Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 882
- Application software 749
- Management 628
- Engineering & Applied Sciences 519
- History 411
- Computer programs 406
- Design 377
- Computer networks 339
- Data processing 334
- Web site development 328
- Computer Science 326
- Web sites 311
- Cloud computing 305
- Historia 304
- Artificial intelligence 303
- Python (Computer program language) 296
- Leadership 275
- Photography 275
- Security measures 275
- Computer software 268
- Computer programming 267
- Programming 267
- Law and legislation 260
- Business & Economics 245
- Computer security 241
- Operating systems (Computers) 240
- Digital techniques 239
- Social aspects 239
- Java (Computer program language) 237
- Information technology 229
-
8361Publicado 2017“…In this book, you'll learn how to break through the cycle of stress and setbacks to act with clarity, purpose, and direction—achieving peak performance and transformation along the way. You'll look deep inside to discover the natural leadership abilities lying dormant within you; you'll wake them up, make them stronger, and learn to draw on the strengths of those around you instead of muscling through with brute force. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8362Publicado 2011“…This collection of essays takes a closer look at various hybrid and disparate worlds related to dance and choreography. …”
Libro electrónico -
8363por Boardman, Marty. author“…Reality TV shows make it look so easy. A little paint here, some new kitchen cabinets there, and presto! …”
Publicado 2013
Libro electrónico -
8364por Faccio, Elena“…Why do so many people feel uneasy when they look in the mirror or see pictures of themselves? …”
Publicado 2013
Libro electrónico -
8365Publicado 2021“…Starting with the current interest in employer branding, this book looks at the historical roots of brand management and the practical steps to achieve employer brand management success. …”
Libro electrónico -
8366Publicado 2017“…Whitaker walk readers through the entire process. From what data looks like and what it should look like, they progress through all the steps involved in getting data ready for modeling. …”
Libro electrónico -
8367Publicado 2018“…What You Will Learn Take an in-depth look at what's new with AWS, along with how to effectively manage and automate your EC2 infrastructure with AWS Systems Manager Deploy and scale your applications with ease using AWS Elastic Beanstalk and Amazon Elastic File System Secure and govern your environments using AWS CloudTrail, AWS Config, and AWS Shield Learn the DevOps way using a combination of AWS CodeCommit, AWS CodeDeploy, and AWS CodePipeline Run big data analytics and workloads using Amazon EMR and Amazon Redshift Learn to back up and safeguard your data using AWS Data Pipeline Get started with the Internet of Things using AWS IoT and AWS Greengrass In Detail Many businesses are moving from traditional data centers to AWS because of its reliability, vast service offerings, lower costs, and high rate of innovation. …”
Libro electrónico -
8368Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Part One: ERM in Context -- Chapter 1: Fundamental Concepts and Current State -- Introduction -- What Is Risk? -- What Does Risk Look Like? -- Enterprise Risk Management (ERM) -- The Case for ERM -- Where ERM Is Now -- Where ERM Is Headed -- Notes -- Chapter 2: Key Trends and Developments -- Introduction -- Lessons Learned from the Financial Crisis -- The Wheel of Misfortune Revisited -- Global Adoption -- Notes -- Chapter 3: Performance-Based Continuous ERM -- Introduction -- Phase Three: Creating Shareholder Value -- Performance-Based Continuous ERM -- Case Study: Legacy Technology -- Notes -- Chapter 4: Stakeholder Requirements -- Introduction -- Stakeholders Defined -- Managing Stakeholder Value with ERM -- Implementing a Stakeholder Management Program -- Appendix A: Reputational Risk Policy -- Notes -- Part Two: Implementing an ERM Program -- Chapter 5: The ERM Project -- Introduction -- Barriers to Change -- Establish the Vision -- Obtain Buy-In from Internal Stakeholders -- Assess Current Capabilities against Best Practices -- Develop a Roadmap -- Appendix A: ERM Maturity Model -- Appendix B: Practical Plan for ERM Program Implementation -- Chapter 6: Risk Culture -- Introduction -- Risk Culture Success Factors -- Best Practice: Risk Escalation -- Conclusion -- Notes -- Chapter 7: The ERM Framework -- Introduction -- The Need for an ERM Framework -- ERM Framework Criteria -- Current ERM Frameworks -- An Update: The Continuous ERM Model -- Developing a Framework -- Conclusion -- Notes -- Part Three: Governance Structure and Policies -- Chapter 8: The Three Lines of Defense -- Introduction -- COSO's Three Lines of Defense -- Problems with This Structure -- The Three Lines of Defense Revisited -- Bringing It All Together: How the Three Lines Work in Concert…”
Libro electrónico -
8369por Organization for Economic Cooperation and Development (OECD) StaffTabla de Contenidos: “…How key poverty indicators will look in 2030 if historical trends continue…”
Publicado 2013
Libro electrónico -
8370por Dooley, John“…Using the Java language, you'll look deeply into coding standards, debugging, unit testing, modularity, and other characteristics of good programs. …”
Publicado 2011
Libro electrónico -
8371por Reed, AaronTabla de Contenidos: “…System RequirementsAdditional Resources; Installation; Creating Your First XNA Application; What You Just Did; Summary; Test Your Knowledge: Quiz; Chapter 3. Fun with Sprites; A Look Behind the Scenes; Game Development Versus Polling; Modifying Your Game; Adding a Sprite to Your Project; Loading and Drawing Your Sprite; Transparency and Other Options; Layer Depth; Let's Move; Animation; Adjusting the Framerate; Adjusting the Animation Speed; What You Just Did; Summary; Test Your Knowledge: Quiz; Test Your Knowledge: Exercise; Chapter 4. …”
Publicado 2010
Libro electrónico -
8372Publicado 2017“…Examine bugs that plague large-scale systems, including integer overflow, race conditions, and memory corruption Look at successful and disastrous examples of previous quantum leaps in health IT, the smart grid, and autonomous vehicles Explore patterns in coding, authentication, and cryptography that led to insecurity Learn how blunders that led to spectacular IT disasters could have been avoided…”
Libro electrónico -
8373Publicado 2019Tabla de Contenidos: “…-- Summary -- Chapter 2. A look inside WebAssembly modules -- 2.1. Known sections -- 2.2. …”
Libro electrónico -
8374Publicado 2014“…Chambers is just the guy to help you get to know your MacBook in no time. Take a closer look at the latest features, get the lowdown on OS X, unleash your creative forces with iLife, take care of business with the iWork applications, and sync it all with iCloud with the expert advice in this bestselling MacBook guide. …”
Libro electrónico -
8375Publicado 2015“…An insightful look at leadership transition from the successor's perspective Success and Succession examines the leadership transition process from the successor's point of view, and outlines the considerations and strategies that lead to a better future for the business. …”
Libro electrónico -
8376por Bakir, Ahmed. author“…And if you're a game developer, this book will provide you with tools to help make your game app look even better by integrating native iOS features…”
Publicado 2014
Libro electrónico -
8377Publicado 2015Tabla de Contenidos: “…Chapter 2: Getting Started with iPadExploring What's in the Box; Taking a First Look at the Gadget; Charging the Battery; Turning iPad On and Registering It; Meeting the Multi-Touch Screen; Connecting with the touchscreen; Goodbye, click-and-drag; hello, tap-and-swipe; Displaying and using the onscreen keyboard; Using the split keyboard; Flicking to search; Updating the Operating System; Understanding Multitasking Basics; Exploring Multitasking Gestures; Examining Your iPad Cameras; Customizing the Side Switch; Exploring the Status Bar; Using Control Center…”
Libro electrónico -
8378por Persaud, Avinash. author“…What would a well-regulated financial system look like? Until now, policymakers, financial experts, and leading academics have been content to avoid facing this question head–on. …”
Publicado 2015
Libro electrónico -
8379Publicado 2015“…OOP Design Patterns and Haskell Try out three ways of Streaming I/O: imperative, Lazy, and Iteratee based Explore the pervasive pattern of Composition: from function composition through to high-level composition with Lenses Synthesize Functor, Applicative, Arrow and Monad in a single conceptual framework Follow the grand arc of Fold and Map on lists all the way to their culmination in Lenses and Generic Programming Get a taste of Type-level programming in Haskell and how this relates to dependently-typed programming Retrace the evolution, one key language extension at a time, of the Haskell Type and Kind systems Place the elements of modern Haskell in a historical framework In Detail Design patterns and idioms can widen our perspective by showing us where to look, what to look at, and ultimately how to see what we are looking at. …”
Libro electrónico -
8380Publicado 2023Tabla de Contenidos: “…Chapter 7: Modern Collaboration and Risk Amplification -- Evolving to the new workspace, where the flow of information is versatile -- Versatile collaboration - some questions -- Challenges of a hybrid setup -- Future devices and their risk profile -- Polarization of opinions and its possible impact on modern collaboration -- Summary -- Chapter 8: Insider Risk and Impact -- Case study - insider risk at Roposo Ltd -- Context -- Actor and the plot -- The crime -- The aftermath -- The lessons -- Understanding the impact of insider risk -- Primary costs of insider risk -- A summarized view of the impact of insider risk -- Summary -- Chapter 9: Real Examples and Scenarios -- Insider risk - definition and threat vectors -- Insider risk - behaviors and technical trends to look out for -- Behavioral indicators -- Technical indicators -- Using the MITRE ATT& -- CK framework to detect insider threat and behavior -- Case study 1 - exploits in the life sciences sector -- Solution and outcome -- Case study 2 - a victim of a phishing attack -- Solution and outcome -- Case study 3 - working from home -- Solution and outcome -- Case study 4 - AT& -- T -- Solution and outcomes -- The cost of insider threats -- Summary -- Chapter 10: Cyberwarfare -- Is everything fair in love and war? …”
Libro electrónico