Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Filosofía 101
- Crítica e interpretación 57
- Design 46
- Logos (Symbols) 45
- Education 42
- Philosophy 36
- Biografías 32
- Computer graphics 31
- Historia 31
- Derecho 29
- Documentales 29
- Teología 29
- Logos (Símbolos) 28
- Diseño gráfico 27
- Logos 27
- Biblia 26
- Crítica i interpretació 25
- Computer programs 23
- Law 22
- Filosofia 21
- Photography 21
- Web sites 21
- Marcas de comercio 20
- Web site development 20
- History 19
- Bíblia 18
- Graphic arts 18
- Metafísica 18
- Fenomenología 17
- RELIGION 17
-
2561Publicado 2016Tabla de Contenidos: “…Mehrere Karten auf einmal anzeigen -- Karte drehen -- Weitere Karten-Ansichten -- 9.6 iWork: Pages, Numbers und Keynote -- 9.7 Fotos -- iCloud-Fotomediathek aktivieren -- Fotos bearbeiten -- Erweiterungen nutzen -- Automatische Gesichts-Erkennung -- Nachträglich hinterlegen, wo ein Foto aufgenommen wurde -- Fotos für Freunde und Kollegen freigeben -- Fotos drucken lassen -- 9.8 Vorschau -- PDFs bearbeiten und zusammenführen -- Mehrere Fotos auf einmal skalieren -- 9.9 Neu gestaltete Notizen-App -- Eigene Notizen mit interaktiven Anlagen -- Bessere Formatierungs-Werkzeuge -- Die gleichen Notizen, überall -- Mehrere Listen anlegen -- Festplatte in mehrere Teile aufteilen -- 10 Auf Safari durch das Web -- 10.1 Das Safari-Fenster -- 10.2 Lieblings-Websites an den Browser anheften -- Angeheftete Sites wieder loslösen -- 10.3 Sound in Tabs stummschalten -- 10.4 Websites bequemer lesen -- 10.5 Surfen, ohne Spuren zu hinterlassen -- Immer privat surfen -- 10.6 Überblick über alle offenen Tabs behalten -- 10.7 Webseiten später lesen -- 10.8 Feeds und soziale Neuigkeiten lesen -- 10.9 Safari mit Erweiterungen ausbauen -- 11 Kommunizieren per Apple Mail -- 11.1 Verbesserungen in Mail -- Wischgesten -- 11.2 Apple Mail einrichten -- IMAP- oder POP-Account konfigurieren -- 11.3 Sortierung der Nachrichten ändern -- 11.4 Das Fenster von Apple Mail im Überblick -- Bcc-Feld anzeigen -- 11.5 Text im Entwurf formatieren -- 11.6 Alle Header einer E-Mail anzeigen -- 11.7 Signaturen einstellen -- Bilder und Logos in die Signatur einbauen -- Signatur für E-Mail-Konto zuweisen -- 11.8 Große Anlagen automatisch per Mail Drop senden -- 11.9 Wischgeste nach links: Archivieren statt löschen -- Neue Regel einrichten -- Mail-Plug-ins wieder entfernen -- 12 Verbindungen zu anderen Geräten und dem Internet -- 12.1 Mit einem WLAN verbinden -- WLAN abschalten…”
Libro electrónico -
2562por Pokam Kamdem, WilliamsTabla de Contenidos: “…Les désillusions du Syndicat d'études et de recherches pétrolifères de Logo-baba -- 1. La relance de l'exploration pétrolière. …”
Publicado 2021
Libro electrónico -
2563Publicado 2023Tabla de Contenidos: “…Set-up Menu -- Set-up Menu Options -- Select Folder -- File Numbering -- Format Card -- Auto Rotate -- Add Movie Rotate Information -- Date/Time/Zone -- Language -- Video System -- Help Text Size -- Mode Guide -- Feature Guide -- Beep -- Volume -- Headphones -- Power Saving -- Screen/Viewfinder Display -- Screen Brightness/Viewfinder Brightness -- Fine-Tune Viewfinder Color Tone -- UI Magnification -- HDMI Resolution -- Touch Control -- Multi-Function Lock -- Sensor Cleaning -- Choose USB Connection App -- Reset Camera -- Custom Shooting Mode (C1, C2) -- Battery Information -- Copyright Information -- Manual/Software URL -- Certification Logo Display -- Firmware -- Chapter 15. The Custom Functions and My Menus -- Custom Function Settings -- Exposure Level Increments -- ISO Speed Setting Increments -- Speed From Metering/ISO Auto -- Bracketing Auto Cancel -- Bracketing Sequence -- Number of Bracketed Shots -- Safety Shift -- Same Exposure for New Aperture -- AE Lock Metering Mode After Focus -- Set Shutter Speed Range -- Set Aperture Range -- Dial Direction to Set Tv/Av -- Control Ring Direction to Set Tv/Av -- Switch Dials When Shooting -- Customize Buttons -- Customize Dials -- Clear Customized Settings -- Add Cropping Information -- Audio Compression -- Default Erase Option -- Release Shutter without Lens -- Retract Lens on Power Off -- Clear All Custom Func. …”
Libro electrónico -
2564
-
2565
-
2566
-
2567
-
2568Publicado 2022Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
Libro electrónico -
2569por Küng, HansTabla de Contenidos: “…Los primeros grandes conflictos -- Pedro: ida a los gentiles -- Santiago: partidario de la unión con la sinagoga -- Excomunión por la sinagoga: la comunidad de Juan -- Preexistencia del Logos en el evangelio de Juan -- En continuidad con Jesús: la fe del judío Pablo -- ¿Preexistencia del Hijo en Pablo? …”
Publicado 2023
Libro electrónico -
2570Publicado 2002Tabla de Contenidos: “…Customized chat UI applet -- 7.1 Customized ChatUI Example 2 -- 7.2 Important classes in the sample -- 7.3 CustomizeChatFactory -- 7.3.1 Methods -- 7.3.2 CustomizeChatFactory2.java -- 7.4 CustomizeChatUI2 -- 7.4.1 Methods -- 7.4.2 CustomizeChatUI2.java -- 7.5 ImagePanel -- 7.5.1 Methods -- 7.5.2 ImagePanel.java -- 7.5.3 The HTML file -- 7.6 Deployment considerations -- 7.6.1 Integrating with a Domino application -- 7.6.2 Loading the logo from a jar file -- 7.7 Extending the functionality -- 7.7.1 RedStorageFrame.java -- 7.7.2 Changes in the factory class -- 7.8 How to use with other toolkit UI elements -- 7.9 Passing a token between applets -- 7.9.1 JavaScript for accessing the token -- 7.9.2 The HTML form -- 7.9.3 Sharing information with other applets -- 7.10 Summary -- Part 3 C++ toolkit -- Chapter 8. …”
Libro electrónico -
2571Publicado 2024Tabla de Contenidos: “…-- Create a Fine-Art Print Border? -- Add My Logo to My Print Layout? -- Choose My Print Resolution? …”
Libro electrónico -
2572por Harsch, ClaudiaTabla de Contenidos: “…-- 2.4.2 Separating IC from LC -- 2.4.3 Going beyond the mechanics of interaction: Hymes and Goffman revisited -- 2.4.4 Emotional, logical and moral IC markers -- 2.4.5 Aristotelian artistic proofs: Pathos, logos, and ethos -- 2.4.6 Membership categorization analysis: Categorial IC markers -- 2.5 Designing IC test tasks -- 2.5.1 From the target language domain to a test -- 2.5.2 Task-based needs analysis -- 2.5.3 Triangulation in needs analysis -- 2.5.4 Paucity of TBNA in L2 Chinese -- 2.6 Designing IC rating materials -- 2.6.1 IC rating materials development -- 2.6.2 The rater perspective and indigenous criteria…”
Publicado 2024
Libro electrónico -
2573Publicado 2017Tabla de Contenidos: “…II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. …”
Libro -
2574
-
2575
-
2576
-
2577por Railsback, Steven F.“…It starts with the fundamentals of modeling and provides an introduction to NetLogo, an easy-to-use, free, and powerful software platform. …”
Publicado 2012
Libro -
2578Publicado 2022Tabla de Contenidos: “…5.2.5 Fuzzy Microgrid Wind -- 5.3 Genetic Algorithm -- 5.3.1 Important Aspects of Genetic Algorithm -- 5.3.2 Standard Genetic Algorithm -- 5.3.3 Genetic Algorithm and Its Application -- 5.3.4 Power System and Genetic Algorithm -- 5.3.5 Economic Dispatch Using Genetic Algorithm -- 5.4 Artificial Neural Network -- 5.4.1 The Biological Neuron -- 5.4.2 A Formal Definition of Neural Network -- 5.4.3 Neural Network Models -- 5.4.4 Rosenblatt's Perceptron -- 5.4.5 Feedforward and Recurrent Networks -- 5.4.6 Back Propagation Algorithm -- 5.4.7 Forward Propagation -- 5.4.8 Algorithm -- 5.4.9 Recurrent Network -- 5.4.10 Examples of Neural Networks -- 5.4.10.1 AND Operation -- 5.4.10.2 OR Operation -- 5.4.10.3 XOR Operation -- 5.4.11 Key Components of an Artificial Neuron Network -- 5.4.12 Neural Network Training -- 5.4.13 Training Types -- 5.4.13.1 Supervised Training -- 5.4.13.2 Unsupervised Training -- 5.4.14 Learning Rates -- 5.4.15 Learning Laws -- 5.4.16 Restructured Power System -- 5.4.17 Advantages of Precise Forecasting of the Price -- 5.5 Conclusion -- References -- 6 Recent Advances in Wearable Antennas: A Survey -- 6.1 Introduction -- 6.2 Types of Antennas -- 6.2.1 Description of Wearable Antennas -- 6.2.1.1 Microstrip Patch Antenna -- 6.2.1.2 Substrate Integrated Waveguide Antenna -- 6.2.1.3 Planar Inverted-F Antenna -- 6.2.1.4 Monopole Antenna -- 6.2.1.5 Metasurface Loaded Antenna -- 6.3 Design of Wearable Antennas -- 6.3.1 Effect of Substrate and Ground Geometries on Antenna Design -- 6.3.1.1 Conducting Coating on Substrate -- 6.3.1.2 Ground Plane With Spiral Metamaterial Meandered Structure -- 6.3.1.3 Partial Ground Plane -- 6.3.2 Logo Antennas -- 6.3.3 Embroidered Antenna -- 6.3.4 Wearable Antenna Based on Electromagnetic Band Gap -- 6.3.5 Wearable Reconfigurable Antenna -- 6.4 Textile Antennas -- 6.5 Comparison of Wearable Antenna Designs…”
Libro electrónico -
2579Publicado 2012“…Unlike other dry business books, this refreshing, straightforward guide from Logo Design Love author and international designer David Airey answers the questions all designers have when first starting out on their own. …”
Libro electrónico -
2580por Airey, David, 1979-“…Unlike other dry business books, this refreshing, straightforward guide from Logo Design Love author and international designer David Airey answers the questions all designers have when first starting out on their own. …”
Publicado 2013
Libro