Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 317
- Historia 307
- Development 271
- History 265
- Application software 196
- Leadership 170
- Engineering & Applied Sciences 152
- Computer networks 148
- Business & Economics 132
- RELIGION 127
- Python (Computer program language) 119
- Data processing 114
- Computer security 113
- Computer Science 109
- Security measures 108
- Social aspects 107
- Artificial intelligence 102
- Information technology 99
- Computer software 95
- Design 95
- Web site development 95
- Success in business 94
- Computer programming 92
- Computer programs 90
- Biblia 88
- Filosofía 86
- Psychological aspects 86
- Organizational change 85
- Technological innovations 84
- Crítica e interpretación 83
-
7881
-
7882
-
7883
-
7884
-
7885por OECD“…Nonetheless, the reform momentum needs to be sustained and deepened for the benefits of recent investment climate reforms to be shared widely and for growth to be environmentally sustainable, ultimately contributing toward the Sustainable Development Goals (SDGs)…”
Publicado 2020
Libro electrónico -
7886por Ollivaud, Patrice“…Current weak labour productivity growth in many OECD countries reflects historically weak contributions from both total factor productivity (TFP) growth and capital deepening. The slowdown in trend productivity growth in the pre-crisis period is mostly explained by a long-established slowdown in TFP growth, but since the crisis, the further deceleration is mainly due to weak capital deepening, a development apparent in practically every OECD country. …”
Publicado 2016
Capítulo de libro electrónico -
7887por Ryckman, Pamela“…But it's also about what happens when they leave the table, when the talking stops and the action starts…”
Publicado 2013
Libro electrónico -
7888Publicado 2013“…In Emerging Markets Rule , two experts on the global shift in economic hegemony explain what is happening, why it is happening--and how you can prevent it from happening to you. …”
Libro electrónico -
7889Publicado 2022Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
Libro electrónico -
7890por Nordås, Hildegunn Kyvik“…The objective of this study is to assess to what extent the observed growth and deepening international economic integration are related. …”
Publicado 2006
Capítulo de libro electrónico -
7891Publicado 2017“…New York Times bestselling author Gregory Benford creates an alternate history of the creation of the atom bomb that explores what could have happened if the bomb was ready to be used by June 6, 1944. …”
Libro -
7892Publicado 2016“…The time-window-based route reservation process is described as Iterative Deepening A*…”
Libro electrónico -
7893Publicado 2018“…You'll gradually expand your initial application, adding features and deepening your knowledge of Kubernetes architecture and operation. …”
Libro electrónico -
7894por Clarke, Shirley“…This series is a powerful, yet simple model for deepening student's learning experiences and focuses on urgent high impact practices that creatively meet and extend the curriculum standards and serves as a road map that has tons of grab and go ideas. …”
Publicado 2020
Libro -
7895Publicado 2020“…This series is a powerful, yet simple model for deepening student's learning experiences and focuses on urgent high impact practices that creatively meet and extend the curriculum standards and serves as a road map that has tons of grab and go ideas. …”
Libro -
7896Publicado 2020“…This series is a powerful, yet simple model for deepening student's learning experiences and focuses on urgent high impact practices that creatively meet and extend the curriculum standards and serves as a road map that has tons of grab and go ideas. …”
Libro -
7897por Clarke, Shirley“…This series is a powerful, yet simple model for deepening student's learning experiences and focuses on urgent high impact practices that creatively meet and extend the curriculum standards and serves as a road map that has tons of grab and go ideas. …”
Publicado 2020
Libro -
7898
-
7899por Robey, RobertTabla de Contenidos: “…-- 1.7.1 Additional reading -- 1.7.2 Exercises -- Summary -- 2 Planning for parallelization -- 2.1 Approaching a new project: The preparation -- 2.1.1 Version control: Creating a safety vault for your parallel code -- 2.1.2 Test suites: The first step to creating a robust, reliable application -- 2.1.3 Finding and fixing memory issues -- 2.1.4 Improving code portability -- 2.2 Profiling: Probing the gap between system capabilities and application performance -- 2.3 Planning: A foundation for success -- 2.3.1 Exploring with benchmarks and mini-apps -- 2.3.2 Design of the core data structures and code modularity -- 2.3.3 Algorithms: Redesign for parallel -- 2.4 Implementation: Where it all happens -- 2.5 Commit: Wrapping it up with quality -- 2.6 Further explorations…”
Publicado 2021
Libro electrónico -
7900Publicado 2015Tabla de Contenidos:Libro electrónico