Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Online social networks 295
- Social networks 178
- Social media 138
- Internet marketing 117
- Social aspects 86
- Management 71
- Data mining 66
- Economic aspects 62
- Computer networks 58
- Computer network resources 56
- Internet 56
- Application software 54
- Facebook (Electronic resource) 54
- Engineering & Applied Sciences 53
- Marketing 52
- Development 50
- Security measures 48
- Computer security 46
- Data processing 44
- Social Sciences 42
- Business networks 41
- Design 39
- Web sites 39
- Information technology 38
- History 37
- Social Change 35
- Sociology & Social History 34
- Twitter 34
- Technological innovations 33
- Electrical & Computer Engineering 32
-
1761Publicado 2014“…This award-winning book has now been fully updated to include new chapters on generating referrals and boosting your confidence when networking, as well as the latest advice on social networking sites. Successfully combine online and offline networking techniques Develop the best networking approaches and behaviours Make a great first impression, build rapport and generate strong business relationships Talk to the right people, have productive conversations and effectively work a room…”
Libro electrónico -
1762Publicado 2013“…Use your powerful listening skills · How to use online social networks to support your in-person networking Magnify your impact with LinkedIn, Facebook, and other online services · Where to start today A complete plan that starts with the network you already have…”
Libro electrónico -
1763Publicado 2012“…Learn how to protect yourself against new credit risks from social networking and mobile banking and how to safeguard against unethical or illegal use of credit scores by employers. …”
Libro electrónico -
1764por Miller, Michael, 1958-“…In addition, this book will cover Windows 8's new Metro interface in depth, as well as feature increased coverage of social networking and cloud computing applications…”
Publicado 2013
Libro electrónico -
1765Publicado 2008“…'International Journal of Digital Earth' welcomes papers that : progress visions for Digital Earth frameworks, policies, and standard ; explore geographically referenced 3D, 4D, or 5D models to represent the real planet, and geo-data-intensive science and discovery ; develop methods that turn all forms of geo-referenced data, from scientific to social, into useful information that can be analyzed, visualized, and shared ; present innovative, operational applications and pilots of Digital Earth technologies at a local, national, regional, and global level ; expand the role of Digital Earth in the fields of Earth science, including climate change, adaptation and health related issues, natural disasters, new energy sources, agricultural and food security, and urban planning ; foster the use of web-based public-domain platforms, social networks, and location-based services for the sharing of digital data, models, and information about the virtual Earth ; explore the role of social media and citizen-provided data in generating geo-referenced information in the spatial sciences and technologies."…”
Revista digital -
1766Publicado 2013“…This makes Vine like a video version of Instagram, enabling users to “share life in motion” via social networking. This has made Vine enormously popular, especially among the same younger users who made Instagram a hit. …”
Libro electrónico -
1767por Fitzpatrick, Kathleen, 1967-“…Facing these issues head-on, Kathleen Fitzpatrick focuses on the technological changes—especially greater utilization of internet publication technologies, including digital archives, social networking tools, and multimedia—necessary to allow academic publishing to thrive into the future. …”
Publicado 2011
Libro electrónico -
1768por Conference on Privacy and Data Protection“…The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in…”
Publicado 2010
Libro electrónico -
1769por Basu, Amit“…Of special interest is the structuring of the metagraphs modeling process, which may enhance the body of work on systems analysis and design (including software engineering), the development of a metagraphs workbench to support such a process, and the possible application of the results presented here, suitably enhanced, to social networks…”
Publicado 2007
Libro electrónico -
1770Publicado 2013“…The volume includes an overview and four sections, covering respectively: (1) innovations in terms of measurement of poverty and inclusion in the region (the concept of inclusion as elaborated at the EU level, innovations in survey design to suit the measurement of inclusion, methodological insights from qualitative work); (2) innovative country level analysis (updating poverty mapping in inter-censual years, the analysis of material deprivation, the analysis of determinants of social inclusion, subjective wellbeing of public work programs participants); (3) examples of country level analysis of drivers of exclusion (barriers to formalization in the labour market, gender disparities in the labour market, disruption in social networks following urbanizations, attitudes towards multi-ethnic states); (4) building inclusive safety nets (an assessment of safety nets in the region, the political economy of welfare reform, micro-simulations of social assistance reform, the adoption of better tools to improve targeting performance). …”
Libro electrónico -
1771por Okereafor, Kenneth“…Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. …”
Publicado 2021
Libro electrónico -
1772Publicado 2022“…You'll learn about the ways that discrimination rears its ugly head in the digital data space and how to address them with several known algorithms, including social network analysis, and linear regression A can't-miss resource for junior-level to senior-level software developers who have gotten their hands dirty with at least a handful of significant software development projects, Data Conscience also provides readers with: Discussions of the importance of transparency Explorations of computational thinking in practice Strategies for encouraging accountability in tech Ways to avoid double-edged data visualization Schemes for governing data structures with law and algorithms…”
Libro electrónico -
1773Publicado 2017“…Discusses how to maximize power and obtain peak reliability when designing, building, and using GPUs Covers system software (OS, compilers), programming environments, languages, and paradigms proposed to help and support GPU programmers Explains how to use mathematical and analytical techniques to predict different performance metrics in GPUs Illustrates the design of efficient GPU algorithms in areas such as bioinformatics, complex systems, social networks, and cryptography Provides applications and use case scenarios in several different verticals, including medicine, social sciences, image processing, and telecommunications…”
Libro electrónico -
1774Publicado 2016“…Understand the goals, costs, and limitations of software security Identify fifteen types of security attacks such as WebSocket, SQL injection, and TLS Heartbleed Discover six core principles of software security including Defense in Depth and Fail Securely Learn about threat modeling using tools like STRIDE, CAPEC, and attack trees Recognize the capabilities and limitations of password policies, WAFS, and Firewalls Review authentication/authorization techniques like HTTP Digest, OAuth 2 and JWT Learn about the CORS, CSP, and HSTS security policies and protocols Explore the W3C Web Cryptography Working Group’s newest security protocols Brian Sletten is a software engineer who focuses on security consulting, web architecture, resource-oriented computing, social networking, the Semantic Web, data science, 3D graphics, visualization, scalable systems, and other technologies. …”
-
1775“…Readers are expected to have basic familiarity with the fundamentals of developing for Microsoft platforms (some understanding of basic SQL, C#, .NET, and WCF); as readers work through the book they will build on their existing skills so that they will be able to deploy geospatial applications for social networking, data collection, enterprise management, or other purposes. …”
Libro electrónico -
1776Publicado 2014“…Discover the basics of texting, voicemail, and smartphone capabilities Learn about features like social networking, adding software, printing, GPS, and synchronizing to your PC Begin using the stylus with Action Memo, Scrapbook, S Finder, Pen Window, and Screen Write Find out why Samsung sold over 10 million Note 3 phablets in the first two months after its release. …”
Libro electrónico -
1777Publicado 2018“…About the Author Richard Rodger, CEO of voxgig, a social network for the events industry, has many years of experience building microservice-based systems for major global companies…”
Libro electrónico -
1778Publicado 2010“…Coverage includes: Implementing threads, services, receivers, and other background tasks Providing user alerts Organizing user interface layouts and views Managing user-initiated events such as touches and gestures Recording and playing audio and video Using hardware APIs available on Android devices Interacting with other devices via SMS, web browsing, and social networking Storing data efficiently with SQLite and its alternatives Accessing location data via GPS Using location-related services such as the Google Maps API Building faster applications with native code Providing backup and restore with the Android Backup Manager Testing and debugging apps throughout the development cycle Turn to The Android Developer’s Cookbook for proven, expert answers–and the code you need to implement them. …”
Libro electrónico -
1779por Langton, David, 1961-“…Online visual marketing solutions may include apps, interactive games tools and modules; infographics; HTML emails / e-newsletters; widgets; YouTube videos; flash animation; social networking campaigns; websites, weblets, mini-sites; blogs; podcasts / MP3s; projected signage; PowerPoint / keynote presentations In print solutions may include brochures, flyers; annual reports; books; direct mail, post cards; newsletters; invitations; letters; press releases; infographics On-site, giveaways, exhibit, and tradeshow solutions may include live events and performances; signs; billboards; exhibits; banners; tent cards; posters; plasmas screens; kiosks; giveaways: tchotchkes, t-shirts, tote bags, etc.; floor graphics/vinyl graphic wraps With Visual Marketing, you'll discover 99 powerful strategies for capturing the attention of your potential customers"--…”
Publicado 2011
Libro electrónico -
1780Publicado 2011“…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
Libro electrónico