Mostrando 4,181 - 4,200 Resultados de 5,263 Para Buscar 'Exposeum~', tiempo de consulta: 1.50s Limitar resultados
  1. 4181
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…La politique macroéconomique de soutien de l'activité doit être complétée par des réformes structurelles -- La croissance est exposée à l'environnement mondial -- Costa Rica -- L'activité économique a ralenti -- Il faut mettre en œuvre l'intégralité de la réforme budgétaire pour restaurer la confiance -- La croissance devrait rester modeste -- Danemark -- L'économie s'est montrée résistante -- Les politiques devraient avoir pour objectif d'améliorer l'efficience économique -- La croissance devrait ralentir -- Espagne -- La croissance s'est modérée -- Il est essentiel de renforcer la croissance de la productivité -- La croissance devrait ralentir -- Estonie -- La croissance ralentit -- La politique budgétaire devrait jouer un rôle plus important -- Les perspectives mondiales médiocres pèsent sur les exportations et l'investissement -- États-Unis -- L'économie ralentit -- Des mesures sont nécessaires pour remédier au fléchissement de la croissance -- Des nombreux risques entourent le ralentissement prévu de la croissance économique -- Finlande -- La croissance ralentit -- Il faut prendre des mesures pour stimuler l'emploi et la productivité -- La croissance devrait fléchir -- France -- La croissance économique a résisté -- De nouvelles réformes favoriseraient une croissance plus inclusive -- La demande intérieure continuera à tirer la croissance -- Grèce -- L'expansion économique tirée par les exportations se poursuit -- Des réformes structurelles et une politique budgétaire prudente sont essentielles pour réduire la dette publique -- La reprise va s'affermir -- Hongrie -- La demande intérieure est le principal pilier de la croissance -- L'inversion des politiques macroéconomiques permettrait de soutenir l'accélération de la croissance -- Le ralentissement de la croissance n'éliminera pas les tensions inflationnistes -- Inde -- L'économie a ralenti…”
    Libro electrónico
  2. 4182
    Publicado 2023
    Libro electrónico
  3. 4183
    por OECD
    Publicado 2023
    Tabla de Contenidos: “…-- Currently, AI adoption is low and the cost savings to firms are modest -- Firms rely on worker attrition rather than layoffs to adjust labour demand -- AI may be leading to greater efficiencies in labour market matching -- Advances in artificial intelligence only account for a small part of automation -- The creation of new tasks and jobs is not well captured by studies focusing only on exposure -- 3.3. Policy can promote AI use that complements human labour and broadly shared productivity gains -- References -- Notes -- 4 Artificial intelligence, job quality and inclusiveness -- Introduction -- 4.1. …”
    Libro electrónico
  4. 4184
    Libro electrónico
  5. 4185
    “…Cependant, certaines conditions doivent être remplies pour ce faire. Elles sont exposées et analysées dans ce rapport…”
    Libro electrónico
  6. 4186
    Publicado 2023
    Libro electrónico
  7. 4187
    por OECD
    Publicado 2020
    Libro electrónico
  8. 4188
    Publicado 2024
    Libro electrónico
  9. 4189
  10. 4190
    Publicado 2017
    Tabla de Contenidos: “…-- Curves -- Correcting Tones with Multiple Layers -- The Shadow/Highlight Adjustment -- How to Improve a Copy Print -- How to Correct Uneven Exposure -- How to Repair Uneven Density: Dodge and Burn with Masked Adjustment Layers -- Magnifying-Glass Layers -- Soft-Light Dodging and Burning-In Layers -- Enhancing Almost-Blank Photos -- Making Extreme Tone Changes without Distorting Colors -- Fixing Harsh Shadows on Faces -- Chapter 6: Restoring Color -- How-Tos in This Chapter -- What Makes a Good Print? …”
    Libro electrónico
  11. 4191
    Publicado 2024
    Tabla de Contenidos: “…Attacking design weaknesses -- Authorization attacks -- Object-level authorization -- Function-level authorization -- Data attacks -- Injection attack -- Detecting injection vulnerabilities -- SQL injection -- NoSQL injection -- Command injection -- Path traversal -- Server-side request forgery -- Other API attacks -- API abuse -- Unrestricted access to sensitive business flows -- Business logic attacks -- Summary -- Further reading -- Part 3: Defending APIs -- Chapter 8: Shift-Left for API Security -- Technical requirements -- Using the OpenAPI Specification -- Data -- Security -- Generating client and server code -- Leveraging the positive security model -- Conducting threat modeling of APIs -- Automating API security -- CI/CD integration -- Semgrep -- Thinking like an attacker -- Summary -- Further reading -- Chapter 9: Defending against Common Vulnerabilities -- Technical requirements -- Authentication vulnerabilities -- Handling JWTs securely -- Implementing OAuth2 -- Password and token hardening -- Securing the reset process -- Handling authentication in code -- Authorization vulnerabilities -- Object-level vulnerabilities -- Function-level vulnerabilities -- Using authorization middleware -- Data vulnerabilities -- Excessive data exposure -- Mass assignment -- Implementation vulnerabilities -- Injection -- Server-Side Request Forgery -- Insufficient logging and monitoring -- Protecting against unrestricted resource consumption -- Defending against API business-level attacks -- Unrestricted access to sensitive business flows -- Unsafe consumption of APIs -- Summary -- Further reading -- Chapter 10: Securing Your Frameworks and Languages -- Technical requirements -- Managing the design-first process in the real world -- Using code-generation tools -- Swagger Codegen -- OpenAPI Generator -- Summary -- Further reading…”
    Libro electrónico
  12. 4192
    Publicado 2025
    Tabla de Contenidos: “…-- Explore Different Types of Internet Connections -- Identify the Hardware Required -- Set Up a Wi-Fi Internet Connection -- Assess Your Software Situation -- Chapter 8 Browsing the Web -- Meet the Edge Browser -- Search the Web -- Find Content on a Web Page -- Pin a Tab -- Create and Manage a Favorites List -- Use Favorites -- View Your Browsing History -- Print a Web Page -- Create Collections -- Customize the New Tab Page and the Home Page -- Adjust Microsoft Edge Settings -- Chapter 9 Staying Safe While Online -- Understand Technology Risks on the Internet -- Download Files Safely -- Use InPrivate Browsing -- Use SmartScreen Filter and Block Unwanted Apps -- Change Edge Privacy Settings -- Understand Information Exposure -- Keep Your Information Private -- Spot Phishing Scams and Other Email Fraud -- Create Strong Passwords -- Chapter 10 Keeping in Touch with Email -- Sign Up for an Email Account -- Set Up Accounts in the Outlook App -- Get to Know the Outlook Interface -- Receive Messages -- Reply to or Forward a Message -- Create and Send Email -- Manage Addresses -- Send an Attachment -- Change Outlook Account Settings -- Chapter 11 Working in the Cloud…”
    Libro electrónico
  13. 4193
    Publicado 2023
    Tabla de Contenidos: “…-- Summary -- Chapter 2 Existing Approaches-Traditional Vendor Risk Management -- Assessments -- SDL Assessments -- Application Security Maturity Models -- Governance -- Design -- Implementation -- Verification -- Operations -- Application Security Assurance -- Static Application Security Testing -- Dynamic Application Security Testing -- Interactive Application Security Testing -- Mobile Application Security Testing -- Software Composition Analysis -- Hashing and Code Signing -- Summary -- Chapter 3 Vulnerability Databases and Scoring Methodologies -- Common Vulnerabilities and Exposures -- National Vulnerability Database -- Software Identity Formats -- CPE -- Software Identification Tagging -- PURL -- Sonatype OSS Index -- Open Source Vulnerability Database -- Global Security Database -- Common Vulnerability Scoring System -- Base Metrics -- Temporal Metrics -- Environmental Metrics -- CVSS Rating Scale -- Critiques -- Exploit Prediction Scoring System -- EPSS Model -- EPSS Critiques -- CISA's Take -- Common Security Advisory Framework -- Vulnerability Exploitability eXchange -- Stakeholder-Specific Vulnerability Categorization and Known Exploited Vulnerabilities -- Moving Forward -- Summary -- Chapter 4 Rise of Software Bill of Materials…”
    Libro electrónico
  14. 4194
    por OECD
    Publicado 2017
    Libro electrónico
  15. 4195
    Publicado 2010
    Libro electrónico
  16. 4196
    Publicado 2015
    Tabla de Contenidos: “…Jos Beelen, Elspeth Jones -- 6. The Impact of Exposure to Diversity in the International University Environment and the Development of Intercultural Competence in Students. …”
    Libro electrónico
  17. 4197
    Computers for seniors for dummies
    Computers For Seniors For Dummies
    Publicado 2022
    Tabla de Contenidos: “…-- Explore Different Types of Internet Connections -- Identify the Hardware Required -- Set Up a Wi-Fi Internet Connection -- Assess Your Software Situation -- Chapter 9 Browsing the Web -- Meet the Edge Browser -- Search the Web -- Find Content on a Web Page -- Pin a Tab -- Create and Manage a Favorites List -- Use Favorites -- View Your Browsing History -- Print a Web Page -- Create Collections -- Customize the New Tab Page and the Home Page -- Adjust Microsoft Edge Settings -- Chapter 10 Staying Safe While Online -- Understand Technology Risks on the Internet -- Download Files Safely -- Use InPrivate Browsing -- Use SmartScreen Filter and Block Unwanted Apps -- Change Edge Privacy Settings -- Understand Information Exposure -- Keep Your Information Private -- Spot Phishing Scams and Other Email Fraud -- Create Strong Passwords -- Chapter 11 Keeping in Touch with Mail…”
    Libro electrónico
  18. 4198
    Publicado 2016
    Tabla de Contenidos: “…Decline -- Five Forces Analysis -- Rivalry among existing suppliers -- Threat of substitute products or services -- Threat of new entrants -- Bargaining power of suppliers -- Bargaining power of buyers -- Seven Domains Assessment framework -- Market domain/macro level - market attractiveness -- Market domain/micro level - market sector benefits and attractiveness -- Industry domain/macro level - industry attractiveness -- Industry domain/micro level - sustainable advantage -- Team domain - mission, aspirations, and propensity for risk -- Team domain - ability to execute on the critical success factors -- Connectedness up and down the value chain -- The McKinsey 7S framework -- Goals and shared values -- Strategy -- Skills -- Structure -- Style -- Systems -- Staff -- Fitting everything together -- The business descriptions -- IXL Learning -- Nextpoint -- Comparison: McKinsey 7S framework -- Goals and shared values -- Strategy -- Skills -- Structure -- Style -- Systems -- Staff -- Comparison - Business Model Canvas -- IXL Learning -- Nextpoint -- Comparison: conclusion -- IXL Learning -- Nextpoint -- Summary -- Chapter 4: Creating a Brand -- A brief definition of what branding is and isn't -- Know your audience -- Identify perceptions required for objectives -- Specializing - becoming a domain expert -- Generalizing - targeting a wider audience -- Case study -- Kick starting perceptions -- Doing a good job -- Limited time offers -- Competitions -- Rewarding customer loyalty -- Strategic partnerships -- Certifications -- Influencers -- Reliability -- Personality -- Media exposure -- Content marketing -- Who do they think you are? …”
    Libro electrónico
  19. 4199
    Publicado 2009
    Tabla de Contenidos: “…Windows -- New Features in After Effects CS4 -- Workflow Overview -- Interface Overview -- Setting a Workspace -- Customizing the Workspace -- Using Viewers -- Opening Related Panels Automatically -- Chapter 2: Importing Footage into a Project -- Starting from the Welcome Screen -- Creating and Saving Projects -- Opening and Closing Projects -- Importing Files -- Importing Still-Image Sequences -- Importing Files with Alpha Channels -- Importing a Layered File as a Single Footage Item -- Importing a Layered File as a Composition -- Importing Adobe Premiere Pro and After Effects Projects -- Importing with Adobe Bridge -- Motion Footage -- Chapter 3: Managing Footage -- Displaying Information in the Project Panel -- Finding Items in a Project -- Sorting Footage in the Project Panel -- Organizing Footage in Folders -- Renaming and Removing Items -- Proxies -- Viewing Footage -- The Footage Panel -- Cueing Motion Footage -- Magnifying an Image -- Viewing Safe Zones and Grids -- Displaying Rulers and Guides -- Viewing Snapshots -- Viewing Channels -- Viewing Transparency -- Correcting for Pixel Aspect Ratios -- Adjusting Exposure -- Chapter 4: Compositions -- Composition Settings -- Creating a Composition -- Specifying Basic Composition Settings -- Resizing a Comp -- Setting a Comp's Background Color -- The Composition and Timeline Panels -- Setting the Time -- Adding Footage to a Composition -- Adding Layers Using Insert and Overlay -- Creating Solid Layers -- Chapter 5: Layer Basics -- Selecting Layers -- Changing the Stacking Order -- Naming Layers -- Switching Video and Audio On and Off -- Locking a Layer -- Basic Layer Switches -- Making Layers Shy…”
    Libro electrónico
  20. 4200
    Publicado 2022
    Tabla de Contenidos: “…The psychological injury generated by traumatic exposure -- 8.3. Impact of trauma on learning -- 8.4. …”
    Libro electrónico