Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
381Publicado 2008Tabla de Contenidos: “…Introduction -- Understanding failed states -- Policy failures -- Developing an integrated approach -- Reframing the failed-state challenge -- Identifying and meeting critical challenges -- Dismantling the instruments of violence -- Critical challenge 1: Reintegrating excombatants -- Critical challenge 2: Building effective, legitimate state security structures -- Removing incentives for violence -- Critical challenge 3: Fairly and appropriately distributing assistance -- Critical challenge 4: Building an inclusive and representative political system -- Establishing security for economic recovery -- Critical challenge 5: Securing the nation's productive assets -- Critical challenge 6: Providing security for foreign direct investment -- Creating conditions for empowering the population -- Government provision of essential public services -- Safe drinking water and basic sanitation -- Accessible public health and health care services -- Accessible primary education -- Sustained human development -- Secondary and postsecondary schools and training centers -- Accessible, safe marketplaces -- Trade facilitation and control -- Other economic development efforts -- Conclusion : Institutions and Leadership -- Appendix: Countries in alert zone…”
Libro electrónico -
382por Gallagher, Richard S.Tabla de Contenidos: “…Foreword / by Carol Roth -- Acknowledgments -- Introduction -- Why worst-case scenarios matter -- Understanding the "uh-oh" moment -- Tools for defusing a customer crisis -- Leaning into criticism -- Achieving deep acknowledgment -- Avoiding trigger phrases -- Divide and conquer : the safe way to deliver bad news -- Powerful problem solving: beyond "yes we can" and "no we can't" -- Reframing your message -- Grounding an angry outburst -- Becoming immune to intimidation -- The wrap-up -- Your worst customer situations--solved! …”
Publicado 2013
Libro electrónico -
383Publicado 2018Tabla de Contenidos: “…-- Planning for immersive global learning -- Staying safe, healthy, and happy -- The journey continues: stepping forward…”
Libro -
384Publicado 2019Tabla de Contenidos: “…Creating a caring and safe environment -- 4. Transformation from hidden to visible leadership -- 5. …”
Libro electrónico -
385Publicado 2022Tabla de Contenidos: “…Chapter 1: Spotlight on Future Firmware -- Chapter 2: Tools -- Chapter 3: Infrastructure for Building Your Own System Firmware -- Chapter 4: System Firmware Debugging -- Chapter 5: Security in its Core -- Chapter 6: Looking into the Future of System Firmware -- Appendix A: Evolution of System Programming Language -- Appendix B: initramfs: Call for Type-Safe Language…”
Libro electrónico -
386Publicado 2016Tabla de Contenidos: “…-- Shell shocked : my journey of disillusionment -- Arms race : going to college -- Propaganda machine : online advertising -- Civilian casualties : justice in the age of big data -- Ineligible to serve : getting a job -- Sweating bullets : on the job -- Collateral damage : landing credit -- No safe zone : getting insurance -- The targeted citizen : civic life…”
Libro electrónico -
387Publicado 2017Tabla de Contenidos: “…-- Shell shocked: My journey of disillusionment -- Arms race: Going to college -- Propaganda machine: Online advertising -- Civilian casualties: Justice in the age of big data -- Ineligible to serve: Getting a job -- Sweating bullets: On the job -- Collateral damage: Landing credit -- No safe zone: Getting insurance -- The targeted citizen: Civic life…”
Libro -
388por Basham, BryanTabla de Contenidos: “…-- Web app architecture -- Mini MVC tutorial -- Being a servlet -- Being a web app -- Conversational state -- Being a JSP -- Script-free pages -- Custom tags are powerful -- When even JSTL isn't enough -- Deploying your web app -- Keep it secret, keep it safe -- The power of filters -- Enterprise design patterns…”
Publicado 2008
Libro electrónico -
389Publicado 2004Tabla de Contenidos: “…Demographic characteristics of the older workforce -- The role of the changing labor market and the changing nature of work in older workers' work experiences and health outcomes -- The social and economic context of work for older persons -- Physical and cognitive differences between older and younger workers -- Effects of workplace exposures on older workers -- Programs and policies related to the older workforce and safe work -- Interventions for older workers -- Conclusions and recommendations…”
Libro electrónico -
390Publicado 2022Tabla de Contenidos: “…Impacts of the ECCOLA Method -- Process Assessment -- Setting the Scope for a New Agile Assessment Model: Results of an Empirical Study -- Towards a Standardized Questionnaire for Measuring Agility at Team Level -- The Impact of Agile Transformations on Organizational Performance: A Survey of Teams, Programs and Portfolios -- Measuring Software Delivery Performance using the Four Key Metrics of DevOps -- Large-scale Agile -- Evolution of the Agile Scaling Frameworks -- Coordination Strategies: Managing Inter-team Coordination Challenges in Large-scale Agile -- Challenges of Adopting SAFe in the Banking Industry - A Study Two Years after its Introduction -- Benefits and Challenges of Adopting SAFe - An Empirical Survey.…”
Libro electrónico -
391Publicado 2021Tabla de Contenidos: “…Impacts of the ECCOLA Method -- Process Assessment -- Setting the Scope for a New Agile Assessment Model: Results of an Empirical Study -- Towards a Standardized Questionnaire for Measuring Agility at Team Level -- The Impact of Agile Transformations on Organizational Performance: A Survey of Teams, Programs and Portfolios -- Measuring Software Delivery Performance using the Four Key Metrics of DevOps -- Large-scale Agile -- Evolution of the Agile Scaling Frameworks -- Coordination Strategies: Managing Inter-team Coordination Challenges in Large-scale Agile -- Challenges of Adopting SAFe in the Banking Industry - A Study Two Years after its Introduction -- Benefits and Challenges of Adopting SAFe - An Empirical Survey.…”
Libro electrónico -
392Publicado 2023Tabla de Contenidos: “…Logics for extensional, locally complete analysis via domain refinements -- Clustered Relational Thread-Modular Abstract Interpretation with Local Traces -- Adversarial Reachability for Program-level Security Analysis -- Automated Grading of Regular Expressions -- Builtin Types viewed as Inductive Families -- Pragmatic Gradual Polymorphism with References -- Modal crash types for intermittent computing -- Gradual Tensor Shape Checking -- A Type System for Effect Handlers and Dynamic Labels -- Interpreting Knowledge-based Programs -- Contextual Modal Type Theory with Polymorphic Contexts -- A Complete Inference System for Skip-free Guarded Kleene Algebra with Tests -- Quorum Tree Abstractions of Consensus Protocols -- MAG π : Types for Failure-Prone Communication -- System $Fˆ\mu \omega$ with Context-free Session Types -- Safe Session-Based Concurrency with Shared Linear State -- Bunched Fuzz: Sensitivity for Vector Metrics -- Fast and Correct Gradient-Based Optimisation for Probabilistic Programming via Smoothing -- Type-safe Quantum Programming in Idris -- Automatic Alignment in Higher-Order Probabilistic Programming Languages…”
Libro electrónico -
393Publicado 2010Tabla de Contenidos: “…Grupo Ikusnet, Irontec, Tuxbrain, Platoniq, Y Productions, ZEMOS98, Blobject, Instituto de Innovacion para el Bienestar Ciudadano, Maier Technology Centre, Naider, Safe Creative, Sociedad de las Indias Electronicas, Tourism Revolution Ecosystem, Xul, Koopera, Osoa (ErrekaAdapta), Sartu, TransAndalus, Caja de Ahorros de Navarra, Cluster de Turismo de Canarias…”
> Texto completo disponible en EOI
Libro -
394por Haunts, Stephen. authorTabla de Contenidos: “…Hashing and Hashed Message Authentication Codes -- 5. Safely Storing Passwords -- 6. Symmetric Encryption -- 7. …”
Publicado 2019
Libro electrónico -
395por Pogue, David, 1963-Tabla de Contenidos: “…Getting online -- Surfing the Web -- How to search the Web -- Searching by information type -- News and blogs -- Reviews and ratings -- Shopping -- Planning trips -- Finance -- Games and gambling -- Music and audio -- Videos, movies, and TV -- Photos -- Email -- Instant messages and chat -- Discussion groups -- Social networking -- Skype & VoIP : Internet phones -- Your own blogs, Web sites, and podcasts -- Living on the Web -- Staying safe…”
Publicado 2006
Libro electrónico -
396por Wang, ShurenTabla de Contenidos: “…Hydropower and sustainable development -- Maximizing and communicating the multiple benefits of hydro -- The food-water-energy nexus approach -- Synergy among the renewables -- Making hydro more competitive (managing and mitigating risk) -- Regional development through power trading -- Hydropower technology -- Civil engineering -- Materials for dams and appurtenant works -- Advances in design and construction techniques -- Recent developments in dam construction -- Monitoring and engineering for safe structures and sites…”
Publicado 2023
Libro electrónico -
397por Rabkin, Jeremy A.Tabla de Contenidos: “…-- CHAPTER THREE: The Constitutional Logic of Sovereignty -- CHAPTER FOUR: The Enlightenment and the Law of Nations -- CHAPTER FIVE: Diplomacy of Independence -- CHAPTER SIX: A World Safe for Eurogovernance -- CHAPTER SEVEN: The Human Rights Crusade -- CHAPTER EIGHT: Is Sovereignty Traded in Trade Agreements? …”
Publicado 2007
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
398por Houliston, Victor, 1954-Tabla de Contenidos: “…The legend of Father Parsons -- The English mission : writing The Christian directory -- The Spanish connection : satirizing Burghley -- The myth of England's Catholic destiny : Persons's political vision -- Reclaiming the past : combating Foxe and Coke -- A Jesuit apologia : appellant abuse -- Making England safe for Catholicism : liberty of conscience under James -- Mastering the polemical scene -- Appendix : a chronology of Persons's printed works, 1580-1622…”
Publicado 2007
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad de Navarra, Biblioteca Pública Episcopal del Seminario de Barcelona, Biblioteca Universidad de Deusto)Libro -
399por Davis, Jeffrey, 1967-Tabla de Contenidos: “…The seeds of legal accountability -- Competing forces in the struggle for accountability : An overview of the issues entangling ATS litigation -- Human rights entrepreneurs : NGOs and the ATS revolution -- Separation of powers and human rights cases -- No safe haven : human rights cases challenging foreign countries and nationals -- Holding corporations accountable for human rights violations -- Sorting through the ashes : testing findings and predictions through quantitative analysis -- Impact and conclusion…”
Publicado 2008
Sumario
Libro -
400Publicado 2024Tabla de Contenidos:Libro electrónico