Mostrando 7,881 - 7,900 Resultados de 10,516 Para Buscar 'Heepen~', tiempo de consulta: 1.01s Limitar resultados
  1. 7881
    por Taylor, Jim, 1947-
    Publicado 1998
    Libro
  2. 7882
    por Childe, V. Gordon 1892-1957
    Publicado 1961
    Libro
  3. 7883
    por Haenens, Albert d ́
    Publicado 1961
    Libro
  4. 7884
    por Armstrong, April Oursler
    Publicado 1969
    Libro
  5. 7885
    por OECD
    Publicado 2020
    “…Nonetheless, the reform momentum needs to be sustained and deepened for the benefits of recent investment climate reforms to be shared widely and for growth to be environmentally sustainable, ultimately contributing toward the Sustainable Development Goals (SDGs)…”
    Libro electrónico
  6. 7886
    por Ollivaud, Patrice
    Publicado 2016
    “…Current weak labour productivity growth in many OECD countries reflects historically weak contributions from both total factor productivity (TFP) growth and capital deepening. The slowdown in trend productivity growth in the pre-crisis period is mostly explained by a long-established slowdown in TFP growth, but since the crisis, the further deceleration is mainly due to weak capital deepening, a development apparent in practically every OECD country. …”
    Capítulo de libro electrónico
  7. 7887
    por Ryckman, Pamela
    Publicado 2013
    “…But it's also about what happens when they leave the table, when the talking stops and the action starts…”
    Libro electrónico
  8. 7888
    Publicado 2013
    “…In Emerging Markets Rule , two experts on the global shift in economic hegemony explain what is happening, why it is happening--and how you can prevent it from happening to you. …”
    Libro electrónico
  9. 7889
    Publicado 2022
    Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
    Libro electrónico
  10. 7890
    por Nordås, Hildegunn Kyvik
    Publicado 2006
    “…The objective of this study is to assess to what extent the observed growth and deepening international economic integration are related. …”
    Capítulo de libro electrónico
  11. 7891
    Publicado 2017
    “…New York Times bestselling author Gregory Benford creates an alternate history of the creation of the atom bomb that explores what could have happened if the bomb was ready to be used by June 6, 1944. …”
    Libro
  12. 7892
    Publicado 2016
    “…The time-window-based route reservation process is described as Iterative Deepening A*…”
    Libro electrónico
  13. 7893
    Publicado 2018
    “…You'll gradually expand your initial application, adding features and deepening your knowledge of Kubernetes architecture and operation. …”
    Libro electrónico
  14. 7894
    por Clarke, Shirley
    Publicado 2020
    “…This series is a powerful, yet simple model for deepening student's learning experiences and focuses on urgent high impact practices that creatively meet and extend the curriculum standards and serves as a road map that has tons of grab and go ideas. …”
    Libro
  15. 7895
    Publicado 2020
    “…This series is a powerful, yet simple model for deepening student's learning experiences and focuses on urgent high impact practices that creatively meet and extend the curriculum standards and serves as a road map that has tons of grab and go ideas. …”
    Libro
  16. 7896
    Publicado 2020
    “…This series is a powerful, yet simple model for deepening student's learning experiences and focuses on urgent high impact practices that creatively meet and extend the curriculum standards and serves as a road map that has tons of grab and go ideas. …”
    Libro
  17. 7897
    por Clarke, Shirley
    Publicado 2020
    “…This series is a powerful, yet simple model for deepening student's learning experiences and focuses on urgent high impact practices that creatively meet and extend the curriculum standards and serves as a road map that has tons of grab and go ideas. …”
    Libro
  18. 7898
    por Belloc, Hilaire, 1870-1953
    Publicado 1951
    Libro
  19. 7899
    por Robey, Robert
    Publicado 2021
    Tabla de Contenidos: “…-- 1.7.1 Additional reading -- 1.7.2 Exercises -- Summary -- 2 Planning for parallelization -- 2.1 Approaching a new project: The preparation -- 2.1.1 Version control: Creating a safety vault for your parallel code -- 2.1.2 Test suites: The first step to creating a robust, reliable application -- 2.1.3 Finding and fixing memory issues -- 2.1.4 Improving code portability -- 2.2 Profiling: Probing the gap between system capabilities and application performance -- 2.3 Planning: A foundation for success -- 2.3.1 Exploring with benchmarks and mini-apps -- 2.3.2 Design of the core data structures and code modularity -- 2.3.3 Algorithms: Redesign for parallel -- 2.4 Implementation: Where it all happens -- 2.5 Commit: Wrapping it up with quality -- 2.6 Further explorations…”
    Libro electrónico
  20. 7900
    Publicado 2015
    Tabla de Contenidos:
    Libro electrónico