Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,474
- Development 2,745
- History 2,707
- Application software 2,126
- Management 1,939
- Engineering & Applied Sciences 1,776
- Gestió de projectes 1,510
- Computer networks 1,287
- Data processing 1,177
- Security measures 1,167
- Computer Science 1,146
- Filosofía 1,110
- Computer security 1,088
- Prevention 1,063
- TFM 1,037
- Computer programs 1,006
- Business & Economics 923
- Artificial intelligence 903
- Computer software 902
- Cloud computing 896
- Education 874
- Design 873
- Universidad Pontificia de Salamanca (España) 860
- Història 855
- Social aspects 807
- Crítica e interpretación 804
- Python (Computer program language) 795
- Project management 784
- Web site development 771
- Computer programming 756
-
6441Publicado 1883991006555059706719
-
6442
-
6443
-
6444
-
6445
-
6446
-
6447
-
6448
-
6449
-
6450
-
6451
-
6452por Lucas, Stuart E.Tabla de Contenidos: “…Protecting and growing your wealth -- Eight principles of strategic wealth management -- Everything begins with values -- Defining your financial objectives -- The enchanted forest, the secret society, and the capital kibbutz -- Picking your investment strategy -- Making your most important hire -- Taxes can be your ally! …”
Publicado 2006
Libro electrónico -
6453Publicado 2009Tabla de Contenidos: “…-- The Broad Definition -- Don't Forget the Tangible -- Our Focus -- About UX Designers -- Where UX Designers Live -- Let's Get Started! -- CHAPTER 2: The Project Ecosystem -- Identify the Type of Site -- Brand Presence -- Marketing Campaign -- Content Source -- Task-Based Applications -- E-Commerce Sites -- E-Learning Applications -- Social Networking Applications -- Choose Your Hats -- Information Architect -- Interaction Designer -- User Researcher -- Other Roles You May Play or May Need -- Building a Network of User Advocacy -- Understand the Company Culture -- History -- Hierarchy -- Logistics -- Pulling It Together -- CHAPTER 3: Proposals for Consultants and Freelancers -- Proposals -- Creating the Proposal -- Title Page -- Revision History -- Project Overview -- Project Approach -- Scope of Work -- Assumptions -- Deliverables -- Ownership and Rights -- Additional Costs and Fees -- Project Pricing -- Payment Schedule -- Acknowledgment and Sign-Off -- Statements of Work -- CHAPTER 4: Project Objectives and Approach -- Solidify Project Objectives -- How Can a UX Designer Help? …”
Libro electrónico -
6454Publicado 2022Tabla de Contenidos: “…Cover -- About the Author -- Title Page -- Copyright Page -- Dedication -- Contents at a Glance -- Contents -- Acknowledgments -- Introduction -- PMP Exam Objectives Map -- Part I Project Management Foundation -- Chapter 1 Preparing for the Exam -- Chapter 2 Managing a Project in Different Environments -- Chapter 3 Working as a Project Manager -- Part II Project Management Professional Knowledge Areas -- Chapter 4 Managing Project Integration -- Chapter 5 Managing Project Scope -- Chapter 6 Managing Project Schedule -- Chapter 7 Managing Project Costs -- Chapter 8 Managing Project Quality -- Chapter 9 Managing Project Resources -- Chapter 10 Managing Project Communications -- Chapter 11 Managing Project Risks -- Chapter 12 Managing Project Procurement -- Chapter 13 Managing Project Stakeholders -- Part III PMP Agile Exam Testing Areas -- Chapter 14 Leading an Agile Project -- Chapter 15 Engaging Agile Stakeholders -- Chapter 16 Measuring Agile Project Performance -- Chapter 17 Managing Risks in Agile Projects -- Part IV PMP Exam Considerations -- Chapter 18 Understanding the Code of Ethics and Professional Conduct -- Chapter 19 Passing the PMP Exam -- Part V Appendixes and Glossary -- Appendix A Project Management Documents -- Appendix B About the Online Content -- Glossary -- Index…”
Libro electrónico -
6455Publicado 1798Libro electrónico
-
6456Publicado 2020“…Explore attack vectors that affect container deployments Dive into the Linux constructs that underpin containers Examine measures for hardening containers Understand how misconfigurations can compromise container isolation Learn best practices for building container images Identify container images that have known software vulnerabilities Leverage secure connections between containers Use security tooling to prevent attacks on your deployment…”
Libro electrónico -
6457
-
6458Publicado 2019“…In 1953 the American Psychiatric Association established an Architectural Study Project in collaboration with the American Institute of Architects. …”
Seriada digital -
6459
-
6460Publicado 2007Tabla de Contenidos: “…Cross Site Scripting (XSS)Presenting False Information; How this Example Works; Presenting a False Form; Exploiting Browser Based Vulnerabilities; Exploit Client/Server Trust Relationships; Chapter 4 : Client-Side Exploit Frameworks; Introduction; AttackAPI; Enumerating the Client; Attacking Networks; Hijacking the Browser; Controlling Zombies; BeEF; Installing and Configuring BeEF; Controlling Zombies; BeEF Modules; Standard Browser Exploits; Port Scanning with BeEF; Inter-protocol Exploitation and Communication with BeEF; CAL9000; XSS Attacks, Cheat Sheets, and Checklists…”
Libro electrónico