Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Photography 337
- Digital techniques 247
- Environment 152
- History 84
- Development 75
- Historia 73
- Toxicology 72
- Security measures 66
- Health aspects 65
- Image processing 63
- Teología 62
- Application software 59
- Engineering & Applied Sciences 59
- Computer networks 58
- Iglesia Católica 56
- Management 55
- Social aspects 55
- Art, Architecture & Applied Arts 54
- Visual Arts 54
- Chemical tests and reagents 53
- Computer security 51
- Canon digital cameras 48
- Environmental aspects 43
- Nikon digital cameras 43
- Risk management 43
- Single-lens reflex cameras 43
- Treatment 43
- Economics 42
- Health risk assessment 41
- Philosophy 41
-
4181por OECDTabla de Contenidos: “…La politique macroéconomique de soutien de l'activité doit être complétée par des réformes structurelles -- La croissance est exposée à l'environnement mondial -- Costa Rica -- L'activité économique a ralenti -- Il faut mettre en œuvre l'intégralité de la réforme budgétaire pour restaurer la confiance -- La croissance devrait rester modeste -- Danemark -- L'économie s'est montrée résistante -- Les politiques devraient avoir pour objectif d'améliorer l'efficience économique -- La croissance devrait ralentir -- Espagne -- La croissance s'est modérée -- Il est essentiel de renforcer la croissance de la productivité -- La croissance devrait ralentir -- Estonie -- La croissance ralentit -- La politique budgétaire devrait jouer un rôle plus important -- Les perspectives mondiales médiocres pèsent sur les exportations et l'investissement -- États-Unis -- L'économie ralentit -- Des mesures sont nécessaires pour remédier au fléchissement de la croissance -- Des nombreux risques entourent le ralentissement prévu de la croissance économique -- Finlande -- La croissance ralentit -- Il faut prendre des mesures pour stimuler l'emploi et la productivité -- La croissance devrait fléchir -- France -- La croissance économique a résisté -- De nouvelles réformes favoriseraient une croissance plus inclusive -- La demande intérieure continuera à tirer la croissance -- Grèce -- L'expansion économique tirée par les exportations se poursuit -- Des réformes structurelles et une politique budgétaire prudente sont essentielles pour réduire la dette publique -- La reprise va s'affermir -- Hongrie -- La demande intérieure est le principal pilier de la croissance -- L'inversion des politiques macroéconomiques permettrait de soutenir l'accélération de la croissance -- Le ralentissement de la croissance n'éliminera pas les tensions inflationnistes -- Inde -- L'économie a ralenti…”
Publicado 2019
Libro electrónico -
4182
-
4183por OECDTabla de Contenidos: “…-- Currently, AI adoption is low and the cost savings to firms are modest -- Firms rely on worker attrition rather than layoffs to adjust labour demand -- AI may be leading to greater efficiencies in labour market matching -- Advances in artificial intelligence only account for a small part of automation -- The creation of new tasks and jobs is not well captured by studies focusing only on exposure -- 3.3. Policy can promote AI use that complements human labour and broadly shared productivity gains -- References -- Notes -- 4 Artificial intelligence, job quality and inclusiveness -- Introduction -- 4.1. …”
Publicado 2023
Libro electrónico -
4184
-
4185por Organisation de coopération et de développement économiques.“…Cependant, certaines conditions doivent être remplies pour ce faire. Elles sont exposées et analysées dans ce rapport…”
Publicado 2001
Libro electrónico -
4186Publicado 2023Libro electrónico
-
4187
-
4188
-
4189
-
4190Publicado 2017Tabla de Contenidos: “…-- Curves -- Correcting Tones with Multiple Layers -- The Shadow/Highlight Adjustment -- How to Improve a Copy Print -- How to Correct Uneven Exposure -- How to Repair Uneven Density: Dodge and Burn with Masked Adjustment Layers -- Magnifying-Glass Layers -- Soft-Light Dodging and Burning-In Layers -- Enhancing Almost-Blank Photos -- Making Extreme Tone Changes without Distorting Colors -- Fixing Harsh Shadows on Faces -- Chapter 6: Restoring Color -- How-Tos in This Chapter -- What Makes a Good Print? …”
Libro electrónico -
4191Publicado 2024Tabla de Contenidos: “…Attacking design weaknesses -- Authorization attacks -- Object-level authorization -- Function-level authorization -- Data attacks -- Injection attack -- Detecting injection vulnerabilities -- SQL injection -- NoSQL injection -- Command injection -- Path traversal -- Server-side request forgery -- Other API attacks -- API abuse -- Unrestricted access to sensitive business flows -- Business logic attacks -- Summary -- Further reading -- Part 3: Defending APIs -- Chapter 8: Shift-Left for API Security -- Technical requirements -- Using the OpenAPI Specification -- Data -- Security -- Generating client and server code -- Leveraging the positive security model -- Conducting threat modeling of APIs -- Automating API security -- CI/CD integration -- Semgrep -- Thinking like an attacker -- Summary -- Further reading -- Chapter 9: Defending against Common Vulnerabilities -- Technical requirements -- Authentication vulnerabilities -- Handling JWTs securely -- Implementing OAuth2 -- Password and token hardening -- Securing the reset process -- Handling authentication in code -- Authorization vulnerabilities -- Object-level vulnerabilities -- Function-level vulnerabilities -- Using authorization middleware -- Data vulnerabilities -- Excessive data exposure -- Mass assignment -- Implementation vulnerabilities -- Injection -- Server-Side Request Forgery -- Insufficient logging and monitoring -- Protecting against unrestricted resource consumption -- Defending against API business-level attacks -- Unrestricted access to sensitive business flows -- Unsafe consumption of APIs -- Summary -- Further reading -- Chapter 10: Securing Your Frameworks and Languages -- Technical requirements -- Managing the design-first process in the real world -- Using code-generation tools -- Swagger Codegen -- OpenAPI Generator -- Summary -- Further reading…”
Libro electrónico -
4192Publicado 2025Tabla de Contenidos: “…-- Explore Different Types of Internet Connections -- Identify the Hardware Required -- Set Up a Wi-Fi Internet Connection -- Assess Your Software Situation -- Chapter 8 Browsing the Web -- Meet the Edge Browser -- Search the Web -- Find Content on a Web Page -- Pin a Tab -- Create and Manage a Favorites List -- Use Favorites -- View Your Browsing History -- Print a Web Page -- Create Collections -- Customize the New Tab Page and the Home Page -- Adjust Microsoft Edge Settings -- Chapter 9 Staying Safe While Online -- Understand Technology Risks on the Internet -- Download Files Safely -- Use InPrivate Browsing -- Use SmartScreen Filter and Block Unwanted Apps -- Change Edge Privacy Settings -- Understand Information Exposure -- Keep Your Information Private -- Spot Phishing Scams and Other Email Fraud -- Create Strong Passwords -- Chapter 10 Keeping in Touch with Email -- Sign Up for an Email Account -- Set Up Accounts in the Outlook App -- Get to Know the Outlook Interface -- Receive Messages -- Reply to or Forward a Message -- Create and Send Email -- Manage Addresses -- Send an Attachment -- Change Outlook Account Settings -- Chapter 11 Working in the Cloud…”
Libro electrónico -
4193Publicado 2023Tabla de Contenidos: “…-- Summary -- Chapter 2 Existing Approaches-Traditional Vendor Risk Management -- Assessments -- SDL Assessments -- Application Security Maturity Models -- Governance -- Design -- Implementation -- Verification -- Operations -- Application Security Assurance -- Static Application Security Testing -- Dynamic Application Security Testing -- Interactive Application Security Testing -- Mobile Application Security Testing -- Software Composition Analysis -- Hashing and Code Signing -- Summary -- Chapter 3 Vulnerability Databases and Scoring Methodologies -- Common Vulnerabilities and Exposures -- National Vulnerability Database -- Software Identity Formats -- CPE -- Software Identification Tagging -- PURL -- Sonatype OSS Index -- Open Source Vulnerability Database -- Global Security Database -- Common Vulnerability Scoring System -- Base Metrics -- Temporal Metrics -- Environmental Metrics -- CVSS Rating Scale -- Critiques -- Exploit Prediction Scoring System -- EPSS Model -- EPSS Critiques -- CISA's Take -- Common Security Advisory Framework -- Vulnerability Exploitability eXchange -- Stakeholder-Specific Vulnerability Categorization and Known Exploited Vulnerabilities -- Moving Forward -- Summary -- Chapter 4 Rise of Software Bill of Materials…”
Libro electrónico -
4194
-
4195
-
4196Publicado 2015Tabla de Contenidos: “…Jos Beelen, Elspeth Jones -- 6. The Impact of Exposure to Diversity in the International University Environment and the Development of Intercultural Competence in Students. …”
Libro electrónico -
4197Computers for seniors for dummiesComputers For Seniors For DummiesPublicado 2022Tabla de Contenidos: “…-- Explore Different Types of Internet Connections -- Identify the Hardware Required -- Set Up a Wi-Fi Internet Connection -- Assess Your Software Situation -- Chapter 9 Browsing the Web -- Meet the Edge Browser -- Search the Web -- Find Content on a Web Page -- Pin a Tab -- Create and Manage a Favorites List -- Use Favorites -- View Your Browsing History -- Print a Web Page -- Create Collections -- Customize the New Tab Page and the Home Page -- Adjust Microsoft Edge Settings -- Chapter 10 Staying Safe While Online -- Understand Technology Risks on the Internet -- Download Files Safely -- Use InPrivate Browsing -- Use SmartScreen Filter and Block Unwanted Apps -- Change Edge Privacy Settings -- Understand Information Exposure -- Keep Your Information Private -- Spot Phishing Scams and Other Email Fraud -- Create Strong Passwords -- Chapter 11 Keeping in Touch with Mail…”
Libro electrónico -
4198Publicado 2016Tabla de Contenidos: “…Decline -- Five Forces Analysis -- Rivalry among existing suppliers -- Threat of substitute products or services -- Threat of new entrants -- Bargaining power of suppliers -- Bargaining power of buyers -- Seven Domains Assessment framework -- Market domain/macro level - market attractiveness -- Market domain/micro level - market sector benefits and attractiveness -- Industry domain/macro level - industry attractiveness -- Industry domain/micro level - sustainable advantage -- Team domain - mission, aspirations, and propensity for risk -- Team domain - ability to execute on the critical success factors -- Connectedness up and down the value chain -- The McKinsey 7S framework -- Goals and shared values -- Strategy -- Skills -- Structure -- Style -- Systems -- Staff -- Fitting everything together -- The business descriptions -- IXL Learning -- Nextpoint -- Comparison: McKinsey 7S framework -- Goals and shared values -- Strategy -- Skills -- Structure -- Style -- Systems -- Staff -- Comparison - Business Model Canvas -- IXL Learning -- Nextpoint -- Comparison: conclusion -- IXL Learning -- Nextpoint -- Summary -- Chapter 4: Creating a Brand -- A brief definition of what branding is and isn't -- Know your audience -- Identify perceptions required for objectives -- Specializing - becoming a domain expert -- Generalizing - targeting a wider audience -- Case study -- Kick starting perceptions -- Doing a good job -- Limited time offers -- Competitions -- Rewarding customer loyalty -- Strategic partnerships -- Certifications -- Influencers -- Reliability -- Personality -- Media exposure -- Content marketing -- Who do they think you are? …”
Libro electrónico -
4199Publicado 2009Tabla de Contenidos: “…Windows -- New Features in After Effects CS4 -- Workflow Overview -- Interface Overview -- Setting a Workspace -- Customizing the Workspace -- Using Viewers -- Opening Related Panels Automatically -- Chapter 2: Importing Footage into a Project -- Starting from the Welcome Screen -- Creating and Saving Projects -- Opening and Closing Projects -- Importing Files -- Importing Still-Image Sequences -- Importing Files with Alpha Channels -- Importing a Layered File as a Single Footage Item -- Importing a Layered File as a Composition -- Importing Adobe Premiere Pro and After Effects Projects -- Importing with Adobe Bridge -- Motion Footage -- Chapter 3: Managing Footage -- Displaying Information in the Project Panel -- Finding Items in a Project -- Sorting Footage in the Project Panel -- Organizing Footage in Folders -- Renaming and Removing Items -- Proxies -- Viewing Footage -- The Footage Panel -- Cueing Motion Footage -- Magnifying an Image -- Viewing Safe Zones and Grids -- Displaying Rulers and Guides -- Viewing Snapshots -- Viewing Channels -- Viewing Transparency -- Correcting for Pixel Aspect Ratios -- Adjusting Exposure -- Chapter 4: Compositions -- Composition Settings -- Creating a Composition -- Specifying Basic Composition Settings -- Resizing a Comp -- Setting a Comp's Background Color -- The Composition and Timeline Panels -- Setting the Time -- Adding Footage to a Composition -- Adding Layers Using Insert and Overlay -- Creating Solid Layers -- Chapter 5: Layer Basics -- Selecting Layers -- Changing the Stacking Order -- Naming Layers -- Switching Video and Audio On and Off -- Locking a Layer -- Basic Layer Switches -- Making Layers Shy…”
Libro electrónico -
4200Publicado 2022Tabla de Contenidos: “…The psychological injury generated by traumatic exposure -- 8.3. Impact of trauma on learning -- 8.4. …”
Libro electrónico