Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Online social networks 295
- Social networks 177
- Social media 139
- Internet marketing 117
- Social aspects 86
- Management 72
- Internet 68
- Data mining 66
- Economic aspects 62
- Computer networks 58
- Computer network resources 56
- Application software 54
- Facebook (Electronic resource) 54
- Marketing 54
- Engineering & Applied Sciences 53
- Development 50
- Security measures 48
- Computer security 46
- Data processing 44
- Social Sciences 42
- Business networks 41
- Design 39
- Web sites 39
- Information technology 38
- History 37
- Social Change 35
- Sociology & Social History 34
- Twitter 34
- Technological innovations 33
- Electrical & Computer Engineering 32
-
1501Publicado 2017Tabla de Contenidos: “…-- Single sign on using a social network like Twitter or Facebook -- Show us what you have got -- Phone number sign-up - a great alternative -- Continuous onboarding - complete the user profile later -- Tell a story - an example onboarding app -- Onboarding sign-up when needed -- Implementation -- Summary -- Chapter 12: Do Things That Do Not Scale -- What we mean by "things that do not scale -- Three reasons to do things that do not scale -- Improved testing and data collection -- Failure that can be controlled -- Development of products that are more lovable -- How to acquire early adopters and establish a small-scale laboratory -- Focusing on a narrow marketplace -- Manually recruiting early adopters -- Perfecting the user experience -- How to transition from an unscalable MVP to scalable code -- Focusing on learning with wireframes and prototypes -- Zeplin -- InVision -- UserTesting.com -- Focusing on scaling and sustainability -- Writing perfect code versus getting the job done -- Automation and optimization -- How to handle technical debt -- Summary…”
Libro electrónico -
1502por Hassler, MarcoTabla de Contenidos: “…6.4.1 Was gemessen werden kann -- 6.4.2 Wie Sie es nutzen sollten -- 6.4.3 Was es zu beachten gilt -- 6.5 Kampagnen -- 6.5.1 Was gemessen werden kann -- 6.5.2 Wie Sie es nutzen sollten -- 6.5.3 Was es zu beachten gilt -- 6.6 Traffic von Social Networks wie Twitter bzw. X, Facebook oder LinkedIn -- 6.6.1 Was gemessen werden kann -- 6.6.2 Wie Sie es nutzen sollten -- 6.6.3 Was es zu beachten gilt -- Kapitel 7: Besuchereigenschaften -- 7.1 Neue und wiederkehrende Besucher -- 7.1.1 Was gemessen werden kann -- 7.1.2 Wie Sie es nutzen sollten -- 7.1.3 Was es zu beachten gilt -- 7.2 Herkunftsland, Region und Stadt -- 7.2.1 Was gemessen werden kann -- 7.2.2 Wie Sie es nutzen sollten -- 7.2.3 Was es zu beachten gilt -- 7.3 Sprache -- 7.3.1 Was gemessen werden kann -- 7.3.2 Wie Sie es nutzen sollten -- 7.3.3 Was es zu beachten gilt -- 7.4 Geschlecht und Altersgruppe -- 7.4.1 Was gemessen werden kann -- 7.4.2 Wie Sie es nutzen sollten -- 7.4.3 Was es zu beachten gilt -- 7.5 Gerät, Browser, Bildschirmgröße und weitere technische Eigenschaften -- 7.5.1 Was gemessen werden kann -- 7.5.2 Wie Sie es nutzen sollten -- 7.5.3 Was es zu beachten gilt -- Kapitel 8: Besucherverhalten -- 8.1 Besuchsdauer -- 8.1.1 Was gemessen werden kann -- 8.1.2 Wie Sie es nutzen sollten -- 8.1.3 Was es zu beachten gilt -- 8.2 Besuchstiefe -- 8.2.1 Was gemessen werden kann -- 8.2.2 Wie Sie es nutzen sollten -- 8.2.3 Was es zu beachten gilt -- 8.3 Absprungrate und Interaktionsrate -- 8.3.1 Was gemessen werden kann -- 8.3.2 Wie Sie es nutzen sollten -- 8.3.3 Was es zu beachten gilt -- 8.4 Besuchstreue - Wiederkehr-Häufigkeit, -Frequenz und -Aktualität -- 8.4.1 Was gemessen werden kann -- 8.4.2 Wie sie es nutzen sollten -- 8.4.3 Was es zu beachten gilt -- 8.5 Navigationsverhalten -- 8.5.1 Was gemessen werden kann…”
Publicado 2023
Libro electrónico -
1503Publicado 2018Tabla de Contenidos: “…-- Features of Neo4j -- Clustering -- Neo4j Browser -- Cache sharding -- Help for beginners -- Evaluating your use case -- Social networks -- Matchmaking -- Network management -- Analytics -- Recommendation engines -- Neo4j anti-patterns -- Applying relational modeling techniques in Neo4j -- Using Neo4j for the first time on something mission-critical -- Storing entities and relationships within entities -- Improper use of relationship types -- Storing binary large object data -- Indexing everything -- Neo4j hardware selection, installation, and configuration -- Random access memory -- CPU -- Disk -- Operating system -- Network/firewall -- Installation -- Installing JVM -- Configuration -- High-availability clustering…”
Libro electrónico -
1504Publicado 2021Tabla de Contenidos: “…Chapter 4 Footprinting and Reconnaissance -- Open Source Intelligence -- Companies -- People -- Social Networking -- Domain Name System -- Name Lookups -- Zone Transfers -- Passive DNS -- Passive Reconnaissance -- Website Intelligence -- Technology Intelligence -- Google Hacking -- Internet of Things (IoT) -- Summary -- Review Questions -- Chapter 5 Scanning Networks -- Ping Sweeps -- Using fping -- Using MegaPing -- Port Scanning -- Nmap -- masscan -- MegaPing -- Metasploit -- Vulnerability Scanning -- OpenVAS -- Nessus -- Looking for Vulnerabilities with Metasploit -- Packet Crafting and Manipulation -- hping -- packETH -- fragroute -- Evasion Techniques -- Protecting and Detecting -- Summary -- Review Questions -- Chapter 6 Enumeration -- Service Enumeration -- Remote Procedure Calls -- SunRPC -- Remote Method Invocation -- Server Message Block -- Built-in Utilities -- nmap Scripts -- NetBIOS Enumerator -- Metasploit -- Other Utilities -- Simple Network Management Protocol -- Simple Mail Transfer Protocol -- Web-Based Enumeration -- Summary -- Review Questions -- Chapter 7 System Hacking -- Searching for Exploits -- System Compromise -- Metasploit Modules -- Exploit-DB -- Gathering Passwords -- Password Cracking -- John the Ripper -- Rainbow Tables -- Kerberoasting -- Client-Side Vulnerabilities -- Living Off the Land -- Fuzzing -- Post Exploitation -- Evasion -- Privilege Escalation -- Pivoting -- Persistence -- Covering Tracks -- Summary -- Review Questions -- Chapter 8 Malware -- Malware Types -- Virus -- Worm -- Trojan -- Botnet -- Ransomware -- Dropper -- Malware Analysis -- Static Analysis -- Dynamic Analysis -- Creating Malware -- Writing Your Own -- Using Metasploit -- Obfuscating -- Malware Infrastructure -- Antivirus Solutions -- Persistence -- Summary -- Review Questions -- Chapter 9 Sniffing -- Packet Capture -- tcpdump -- tshark…”
Libro electrónico -
1505Publicado 2018Tabla de Contenidos: “…Estimating probabilities from an ensemble -- Sequences of models - AdaBoost -- Gradient tree boosting (GTB) -- XGBoost -- LightGBM -- CatBoost -- Dealing with big data -- Creating some big datasets as examples -- Scalability with volume -- Keeping up with velocity -- Dealing with variety -- An overview of Stochastic Gradient Descent (SGD) -- A peek into natural language processing (NLP) -- Word tokenization -- Stemming -- Word tagging -- Named entity recognition (NER) -- Stopwords -- A complete data science example - text classification -- An overview of unsupervised learning -- K-means -- DBSCAN - a density-based clustering technique -- Latent Dirichlet Allocation (LDA) -- Summary -- Chapter 5: Visualization, Insights, and Results -- Introducing the basics of matplotlib -- Trying curve plotting -- Using panels for clearer representations -- Plotting scatterplots for relationships in data -- Histograms -- Bar graphs -- Image visualization -- Selected graphical examples with pandas -- Working with boxplots and histograms -- Plotting scatterplots -- Discovering patterns by parallel coordinates -- Wrapping up matplotlib's commands -- Introducing Seaborn -- Enhancing your EDA capabilities -- Advanced data learning representation -- Learning curves -- Validation curves -- Feature importance for RandomForests -- Gradient Boosting Trees partial dependence plotting -- Creating a prediction server with machine-learning-as-a-service -- Summary -- Chapter 6: Social Network Analysis -- Introduction to graph theory -- Graph algorithms -- Types of node centrality -- Partitioning a network -- Graph loading, dumping, and sampling -- Summary -- Chapter 7: Deep Learning Beyond the Basics -- Approaching deep learning -- Classifying images with CNN -- Using pre-trained models -- Working with temporal sequences -- Summary -- Chapter 8: Spark for Big Data…”
Libro electrónico -
1506Publicado 2018Tabla de Contenidos: “…</P><P>Models of learning </P><P>Models underlying a classical view of pedagogy </P><P>Constructivism </P><P>Andragogy </P><P>Heutagogy </P><P>The main elements of the self-directed learning of science and technology </P><P>Theories of motivation and self-determination </P><P>Individual engagement with science and technology </P><P>References </P><P>Chapter 3: Learning to Deal with Medical Issues </P><P>Abstract </P><P>Seeking solutions to health problems </P><P>Ana's story: First pregnancy </P><P>Penny's story: An "invisible disability" </P><P>Mary's story: A lifelong challenge </P><P>Commentary on the three case stories </P><P>References </P><P>Chapter 4: Pursuing Personal Interests -- Learning through Hobbies </P><P>Abstract </P><P>Pursuing a life-long hobby </P><P>Richard's Story: Building a Logie Baird televisor </P><P>Michael's Story: Creating Complex Jewellery </P><P>Pursuing Environmental Interests </P><P>Tina's Story: Surprise encounter with a bumblebee </P><P>Paulette's Story: Opaque Aquifers and Other Matters </P><P>Commentary on the four case stories </P><P>References </P><P>Chapter 5: Learning to Help Others </P><P>Abstract </P><P>Helping children </P><P>Paul's story: pop-up dinosaurs </P><P>Liz's story: Science for Mothers </P><P>The explainers </P><P>Tiki's story: Interpreting plants </P><P>Kristen's story: In the galleries </P><P>Warren's story: A science of place </P><P>Commentary on the five case stories </P><P>References </P><P>Chapter 6: Learning for Work </P><P>Abstract </P><P>Learning in and for the workplace </P><P>Hugh's story: An experience of life-long learning </P><P>Ketan's story: Understanding controversy </P><P>Keith's story: Life is a garden </P><P>Commentary on the three case stories </P><P>References </P><P>Chapter 7: Learning Through a Diversity of Approaches: The Case of the Moon Diary </P><P>Abstract </P><P>Introduction </P><P>The influence of learning styles and multiple intelligences </P><P>Free pathways and motivation </P><P>The Moon Diary assignment </P><P>Initial responses: from confusion to elation </P><P>Choosing the theme </P><P>Reflections </P><P>References </P><P>Chapter 8: Resources for Self-Directed Learning </P><P>Abstract </P><P>How self-directed learners use resources </P><P>Media resources </P><P>Printed resources </P><P>Electronic mass media </P><P>The Internet and social media </P><P>Quality of information portrayed by mass media </P><P>People as resources -- experts, friends, peers and colleagues </P><P>Experts in the field </P><P>Friends, peers, and colleagues </P><P>Course-taking and teachers </P><P>Internet e-learning platforms </P><P>Self-directed learning at education institutions </P><P>Personal resources </P><P>References </P><P>Chapter 9: Learning from New Media </P><P>Abstract </P><P>Characteristics of new media </P><P>Learning via the Internet: The digital divide </P><P>Motivation to search the Internet </P><P>Checking facts </P><P>Focused searching </P><P>Exploration and discovery </P><P>Learning about science through new media: Social networks </P><P>Hazards of new media </P><P>Judging a credible source </P><P>Helping people to learn from the Internet </P><P>References </P><P>Chapter 10: Supporting Self-directed Learning in Science and Technology </P><P>Abstract </P><P>Introduction </P><P>Essential skills for effective self-directed learning </P><P>Prerequisite personal resources for self-directed learners </P><P>Motivation toward the chosen task </P><P>Active engagement in learning </P><P>Self-efficacy as a learner </P><P>Partnerships for learning </P><P>Mentoring relationships </P><P>Varieties of mentorship </P><P>Learning relationships in our case stories </P><P>Learning relationships and online media </P><P>How to support self-directed learners </P><P>Likely supporters of self-directed learners </P><P>Educators providing formal learning experiences </P><P>Specialists and community liaison people </P><P>Staff in the educational sections of cultural organisations </P><P>Effective communication </P><P>References </P><P>Chapter 11: Advancing the Cause of Adult Literacy in Science and Technology </P><P>Abstract </P><P>Science in the school curriculum </P><P>Dealing with science and technology in everyday life </P><P>Technology in the school curriculum </P><P>The curricular relevance of STEM and STEAM </P><P>The relevance of an integrated curriculum </P><P>Developing literacy in science and technology </P><P>Increasing "Science Capital" </P><P>Providing knowledge and skills to facilitate universal scientific literacy </P><P>Achieving the goals of lifelong learning in science and technology </P><P>References</P>…”
Libro electrónico -
1507Publicado 2020Tabla de Contenidos: “…Acknowledgments 11 -- Abstract . 13 -- List of Figures . 15 -- List of Tables 17 -- 1 Introduction . 19 -- 1.1 Relevance of the Study . 20 -- 1.2 Structure of the Study . 24 -- Theoretical Part -- 2 Moving with Skills: A Review of the Literature 31 -- 2.1 Historical Overview 31 -- 2.2 Conceptual Overview . 33 -- 2.2.1 State . 33 -- 2.2.2 Employer . 34 -- 2.2.3 Migrants, Families, and Couples . 35 -- 2.3 Highly-Skilled Migration Studies . 36 -- 2.3.1 Dichotomising Migration . 36 -- 2.3.2 Deepening Migration 39 -- 2.3.3 Intermediary Summary: Construction of a Polarisation I . 42 -- 2.4 Expatriation Studies 43 -- 2.4.1 Defining Expatriates 44 -- 2.4.2 Assigned Expatriate and Self-Initiated Expatriate 46 -- 2.4.3 Expatriate Adjustments 49 -- 2.4.4 Intermediary Summary: Construction of a Polarisation II . 56 -- 2.5 Gender and Highly-Skilled Migration . 57 -- 2.5.1 Gender Binaries . 58 -- 2.5.2 Gender as a Dichotomous Variable . 60 -- 2.5.3 Gender as a Relational and Situational Feature . 61 -- 2.5.4 Intermediary Summary: Overcoming the Polarisation 69 -- 3 Decentring the Research on Highly-Skilled Migration and -- Expatriation: Three Methodological Premises . 71 -- 3.1 Decentring and Deconstructing . 71 -- 3.2 Methodological Individualism 73 -- 3.2.1 Defining the Family and the Couple . 74 -- 3.2.2 The Hidden Economy of Kinship 77 -- 3.2.3 Doing Family 78 -- 3.3 Methodological Nationalism . 80 -- 3.3.1 Changing the Entry Points . 81 -- 3.4 Methodological Economism . 84 -- 3.4.1 Mobility and Migration 84 -- 3.4.2 Temporal Mobilities and Permanent Migration 86 -- 3.4.3 Defining and Problematising the Skills 87 -- 3.5 Research Questions 91 -- Methodological Part -- 4 Research Design 95 -- 4.1 Epistemology . 95 -- 4.2 Methods in Practice 99 -- 4.2.1 Accessing the Field 99 -- 4.2.2 Constructing the Interview Corpus 101 -- 4.2.3 Analysing the Interview Corpus 107 -- 5 Contextualising the Study 115 -- 5.1 Contextualising the Researcher 115 -- 5.2 Contextualising the Lake Geneva Region and Frankfurt RhineMain Region 118 -- 5.2.1 Family Policy in the two Regions 124 -- Empirical Part -- 6 Professional Careers Coordination . 137 -- 6.1 Migration Triggering: An Individual Approach . 138 -- 6.1.1 Assigned Expatriate . 138 -- 6.1.2 Drawn Expatriate . 139 -- 6.1.3 Intra Self-Initiated Expatriate 140 -- 6.1.4 Inter Self-Initiated Expatriate 141 -- 6.2 Migration Triggering: A Collective Approach 142 -- 6.2.1 Primary-Mover and Secondary-Mover 143 -- 6.3 Conceptualising the Professional Careers Coordination 145 -- 6.4 Primary-Mover 148 -- 6.4.1 Expat-Move 149 -- 6.4.2 Local-Move . 153 -- 6.4.3 Continuum of the Primary-Mover 155 -- 6.5 Secondary-Mover and Secondary-Stayer 157 -- 6.5.1 Total-Move of a Partner-Initiated Mover . 158 -- 6.5.2 Unique Challenges of a Partner-Initiated Mover 159 -- 6.5.3 Half-Move of a Partner-Coordinated Mover . 165 -- 6.5.4 Immobility of a Secondary-Stayer . 170 -- 6.5.5 Access to the Labour Force 171 -- 6.5.6 Types of Moves of the Secondary-Mover . 179 -- 6.6 Theorising the Professional Careers Coordination 180 -- 7 Representing Migration: Between Motilities and Anchors 183 -- 7.1 Displaying Family . 184 -- 7.2 Motile Narratives 186 -- 7.2.1 Structural Constraints . 187 -- 7.2.2 Career Men and Career Women 195 -- 7.2.3 Paradoxical Family Men . 201 -- 7.3 Anchored Narratives 207 -- 7.3.1 Ignoring Motility . 208 -- 7.3.2 Refusing Motility . 211 -- 7.3.3 After Motility . 215 -- 7.4 Gender and Motility . 221 -- 8 Family-Strategies of Highly-Skilled Migrants 225 -- 8.1 Conceptualising the Family-Strategies . 225 -- 8.2 Motile Family-Strategy . 226 -- 8.2.1 Prioritising one Career . 227 -- 8.2.2 Homemaking and Caregiving 235 -- 8.2.3 Company's Support . 239 -- 8.3 Local Family-Strategy . 248 -- 8.3.1 Low Support for the Care Work 249 -- 8.3.2 Combination of Formal, Informal and Non-Formal Care -- Support 252 -- 8.3.3 Separations and Divorces . 258 -- 8.4 Mobile Family-Strategy 264 -- 8.4.1 Succession of Half-Moves . 265 -- 8.4.2 Power-Dynamics . 268 -- 8.4.3 Mobile Family-Strategy and Children 272 -- 8.5 Theorising the Family-Strategies 275 -- 8.5.1 Care Work Organisation and Social Networks 275 -- 8.5.2 Iterative Logic, Path-Dependency, and Conflicts 278 -- 8.5.3 Mutually Exclusive Model 281 -- Discussion Part -- 9 Theoretical and Empirical Insights . 289 -- 9.1 Decentring the Literature and the Research Design 289 -- 9.2 Doing Family on the Move 295 -- 9.2.1 Consequences following the Decision to Migrate 296 -- 9.2.2 Narratives Displaying the Division of the Tasks . 299 -- 9.2.3 Family-Strategies 302 -- 10 Recommendations for Practice . 307 -- 10.1 Migration, Children, and Gender Wage Gap . 307 -- 10.2 Childcare in the Geneva and the Frankfurt regions 313 -- 10.3 Family-Friendly Companies . 317 -- 10.4 Summary of the Implications for Further Research and the -- Recommendations for Practice 320 -- 11 Conclusion: Motility and Mobility 321 -- Appendix . 323 -- Bibliography 339.…”
Libro electrónico -
1508Publicado 2017Tabla de Contenidos: “…Filter out all but the TMIN entries -- Create (station ID, temperature) key/value pairs -- Find minimum temperature by station ID -- Collect and print results -- Running the minimum temperature example and modifying it for maximums -- Examining the min-temperatures script -- Running the script -- Running the maximum temperature by location example -- Counting word occurrences using flatmap() -- Map versus flatmap -- Map () -- Flatmap () -- Code sample - count the words in a book -- Improving the word-count script with regular expressions -- Text normalization -- Examining the use of regular expressions in the word-count script -- Running the code -- Sorting the word count results -- Step 1 - Implement countByValue() the hard way to create a new RDD -- Step 2 - Sort the new RDD -- Examining the script -- Running the code -- Find the total amount spent by customer -- Introducing the problem -- Strategy for solving the problem -- Useful snippets of code -- Check your results and sort them by the total amount spent -- Check your sorted implementation and results against mine -- Summary -- Chapter 3: Advanced Examples of Spark Programs -- Finding the most popular movie -- Examining the popular-movies script -- Getting results -- Using broadcast variables to display movie names instead of ID numbers -- Introducing broadcast variables -- Examining the popular-movies-nicer.py script -- Getting results -- Finding the most popular superhero in a social graph -- Superhero social networks -- Input data format -- Strategy -- Running the script - discover who the most popular superhero is -- Mapping input data to (hero ID, number of co-occurrences) per line -- Adding up co-occurrence by hero ID -- Flipping the (map) RDD to (number, hero ID) -- Using max() and looking up the name of the winner -- Getting results…”
Libro electrónico -
1509Publicado 2015Tabla de Contenidos: “…-- Shared e-mail accounts -- Tracing e-mail -- Reading e-mail headers -- Social networking sites -- Additional resources -- Casey Anthony trial testimony -- Summary -- References -- Chapter 9 - Network forensics -- Information in This Chapter: -- Introduction -- Social engineering -- Network fundamentals -- Network types -- Network security tools -- Network attacks -- Alert! …”
Libro electrónico -
1510Publicado 2024Tabla de Contenidos: “…-- Methods Used -- Findings -- Discussion -- What We Learned -- Chapter 8 Social Networks of Giraffes -- Executive Summary -- Why Is This Important? …”
Libro electrónico -
1511Next generation wireless applications creating mobile applications in a Web 2.0 and Mobile 2.0 worldpor Golding, Paul, 1968-Tabla de Contenidos: “…-- 2.3 A Concentric Networks Approach -- 2.3.1 Social Network -- 2.3.2 Device Network -- 2.3.3 Radio Frequency (RF / Wireless) Network -- 2.3.4 Internet Protocol (IP) Network -- 2.3.5 Content Network -- 2.4 Application Topologies -- 2.5 Physical Network Elements -- 3 Becoming an Operator 2.0 -- 3.1 Introduction -- 3.2 What Applications Can I Sell? …”
Publicado 2008
Libro electrónico -
1512Publicado 2010Tabla de Contenidos: “…Individual Learning Paths of Employees in the Context of Social Networks -- 11.1 Introduction -- 11.2 Viewing the Organisation as a Network of Actors -- 11.3 Learning-Relevant Experiences Gained from the Work Network -- 11.3.1 How Actors Organise Work: A Cycle -- 11.3.2 Four Ideal Types of Work Process -- 11.3.3 Three Dimensions in Work-Network Structures -- 11.4 Learning-Relevant Experiences Gained in the Learning Network -- 11.4.1 Actors Organise Learning Networks: A Cycle -- 11.4.2 Actors Create Learning Programmes -- 11.4.3 Four Ideal Types of Learning Network -- 11.4.4 The Importance of Actors’ Action Theories -- 11.5 How do Employees create their Individual Learning Paths? …”
Libro electrónico -
1513Publicado 2019Tabla de Contenidos: “…-- Digital branding as a core management requirement -- Understanding the digital brand experience -- Understanding the consumer decision journey and digital branding -- Linking social networking and the consumer decision journey -- Digital brand communities -- Online brand communities' member characteristics -- Managing global brands…”
Libro electrónico -
1514Publicado 2016Tabla de Contenidos: “…-- Sharing is caring -- Facebook -- Twitter -- LinkedIn -- Instagram -- Snapchat and Vine -- YouTube -- Blogs and websites -- Documenting the process -- Describing updates -- MailChimp -- Paying attention to statistics -- Engaging with your audience -- Rewarding engagement -- It's a hoot! Managing social networks -- Remembering time zones -- Tag! You're it -- Getting commercial…”
Libro electrónico -
1515Publicado 2012Tabla de Contenidos: “…Spear Phishing and Whaling -- Vishing -- Smishing -- Pharming -- Social Networking Attacks -- Raising User Awareness Through Training -- Questions -- Answers -- Chapter 6 Malicious Code and Activity -- Identifying Malicious Code -- Virus -- Worm -- Trojan Horse -- Logic Bomb -- Keylogger -- Rootkits -- Mobile Code -- Trapdoors and Backdoors -- Spyware -- Malware Hoaxes -- Understanding Malicious Web Activity -- Software Security -- Injection -- Cross Site Scripting -- Cross Site Request Forgery -- Implementing Malicious Code Countermeasures -- Antivirus Software -- Keeping AV Signatures Up to Date -- Keep Operating Systems Up to Date -- Spam Filters -- Content-Filtering Appliances -- Least Privilege -- Educate Users -- Beware of Shortened Links -- Sign Up for E-mail Alerts -- Common Vulnerabilities and Exposures -- Questions -- Answers -- Chapter 7 Risk, Response, and Recovery -- Defining Risk -- Identifying Threats -- Understanding Vulnerabilities -- Understanding Impact -- Managing Risk -- Residual Risk -- Identifying Assets -- Performing Risk Assessments -- Risk Assessment Steps -- Quantitative Analysis -- Qualitative Analysis -- Address Findings -- Responding to Incidents -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-incident Activity -- Questions -- Answers -- Chapter 8 Monitoring and Analysis -- Intrusion Detection Systems -- IDS Alerts -- Network-based Intrusion Detection Systems -- Host-based Intrusion Detection Systems -- Intrusion Prevention Systems -- Detection Methods -- Detection Systems and Logs -- Detecting Unauthorized Changes -- SEMs, SIMs, and SIEMs -- Security Assessments -- Vulnerability Assessments -- Penetration Tests -- Questions -- Answers -- Chapter 9 Controls and Countermeasures -- Using Controls, Safeguards, and Countermeasures -- Understanding the Goals of Controls -- Preventive…”
Libro electrónico -
1516por Varma, SumatiTabla de Contenidos: “…Cover -- About the Author -- Brief Contents -- Contents -- Preface -- The Development of this Book -- Unit I: Foundations -- Chapter 1: Globalization and International Business -- Introduction -- Elements of Globalization -- Economic Globalization -- Cultural Globalization -- Political Globalization -- Drivers of Globalization -- Political Forces -- Economic Forces -- Technological Forces -- Industry Focus: Social Networking -- Emergence of Global Governance -- Competitive Forces -- Region Focus: Civets -- International Orientations -- Ethnocentric Orientation -- Polycentric Orientation -- International Business in Action: Multi-Latinas -- Regiocentric Orientation -- Geocentric Orientation -- International Versus Domestic Business -- Motives for Internationalization -- Two Decades of Shifting Wealth -- The Globalization Debate -- Arguments in Support of Globalization -- Concerns with Respect to Globalization -- Managerial Implications: Managing a Global Enterprise -- Terrorism -- Corruption -- Cultural Adjustment -- Closing Case: The Japanese Road to Success -- Summary -- Key Terms -- Discussion Questions -- Mini Projects -- Endnotes -- Chapter 2: Globalization of Business Structures: The Transnational Corporation -- Introduction -- Transnational Corporations -- TNCs from Developed and Developing Countries -- Non-Equity Modes of International Production -- Transnationality of Firms -- Changing Face of TNCs -- Evolution of TNCs -- Dragon TNCs -- Born Globals -- Industry Focus: Accelerated Internationalization of the White Goods Sector -- Global Niche Players -- Micro TNCs -- State-owned TNCs -- International Business in Action: Changing Face of the Family Business in the Middle East -- Theories of Firm Internationalization -- Closing Case: Globalization of the Brazilian Enterprise -- Summary -- Key Terms -- Discussion Questions -- Mini Projects…”
Publicado 2012
Libro electrónico -
1517Publicado 2023Tabla de Contenidos: “…Group photography: Wang et al. -- 6.3.3. Social networks and crowdsourcing: Schifanella et al. -- 6.3.4. …”
Libro electrónico -
1518por Pinto, RohanTabla de Contenidos: “…-- The evolution of digital identities -- Institutional databases -- Characteristics of institutional databases -- Advantages of institutional databases -- Disadvantages of institutional databases -- ACLs -- Functions of ACLs in traditional identity management -- Disadvantages of ACLs -- Circumventing the drawbacks of ACLs -- Public key cryptography - the origin of secure public networks -- The evolution of public networks -- The need for secure communication -- The emergence of PKI -- Components of PKI -- Benefits and applications of PKI -- Drawbacks of PKI -- Secure public networks and PKIs -- The World Wide Web -- Social networks - Identity 2.0 -- Biometric identity -- IoT and the identity of things -- Blockchain - a new model for identity -- Summary -- Chapter 2: Identity Management Versus Access Management -- What is identity management? …”
Publicado 2024
Libro electrónico -
1519Publicado 2019Tabla de Contenidos: “…-- 2 Global E-business and Collaboration -- Chapter-Opening Case: Enterprise Social Networking Helps Sanofi Pasteur Innovate and Improve Quality -- 2-1 What major features of a business are important for understanding the role of information systems? …”
Libro electrónico -
1520Publicado 2023Tabla de Contenidos: “…-- Change the Targeting/Messaging Strategy -- Change the Distribution Strategy -- Content Marketing Channel Management and Promotion -- Adjust the Editorial Calendar -- Put More Resources Toward Social Media/Online Communities -- Change the Website -- Change the Products/Services -- Content Marketing Measurement and Control -- Adjust the KPIs -- Change the Content Marketing Metrics -- Chapter 6 Social Media Marketing -- Welcome to the Endless Coffee Cup Podcast -- Social Media Context -- Term "Social Media" Coined in 2004 -- Key Definitions and Framework -- Social Media Marketing Today -- Areas Associated with Social Media Marketing Today -- Content Marketing -- Reputation Management -- Disinformation -- Monitoring/Participating in Conversations -- Influencer Marketing -- Digital Advertising -- Social Media Marketing and Organizational Structure -- Social Media Marketing Strategy and Planning -- How Social Media Impacts Business Goals -- Value of Influencers -- Social Media Channel Management -- Early Social Media Channels -- Social Networks -- Video Sharing -- Microblogging -- Photo Sharing -- Blogs…”
Libro electrónico