Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Human rights 29
- Derechos humanos 27
- History 17
- Management 14
- Artificial intelligence 13
- Leadership 13
- Human Rights 12
- Philosophy 12
- Social aspects 11
- International law 10
- Law 10
- Political science 10
- Derechos humanos (Derecho internacional) 9
- Cloud computing 8
- Law and legislation 8
- Application software 7
- Democracy 7
- Derecho constitucional 7
- Development 7
- RELIGION 7
- Computer security 6
- Constitutional law 6
- Ethics 6
- Iglesia Católica 6
- Moral and ethical aspects 6
- Personnel management 6
- Politics and government 6
- Strategic planning 6
- Technological innovations 6
- Derecho 5
-
381por OECDTabla de Contenidos: “…. -- 1.1.2. ...and in spite of historic foundations favourable to science and innovation... -- 1.1.3. ...the transition is yet to commence -- 1.2. …”
Publicado 2021
Libro electrónico -
382por Kaltmeier, OlafTabla de Contenidos: “…Environmental Apocalypse, Mexican Revolution, and Conservation Policies -- Conservation Efforts in Central America -- Conclusions -- References -- Biodiversity in the Caribbean from the Mid‐Nineteenth Century to 1950 -- Logging -- Agroecosystems: Between Plantations and Smallholdings -- Livestock and Animals -- Protection of Flora and Fauna -- References -- From 1950 to the Present -- Introduction: Biodiversity and the Anthropocene in Latin America from 1950 to the Present -- References -- Biodiversity in the Southern Cone from 1950 to the Present -- The Southern Cone as Biocultural Mosaic -- "The Republic of Soy" -- Foreign Forests and Indigenous Rights -- Maritime Monocultures: Salmon Farms and Social Conflict -- Conserving Biodiversity -- The Anthropocene and the Unforeseen -- References -- Biodiversity in the Andes from 1950 to the Present -- Biodiversity's Axes -- Agrobiodiversity -- Trends of the Great Acceleration -- Extinction -- Conclusions -- References -- Biodiversity in the Amazon from 1950 to the Present -- Humans and Nonhumans in the Amazon since the Great Acceleration -- Threats to Flora and Fauna from 1950 onward -- Predation: Capture, Commerce, and Consumption -- Introduction of Exotic Species -- Sociobiodiversity and Biocultural Diversity in Amazonia -- Final Considerations -- References -- Biodiversity in Mesoamerica from 1950 to the Present -- Biodiversity: the Theoretical‐Historical Reflection on a Fragile Wealth -- Biodiversity: the Difficulty of Conservation in National and International Policies -- Status of Mesoamerican Biodiversity -- Central America -- Mexico -- Experiences of Community Biodiversity Management in Mesoamerica -- The Indigenous Peasant Coordinator of Community Agroforestry in Central America (ACICAFOC) -- Cuetzalan, Mexico: Biodiversity, Culture, and Defense of the Territory…”
Publicado 2024
Libro electrónico -
383Publicado 2011“…Throughout history, migrants have fueled the engine of human progress. Their movement has sparked innovation, spread ideas, relieved poverty, and laid the foundations for a global economy. …”
Libro electrónico -
384Publicado 2022Tabla de Contenidos: “…-- The ecosystem of transformers -- Industry 4.0 -- Foundation models -- Is programming becoming a sub-domain of NLP? …”
Libro electrónico -
385
-
386Publicado 2009Tabla de Contenidos: “…Is "intelligent design" science? or, What enables human beings to be intelligent designers? / Elia M. …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
387
-
388por Zuckerman, Phil“…”Most Americans are convinced that faith in God is the foundation of civil society. Society Without God reveals this to be nothing more than a well-subscribed, and strangely American, delusion. …”
Publicado 2008
Libro -
389Publicado 2017Tabla de Contenidos: “…-- As Andy Greenawalt Says, "You Are Misusing Your Humans -- Do Not Let Sacred Geese Live -- Market Your Market -- Purpose Can Drive Change, Too -- Shift to a Digital Community -- Price Is Only a Concern in the Absence of Value -- Overcoming the Challenges of the Digital Branch Starts with You -- Welcome to Digital Community Banking -- Move over Millennials -- Make Way for iGen -- Beware the Culture Danger -- Understand Your Technology -- Your Foundation Could Be a Bit Shaky -- And So, the Story Goes, "Free Your Data -- A Reliance on Professional Services Means You Get to Focus While Your End Users Get Best-of-Breed Offerings -- It's Not about Having Access to "Data," It's about Focused Direction -- Partner, Don't Incubate -- Skip the Writhing, Pleading, Grasping at Straws Thing -- Be Interested, Not Desperate -- Some Thoughts about Working with Fintech Startups -- Get More Efficient and More Proficient with Partners -- Scale Delivers Results -- For about Fifty Years, the Most Convenient Bank in the United States Was the US Postal Savings System -- Brand Power -- The Average Consumer Cares Very Little about Your Customer Service -- Which Takes Us Back to the Scale of Brands…”
Libro electrónico -
390Publicado 2023Tabla de Contenidos: “…-- How Do We Start Down the Right Path? -- How Do We Do This Right? How Do We Resolve These Issues? …”
Libro electrónico -
391Publicado 2013Tabla de Contenidos: “…Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture…”
Libro electrónico -
392
-
393Publicado 2024Libro electrónico
-
394Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1 How Customer Education Transforms Prospects to Champions -- The Evolution of Customer Education -- The Business Benefits of Education Across the Lifecycle -- Pre-sale -- Post-sale -- Advocacy -- Crossing the Chasm: When Is the Right Time to Invest in Customer Education? -- Chapter 2 Customer Education as a Catalyst for Business Growth -- The Importance of a Centralized Strategy for Customer Education -- What Else Is Customer Education? …”
Libro electrónico -
395Publicado 2013“…In Moral Intelligence 2.0, Lennick and Kiel extensively identify the moral components at the heart of the recent financial crisis, and illuminate the monetary and human costs of failed moral leadership in global finance, business and government. …”
Libro electrónico -
396Publicado 2023Libro electrónico
-
397Publicado 2016Tabla de Contenidos: “…Privacy -- Financial Regulations -- E-Discovery -- Expanding Scope of Regulation -- The Rapid Proliferation of Information, Devices, and Things -- The Changing Threat Landscape -- Stealthy Malware -- Nine Irrefutable Laws of Information Risk -- A New Approach to Managing Risk -- Chapter 2: The Misperception of Risk -- The Subjectivity of Risk Perception -- How Employees Misperceive Risk -- The Lure of the Shiny Bauble -- How Security Professionals Misperceive Risk -- Security and Privacy -- How Decision Makers Misperceive Risk -- How to Mitigate the Misperception of Risk -- Uncovering New Perspectives During Risk Assessments -- Communication Is Essential -- Building Credibility -- Chapter 3: Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk -- Information Risk Governance -- Finding the Right Governance Structure -- Building Internal Partnerships -- Legal -- Privacy -- Litigation -- Intellectual Property -- Contracts -- Financial Compliance -- Legal Specialists Within Business Groups -- Human Resources -- Setting Employee Expectations in Security Policies -- Employee Communications -- Investigations -- Finance -- Sarbanes-Oxley Compliance -- Working with Business Groups -- Internal Audit -- Corporate Risk Management -- Privacy -- Corporate Security -- Business Group Managers -- Conclusion -- Chapter 4: External Partnerships: The Power of Sharing Information -- The Value of External Partnerships -- External Partnerships: Types and Tiers -- 1:1 Partnerships…”
Libro electrónico -
398Publicado 2024Tabla de Contenidos: “…Understanding ABAC -- Other access control models for multi-account environments -- Choosing the right access control model -- Managing IAM identities -- Managing both human and non-human identities -- Types of credentials and their use cases -- IAM users, groups, and roles -- External identities and federation in AWS -- Comparing IAM identity types -- Managing IAM policies -- Understanding IAM policies -- Creating and managing IAM policies -- Advanced IAM policy use cases -- IAM in multi-account deployments -- Challenges with managing large-scale IAM deployments -- Centralized IAM management -- Cross-account access -- Sharing resources at scale -- Automating IAM implementation in a DevOps world -- Best practices for multi-account IAM -- Summary -- Questions -- Answers -- Further reading -- Chapter 4: Data Protection - Encryption, Key Management, and Data Storage Best Practices -- AWS encryption mechanisms and services -- AWS approach to encryption -- Types of encryption supported by AWS -- The AWS Encryption SDK -- Key features -- Managing cryptographic keys -- Key management services in AWS -- KMS in-depth overview -- CloudHSM integration and use cases -- Compliance in AWS key management -- Data protection in key AWS services -- S3 buckets -- EBS volumes -- EFS filesystems -- RDS databases -- DynamoDB tables -- Data protection in other AWS services -- Unified data protection strategy -- Summary -- Questions -- Answers -- Further reading -- Chapter 5: Introduction to AWS Security Services -- Unpacking threat and vulnerability detection -- GuardDuty-your AWS security sentinel -- Detective-your AWS security analyst -- Inspector-your AWS security auditor -- CloudTrail Lake and Security Lake-your AWS analytics powerhouses -- Best practices for threat and vulnerability detection -- Managing security governance and compliance…”
Libro electrónico -
399Publicado 2017“…Next, he presents the foundational knowledge you need to start creating real bots and CUIs. …”
Libro electrónico -
400Publicado 2017“…You will understand how to solve various ambiguities in processing human language and will come across various scenarios while performing text analysis. …”
Libro electrónico