Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 46
- Historia 45
- Development 33
- Computer-aided design 31
- Data processing 31
- Management 31
- JavaScript (Computer program language) 29
- Application software 26
- indonesia 26
- Programming 24
- Architectural drawing 21
- Autodesk Revit 21
- Design 21
- Leadership 21
- Security measures 20
- Architectural design 19
- Computer security 18
- Computer graphics 17
- Crítica e interpretación 17
- Marketing 16
- Novela norteamericana 16
- Web site development 16
- Arquitectura 15
- Descubrimientos y exploraciones 15
- Història 15
- Success in business 15
- Business & Economics 14
- Computer programs 14
- Video games 14
- Business 13
-
1281Publicado 2014Tabla de Contenidos: “…Size Matters: Quantify Your ImpactPart-Time Jobs and Internships; Extracurriculars; Volunteering; Start Something; Questions and Answers; Well, There Go the College Hires; Will Code for Food; The Un-manager; Chapter 3: Getting in the Door; The Black Hole: Online Job Submission; Making the Best of the Black Hole; Getting a Personal Referral; The Informational Interview; Reach Out to Recruiters; Alumni Network and Beyond; Career Fairs; Professional Recruiters; When Things Get Ugly: What to Watch Out For; Additional Avenues; Start Elsewhere; Contract Roles; Get Creative; Official Groups…”
Libro electrónico -
1282por Fox, Vanessa, 1972-Tabla de Contenidos: “…Using Search Data for Better Business Strategy and Stronger Customer EngagementA Better Strategy for Increased Customers and a More Successful Business; Chapter 3: How We Search; Query Types; Determining Intent; Query Refinements; Using Demographic Data; How Searchers Evaluate the Page They've Clicked On; Chapter 4: Building Searcher Personas: Opening the Door to the Crowd of Customers You've Been Keeping Out; Search Acquisition Strategy Process; Chapter 5: How Search Engines Work; The Evolution of Search Engines; The Introduction of Pagerank; The Current State of Search Engines…”
Publicado 2012
Libro electrónico -
1283por Gerhard, MarkTabla de Contenidos: “…Importing Revit Files into 3ds MaxThe Bottom Line; Chapter 6: Creating AEC Objects; Creating a Parametric Wall; Adding Doors and Windows to Walls; Changing Elevations with Stairs; Setting Boundaries with Railings; Adding Foliage to a Scene; The Bottom Line; Chapter 7: Organizing and Editing Objects; Naming Objects; Organizing Objects by Layers; Lofting an Object; Using the Noise Modifier; Extruding with the Sweep Modifier; Aligning Objects; The Bottom Line; Chapter 8: Light and Shadow; Lighting Your Model; Rendering a View; Ambient Light; Adding Shadow Effects; Playing in the Shadows…”
Publicado 2010
Libro electrónico -
1284por Geelhoed, FioreTabla de Contenidos: “…Cover; Title page; PREFACE; CONTENTS; FIGURES; INTRODUCTION; 1 REMOVING THE VEIL; 1.1 Islamic Fundamentalism in the West: The Dutch Case and a British Impression; 1.2 Getting Started: Three Research Methods; 1.2.1 Conducting Interviews; 1.2.2 Getting in Place for Observation; 1.2.3 Exploring Online Interactions; 1.3 Ethical Issues when Entering the Field; 1.3.1 Being an 'Unveiled' Non-Muslim Researcher; 1.3.2 Anonimity and Confidentiality; 1.3.3 Assuming Informed Consent; 1.3.4 Acceptance of Closed Inner Doors; 1.4 In the Field: Countering Obstacles and Limitations to Validity…”
Publicado 2014
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
1285Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Part 1: Attack Preparation -- Chapter 1: Mindset and Methodologies -- Approach and mindset -- The approach -- The process -- The testing techniques -- The baseline competencies -- The mindset -- Methodologies and frameworks -- NIST SP 800-115 -- Penetration Testing Execution Standard (PTES) -- OWASP's WSTG -- ISECOM's OSSTMM -- The recipe -- Summary -- Further reading -- Chapter 2: Toolset for Web Attacks and Exploitation -- Technical requirements -- Operating systems and the tools of the trade -- Operating system -- Linux -- Windows -- macOS -- Browser -- Interception proxy -- Python for automating web tasks -- Virtualization and containerization systems -- VirtualBox -- Docker -- Summary -- Further reading -- Part 2: Evergreen Attacks -- Chapter 3: Attacking the Authentication Layer - a SAML Use Case -- Technical requirements -- Scenario files -- The Doors of Durin SAML login scenario -- How does SAML work and what are its vulnerabilities? …”
Libro electrónico -
1286por London, Jonathan“…By applying these principles, you'll open more doors, increase your productivity, speed up decisions, and close more deals." …”
Publicado 2012
Libro electrónico -
1287por Nolan, Godfrey“…This is becoming an increasingly important topic as the Android marketplace grows and developers are unwittingly releasing the apps with lots of back doors allowing people to potentially obtain credit card information and database logins to back-end systems, as they don’t realize how easy it is to decompile their Android code. …”
Publicado 2012
Libro electrónico -
1288por OECDTabla de Contenidos: “…Engagement with lobbyists and public officials encourages compliance with transparency requirements -- Digital tools and automatic verifications are useful for increasing public scrutiny -- Audit and review of the rules and guidelines on lobbying is limited -- A limited number of countries have carried out audits and reviews -- External oversight has proven valuable in identifying gaps in implementation -- References -- 3 Integrity -- Introduction -- Public officials need an integrity framework adapted to the risks of lobbying and other influence activities -- Few countries have specific integrity standards for public officials on lobbying activities -- Public officials require additional guidance to assess the reliability of information -- Rules on gifts, invitations and hospitalities are robust, but need continued attention -- The revolving door is still a concern, despite strict standards for managing conflicts of interest. -- Post-public employment -- Pre-public employment -- Guidance, capacity building and awareness raising can be increased -- Companies and lobbyists need a full integrity framework to engage in policy making -- Companies and lobbyists need comprehensive, detailed integrity standards -- Misalignment between companies' public commitments and lobbying practices reduce trust in public decision making -- References -- 4 Access -- Introduction -- Opportunities for participation need to be increased -- Stakeholders may not always be aware of opportunities to participate -- Stakeholders are introduced into the policy-making process at too late a stage -- Limited information is available to stakeholders -- Stakeholders' capacity needs to be carefully evaluated -- Stakeholders' capacities and capabilities need to be taken into account -- Stakeholders face marginal benefits and high costs for participation…”
Publicado 2021
Libro electrónico -
1289Publicado 2016Tabla de Contenidos: “…Step 2: Create Custom Fields within the CRM SystemStep 3: Mapping the Fields to Reports in Salesforce; Refine and Optimize the Entire Process; Company Databases; CrunchBase and AngelList; Owler; Mattermark; Socedo; Chapter 4: List Building: Part 3: Getting in the Door; Top-Down and Bottom-Up Targeting; Top-Down Targeting; Bottom-Up Targeting; LinkedIn Sales Navigator; Node.io; DataFox; Growbots; Spiderbook; RainKing; Lean on Your Industry Allies; SellerCrowd; Using Twitter to Generate Warm Leads; Socedo; Chapter 5: Uncovering Contact Information; Remove Duplicates Early On; Toofr; ZoomInfo…”
Libro electrónico -
1290Publicado 2015Tabla de Contenidos: “…; Self-awareness can unlock the door to a brilliant life; SUMO Summary; Chapter 2 Change Your T-shirt; The great BSE crisis; So why wear the T-shirt in the first place?…”
Libro electrónico -
1291por Maurer, Paul J.Tabla de Contenidos: “…The Security Audit Checkmark -- Chapter 7 Practicing Cyber Kung Fu -- Essential to Success: Patience, Wisdom, and Self-Control -- Remember the Titanic -- A Few Principles for Emergency Planning -- Stay Calm, Cool, and Collected -- Our Job Is Not Revenge -- Develop Your Cyber Kung Fu -- Case Study: An Open Door: Vigilante Justice -- Chapter 8 No Sticky Fingers Allowed -- If It's Free, It's for Me? …”
Publicado 2024
Libro electrónico -
1292por Grover, Chris, 1955-Tabla de Contenidos: “…Using Auto-Fold with Circles and CylindersUsing Info Entity to Edit 3-D Objects; Drawing a Basic House; Locking an Inference; Working with Sloped Surfaces; Referencing a Sloped Surface; Yet Another Way to Reference a Slope; Inference Locking with the Move Tool; Using Inference Locking with Shape Tools; Making Doors and Windows; Using the Offset Tool; Building a Roof with an Overhang; Initial Landscaping: Front Walk and Driveway; Working Smarter with Groups and Components; Creating a Group; Editing and Modifying a Group; Creating Components; Speeding Up Construction with Arrays…”
Publicado 2009
Libro electrónico -
1293por West, Adrian W.Tabla de Contenidos: “…Tutorial for the Tabbed MenuHorizontal Menus with Rounded Tabs; Horizontal Tab Menus Using an Image; Using Button Images for Tabs; Sliding Doors Technique; Vertical Rollover Navigation Menus; Create an Active-Page Button; Horizontal and Vertical Menus on the Same Page; Summary; CHAPTER 5 Moving to CSS3; CSS3 Gradients; Linear Gradients; Radial Gradients; CSS3 Opacity and RGBA Colors; New CSS3 Selectors and Elements; ::first letter; ::first line; ::before; :nth-child(); Font Selectors; Using Current, Future, and Other Modules; Summary; CHAPTER 6 Audio, Video, and Slide Shows…”
Publicado 2012
Libro electrónico -
1294por Stratten, ScottTabla de Contenidos: “…; Invasion of Sanity and Sanitation; I Don't Feel Special; The Door to Digital Success; Twipster; O Canada; Working Hard; Mistaken Mobile Metrics; Caution! …”
Publicado 2014
Libro electrónico -
1295por Griffin, Terry, 1962-Tabla de Contenidos: “…The Record/Play BlockThe Remote Control Tool; Conclusion; 5: Sensors; Using the Sensors; The Touch Sensor; The BumperBot Program; The Sound Sensor; BumperBot with Sound; The Light and Color Sensors; The RedOrBlue Program; The Ultrasonic Sensor; Door Chime; The Rotation Sensor; The BumperBot2 Program; Conclusion; 6: Program Flow; The Sequence Beam; The Switch Block; The Loop Block; The Keep Alive Block; The Stop Block; Conclusion; 7: The WallFollower Program: Navigating a Maze; Pseudocode; Solving a Maze; Program Requirements; Assumptions; Initial Design; Following a Straight Wall…”
Publicado 2010
Libro electrónico -
1296por Callaway, Joseph, 1943-Tabla de Contenidos: “…; May As Well Close the Doors; Two Is the Road to Failure; Clients First Makes Us Competitive; Like a Religious Experience; She Had Drive and Determination; 22: Going Forward; We Had No Idea…”
Publicado 2012
Libro electrónico -
1297por Scott, David MeermanTabla de Contenidos: “…When You Have Hot NewsHow to Deflate a Scandal; The Time Is Now; The Million-Dollar Door; 8 What Are People Saying about You This Instant?…”
Publicado 2012
Libro electrónico -
1298por Wiles, JackTabla de Contenidos: “…Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?…”
Publicado 2012
Libro electrónico -
1299Publicado 2011Tabla de Contenidos: “…Four Major Types of Training -- Pulling the Four Types of Training Together -- 25 Training Activities You Can Use -- Summarizing the Activities -- Closing the Door on This Active Chapter -- Remember This -- Chapter 9: Testing or Examining-What's the Difference? …”
Libro electrónico -
1300por James, KarenTabla de Contenidos: “…Which self are you putting forward?Opening the door; The power of the mind; A word on transformation; Theory U; Do you know your blind spots?…”
Publicado 2015
Libro electrónico