Mostrando 281 - 300 Resultados de 315 Para Buscar '13 Going on 30', tiempo de consulta: 0.16s Limitar resultados
  1. 281
    Publicado 2004
    Libro electrónico
  2. 282
    Publicado 2025
    Tabla de Contenidos: “…Introduction -- 1.1 Layer 1 Scalability Solutions -- 1.2 Layer 2 Scalability Solutions -- 1.3 Blockchain 3.0 -- 2. Layer 2 Solutions: How Do They Work? …”
    Libro electrónico
  3. 283
    por Romero, Steven
    Publicado 2011
    Libro electrónico
  4. 284
    Publicado 2015
    Video
  5. 285
    Publicado 2023
    Video
  6. 286
    Publicado 2021
    Libro electrónico
  7. 287
    Publicado 2018
    Libro electrónico
  8. 288
    Publicado 2022
    Tabla de Contenidos: “…Adding lines to your header or footer -- Arranging text with some help from tabs -- Setting Tabs, Margins, and Other Types of Indents -- Setting tabs -- Making your margins -- Working with indents -- Columns and Lists and Text Boxes (Oh, My) -- Column creation -- Lists made easy (and pretty) -- Text anywhere with text boxes -- Working with Tables -- Creating a table -- Formatting a table -- Chapter 8 This and That: Advanced and Collaboration Features -- Going in Style: Defining Styles for Easy Formatting -- The easy way: Defining a style by example -- The harder way: Defining a style by dialog -- Customizing Interface Elements -- Customizing ribbon tabs and menus -- Create ribbon tabs and tab groups -- Customizing the Quick Access toolbar -- Customizing keyboard shortcuts -- Creating a Table of Contents Automatically -- Using Collaboration Features -- Turning on the Track Changes feature -- Accepting or rejecting changes -- Addressing Envelopes and Creating Labels -- Creating and printing an envelope -- Creating labels -- Creating Web Pages -- Part 3 Powerful Presentations with Microsoft PowerPoint -- Chapter 9 Getting to Know Microsoft PowerPoint -- Viewing Slides with Various Views -- Normal view -- Slide sorter view -- Slide show view -- Notes page view -- Presenter view -- Reading view -- Planning Your Presentation: A Few Tips for Making Your Slide Shows Better -- Use the 10/20/30 rule -- Start with an outline -- Chapter 10 Creating Slide Shows -- Getting Started -- Giving Your Presentation a Visual Theme -- Using a theme as is -- Customizing a theme's colors or fonts -- Using Laborsaving Slide Layouts -- Mastering slide masters -- Working with title and text objects -- Working with PowerPoint Objects -- Formatting tables -- Creating a chart -- Get smart: Use SmartArt -- More media: Adding images, movies, or sounds…”
    Libro electrónico
  9. 289
    Publicado 2022
    Tabla de Contenidos: “…-- Chapter 12 How to Use LinkedIn for Maximum Impact (in Minimal Time) -- LinkedIn R and R -- Chapter 13 Audio Is Everywhere (How to Take Advantage of It) -- Chapter 14 Influencer Marketing Matters -- Chapter 15 Get the Most out of Your Marketing and Convert More Leads Using Retargeting -- Section II How to Find and Follow Up with the Highest-Quality Leads That Are the Most Likely to Convert -- Chapter 16 Amazing Sales Tools That Will Increase Your Lead Conversion Rate -- Increase Your Lead Conversion Rate by Improving Your Conversations -- Have Better Sales Meetings and One-on-Ones -- Take Better Notes During Sales Coaching -- Run Sales Contests That Increase Effort and Results -- Learn What Matters the Most to Someone Who Is Considering Hiring You -- Give Credit Where Credit Is Due -- Chapter 17 Should You Use an ISA or an AI Chatbot to Follow Up with Leads? …”
    Libro electrónico
  10. 290
    Publicado 2024
    Grabación no musical
  11. 291
    Publicado 2021
    Tabla de Contenidos: “…1 The C Programming For Dummies Approach 2 How This Book Works 3 Icons Used in This Book 4 Parting Thoughts 5 Part 1: The ABs of C 7 Chapter 1: A Quick Start for the Impatient 9 What You Need to Program 9 Command Prompt Programming 10 IDE Programming 11 Installing Code: Blocks 12 Touring the Code: Blocks workspace 13 Your First Program 14 Coding at the command prompt 15 Building a new Code: Blocks project 16 Building and running 18 Chapter 2: The Programming Thing 21 The History of Programming 21 Reviewing early programming history 21 Introducing the C language 22 The Programming Process 23 Understanding programming 23 Writing source code 24 Compiling and linking 26 Running and testing 27 Chapter 3: Anatomy of C 29 Parts of the C Language 29 Keywords 30 Functions 31 Operators 33 Variables and values 33 Statements and structure 33 Comments 35 Behold the Typical C Program 37 Understanding C program structure 37 Setting the main() function 38 Returning something to the operating system 39 Adding a function 40 Part 2: C Programming 101 43 Chapter 4: Trials and Errors 45 Display Stuff on the Screen 45 Displaying a humorous message 45 Introducing the puts() function 46 Adding more text 47 Commenting out a statement 49 Goofing up on purpose 49 More Text Output Nonsense 51 Displaying text with printf() 52 Introducing the printf() function 52 Understanding the newline 53 Employing escape sequences 54 Goofing up on purpose again 55 Chapter 5: Values and Simple Math 57 A Venue for Various Values 57 Understanding values 58 Displaying values with printf() 59 Minding the extra zeros 61 The Computer Does the Math 61 Doing simple arithmetic 61 Reviewing the float-integer thing 63 Pretending integers are floats 64 Chapter 6: A Place to Put Stuff 67 Values That Vary 67 Setting up a quick example 68 Introducing data types 69 Using variables 70 Variable Madness! …”
    Libro electrónico
  12. 292
    Publicado 2022
    Tabla de Contenidos: “…Contents at a Glance Introduction. 1 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work. 7 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work. 19 Chapter 3: Applying the Science Behind Human Behavior and Risk Management. 33 Part 2: Building a Security Awareness Program. 51 Chapter 4: Creating a Security Awareness Strategy. 53 Chapter 5: Determining Culture and Business Drivers. 61 Chapter 6: Choosing What to Tell The Users. 75 Chapter 7: Choosing the Best Tools for the Job 89 Chapter 8: Measuring Performance. 107 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program. 121 Chapter 10: Running Your Security Awareness Program 143 Chapter 11: Implementing Gamification 165 Chapter 12: Running Phishing Simulation Campaigns. 181 Part 4: The Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Chapter 15: Ten Fundamental Awareness Topics. 221 Chapter 16: Ten Helpful Security Awareness Resources. 227 Appendix: Sample Questionnaire 233 Index. 253 Table of Contents Introduction 1 About This Book. 1 Foolish Assumptions. 2 Icons Used in This Book. 3 Beyond the Book. 3 Where to Go from Here. 4 Part 1: Getting to Know Security Awareness. 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness. 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss. 10 Knowing How Security Awareness Programs Work. 11 Establishing and measuring goals. 12 Showing users how to "do things right". 14 Recognizing the Role of Awareness within a Security Program. 15 Disputing the Myth of the Human Firewall. 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work. 19 Making a Case Beyond Compliance Standards. 20 Treating Compliance as a Must. 21 Motivating users to take action. 22 Working within the compliance budget. 22 Limiting the Popular Awareness Theories. 23 Applying psychology to a diverse user base. 23 Differentiating between marketing and awareness. 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work. 27 Making Perfection the Stated Goal. 28 Measuring from the Start. 29 Prioritizing Program Over Product. 29 Choosing Substance Over Style. 30 Understanding the Role of Security Awareness. 31 Table of Contents Chapter 3: Applying the Science Behind Human Behavior and Risk Management. 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science. 35 Recognizing incidents as system failures. 36 Responding to incidents. 37 Applying Accounting Practices to Security Awareness. 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology. 40 The ABCs of behavioral science. 41 The Fogg Behavior Model. 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve. 44 Remembering That It's All About Risk. 45 Optimizing risk. 46 The risk formula. 46 Part 2: Building a Security Awareness Program. 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program. 54 Choosing effective communications tools. 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All. 58 Chapter 5: Determining Culture and Business Drivers. 61 Understanding Your Organization's Culture. 62 Determining security culture. 64 Recognizing how culture relates to business drivers. 65 Identifying Subcultures. 65 Interviewing Stakeholders. 67 Requesting stakeholder interviews. 67 Scheduling the interviews 70 Creating interview content. 70 Taking names. 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users. 75 Basing Topics on Business Drivers. 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right". 77 Common Topics Covered in Security Awareness Programs. 79 Security Awareness For Dummies Phishing 79 Social engineering. 80 Texting and instant messaging security. 80 Physical security. 81 Malware 81 Ransomware 81 Password security. 82 Cloud security 82 USB device security. 82 Internet of Things 83 Travel security. 83 Wi-Fi security 84 Mobile devices. 84 Work from home. 84 Basic computer security. 85 Insider threat. 85 Protecting children on the internet 85 Social media security 86 Moving security. 86 Compliance topics. 87 Chapter 7: Choosing the Best Tools for the Job. 89 Identifying Security Ambassadors 90 Finding ambassadors. 90 Maintaining an ambassador program. 91 Knowing the Two Types of Communications Tools. 92 Reminding users to take action. 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase. 95 Posters 96 Hardcopy newsletters. 97 Monitor displays 97 Screen savers. 98 Pamphlets. 98 Desk drops. 99 Table tents. 99 Coffee cups or sleeves 99 Stickers. 100 Mouse pads 100 Pens and other useful giveaways. 100 Camera covers. 101 Squishy toys and other fun giveaways. 101 Active communications tools. 101 Table of Contents Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts. 108 Meeting Compliance Requirements. 109 Collecting Engagement Metrics. 111 Attendance metrics. 111 Likability metrics. 112 Knowledge metrics. 112 Measuring Improved Behavior. 113 Tracking the number of incidents. 113 Examining behavior with simulations 114 Tracking behavior with gamification. 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics. 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program. 121 Knowing Your Budget. 122 Finding additional sources for funding 123 Allocating for your musts. 125 Limiting your discretionary budget. 126 Appreciating your team as your most valuable resource. 126 Choosing to Implement One Program or Multiple Programs. 127 Managing multiple programs 128 Beginning with one program. 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy. 131 Ensuring that your message sticks. 133 Distributing topics over three months. 133 Deciding Whether to Include Phishing Simulations. 136 Planning Which Metrics to Collect and When. 137 Considering metrics versus topics 137 Choosing three behavioral metrics. 138 Incorporating Day 0 metrics 138 Scheduling periodic updates. 138 Biasing your metrics. 139 Branding Your Security Awareness Program 139 Creating a theme. 139 Maintaining brand consistency. 140 Coming up with a catchphrase and logo. 140 Promoting your program with a mascot. 140 Security Awareness For Dummies Chapter 10: Running Your Security Awareness Program. 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors. 145 Recognizing the role of general project management. 146 Getting All Required Approvals. 146 Getting the Most from Day 0 Metrics. 147 Creating Meaningful Reports. 149 Presenting reports as a graphical dashboard. 149 Adding index scores. 152 Creating an awareness index. 152 Reevaluating Your Program. 153 Reconsidering your metrics. 154 Evaluating your communications tools 155 Measuring behavioral changes. 156 Redesigning Your Program 157 Anything stand out? …”
    Libro electrónico
  13. 293
    Publicado 2021
    Libro electrónico
  14. 294
    Publicado 2022
    Libro electrónico
  15. 295
    Publicado 2023
    “…Next we highlight the use of Amazon Firecracker in AWS Lambda as one of the most impressive use cases and go on to explain how to train models in Rust using PyTorch that target the GPU. …”
    Video
  16. 296
    Publicado 2024
    Tabla de Contenidos: “…-- Chapter 11 Product Designers -- How the Product Works -- Product Discovery -- Chapter 12 Tech Leads -- Chapter 13 Product Leaders -- Management -- Coaching -- Staffing -- Leadership -- Product Vision -- Team Topology -- Product Strategy -- Team Objectives -- Ongoing Evangelism -- Product Ops -- The Impact of AI on Product Teams -- Chapter 14 Innovation Story: Almosafer -- Company Background -- The Problem to Solve -- Discovering the Solution -- The Results -- Part IV Product Model Concepts -- Chapter 15 Product Teams -- Principle: Empowered with Problems to Solve -- Product Leaders and Empowered Teams -- Principle: Outcomes over Output -- Principle: Sense of Ownership -- Principle: Collaboration…”
    Libro electrónico
  17. 297
    Publicado 2024
    Tabla de Contenidos: “…I Don't Remember -- Ads That Say Less: Fewer People and Places Say More, Say It Louder, and Say It Better -- How Deep Tones Convey Wisdom: Finding Meaning in the Timbre of Voiceovers -- No Surprise, Women Are Tired of "Mansplaining" -- The Decelerated Delight - Slow Motion and the Mesmerized Mind -- The Neuroscience of Contact: Touch, Hug, and Hold to Connect -- First Impressions Are All That Matter - First Five Seconds of Advertising -- The Awe of the Unveil: Neuroscience Behind the Curtain Rise -- Tackling Territorial Transitions: Navigating the Mind's Map in 30 Seconds -- Chapter 17 scriptGPT - Writing Entire TV Shows, Plots, and Dialogue -- The Persona Palette: Neuronal Narratives in Archetypal Depictions -- The Neural Alchemy of Storytelling: Decoding Narrative Twists in Screenwriting -- Orchestrating Words, Sounds, and Emotion in Screenwriting Crafting Words that Resonate -- Character Interactions and Audience Appeal -- Chapter 18 luxuryGPT - Premiumize Products Using Brain Codes of Luxury -- The Paradox of Plenty: Perceived Luxury in the Economics of More or Less…”
    Libro electrónico
  18. 298
    Publicado 2016
    Libro electrónico
  19. 299
    Publicado 2020
    Libro electrónico
  20. 300
    Publicado 2016
    Tabla de Contenidos: “…Shepherd' Anonymous -- 30. 'Hey, troly loly lo, maid, whither go you?' …”
    Libro electrónico