Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 673
- Social aspects 461
- Development 428
- Historia 380
- Management 334
- Application software 306
- Education 267
- RELIGION 258
- Social conditions 226
- Engineering & Applied Sciences 193
- Research 188
- Politics and government 176
- Web site development 160
- Computer networks 151
- Design 151
- Community development 148
- Computer programs 144
- Python (Computer program language) 144
- Study and teaching 140
- Computer software 137
- Innovaciones tecnológicas 137
- Leadership 135
- Social Sciences 135
- Economic aspects 129
- Technological innovations 127
- Information technology 126
- Web sites 126
- Security measures 125
- Investigación científica 124
- Open source software 124
-
15341Publicado 2016“…This book offers unique insights into the wisdom of the community’s leaders gathered to share hard-won lessons from the trenches. …”
Libro electrónico -
15342Publicado 2018Tabla de Contenidos: “…. -- How it works... -- Using community Puppet style -- How to do it... -- Indentation -- Quoting -- false -- Variables -- Parameters -- Symlinks -- Installing Puppet -- How to do it... -- Creating a manifest -- How to do it... -- There's more... -- Checking your manifests with puppet-lint -- Getting ready -- How to do it... -- There's more... -- See also -- Making modules -- How to do it... -- How it works... -- There's more... -- Templates -- Facts, functions, types, and providers -- Third-party modules -- Module organization -- See also -- Using standard naming conventions -- How to do it... -- There's more... -- Using inline templates -- How to do it... -- How it works... -- There's more... -- See also -- Iterating over multiple items -- How to do it... -- How it works... -- There's more... -- Using hashes -- Creating arrays with the split function -- Writing powerful conditional statements -- How to do it... -- How it works... -- There's more... -- elsif branches -- Comparisons -- Combining expressions -- See also -- Using regular expressions in if statements -- How to do it... -- How it works... -- There's more... -- Capturing patterns -- Regular expression syntax -- See also -- Using selectors and case statements…”
Libro electrónico -
15343Publicado 2022Tabla de Contenidos: “…3.1 Domain-General Cognitive Facilitation -- 3.2 Domain-Specific Cognitive Facilitation -- 3.3 Affective Facilitation -- 3.4 Relational Facilitation -- 4 Opportunities -- 4.1 Participation -- 4.2 Scale -- 4.3 Interstitiality -- 4.4 The Discursive Norms of Philosophy -- 5 Challenges -- 5.1 The Problem of Rapport -- 5.2 The Problem of Urban Social Psychology -- 5.3 The Problem of the Outsider -- 6 Conclusion -- Notes -- References -- Chapter 28 Philosophy in Nature as a Kind of Public Philosophy -- 1 Introduction -- 2 My Path to Public Philosophy in Nature -- 3 The Tour -- 3.1 Setting the Scene -- 3.2 Dialogue -- 4 Challenges and Rewards -- 5 Conclusion -- Notes -- Chapter 29 Philosophical Counseling -- 1 Philosophical Counseling as a Mode of Philosophical Practice -- 2 What Philosophical Counselors Do -- 3 The Relationship between Philosophical Counseling and Psychotherapy -- 4 Guidance to Aspiring Philosophical Counselors -- Notes -- References -- Chapter 30 The Transformative Power of Community Engaged Teaching -- 1 Domains and Dynamics -- 2 Remembering and Understanding -- 3 Lessons and Legacies -- Notes -- References -- Chapter 31 Philosophy Through Memes -- 1 Philosophy. …”
Libro electrónico -
15344
-
15345Publicado 2017Tabla de Contenidos: “…Overview -- Leaderboard -- Knowledge Base -- Community -- Search -- Net Promoter Score -- Satisfaction -- Insights -- Zendesk Insights/GoodData -- Creating a Dashboard and Tab -- Adding reports -- Adding filters -- Adding Widgets -- Adding some text and lines -- Creating custom reports -- Creating custom metrics -- Schedule dashboard E-mails -- Summary -- Chapter 8: Security Settings and SSO -- Security settings and best practice -- Access security -- Zendesk password authentication -- Two-factor authentication -- Zendesk's single sign-on options -- Social media SSO -- Enterprise SSO -- Secure Assertion Markup Language (SAML) -- IP restrictions -- Using custom roles to reduce unnecessary access -- Auditing your Zendesk account -- Secure coding practices -- Removing/Redacting Credit Card numbers -- Private attachments -- Advanced Security Enterprise Add-on -- Data at rest encryption -- Enhanced disaster recovery -- HIPAA compliance -- In case of a breach -- Summary -- Chapter 9 : Troubleshooting Zendesk -- Troubleshooting performance issues -- Zendesk status -- General browser issues -- Disabling extensions/plugins -- Clearing browsing data/cache -- Traceroute -- Troubleshooting business rules -- Triggers and automations -- Ticket events -- Trigger order -- SLAs -- Troubleshooting Zendesk apps -- Contacting Zendesk support -- Summary -- Chapter 10: Zendesk Tips and Tricks -- Business rules -- Notifying the team leader about a ticket with a high amount of replies -- Using tags to disable or enable business rules for tickets -- Closing a ticket via a tag -- Disabling the satisfaction survey via a tag -- Removing tags from follow-up tickets -- Using business rules to detect and fix user errors -- Adding comments to tickets via a URL target -- Logging ticket events via an e-mail target -- Roles and views -- Creating a vacation view…”
Libro electrónico -
15346Publicado 2017Tabla de Contenidos: “…The Use of New Technologies -- Community Engagement in Germplasm Production -- Recognition of the Rights of Small-Scale Producers -- Negotiation of Access to Markets -- Adoption and Impact: Toward Enhanced Farmer Livelihoods and Global Environmental Benefits -- Public/Private Partnerships: Localization and the Case of Allanblackia spp. -- Toward the Third Decade -- 15 Trees: Capturing Useful Traits in Elite Cultivars: An Update -- III. …”
Libro electrónico -
15347Publicado 2023Tabla de Contenidos: “…Don't forget your emergency fund -- Look into additional income streams -- Active income -- Passive income -- Portfolio income -- Plan ahead as much as possible -- Consider living frugally -- Evaluating Your Job and Its Related Expenses -- Discuss your options for alternative work environments -- Analyze your compensation package -- Assess work-related costs -- Budgeting with Irregular Income -- Calculate bare bones expenses and income -- Stick with cash envelopes -- Use community resources -- Chapter 12 Budgeting during Different Life Stages -- Taking Responsibility for Your Money as a Student -- Understand your financial aid package -- Need-based financial aid -- Non-need-based financial aid -- Apply for internships -- Understanding the different types of internships -- Finding a paid internship -- Utilize your school's work-study program -- Maximize student discounts -- Account for major and ongoing college expenses -- Sharing and Agreeing on Money Management as a Couple -- Get on the same page as your partner -- Discover your money personality -- Don't be afraid to try out different budgeting methods -- Use joint accounts in a way that works for you -- Identify financial abuse and financial infidelity -- Planning for Child-Related Costs -- Factor in housing costs -- Buy used -- Create an ongoing sinking fund for school expenses -- Research daycare opportunities -- Look into a dependent care account through your employer -- Living off the Money You've Saved for Retirement -- Examine your saving ten years before retirement -- Understand your retirement budget -- Trim your expenses and take care of lingering debt -- Make sure you're signed up for senior discounts -- Prioritize your needs over others' -- Chapter 13 Budgeting for a Major Purchase or Life Event -- Purchasing a Home -- Use the 28/36 rule -- Determine your down payment…”
Libro electrónico -
15348por Massol, Vincent“…Using Maven, you can leverage the experience of the community to avoid the tedious process of creating yet another build script for each new project. …”
Publicado 2004
Libro electrónico -
15349por Murphy, Niall Richard“…This growing shortage has effectively put the Internet community--and some of its most brilliant engineers--on alert for the last decade. …”
Publicado 2005
Libro electrónico -
15350por Galic, MicheleTabla de Contenidos: “…Scenario description -- 2.1 Portal business scenarios -- 2.1.1 Base secure portal -- 2.1.2 Single sign-on for access to multiple applications -- 2.1.3 Collaboration among customers and employees -- 2.1.4 User Information Aggregation -- 2.1.5 Employee Community Workplace scenario -- 2.1.6 Effective Content Management scenario -- Chapter 3. …”
Publicado 2004
Libro electrónico -
15351por O'Sullivan, BryanTabla de Contenidos: “…-- Novelty -- Power -- Enjoyment -- What to Expect from This Book -- A Little Bit About You -- What to Expect from Haskell -- Compared to Traditional Static Languages -- Compared to Modern Dynamic Languages -- Haskell in Industry and Open Source -- Compilation, Debugging, and Performance Analysis -- Bundled and Third-Party Libraries -- A Brief Sketch of Haskell's History -- Prehistory -- Early Antiquity -- The Modern Era -- Helpful Resources -- Reference Material -- Applications and Libraries -- The Haskell Community -- Conventions Used in This Book -- Using Code Examples -- Safari® Books Online -- How to Contact Us -- Acknowledgments -- Bryan -- John -- Don -- Thank You to Our Reviewers -- Chapter 1. …”
Publicado 2009
Libro electrónico -
15352por Lucas, Michael, 1967-Tabla de Contenidos: “…-- The BSD License -- AT& -- T vs. the World -- The Birth of OpenBSD -- The OpenBSD Community -- OpenBSD Users -- OpenBSD Contributors -- OpenBSD Committers -- OpenBSD Coordinator -- OpenBSD's Strengths -- Portability -- Power -- Documentation -- Free -- Correctness -- Security -- OpenBSD and Your Security -- OpenBSD's Uses -- Desktop -- Server -- Network Management -- About This Book -- Contents Overview -- 1. …”
Publicado 2013
Libro electrónico -
15353Publicado 2010Tabla de Contenidos: “…Remote Office Topology -- Data Center Topology -- Traffic Flows -- Network Infrastructure Checklist -- Application Characteristics -- Application Requirements Checklist -- Application Optimizer Requirements -- CIFS Accelerator -- Advanced Features -- File Services Utilization -- File Services Requirements Checklist -- MAPI Accelerator -- MAPI Requirements Checklist -- HTTP Accelerator -- HTTP Requirements Checklist -- NFS Accelerator -- NFS Requirements Checklist -- Video Accelerator -- Video Requirements Checklist -- SSL Accelerator -- SSL Requirements Checklist -- Replication Accelerator -- Platform Requirements -- Platform Requirements Checklist -- Scalability Requirements -- Scalability Requirements Checklist -- Availability Requirements -- Availability Checklist -- Management Requirements -- Cisco WAAS Central Manager and XML-API -- SNMP Trap/Inform Routing -- SNMP Community Strings -- Syslog Servers -- Management Requirements Checklist -- Security Requirements -- Security Requirements Checklist -- Virtualization Requirements -- Virtualization Requirements Checklist -- Summary -- Chapter 4 Network Integration and Interception -- Interface Connectivity -- Link Aggregation Using PortChannel -- PortChannel Configuration -- Using the Standby Interface Feature -- Standby Interface Configuration -- Interception Techniques and Protocols -- Web Cache Communication Protocol -- WCCP Overview -- Service Groups -- Forwarding and Return Methods -- Load Distribution -- Failure Detection -- Flow Protection -- Graceful Shutdown -- Scalability -- Redirect Lists -- Service Group Placement -- WCCP Configuration -- Hardware-Based Platforms -- Policy-Based Routing -- Inline Interception -- Content Switching -- Application Control Engine -- Egress Methods -- Directed Mode -- Network Integration Best Practices -- Summary -- Chapter 5 Branch Office Network Integration…”
Libro electrónico -
15354Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- Foreword -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Introduction -- New demands in enterprise systems -- Modern way of realizing enterprise systems -- Relevance of Java EE in modern systems -- Java EE 8 update and roadmap -- Java Community Process -- What to expect in the book -- Chapter 2: Designing and Structuring Java Enterprise Applications -- The purpose of enterprise applications -- What developers should focus on -- Meeting customer's demands -- Outer enterprise project structure -- Business and team structures -- Software projects contents -- Application source code -- Software structures -- Version control systems -- Binaries -- Build systems -- Single versus multi-module projects -- Illusion of reusability -- Technical dependencies -- Organizational challenges -- Reusability considerations -- Project artifacts -- One project per artifact -- Build systems for Java EE -- Apache Maven -- Gradle -- Structuring for modern frontend technologies -- Enter JavaScript frameworks -- Organizing modern frontends -- Enterprise project code structure -- Situation in enterprise projects -- Horizontal versus vertical layering -- Business-driven structure -- Designing reasonable modules -- Realizing package structures -- Package contents -- Horizontal package layering -- Flat module package -- Entity Control Boundary -- Packages -- Package access -- Don't over-enforce architecture -- Summary -- Chapter 3: Implementing Modern Java Enterprise Applications -- Use case boundaries -- Core domain components of modern Java EE -- EJB and CDI - differentiation and integration -- CDI producers -- Emitting domain events -- Scopes -- Patterns in Java EE -- Design patterns revisited -- Singleton -- Abstract factory…”
Libro electrónico -
15355Publicado 2018Tabla de Contenidos: “…Component Tree -- auraTemp -- Transactions tab -- Performance tab -- Event Log tab -- Actions tab -- Storage tab -- Salesforce community page optimizer -- Using the Chrome developer Console -- Setting breakpoints in the Chrome developer Console -- Pause on caught exceptions -- Apex debugging -- Using the Salesforce CLI to stream logs -- Advanced debugging with the Replay Debugger -- Summary -- Chapter 9: Performance Tuning Your Lightning Component -- Storable actions -- When to use storable actions? …”
Libro electrónico -
15356por Diel, MartinaTabla de Contenidos: “…Teilzeit -- Sabbatical -- Arbeitsplatz -- Dresscode -- Homeoffice -- Hardware -- Internationalität -- Sichtbarkeit in der Community -- Gehaltsrahmen -- Umsatzbeteiligung -- Betriebliche Altersvorsorge -- Mitarbeiterrabatte -- Kantine -- Unterstützung bei der Wohnungssuche -- Betriebskindergarten -- Gesundheitsangebote -- Etwas für die Fahrradfahrer -- Verkehrsgünstige Lage -- Dienstreise-Policy -- Und noch mehr Goodies -- Was sonst noch wichtig ist: Sprache, Suchmaschinenoptimierung und weitere Aspekte -- Sprache -- Anrede mit »du« -- Gendergerechtigkeit und Diversität -- Sorgfalt -- Suchmaschinenoptimierung -- Lesefreundliche Struktur -- Bildelemente -- Testimonials -- Mobile Recruiting -- Bewerbungsunterlagen -- Weiteres Vorgehen -- Ansprechpartner -- Initiativbewerbungen -- Einige inspirierende Beispiele -- Kapitel 4 - Stellenbörsen -- Jobbörsen -- Google Jobs -- Reichweite -- Bewertung durch Nutzer*innen -- Anzahl angebotener Stellen -- Allgemeine Jobbörsen -- Spezialisierte Jobbörsen - eine subjektive Auswahl -- Stack Overflow Jobs -- T3n -- Jobvector -- 4scotty -- Weitere Jobbörsen -- Multiposting-Agenturen -- Jobsuchmaschinen -- Social-Media-Plattformen -- Xing -- Stellenmarkt -- Postings in Gruppen -- Weitere Möglichkeiten für Jobinserate in Xing -- LinkedIn -- Facebook -- Weitere Social-Media-Plattformen -- Fazit -- Kapitel 5 - Active Sourcing - passive Kandidat*innen erschließen -- Empfehlung von Mitarbeitenden -- Frühere Mitarbeiterinnen und Mitarbeiter -- Frühere Bewerber*innen -- Bewerber*innen, denen Sie abgesagt haben -- Bewerber*innen, die Ihnen abgesagt haben -- Bewerberdatenbanken -- Bewerberdatenbank der Agentur für Arbeit -- Monster-Lebenslaufdatenbank -- StepStone DirectSearch Database -- Careerbuilder -- Experteer -- Jobleads -- 4scotty -- Honeypot -- 99talents -- Matching Box -- Boa Recruiting -- Talent.Io, Moberries…”
Publicado 2020
Libro electrónico -
15357Publicado 2015“…Multilingual Information Management draws on previous empirical research to explore how information and technologies are used within the community of translators as information facilitators among different languages and cultures, to help them become more productive and competitive in today’s market. …”
Libro electrónico -
15358por Gavin, Lee“…., UCCnet is a neutral industry organization that implements these standards by requiring its community of trading partners to provide standardized item data in particular formats to its registry. …”
Publicado 2004
Libro electrónico -
15359Publicado 2023Tabla de Contenidos: “…Conducting an initial information security analysis -- Purpose and description of the information system -- Determining compliance requirements -- Documenting key information system and project roles -- Defining the expected user types -- Documenting interface requirements -- Documenting external information systems access -- Conducting a business impact assessment (BIA) -- Conducting information categorization -- Developing a security architecture advisement program -- Information security architecture process -- Example information security architecture process -- Architecture special considerations -- Summary -- Chapter 11: Cloud Security Considerations -- Importance of cloud computing -- Cloud computing characteristics -- Cloud computing service models -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Software as a Service (SaaS) -- Cloud computing deployment models -- Public cloud -- Private cloud -- Community cloud -- Hybrid cloud -- Cloud computing management models -- Managed service providers -- Cloud service providers -- Special considerations for cloud computing -- Cloud computing data security -- Identification, authentication, and authorization in the cloud -- Monitoring and logging considerations -- Security automation considerations -- Secure application development considerations -- Summary -- Chapter 12: Zero Trust Architecture in Information Security -- Zero Trust and its principles -- The history of Zero Trust -- Importance of Zero Trust in cybersecurity -- Shifting from traditional perimeter-based security -- The pillars of Zero Trust -- Identity pillar -- Devices -- Networks -- Applications and Workloads -- Data -- Summary -- Chapter 13: Third-Party and Supply Chain Security -- Understanding C-SCRM and its importance -- The challenges in managing supply chain cybersecurity risks…”
Libro electrónico -
15360por Dow, Colin“…Renowned for its versatility, affordability, and active community support, Raspberry Pi is at the forefront of IoT development. …”
Publicado 2024
Libro electrónico