Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 8
- Leadership 6
- Computer security 5
- History 5
- Certification 4
- Electronic data processing personnel 4
- Examinations 4
- Security measures 4
- Business & Economics 3
- Microcomputers 3
- Pocket computers 3
- Success in business 3
- Business 2
- Computer Science 2
- Computer programming 2
- Computer technicians 2
- Computing Technology Industry Association 2
- Employees 2
- Engineering & Applied Sciences 2
- Fairs 2
- Maintenance and repair 2
- Markets 2
- Online social networks 2
- Self-Help 2
- Strategic planning 2
- Success 2
- Tablet computers 2
- Twitter 2
- Vocational guidance 2
- iPad (Computer) 2
-
61
-
62Publicado 2011Tabla de Contenidos: “…-- Golden years -- Tax avoidance -- Japanese curse -- The god of our time -- Business of business -- Limited consciences -- A brilliant daring speculation -- Dirty tricks -- Marriages and separations -- The house that Jack built -- Capital ideas -- WWJD - watch what Jack did! …”
Libro electrónico -
63por Pike, Robert W.Tabla de Contenidos: “…Game #62: A Lot of Hot AirGame #63: Black Jack; Game #64: Ball Toss; Game #65: The Prize Box; Game #66: Cartoon Drawing; Game #67: Different Characters; Game #68: Cultural Introductions; Game #69: Bump; Game #70: License Plates; Game #71: Get Through the Window; Game #72: Rhythmic Sticks; Game #73: Dealing with Harassment; Game #74: Hat Trick; Game #75: Discovering Learning Styles; Game #76: Representative Objects; Game #77: Rock Collection; Game #78: Pass the Hat; Game #79: Team Q & A; Game #80: Memory Test; Game #81: Wrenching Decisions; Game #82: Ugly Chart Contest…”
Publicado 2004
Libro electrónico -
64por Oliviero, Andrew, 1966-Tabla de Contenidos: “…; Part I: LAN Networks and Cabling Systems; Chapter 1: Introduction to Data Cabling; The Golden Rules of Data Cabling; The Importance of Reliable Cabling; You've Come a Long Way, Baby: The Legacy of Proprietary Cabling Systems; Cabling and the Need for Speed; Cable Design; Data Communications 101; Speed Bumps: What Slows Down Your Data; Types of Crosstalk; External Interference…”
Publicado 2009
Libro electrónico -
65por Gralla, PrestonTabla de Contenidos: “…Copyright; The Missing Credits; Introduction; Chapter 1; The Guided Tour; Power/Lock Key; Headset Jack; About the Screen; Status Bar Icons; Notification Light; The Four Keys; Micro USB Port; HDMI Port; Ringer Volume; Microphone; SD Card and Battery; Camera; Charging Cable and AC Adapter; Home Screen; The Droid X Panes; Customizing the Home Screen and Panes; Controlling the Droid X2 with Your Fingers; Chapter 2; Typing and Texting; The Keyboards; Using the Multi-Touch Keyboard; Using the Swype Keyboard; Copying and Pasting Text; Searching Your Droid X2; Voice Search; Text Messaging…”
Publicado 2011
Libro electrónico -
66Publicado 2010Tabla de Contenidos: “…The Guided Tour; Sleep Switch (On/Off); SIM Card Slot; Headphone Jack; The Screen; Screen Icons; Home Button; Silencer Switch, Volume Keys; The Bottom and the Back; iPhone 4 Special Bits; In the Box; Seven Basic Finger Techniques; Charging the iPhone; Battery Life Tips; The Home Screen; 2. …”
Libro electrónico -
67por Grossman, Kevin W.Tabla de Contenidos: “…; Look to LinkedIn; Just the Facts, Jack. But First, the Story; Your Summary; Your Previous Jobs, Titles, and Descriptions; Your Specialties, Skills, and Expertise (Think Key Words); Your Education (even If It's Incomplete); Your Professional Headline; And, of Course, Your Headshot; Recommendations and Accolades; Oh, Yeah-You've Got to Connect; A Word About Branching Out; Wait, What?…”
Publicado 2012
Libro electrónico -
68
-
69Publicado 2024“…They explain how leading strategically will help managers strengthen their capacity to develop strategy and to lead its execution. …”
Grabación no musical -
70
-
71por Benninga, SimonTabla de Contenidos: “…Calcular los valores de los parámetros -- 5.Un ejemplo: Hoteles Hilton -- 6.Calcular el CCMP utilizando ß del activo, ßactivo -- 7.¡No lea esta sección! …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
72Publicado 2010“…Whether you are coaching subordinates or clients, you will want to keep this book close at hand—full of detailed guidance.” …”
Libro electrónico -
73
-
74
-
75Publicado 2024Tabla de Contenidos: “…-- Get a Computer That's Powerful Enough -- Make Sure You Have Enough Fast Memory -- Keep Your Production Media Separate -- Update Your Drivers ... …”
Libro electrónico -
76Publicado 2016Tabla de Contenidos: “…Bartholomew Yong -- 24. 'I pray thee keep my kine' Alonso Perez, tr. Bartholomew Yong -- 25. …”
Libro electrónico -
77Publicado 2021Tabla de Contenidos: “…-- Free IDS/IPS -- IPS versus IDS -- Summary -- Chapter 9: Deep Diving into Physical Security -- Technical requirements -- Understanding physical security and associated threats -- The powerful LAN Turtle -- The stealthy Plunder Bug LAN Tap -- The dangerous Packet Squirrel -- The portable Shark Jack -- The amazing Screen Crab -- The advanced Key Croc -- USB threats -- Equipment theft -- Environmental risks -- Physical security mechanisms -- Mastering physical security -- Clean desk policy -- Physical security audits -- Summary -- Further reading -- Chapter 10: Applying IoT Security -- Understanding the Internet of Things -- The risks -- The vulnerabilities -- Understanding IoT networking technologies -- LoRaWAN -- Zigbee -- Sigfox -- Bluetooth -- Security considerations -- Improving IoT security -- Creating cybersecurity hardware using IoT-enabled devices -- Raspberry Pi firewall and intrusion detection system -- Defensive security systems for industrial control systems (SCADA) -- Secure USB-to-USB copy machine -- Creating a 10 honeypot -- Advanced monitoring of web apps and networks -- Creating an internet ad blocker -- Access control and physical security systems -- Bonus track - Understanding the danger of unauthorized IoT devices -- Detecting unauthorized IoT devices -- Detecting a Raspberry Pi -- Disabling rogue Raspberry Pi devices -- Summary -- Further reading -- Chapter 11: Secure Development and Deployment on the Cloud -- Technical requirements -- Secure deployment and implementation of cloud applications…”
Libro electrónico -
78
-
79Publicado 2015Tabla de Contenidos: “….: A Call to the Heart -- Zach Clayton: It's Not about Your Resume -- Crucibles Help Make the Transformation -- Steve Jobs: Learning in the Wilderness -- John Mackey: Learning to Share Power -- My Defining Leadership Experience -- Taking the I to We Journey -- Exercise: Your Transformation from I to We -- Chapter 10: Purpose -- Ken Frazier: Medicine for the People -- Defending Merck Science -- A Mentor's Story -- What's the Purpose of Your Leadership? …”
Libro electrónico -
80