods of All Hackers and Malware -- Top Root-Cause Exploit Methods of Ransomware -- Preventing Ransomware -- Primary Defenses -- Everything Else -- Use Application Control -- Antivirus Prevention -- Secure Configurations -- Privileged Account Management -- Security Boundary Segmentation -- Data Protection -- Block USB Keys -- Implement a Foreign Russian Language -- Beyond Self-Defense -- Geopolitical Solutions -- International Cooperation and Law Enforcement -- Coordinated Technical Defense -- Disrupt Money Supply…”
    Libro electrónico
  5. 7165
    Publicado 2014
    Tabla de Contenidos: “…Taking It a Level Up -- Build configuration templates -- Creating templates from scratch -- Creating build configurations from the template -- Creating templates from existing build configurations -- Going meta with Meta-Runners -- Using Meta-Runners -- Build result actions -- Commenting on build results -- Tagging build results -- Pinning build results -- Promoting builds -- Marking the build as successful or failed -- Removing builds -- Build history cleanup -- Cleanup rules -- Archiving projects -- Configuring build priorities -- Interacting with TeamCity from build scripts -- Service messages -- Creating teamcity-info.xml -- Summary -- 11. Beyond CI - Continuous Delivery -- What is Continuous Delivery? …”
    Libro electrónico
  6. 7166
    Publicado 2019
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Notes on Contributors -- Preface -- PART I: Classic Approaches -- Chapter 1: Experimental Research Methods in Consumer Psychology -- Types of Variables -- Types of Validity -- Common Mistakes -- References -- Chapter 2: Surveys, Experiments, and the Psychology of Self-Report -- Surveys and Experiments -- Answering Questions: Participants' tasks -- Reporting on Behaviors and Experiences -- Reporting on Attitudes and Preferences -- Coda -- Acknowledgments -- References -- Chapter 3: Beyond the Lab: Using Data from the Field to Increase Research Validity -- How Can Researchers Provide the Most Robust Research Findings? …”
    Libro electrónico
  7. 7167
    Publicado 2024
    Tabla de Contenidos: “…-- Exploring different types of analytics -- Descriptive analytics -- Diagnostic analytics -- Predictive analytics -- Prescriptive analytics -- Walking through the maze of tools and techniques -- Beyond simple pivot tables -- Why Python? -- Modern challenges in the world of privacy-centric marketing -- The importance of data engineering and tracking -- Don't moonlight as a data engineer -- Web tracking is hard, and it is becoming harder -- Summary -- References -- Chapter 2: Extracting and Exploring Data with Singer and pandas -- Technical requirements -- What is ETL, and why should you care? …”
    Libro electrónico
  8. 7168
    Publicado 2002
    Tabla de Contenidos: “…Machine generated contents note: Introduction: Beyond Human Resource Management 1 1. The Cross-Cultural Organization: The Multicultural Model 13 Swedish culture and people management - IKEA: managing cultural differences - The multicultural model - Cultural values - Other cultural dimensions - Some reflections on the cross-cultural organization - Spanish culture and work values - People management in Spain - IKEA in Spain - Implications for managers - An agenda for research. 2. …”
    Acceso restringido con credenciales, usuarios UPSA
    Libro electrónico
  9. 7169
    por Jackson, T. H.
    Publicado 2002
    Tabla de Contenidos: “…Machine generated contents note: Introduction: Beyond Human Resource Management 1 1. The Cross-Cultural Organization: The Multicultural Model 13 Swedish culture and people management - IKEA: managing cultural differences - The multicultural model - Cultural values - Other cultural dimensions - Some reflections on the cross-cultural organization - Spanish culture and work values - People management in Spain - IKEA in Spain - Implications for managers - An agenda for research. 2. …”
    Enlace del recurso
    Libro electrónico
  10. 7170
    por Esparza Leibar, Inaki
    Publicado 1995
    Tabla de Contenidos: “…Prueba más allá de toda duda razonable/Proof beyond a reasonable doubt; 4. Derecho a un juicio con jurado/Right to jury trial…”
    Libro electrónico
  11. 7171
    Publicado 2013
    Tabla de Contenidos: “…Creating the New University - Glenn Withers -- 49. Beyond 'Dialogues of the Deaf': Re-imagining policing and security research for policy and practice - Simon Bronitt -- 50. …”
    Libro electrónico
  12. 7172
    Publicado 2020
    Tabla de Contenidos: “…-- Housing and Aloha ʻĀina: Beyond Building Our Way Out of the Crisis -- No Kākou Ke Kuleana: The Responsibility Belongs to Us -- Technology, Entrepreneurship, and Waiwai -- Ulu Kukui O Kaulike: Advancing Justice for Kānaka Maoli in One Generation Through Health Policy -- Shine Your Light Wherever You Go -- Puʻuhonua o Puʻuhuluhulu University: He Kīpuka Aloha ʻĀina no ka ʻImi Naʻauao -- Haumāna -- Ancient Is Modern—Transforming Public Education for Hawaiians -- Writing in the Path of Our Ancestors: Ke Ea Hawaiʻi Student Council -- The Next Aloha ʻĀina -- Hāmākua 2120: A Moʻolelo of Abundance from a Future -- Dear Reader: Making the Value of Hawaiʻi Together…”
    Libro electrónico
  13. 7173
    por McGee, Glenn, 1967-
    Publicado 2012
    Tabla de Contenidos: “…; Case 43 Docu-Medical Shows Lack Reality; Caution 8: You Aren't Dead Until Someone Tells You So; Case 44 Redefining Retirement: Beyond Rest and Recreation; Case 45 Medicare Is Going South: What Do We Owe the Aging?…”
    Libro electrónico
  14. 7174
    Publicado 2018
    Tabla de Contenidos: “…-- Creating the project with paid assets -- Installing and building OpenCV -- Downloading OpenCV -- [Configuring the CMake and OpenCV source files] -- Configuring the CMake and OpenCV source files -- OpenCV with Unity -- OpenCV and Unity -- Summary -- Questions -- Further reading -- Chapter 8: To the HoloLens and Beyond -- What is Mixed Reality, and how does it work? …”
    Libro electrónico
  15. 7175
    Publicado 2022
    Tabla de Contenidos: “…-- 1 Things Rainmakers Do That Most of Us Don't: The Five Rainmaker Skills: Universities Don't Teach Us and Our Firms Don't Train Us -- 2 How Clients Buy: Understanding the Client's Buying Decision Journey -- 3 Where Clients Come From: Understanding the Key Client Pathways -- 4 Rainmaking for Introverts and People Who Don't Want to Sell: Winning Client Business While Being True to Yourself -- The Five Skills We Must Learn If We Want to Become a Rainmaker -- Skill 1: Create Your Personal Brand Identity -- 5 Decide What You Want to Be Known for and Who You Wish to Serve: You Can Be Known for Anything, But You Can't Be Known for Everything -- 6 The Power of Focus: The Key to Being Remembered -- 7 Choosing Your Specialty: Shrink the Pond Until You're a Big Fish -- 8 You Can't Sell Beyond Your Credibility Zone: The Cautionary Tale of EDS -- Skill 2: Demonstrate Your Professional Expertise -- 9 How Clients Tell Who the Real Experts Are: Clients Need Clues That We Are Really Good at What We Do -- 10 How to Toot Your Own Horn without Looking Like a Jerk: Proven Techniques for Demonstrating Your Expertise -- 11 Using LinkedIn to Build Your Credibility: It Won't Make the Cash Register Ring, So What's It Good For? …”
    Libro electrónico
  16. 7176
    por Iyer, Balaji
    Publicado 2022
    Tabla de Contenidos: “…Google Workspace security center -- Security Health -- Security dashboard -- Security investigation tool -- Data loss prevention -- Creating a rule from a template -- Alert center -- Segregation of data by regions -- Endpoint management -- Mobile management -- Automated device management -- Reports -- Summary -- Part 3: Data Integrations -- Chapter 5: Beyond Workspace -- Google Classroom -- Enabling Google Classroom -- Managing Google Classroom settings -- Grades and rosters -- Student unenrollment -- Google workspace Marketplace apps -- Managing Marketplace apps -- Add-ons for Google Workspace services -- Access control for third-party applications -- Google Assistant for Google Workspace -- Nest Hub -- Enabling the Search and Assistant service -- Using third-party clients -- Enabling access for mail clients -- Using Google Workspace Sync for Microsoft Outlook (GWSMO) -- Accessibility for users -- Summary -- Chapter 6: Designing Custom Applications -- Apps Script -- Hello World! …”
    Libro electrónico
  17. 7177
    Tabla de Contenidos: “…René Kemp -- Acknowledgements -- Contents -- About the Author -- Part I: The Quest for a Natural Social Contract -- 1: Introduction -- 1.1 Reader ́s Guide -- 2: Sustainability Transition: Quest for a New Social Contract -- 2.1 Paradox of Prosperity -- 2.2 Ecological Limits of Our Planet -- 2.3 Emerging Security and Justice Challenges -- 2.4 The Sustainability Transition: Humankind ́s Quest for a New Social Contract -- 2.5 What ́s Beyond the Sustainable Development Goals? -- 3: Towards a Natural Social Contract -- 3.1 What Is a Social Contract? …”
    Libro electrónico
  18. 7178
    por Haque, A. K. Enamul
    Publicado 2021
    Tabla de Contenidos: “…3 A Survey of Community-Based Adaptation in Developing Countries -- 3.1 Introduction -- 3.2 Core Properties of CBA -- 3.3 CBA in Academic Literature -- 3.4 CBA in Gray Literature -- 3.5 Barriers and Challenges to CBA -- 3.6 CBA in Practice -- 3.6.1 Urban Resilience in the Philippines -- 3.6.2 Coastal Resilience in Thailand -- 3.6.3 Livelihood Resilience in Ethiopia -- 3.7 CBA Beyond 2020 -- References -- 4 What Motivates Farm-Level Adaptation in India? …”
    Libro electrónico
  19. 7179
    por Katoh, Naoki
    Publicado 2021
    Tabla de Contenidos: “…2.3.3 Results for the General-Graph Model -- 2.4 Characterization of Testability on Bounded-Degree Digraphs -- 2.4.1 Bounded-Degree Model of Digraphs -- 2.4.2 Monotone Properties and Hereditary Properties -- 2.4.3 Characterizations -- 2.4.4 An Idea to Extend the Characterizations Beyond Monotone and Hereditary -- 2.5 Testable EXPTIME-Complete Games -- 2.5.1 Definitions -- 2.5.2 Testers for Generalized Chess, Shogi, and Xiangqi -- 2.6 Summary -- References -- 3 Constant-Time Algorithms for Continuous Optimization Problems -- 3.1 Introduction -- 3.2 Graph Limit Theory…”
    Libro electrónico
  20. 7180
    por OECD
    Publicado 2021
    Tabla de Contenidos: “…. -- ...and in fragile contexts -- Insight # 4: Project-type interventions are preferred to joint-funding mechanisms -- Stable but evolving engagement in joint funding mechanisms -- Multilateral channels are often used in low-income countries and fragile contexts -- Insight # 5: Country ownership drives successful results -- Regional programmes are emerging as relevant and efficient -- Approaches to supporting country ownership are evolving, going beyond national government -- Towards good practices in international support for data and statistical systems -- References -- Notes -- Data for Development Profiles -- Data for Development Profiles -- Australia -- Strategies, actors and funding -- Illustrative programmes and projects -- Lessons learnt -- Thematic focus -- Geographic focus…”
    Libro electrónico