Mostrando 4,541 - 4,560 Resultados de 5,391 Para Buscar 'Icogne~', tiempo de consulta: 1.31s Limitar resultados
  1. 4541
    Publicado 2021
    “…Como preparación a la Jornada Mundial de la Juventud (JMJ) de Lisboa 2023, la Cruz y el icono de Nuestra Señora de Salus Populi Romani, símbolos que acompañan a los jóvenes en la preparación de estas jornadas, están peregrinando por las diócesis españolas. …”
    Acceso desde Summa.
    Video
  2. 4542
    por Espuña, Margarita
    Publicado 2010
    “…Allí fue convertida por el aparato propagandístico de Fidel Castro en un icono de la lucha revolucionaria, una figura modelada y manipulada según los intereses del régimen comunista de la isla. …”
    Libro
  3. 4543
    por Isaacson, Walter
    Publicado 2011
    “…Tras entrevistarlo en más de cuarenta ocasiones en los últimos dos años, además de a un centenar de personas de su entorno, familiares, amigos, adversarios y colegas, Walter Isaacson nos presenta la única biografía escrita con la colaboración de Jobs, el retrato definitivo de uno de los iconos indiscutibles de nuestro tiempo, la crónica de la vida y personalidad del genio cuya creatividad, energía y afán de perfeccionismo revolucionaron seis industrias: la informática, el cine de animación, la música, la telefonía, las tabletas y la edición digital…”
    Libro
  4. 4544
    Publicado 2016
    “…La Transición de la dictadura a la democracia se ha contado como una foto fija si bien existen distintas narrativas al respecto ¿Se trata de una esencia fundacional, incluso icono sagrado, o, más bien, un modelo que hay que revisar y superar? …”
    Libro
  5. 4545
    Publicado 2022
    Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
    Libro electrónico
  6. 4546
    por Čičinaże, Nino aut
    Publicado 2021
    “…The texts reveal the increased religious and political dimensions of icons in the 10th-11th c. monastic environment: they enhance different monastic spaces – churches, ossuaries, cells of monks. …”
    Artículo
  7. 4547
    Publicado 2008
    “…. • Working with shapes, stencils, and themes • Using the Data Graphics feature for extra customization • Importing content from Microsoft Excel and Microsoft Project • Displaying data as text, data bars, icons, and color-coding using Data Graphics • Creating custom stencils, icons, and templates • Storing and displaying employee information in organization charts • Customizing the layout of organization charts • Creating database models, flowcharts, and Gantt charts • Connecting shapes in network drawings • Using digital ink and animation • Creating macros • Handling guides and rulers • Working with layers • Getting the most from ShapeSheets…”
    Libro electrónico
  8. 4548
    por Seizov, Ognyan
    Publicado 2014
    “…Seizov introduces the book's main theoretical and methodological contribution to multimodal document analysis, the annotation scheme "Imagery and Communication in Online Narratives" (ICON), and explores how the ICON approach works in practice…”
    Libro
  9. 4549
    Publicado 2018
    “…Every year, the iconic luxury brand Hermès chooses a new theme to celebrate its creative direction for the upcoming year. …”
    Libro
  10. 4550
    por Santoro, Jaime
    Publicado 2017
    Tabla de Contenidos: “…INICIO DE 3D CON SUPERFICIES -- 17.1 DIBUJAR EN 3D -- 17.2 CAMBIAR EL PUNTO DE VISTA -- 17.3 DAR ALTURA A LOS OBJETOS -- 17.4 ÓRDENES PARA SUPERFICIES -- 17.4.1 MALLA 3D -- 17.4.2 CARA 3D -- 17.4.3 SUPERFICIE REGLADA -- 17.5 SOMBREAR Y OCULTAR LÍNEAS EN EL DIBUJO -- 17.6 CAMBIAR EL SISTEMA DE COORDENADAS (...) -- 17.7 VER EL ICONO X, Y -- 17.8 SISTEMAS DE COORDENADAS PREDEFINIDOS -- 17.9 VER LA PLANTA DEL SCP -- 17.10 SUPERFICIE TABULADA -- 17.11 SUPERFICIE DEFINIDA POR LADOS -- 17.12 SUPERFICIE REVOLUCIONADA -- 17.13 OBJETOS 3D PREDEFINIDOS -- 18. …”
    Libro electrónico
  11. 4551
    Publicado 2024
    “…Without words, apps would be an unusable jumble of shapes and icons, while voice interfaces and chatbots wouldn't even exist. …”
    Grabación no musical
  12. 4552
    Publicado 2012
    “…An intimate portrait and a vibrant celebration of one of the most influential women of the twentieth century. An enduring icon who has had a strong influence on the course of fashion, beauty, publishing and culture…”
    Ver más información
    DVD
  13. 4553
    Publicado 1998
    Revista digital
  14. 4554
    Publicado 2003
    “…Mamá le canta una nana, papá la coge en brazos, la abuela le da el biberón y el abuelo toca una canción. …”
    Libro
  15. 4555
    Publicado 2015
    “…Schneider, a leading - indeed, iconic - figure in the field of international dispute resolution and co-founder of the world-renowned law firm LALIVE. …”
    Libro electrónico
  16. 4556
    Publicado 2012
    “…The names behind Pickard Chilton have lead the design of some of the world's most widely known buildings, creating iconic structures that have defined institutions, corporations, communities, cities and countries. …”
    Libro
  17. 4557
    Publicado 2020
    Tabla de Contenidos: “…X-Ray and Computed Tomography -- 13.1 Introduction -- 13.2 History -- 13.3 X-Ray Generation -- 13.3.1 X-Ray Tube Construction -- 13.3.2 X-Ray Generation Process -- 13.4 Material Properties -- 13.4.1 Attenuation -- 13.4.2 Lambert-Beer Law for Multiple Materials -- 13.4.3 Factors Determining Attenuation -- 13.5 X-Ray Detection -- 13.5.1 Image Intensifier -- 13.5.2 Multiple-Field II -- 13.5.3 Flat Panel Detector (FPD) -- 13.6 X-Ray Imaging Modes -- 13.6.1 Fluoroscopy -- 13.6.2 Angiography -- 13.7 Computed Tomography (CT) -- 13.7.1 Reconstruction -- 13.7.2 Parallel-Beam CT -- 13.7.3 Central Slice Theorem -- 13.7.4 Fan-Beam CT -- 13.7.5 Cone-Beam CT -- 13.7.6 Micro-CT -- 13.8 Hounsfield Unit (HU) -- 13.9 Artifacts -- 13.9.1 Geometric Misalignment Artifacts -- 13.9.2 Scatter -- 13.9.3 Offset and Gain Correction -- 13.9.4 Beam Hardening -- 13.9.5 Metal Artifacts -- 13.10 Summary…”
    Libro electrónico
  18. 4558
    Publicado 2023
    Tabla de Contenidos: “…Biomass pyrolysis reactors -- 3.1 Fast pyrolysis reactors -- 3.1.1 Bubbling fluidized bed reactors -- 3.1.2 Auger reactors -- 3.1.3 Fixed-bed reactors -- 3.1.4 Circulating fluidized bed reactor -- 3.1.5 Rotating cone reactors -- 3.1.6 Ablative reactors -- 3.1.7 Grinding pyrolysis reactors -- 3.2 Slow pyrolysis reactors -- 3.2.1 Kilns -- 3.2.2 Retorts -- 4. …”
    Libro electrónico
  19. 4559
    Publicado 2005
    Acceso restringido con credenciales UPSA
    Libro electrónico
  20. 4560
    por Avellaneda Cusaría, Alfonso
    Publicado 2005
    Enlace del recurso
    Artículo digital