Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFM 2,694
- Gestió de projectes 1,302
- Empreses 1,057
- Universidad Pontificia de Salamanca (España) 987
- Direcció i administració 882
- Planificació estratègica 792
- Development 785
- TFMP 721
- Application software 720
- Engineering & Applied Sciences 583
- Planificació 566
- Management 423
- Computer programs 420
- Computer Science 404
- Computer networks 359
- Examinations 350
- Data processing 338
- Python (Computer program language) 328
- Computer programming 304
- Arquitectura 298
- Edificis 297
- Sistemes d'informació per a la gestió 294
- Design 281
- History 277
- Indústria i comerç 274
- Comerç electrònic 273
- Cloud computing 269
- Certification 266
- Photography 262
- Operating systems (Computers) 259
-
18641por Lashin, AhmedTabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Preface -- Table of Contents -- Chapter 1: Report Authoring Basic Concepts -- Introduction -- Summary filters and detail filters -- Sorting grouped values -- Aggregation and rollup aggregation -- Implementing if-then-else in filters -- Formatting data - dates, numbers, and percentages -- Creating sections -- Hiding columns in crosstabs -- Prompts - display value versus use value -- Chapter 2 : Advanced Report Authoring -- Introduction -- Adding cascaded prompts -- Creating a nested report - defining the master detail relationship -- Writing back to the database -- Adding conditional formatting -- Formatting negative values -- Playing with conditional styles -- Using conditional blocks - many reports in one -- Defining drill-through from crosstab intersection -- Overriding crosstab intersection drill-through definitions -- Chapter 3 : Using JavaScript Files - Tips and Tricks -- Introduction -- Defining dynamic default values for prompts -- Changing the title of the value prompt -- Validating textbox prompts -- Showing/hiding prompt controls at runtime -- Selecting and submitting values automatically -- Manipulating the Date Time control -- Creating a variable width bar chart using JavaScript -- Chapter 4 : The Report Page - Tips and Tricks -- Introduction -- Showing images dynamically (traffic light report) -- Handling the missing image issue -- Dynamic links to an external website (a Google Maps example) -- Alternating drill links -- Showing tooltips on reports -- Merged cells in Excel output -- Worksheet name in Excel output -- Conditional column titles -- Chapter 5 : Working with XML -- Introduction -- Changing drill targets quickly -- Copying and pasting drill links -- Removing references to old packages or items…”
Publicado 2013
Libro electrónico -
18642Publicado 2015Tabla de Contenidos: “…Front Cover -- Business Intelligence Guidebook -- Copyright -- Contents -- Foreword -- How to Use This Book -- CHAPTER SUMMARIES -- Acknowledgments -- PART I - CONCEPTS AND CONTEXT -- CHAPTER 1 - THE BUSINESS DEMAND FOR DATA, INFORMATION, AND ANALYTICS -- JUST ONE WORD: DATA -- WELCOME TO THE DATA DELUGE -- TAMING THE ANALYTICS DELUGE -- TOO MUCH DATA, TOO LITTLE INFORMATION -- DATA CAPTURE VERSUS INFORMATION ANALYSIS -- THE FIVE CS OF DATA -- COMMON TERMINOLOGY FROM OUR PERSPECTIVE -- REFERENCES -- PART II - BUSINESS AND TECHNICAL NEEDS -- CHAPTER 2 - JUSTIFYING BI: BUILDING THE BUSINESS AND TECHNICAL CASE -- WHY JUSTIFICATION IS NEEDED -- BUILDING THE BUSINESS CASE -- BUILDING THE TECHNICAL CASE -- ASSESSING READINESS -- CREATING A BI ROAD MAP -- DEVELOPING SCOPE, PRELIMINARY PLAN, AND BUDGET -- OBTAINING APPROVAL -- COMMON JUSTIFICATION PITFALLS -- CHAPTER 3 - DEFINING REQUIREMENTS-BUSINESS, DATA AND QUALITY -- THE PURPOSE OF DEFINING REQUIREMENTS -- GOALS -- DELIVERABLES -- ROLES -- DEFINING REQUIREMENTS WORKFLOW -- INTERVIEWING -- DOCUMENTING REQUIREMENTS -- PART III - ARCHITECTURALFRAMEWORK -- CHAPTER 4 - ARCHITECTURE FRAMEWORK -- THE NEED FOR ARCHITECTURAL BLUEPRINTS -- ARCHITECTURAL FRAMEWORK -- INFORMATION ARCHITECTURE -- DATA ARCHITECTURE -- TECHNICAL ARCHITECTURE -- PRODUCT ARCHITECTURE -- METADATA -- SECURITY AND PRIVACY -- AVOIDING ACCIDENTS WITH ARCHITECTURAL PLANNING -- DO NOT OBSESS OVER THE ARCHITECTURE -- CHAPTER 5 - INFORMATION ARCHITECTURE -- THE PURPOSE OF AN INFORMATION ARCHITECTURE -- DATA INTEGRATION FRAMEWORK -- DIF INFORMATION ARCHITECTURE -- OPERATIONAL BI VERSUS ANALYTICAL BI -- MASTER DATA MANAGEMENT -- CHAPTER 6 - DATA ARCHITECTURE -- THE PURPOSE OF A DATA ARCHITECTURE -- HISTORY -- DATA ARCHITECTURAL CHOICES -- DATA INTEGRATION WORKFLOW -- DATA WORKFLOW-RISE OF EDW AGAIN -- OPERATIONAL DATA STORE -- REFERENCES…”
Libro electrónico -
18643Publicado 2002Tabla de Contenidos: “…Roitblat -- Chimpanzee Ai and her son Ayumu: an episode of education by master-apprenticeship / Tetsuro Matsuzawa -- The evolution and ontogeny of ordinal numerical ability / Elizabeth M. …”
Libro electrónico -
18644por McFedries, PaulTabla de Contenidos: “…Cover -- Contents -- Introduction -- What's in the Book -- This Book's Special Features -- I: MASTERING EXCEL RANGES AND FORMULAS -- 1 Getting the Most Out of Ranges -- Advanced Range-Selection Techniques -- Data Entry in a Range -- Filling a Range -- Using the Fill Handle -- Creating a Series -- Advanced Range Copying -- Copying Selected Cell Attributes -- Clearing a Range -- Applying Conditional Formatting to a Range -- 2 Using Range Names -- Defining a Range Name -- Working with Range Names -- 3 Building Basic Formulas -- Understanding Formula Basics -- Understanding Operator Precedence -- Controlling Worksheet Calculation -- Copying and Moving Formulas -- Displaying Worksheet Formulas -- Converting a Formula to a Value -- Working with Range Names in Formulas -- Working with Links in Formulas -- Formatting Numbers, Dates, and Times -- 4 Creating Advanced Formulas -- Working with Arrays -- Understanding Array Formulas -- Using Array Constants -- Using Iteration and Circular References -- Consolidating Multisheet Data -- Applying Data-Validation Rules to Cells -- Using Dialog Box Controls on a Worksheet -- 5 Troubleshooting Formulas -- Understanding Excel's Error Values -- Fixing Other Formula Errors -- Handling Formula Errors with IFERROR( ) -- Using the Formula Error Checker -- Auditing a Worksheet -- II: HARNESSING THE POWER OF FUNCTIONS -- 6 Understanding Functions -- About Excel's Functions -- The Structure of a Function -- Typing a Function into a Formula -- Using the Insert Function Feature -- Loading the Analysis ToolPak -- 7 Working with Text Functions -- Excel's Text Functions -- Working with Characters and Codes -- Converting Text -- Formatting Text -- Manipulating Text -- Removing Unwanted Characters from a String -- Extracting a Substring -- Searching for Substrings -- Case Study: Generating Account Numbers…”
Publicado 2011
Libro electrónico -
18645Publicado 2017Tabla de Contenidos: “…-- Arithmetic Operators -- Comparison Operators -- Date Time Functions -- String Functions -- Regular Expression Functions -- Functions for transformation -- Mastering transformation with User-Defined Functions -- Some considerations when using UDFs -- UDF format -- Summary -- Further Reading -- Chapter 4: BigQuery SQL Basic -- The BigQuery interface -- Error checking -- Querying in BigQuery -- Types of queries -- Querying public data -- Basic SQL syntax -- Commenting in BigQuery SQL…”
Libro electrónico -
18646Publicado 2017Tabla de Contenidos: “…-- 9: Mobilize Hearts and Minds Forward -- Leave the Abstract and Make an Impression -- End the Suspense: Make the Unknown Future Known -- How to Mobilize Hearts and Minds Forward -- What Does Your Team Anticipate? -- To Execute Masterfully, Use These Classes Of Mobilizing Questions -- Achieve Something Bigger -- 10: Is Your Team Ready to Do Big Things? …”
Libro electrónico -
18647Publicado 2010Tabla de Contenidos: “…Binding Data to a Control -- Summary -- Chapter 11: Bringing It All Together -- Adding Reusable Assets with Component Screens -- Adding Annotations to Our Project -- Creating Documentation -- Summary -- Part III: Understanding SketchFlow -- Chapter 12: The SketchFlow Interface -- The Workspace -- The Tools Panel -- The Projects Panel -- The Assets Panel -- The States Panel -- Objects in the Objects and Timeline Panel -- Timelines in the Objects and Timeline Panel -- SketchFlow Animation Panel -- Artboard Panel -- SketchFlow Map -- The Results Panel -- The Properties Panel -- The Resources Panel -- The Data Panel -- The Feedback Panel -- Application Menus -- Summary -- Chapter 13: Assets, Styles, and Components -- SketchFlow Style Assets -- Working with Styles -- Understanding Styles, Templates, and Resources -- Working with Components -- Summary -- Chapter 14: SketchFlow Animation and States -- Animation Models in SketchFlow and Expression Blend -- SketchFlow Animation -- States -- Keyframe Animation and Storyboards -- Summary -- Chapter 15: SketchFlow Behaviors -- How Behaviors Work -- Triggers and Actions -- Behavior -- Adding Behaviors and Setting Properties -- Summary -- Chapter 16: Data -- Understanding Data and Binding -- The Data Panel -- Creating Data Resources for SketchFlow Projects -- Working with Data in SketchFlow -- Summary -- Chapter 17: Annotating Your Work, Getting Feedback, and Creating Documentation -- Adding Annotations to Your Project -- Getting Feedback with the SketchFlow Player -- Navigation in the SketchFlow Player -- Importing Feedback into Your Project -- Creating Documentation -- Summary -- Part IV: Applied Knowledge -- Chapter 18: Project Brief and Sketches -- Project Brief -- Loyal Customer Survey -- Sketching Ideas -- Refinement and Master Sketches -- Summary -- Chapter 19: Navigation Via Component Screens…”
Libro electrónico -
18648Publicado 2022Tabla de Contenidos: “…Server software component (T1505) -- Escalating privileges -- Exploiting for privilege escalation (T1068) -- Creating or modifying system process (T1543) -- Process injection (T1055) -- Abuse elevation control mechanism (T1548) -- Bypassing defenses -- Exploiting for defense evasion (T1211) -- Deobfuscating/decoding files or information (T1140) -- File and directory permissions modification (T1222) -- Impairing defenses (T1562) -- Indicator removal on host (T1070) -- Signed binary proxy execution (T1218) -- Accessing credentials -- Brute force (T1110) -- OS credential dumping (T1003) -- Steal or forge Kerberos tickets (T1558) -- Moving laterally -- Exploiting remote services (T1210) -- Remote services (T1021) -- Using alternate authentication material (T1550) -- Collecting and exfiltrating data -- Data from local system (T1005) -- Data from network shared drives (T1039) -- Email collection (T1114) -- Archive collected data (T1560) -- Exfiltration over web service (T1567) -- Automated exfiltration (T1020) -- Ransomware deployment -- Inhibit system recovery (T1490) -- Data encrypted for impact (T1490) -- Summary -- Chapter 6: Collecting Ransomware-Related Cyber Threat Intelligence -- Threat research reports -- Community -- Threat actors -- Summary -- Section 3: Practical Incident Response -- Chapter 7: Digital Forensic Artifacts and Their Main Sources -- Volatile memory collection and analysis -- Non-volatile data collection -- Master file table -- Prefetch files -- LNK files -- Jump lists -- SRUM -- Web browsers -- Windows Registry -- Windows event logs -- Other log sources -- Summary -- Chapter 8: Investigating Initial Access Techniques -- Collecting data sources for an external remote service abuse investigation -- Investigating an RDP brute-force attack -- Collecting data sources for a phishing attack investigation…”
Libro electrónico -
18649Publicado 2023Tabla de Contenidos: “…Part Three: Growing creative-destructive alignment (2017-present) -- The new international competition in green technologies and domestic environmental problems -- The creative and destructive elements of the third Five-Year Plan for Green Growth (2019-2023) -- The Second Five-Year Master Plan for smart grids -- Smart cities: National pilot smart cities -- Hybridized industrial ecosystems -- Destructive ambitions in action: Korea's efforts to phase out coal -- Concluding remarks -- 7 Creative-Destruction in China's Strong and Smart Grid Initiatives: The Shift to Ultra-High Voltage -- The pattern -- The puzzle -- China's electrification strategy -- Part One: The developmental origins of China's `strong and smart' grid focus (1990s-2006) -- Part Two: Developmental-environmentalism and the emergent greening of China's electric power grid (2007-2015) -- The shift to a UHV grid -- Executing the UHV strategic shift -- Part Three: Growing creative-destructive alignment (2015-present) -- Creating a hybridized industrial ecosystem for the grid: The building of an electric power equipment industry in China -- The full flowering of creative-destructive alignment: Internationalization of State Grid Corporation of China and the Chinese power industry -- Concluding remarks -- 8 Drivers and Dynamics of Northeast Asia's Green Energy Shift: A Comparative Strategic Analysis -- East Asian approaches to the green energy transition -- Grid hypermodernization -- Greening of transport: The shift to electric vehicles -- Dramatic incursion by Northeast Asian economies: Leapfrogging strategy -- Developmental environmentalism in action -- Aspect One: Developmental environmentalism as mindset and ambition driving the green energy transition -- Aspect Two: Developmental environmentalism as legitimation strategy…”
Libro electrónico -
18650Publicado 2023Tabla de Contenidos: “…Understanding the Player scene -- Gauging the Asteroid scene -- Unraveling the quest system -- Breaking down the World scene -- Logging the player in to the server -- Authenticating players -- Syncing the World scenes -- Separating server and client responsibilities -- Shooting bullets on all instances -- Calculating an asteroid's damage -- Storing and retrieving data on the server -- Implementing the quest system's client side -- Implementing the quest system's server side -- Summary -- Part 3: Optimizing the Online Experience -- Chapter 10: Debugging and Profiling the Network -- Technical requirements -- Introducing Godot's Debugger -- Mastering the Stack Trace tab -- Debugging with the Errors tab -- Exploring the Profiler tab -- Exploring the Visual Profiler tab -- Exploring the Monitors tab -- Getting to know the Video RAM tab -- Grasping the Misc tab -- Understanding the Network Profiler -- Identifying the project's bottlenecks -- Using the Network Profiler -- Using the Monitors tab -- Summary -- Chapter 11: Optimizing Data Requests -- Technical requirements -- Understanding network resources -- Decreasing the requests count -- Reducing the weapon fire count -- Decreasing Asteroid's syncing count -- Compressing data with the ENetConnection class -- Summary -- Chapter 12: Implementing Lag Compensation -- Technical requirements -- Introducing lag issues -- Dealing with unreliable packets -- Common compensation techniques -- Implementing server-side motion -- Bridging the gaps with interpolation -- Playing ahead with prediction -- Gazing into the future with extrapolation -- Summary -- Chapter 13: Caching Data to Decrease Bandwidth -- Technical requirements -- Understanding caching -- Setting up the HTTPRequest node -- Understanding the HTTP protocol -- Setting up the scenes and database -- Implementing texture caching…”
Libro electrónico -
18651Publicado 2024Tabla de Contenidos: “…Understanding hidden sources -- Diving into the deep and dark web -- Let's make sure we understand the internet -- Harvesting more with theHarvester -- Shodan -- Automating OSINT collection and analysis -- Summary -- Chapter 4: Exploring the Unknown - How Discovery Tools Reveal Hidden Information -- Introduction to discovery tools -- Unlocking network secrets -- Domain and IP address analysis -- Understanding the DNA of WHOIS - Its definition and purpose -- Applicability - Not just domains but IP blocks too -- The online magnifying glasses - Popular WHOIS lookup platforms -- Finding the connections -- The darker side - When attackers use WHOIS -- DNS and IP analysis - Connecting domains to infrastructure -- Traceroute and network mapping - Navigating the vast cyber seas -- Website reconnaissance - Mastering the unseen layers -- Web page scraping and analysis -- Document and metadata analysis -- Identifying hidden information in documents and files -- Analyzing document contents for valuable clues -- OSINT data visualization -- Tools and techniques for visualizing OSINT data -- Best practices for using discovery tools -- Summary -- Chapter 5: From Recon-ng to Trace Labs - A Tour of the Best Open Source Intelligence Tools -- Recon-ng - A powerful OSINT framework -- Running modules and gathering information with Recon-ng -- Maltego - Visualizing OSINT data and connections -- Getting started with Maltego for OSINT investigations -- Discovering the infrastructure -- Shodan - The search engine for IoT -- Getting started with Shodan -- Using Shodan's API -- Trace Labs - A powerful OS designed just for OSINT -- Overview of the Aircrack-ng suite -- Airmon-ng -- Airodump-ng -- Aireplay-ng -- Aircrack-ng -- Airbase-ng -- Airgraph-ng -- Finding hidden networks -- Additional open source OSINT tools -- SpiderFoot -- Twint -- Some final thoughts on tools…”
Libro electrónico -
18652por Carr, OliviaTabla de Contenidos: “…-- Your journey will look different -- Being comfortable on your journey -- Chapter 9 Mastering your mindset: Overcoming obstacles and unleashing your full potential -- So what is a growth mindset? …”
Publicado 2023
Libro electrónico -
18653
-
18654
-
18655
-
18656
-
18657
-
18658
-
18659
-
18660