Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,381
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 370
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 262
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
101
-
102
-
103
-
104Publicado 2020Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- How This Book Is Organized -- Part 1: Getting Started with Growth Hacking -- Part 2: Seeing Where Growth Opportunities Come From -- Part 3: Applying the Growth Hacking Process -- Part 4: The Part of Tens -- Beyond the Book -- Other For Dummies Books -- Where to Go from Here -- Part 1 Getting Started with Growth Hacking -- Chapter 1 Defining Growth Hacking -- Defining Growth Hacking Goals -- Working through the Basics -- Recognizing the Distinctive Nature of Growth Hacking -- Traditional marketing versus growth hacking -- Lean start-up versus growth hacking -- Agile product development versus growth hacking -- Steering Clear of Growth Hacking Obstacles -- The phrase itself -- Getting caught up in the "hacking" part -- Thinking that growth has to come at the cost of the customer experience -- Thinking that it's about quick hits and tactics -- Thinking that there's a magical growth hacker -- Thinking that only the growth team is responsible for growth -- Thinking that you need a background in product development or marketing -- Thinking that you need to be a coder -- Thinking that growth comes from acquisition -- Thinking that the "famous growth hacks" did all the hard work -- Thinking that you can just call yourself a growth hacker -- Chapter 2 Building Growth Hacking Skills -- Determining the Growth Hacker's Skill Set -- Inspecting the Growth Hacker's Toolbox -- Seeing What Makes Growth Hackers Tick -- Chapter 3 Building Growth Teams -- Investigating Growth Team Structure -- Getting a growth team off the ground -- Seeing who answers to whom -- Gauging the Impact of Growth Leads -- Looking at the Four Types of Organizational Cultures -- Determining the overall impact of specific organizational cultures…”
Libro electrónico -
105
-
106Publicado 2020Tabla de Contenidos: “…Die Bauanleitung -- Der Aufbau -- Der Code -- Überwachungskamera -- Der Programmablauf -- Der Wii-Nunchuk-Controller -- Die Bauanleitung -- Der Aufbau -- Der Sketch -- Wie du dein Smartphone mit deinem Computer verbindest -- Trebuchet 2.0 -- Die Trebuchet -- Der Programmablauf -- Der PIR-Sensor -- Der Piezo-Buzzer -- Die Bauanleitung -- Der Aufbau -- Der Code -- Testen des Buzzers -- Testen des PIR-Sensors -- Bluetooth - His masters voice -- HC-05 oder HC-06? -- Die Bauanleitung -- Der Aufbau -- Der Sketch -- Die Steuerung -- Sprachsteuerung via Bluetooth -- Der Sketch -- Der Schokoriegeltresor -- Der Programmablauf -- Das Tastenfeld -- Testen des Tastenfelds -- Die Kommunikation -- Das Slave-Modul -- Das Master-Modul konfigurieren -- Die Bauanleitung - die Mechanik -- Der Aufbau - Master -- Der Sketch - Master -- Die Bauanleitung - das Control Panel -- Der Aufbau - Slave -- Der Sketch - Slave -- Der Tischfahrer -- Der Programmablauf -- Der Infrarotsensor -- Die Bauanleitung -- Der Aufbau -- Der Code -- Testen des Sensors -- Die Kuckucksuhr -- Der Programmablauf -- Der Schrittmotor -- Den Schrittmotor mit LEGO verbinden -- Das RTC-Modul -- Die Bauanleitung -- Die Zeit einstellen -- Der Aufbau -- Der Code -- Der Linienfolger -- Der Programmablauf -- Der Sensor -- Die Bauanleitung -- Der Aufbau -- Der Sketch -- Den Sensor testen -- Roboterkunst -- Der Code -- Der Spirograph -- Der Programmablauf -- Die Bauanleitung -- Der Aufbau -- Der Code -- Die Ping-Pong-Pistole -- Der Programmablauf -- Die Bauanleitung -- Der Aufbau -- Der Code -- Wecker -- Der Programmablauf -- Der Feuchtigkeitssensor -- Die Bauanleitungen -- Die Codes -- Das Letzte ... -- Bücher -- Händler…”
Libro electrónico -
107Publicado 2017“…Ethical hacking, or security testing, is the art and science of finding the flaws in an organization's network systems or web applications. …”
-
108por Seibold, ChrisTabla de Contenidos: “…Before you hack -- Mountain Lion hacks -- Customize your OS X experience -- Hacks for a more informative Mac -- Make it automatic -- Fun with Unix -- Lock down that Mac -- Other OSes -- Networking hacks -- Multimedia hacks -- Hack some hardware…”
Publicado 2013
Libro electrónico -
109por Bhangal, ShamTabla de Contenidos: “…A Page-Turn Effect (Exploit Symmetry and Masking)A Mathematical Hall of Mirrors; Page Turning; Final Thoughts; Animation; Smooth Scripted Motion; User-Actuated Movement (Breaking the onEnterFrame Monopoly); Final Thoughts; Time-Controlled Movement; The Code; Final Thoughts; Quick, Bandwidth-Efficient Character Animation; Hacky Wacky Walking; Final Thoughts; alt-Flash: Motion Graphics Alternatives; Processing; KoolMoves; Final Thoughts; Deja New Animations; Final Thoughts; Hacking The Matrix; Final Thoughts; Computer-Generated Character Animation; Automating Character Animation with Poser…”
Publicado 2004
Libro electrónico -
110por Savikas, AndrewTabla de Contenidos: “…Word Hacks; Contributors; Dedication; Preface; How to Use This Book; Where to Learn More; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; How to Contact Us; Got a Hack?…”
Publicado 2005
Libro electrónico -
111Publicado 2013Tabla de Contenidos: “…Cohen and Tom Scheinfeldt ""; ""Why ""Hacking""? / Tad Suiter ""; ""Hacking Scholarship ""; ""Getting Yourself Out of the Business in Five Easy Steps / Jason Baird Jackson ""; ""Burn the Boats/Books / David Parry ""; ""Reinventing the Academic Journal / Jo Guldi ""; ""Reading and Writing / Michael O'Malley ""; ""Voices: Blogging / Matthew G. …”
Libro electrónico -
112Publicado 2019“…This book shows you how to sort through the madness and get back to getting results. Identify your major speed bumps, and let the action-focused discussion gives you practical workarounds that will streamline your day and help you make things happen.Covering hacks at personal, one-on-one, and team levels, this book is packed with tips, tricks, and advice that will help you eliminate the distractions and harness technology; communicate effectively, delegate clearly, and coach confidently; and make meetings and missions that matter for your team. …”
Grabación musical -
113Publicado 2019“…Business Hack is your essential roadmap to business growth and online marketing success. …”
Grabación musical -
114por Grimes, Roger A.“…Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. …”
Publicado 2019
Grabación no musical -
115Publicado 2019Tabla de Contenidos: “…Why ethical hacking? -- Essential terms and concepts -- Methodology and quantitative studies of ethical hacking : evidence-based decision and policy-making -- Legal cases around the world (with Jelena Ardalic) -- Select ethical-hacking incidences : anonymous -- Select ethical-hacking incidences : Chaos Computer Club, CyberBerkut, LulzSec, Iranian Cyber Army, and others -- Online civil disobedience -- Hacktivism -- Penetration/intrusion testing and vulnerability disclosure -- Counterattack/hackback -- Security activism -- Ethical-hacking challenges in legal frameworks, investigation, prosecution, and sentencing -- Ethical hacking, whistle-blowing, and human rights and freedoms -- Toward an ethical-hacking framework…”
Libro electrónico -
116
-
117por Tuhls, G. O.“…Übersichtliches Kompendium für schnelle Problemlösungen Alle Word Hacks sind übersichtlich gegliedert und thematisch sortiert, sodass Sie schnell und einfach die passende Funktion für Ihre Aufgabenstellungen finden. …”
Publicado 2024
Libro electrónico -
118por Butler, Michael“…There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. …”
Publicado 2024
Libro electrónico -
119
-
120