Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,216
- Historia 640
- Management 562
- Development 453
- Economics 371
- Engineering & Applied Sciences 355
- Social aspects 344
- Business & Economics 322
- Education 293
- Economic conditions 268
- Computer networks 266
- Politics and government 259
- Filosofía 254
- Leadership 254
- Application software 243
- Computer Science 236
- Crítica e interpretación 232
- Economic policy 220
- History and criticism 218
- Philosophy 218
- Data processing 209
- Economic aspects 208
- Technological innovations 208
- Computer security 206
- Security measures 206
- Information technology 204
- Cloud computing 196
- Artificial intelligence 194
- Rilke, Rainer Maria 192
- Atles 188
-
24561por Urribarri Urdaneta, Oscar Alberto“…En tal sentido, las operaciones de investigación consistieron en la recopilación de datos en un trabajo de campo mediante los métodos de entrevistas semiestructuradas a quince participantes que desempeñan roles en los diferentes niveles jerárquicos y de observación participante en las unidades de observación seleccionadas. …”
Publicado 2020
Libro electrónico -
24562Publicado 2021“…After an Executive Summary of the contents, the chapters build up understanding of orthodox economics' role in protecting the neoliberal paradigm. A salient case, the ETS is successful in shielding the Business-as-Usual activities of the EU's industry, however this book argues that the system fails in creating innovation for decarbonizing production technologies. …”
Libro electrónico -
24563por Conchon, Anne“…À l’échelle d’un itinéraire singulier et atypique, l’objectif de cette étude est de saisir la façon dont se cristallisent les stratégies d’un individu et les ressources tirées de ses relations sociales, et de lui restituer ainsi un rôle actif dans la construction de son capital relationnel - des liens de parenté, d’amitié, de voisinage, de clientèle ou de travail mais aussi l’appartenance à la franc-maçonnerie. …”
Publicado 2020
Electrónico -
24564por Ageron, Charles-Robert“…Les populations, du Maghreb à Madagascar, de l'Afrique Noire à l'Indochine, attendaient-elles, déjà en fait, la fin de la domination française ? Quel rôle jouèrent les influences étrangères - américaines et britanniques, en particulier - dans cette accélération de l'histoire ? …”
Publicado 2013
Electrónico -
24565por Aubert, Didier“…Dans cette entreprise qui relève autant de la mythologie que de l’histoire, le western (film dont l’action est située à la frontière) joue un rôle déterminant. Toutefois, du Cheval de fer (John Ford, 1924) à Little Big Man (Arthur Penn, 1970), le regard porté par le cinéma sur la construction de l’Ouest américain a connu des évolutions, des revirements, des interrogations, déterminées à la fois par les évènements historiques et les bouleversements sociologiques qui affectent les États-Unis tout au long de cette période. …”
Publicado 2021
Electrónico -
24566por Barnier, Frédérique“…Dans le cas français, l’ingénierie des armements relève du monde administratif et technique « ordinaire » et les corps d’armement ont joué un rôle pionnier dans de nombreux champs scientifiques et techniques, dans la géodésie, l’instrumentation et la métrologie notamment, ou encore dans la rationalisation industrielle. …”
Publicado 2020
Electrónico -
24567por Bartels, Jens“…This book provides the key to understanding the role of powerful women and their relationship with power in the ancient world…”
Publicado 2021
Electrónico -
24568por Blanchard, Maxime“…Entre la remise en question de l’intellectuel, qui n’aurait plus de rôle dans la société contemporaine, et de la négligence du texte malrucien, devenu supposément illisible parce qu’il soutient des thèses, S’engager : L’intellectuel dans l’œuvre d’André Malraux s’approprie et relaie un admirable modèle : celui du texte politique et de l’intellectuel engagé. …”
Publicado 2020
Electrónico -
24569Publicado 2020“…Dabei ist von besonderem Interesse, was die römischen Juristen als Anlass für eine translatio iudicii anerkennen, welche Rolle sie dem Magistrat und welche den Parteien innerhalb des Translationsverfahrens zuerkennen und ob durch die translatio iudicii ein eigenständiger, neuer Prozess begründet wird oder der begründete Rechtsstreit und der von den neuen Beteiligten aufgenommene Prozess ein einheitliches Verfahren bilden…”
Electrónico -
24570Publicado 2012“…Comment comprendre leur rôle et saisir leur impact ? Qu’apportent-elles aux entreprises avec lesquelles elles coopèrent ? …”
Libro electrónico -
24571Publicado 2022“…Smart, ambitious women who are underrepresented in their fields tend to rely solely on hard work and skills, Abji notes, so you'll also find wise counsel on how to nurture self-awareness, self-approval and self-trust, so you can succeed at the top without compromising your values. …”
Libro electrónico -
24572Publicado 2020“…Delve into the "data-reality gap" that grows with our dependence on data Learn how the right tools can streamline the visualization process Avoid common mistakes in data analysis, visualization, and presentation Create and present clear, accurate, effective data visualizations To err is human, but in today's data-driven world, the stakes can be high and the mistakes costly. Don't rely on "catching" mistakes, avoid them from the outset with the expert instruction in Avoiding Data Pitfalls …”
Libro electrónico -
24573Publicado 2018“…Master the fundamental elements of wealth management Shift to a growth mindset and deal successfully with change Attract, develop, and retain the top talent to grow your business Offer a unique value proposition to better serve high net worth clients The wealth management industry is facing its greatest challenge to date, and whether your business fails, survives, or thrives depends on leadership. You simply cannot rely on old methods to win a brand new battle. It's time for a change in strategy, methods, processes, and approaches—are you flexible enough to bend without breaking? …”
Libro electrónico -
24574Publicado 2017“…Understand product funnels and their critical role in analyzing product performance and user needs Discover the best ways to use Google Analytics to track product performance and user interactions Learn to use Google tools like attribution modeling, event tracking, and acquisition and behavior reports Explore the Google Search Console and learn how it identifies user expectations around products See how tools like Hot Jar and Crazy Egg can help you visualize and understand user engagement Matthew Edgar is a partner at Colorado based Elementive, a consulting firm specializing in web analytics, CRO, UX, and technical SEO. …”
-
24575Publicado 2016“…Tech-savvy readers will get a comprehensive account of how data analysis has prevailed over political instinct and experience, along with examples of the challenges these practitioners face. Essays include: The Role of Data in Campaigns —Andrew Therriault, former Director of Data Science for the Democratic National Committee Essentials of Modeling and Microtargeting —Dan Castleman, cofounder and Director of Analytics at Clarity Campaign Labs, a leading modeler in Democratic politics Data Management for Political Campaigns —Audra Grassia, Deputy Political Director for the Democratic Governors Association in 2014, now leads political engagements at Civis Analytics How Technology Is Changing the Polling Industry —Patrick Ruffini, cofounder of Echelon Insights and Founder/Chairman of Engage, was a digital strategist for President Bush in 2004 and for the Republican National Committee in 2006 Data-Driven Media Optimization —Alex Lundry, cofounder and Chief Data Scientist at Deep Root Analytics, a leading expert on media and voter analytics, electoral targeting, and political data mining How (and Why) to Follow the Money in Politics —Derek Willis, ProPublica’s news applications developer, formerly with The New York Times Digital Advertising in the Post-Obama Era —Daniel Scarvalone, Associate Director of Research and Data at Bully Pulpit Interactive (BPI), a digital marketer for the Democratic party Election Forecasting in the Media —Natalie Jackson, Senior Polling Editor at The Huffington Post…”
Libro electrónico -
24576Publicado 2018Tabla de Contenidos: “…Mitko Bogdansoki -- Securing the weakest link in the cyber security chain against social engineering attacks -- Introduction -- Social engineering definition -- Social engineering attacks life cycle -- Taxonomy of the social engineering attacks -- Phishing -- Dumpster diving -- Shoulder surfing -- Advanced Persistent Treat (APT) -- Reverse social engineering -- Baiting -- Waterholing -- Tailgating -- Trojan horses -- Surfing online content -- Role-playing -- Pretexting -- Spear phishing -- Quid pro quo -- Vishing -- Real-world examples of social engineering attacks -- Staying safe from social engineering attacks -- References -- Ozan Ucar and Orhan Sari -- Ask the expert-tips to prevent social engineering (SE) and personal real-life experiences of SE -- Keepnet Phishing Simulator is an excellent tool for fighting against phishing attacks -- Template management -- Edit button -- Adding a new template -- Report manager -- Phishing incident responder -- Sami Lahio -- Chapter 14: Ask the Experts - Part 4 -- Oguzhan Filizlibay -- The aftermath - what follows a social engineering attack? …”
Libro electrónico -
24577Publicado 2016“…A través de casi 30 campañas de clientes tan prestigiosos como Amazon, BMW, Citybank, Rolling Stone, EDS, Holiday Inn, Lee Jeans, Miller, Nestlé, Skoda o Subway, descubrirás los errores y aciertos cometidos por estas marcas a la hora de querer posicionarse en el mercado a través de la publicidad así como a saber identificar la idea esencial y cómo sacarle el jugo para lograr multiplicar el valor de la creatividad. …”
Libro electrónico -
24578Publicado 2018“…It enables developers to build and deploy decentralized applications that can be relied on to work without fraud, censorship or interference from third parties. …”
Libro electrónico -
24579Publicado 2021“…Identity Core is a flagship library packaged with ASP.NET Core projects that helps in securing ASP.NET applications using features such as authentication, role management, and so on. . Getting authentication and authorization done right in your website can help keep your users and their data safe from attacks. …”
Video -
24580Publicado 2021“…We also highlight how the file I/O events are captured in IBM QRadar® and offenses are generated based on predefined rules. After the offenses are generated, we show how the cases are automatically generated in IBM Cloud Pak® for Security by using the IBM QRadar SOAR Plugin, with a manually automated method to log a case in IBM Cloud Pak for Security. …”
Libro electrónico