Mostrando 24,561 - 24,580 Resultados de 27,041 Para Buscar 'RTL9~', tiempo de consulta: 0.79s Limitar resultados
  1. 24561
    “…En tal sentido, las operaciones de investigación consistieron en la recopilación de datos en un trabajo de campo mediante los métodos de entrevistas semiestructuradas a quince participantes que desempeñan roles en los diferentes niveles jerárquicos y de observación participante en las unidades de observación seleccionadas. …”
    Libro electrónico
  2. 24562
    Publicado 2021
    “…After an Executive Summary of the contents, the chapters build up understanding of orthodox economics' role in protecting the neoliberal paradigm. A salient case, the ETS is successful in shielding the Business-as-Usual activities of the EU's industry, however this book argues that the system fails in creating innovation for decarbonizing production technologies. …”
    Libro electrónico
  3. 24563
    por Conchon, Anne
    Publicado 2020
    “…À l’échelle d’un itinéraire singulier et atypique, l’objectif de cette étude est de saisir la façon dont se cristallisent les stratégies d’un individu et les ressources tirées de ses relations sociales, et de lui restituer ainsi un rôle actif dans la construction de son capital relationnel - des liens de parenté, d’amitié, de voisinage, de clientèle ou de travail mais aussi l’appartenance à la franc-maçonnerie. …”
    Electrónico
  4. 24564
    por Ageron, Charles-Robert
    Publicado 2013
    “…Les populations, du Maghreb à Madagascar, de l'Afrique Noire à l'Indochine, attendaient-elles, déjà en fait, la fin de la domination française ? Quel rôle jouèrent les influences étrangères - américaines et britanniques, en particulier - dans cette accélération de l'histoire ? …”
    Electrónico
  5. 24565
    por Aubert, Didier
    Publicado 2021
    “…Dans cette entreprise qui relève autant de la mythologie que de l’histoire, le western (film dont l’action est située à la frontière) joue un rôle déterminant. Toutefois, du Cheval de fer (John Ford, 1924) à Little Big Man (Arthur Penn, 1970), le regard porté par le cinéma sur la construction de l’Ouest américain a connu des évolutions, des revirements, des interrogations, déterminées à la fois par les évènements historiques et les bouleversements sociologiques qui affectent les États-Unis tout au long de cette période. …”
    Electrónico
  6. 24566
    por Barnier, Frédérique
    Publicado 2020
    “…Dans le cas français, l’ingénierie des armements relève du monde administratif et technique « ordinaire » et les corps d’armement ont joué un rôle pionnier dans de nombreux champs scientifiques et techniques, dans la géodésie, l’instrumentation et la métrologie notamment, ou encore dans la rationalisation industrielle. …”
    Electrónico
  7. 24567
    por Bartels, Jens
    Publicado 2021
    “…This book provides the key to understanding the role of powerful women and their relationship with power in the ancient world…”
    Electrónico
  8. 24568
    por Blanchard, Maxime
    Publicado 2020
    “…Entre la remise en question de l’intellectuel, qui n’aurait plus de rôle dans la société contemporaine, et de la négligence du texte malrucien, devenu supposément illisible parce qu’il soutient des thèses, S’engager : L’intellectuel dans l’œuvre d’André Malraux s’approprie et relaie un admirable modèle : celui du texte politique et de l’intellectuel engagé. …”
    Electrónico
  9. 24569
    Publicado 2020
    “…Dabei ist von besonde­rem Interesse, was die römischen Juristen als Anlass für eine translatio iudicii anerkennen, welche Rolle sie dem Magistrat und welche den Parteien innerhalb des Translationsverfahrens zuerkennen und ob durch die translatio iudicii ein eigenständiger, neuer Prozess be­gründet wird oder der begründete Rechtsstreit und der von den neuen Beteiligten aufgenommene Prozess ein einheitliches Verfahren bilden…”
    Electrónico
  10. 24570
    Publicado 2012
    “…Comment comprendre leur rôle et saisir leur impact ? Qu’apportent-elles aux entreprises avec lesquelles elles coopèrent ? …”
    Libro electrónico
  11. 24571
    Publicado 2022
    “…Smart, ambitious women who are underrepresented in their fields tend to rely solely on hard work and skills, Abji notes, so you'll also find wise counsel on how to nurture self-awareness, self-approval and self-trust, so you can succeed at the top without compromising your values. …”
    Libro electrónico
  12. 24572
    Publicado 2020
    “…Delve into the "data-reality gap" that grows with our dependence on data Learn how the right tools can streamline the visualization process Avoid common mistakes in data analysis, visualization, and presentation Create and present clear, accurate, effective data visualizations To err is human, but in today's data-driven world, the stakes can be high and the mistakes costly. Don't rely on "catching" mistakes, avoid them from the outset with the expert instruction in Avoiding Data Pitfalls …”
    Libro electrónico
  13. 24573
    Publicado 2018
    “…Master the fundamental elements of wealth management Shift to a growth mindset and deal successfully with change Attract, develop, and retain the top talent to grow your business Offer a unique value proposition to better serve high net worth clients The wealth management industry is facing its greatest challenge to date, and whether your business fails, survives, or thrives depends on leadership. You simply cannot rely on old methods to win a brand new battle. It's time for a change in strategy, methods, processes, and approaches—are you flexible enough to bend without breaking? …”
    Libro electrónico
  14. 24574
    Publicado 2017
    “…Understand product funnels and their critical role in analyzing product performance and user needs Discover the best ways to use Google Analytics to track product performance and user interactions Learn to use Google tools like attribution modeling, event tracking, and acquisition and behavior reports Explore the Google Search Console and learn how it identifies user expectations around products See how tools like Hot Jar and Crazy Egg can help you visualize and understand user engagement Matthew Edgar is a partner at Colorado based Elementive, a consulting firm specializing in web analytics, CRO, UX, and technical SEO. …”
    Video
  15. 24575
    Publicado 2016
    “…Tech-savvy readers will get a comprehensive account of how data analysis has prevailed over political instinct and experience, along with examples of the challenges these practitioners face. Essays include: The Role of Data in Campaigns —Andrew Therriault, former Director of Data Science for the Democratic National Committee Essentials of Modeling and Microtargeting —Dan Castleman, cofounder and Director of Analytics at Clarity Campaign Labs, a leading modeler in Democratic politics Data Management for Political Campaigns —Audra Grassia, Deputy Political Director for the Democratic Governors Association in 2014, now leads political engagements at Civis Analytics How Technology Is Changing the Polling Industry —Patrick Ruffini, cofounder of Echelon Insights and Founder/Chairman of Engage, was a digital strategist for President Bush in 2004 and for the Republican National Committee in 2006 Data-Driven Media Optimization —Alex Lundry, cofounder and Chief Data Scientist at Deep Root Analytics, a leading expert on media and voter analytics, electoral targeting, and political data mining How (and Why) to Follow the Money in Politics —Derek Willis, ProPublica’s news applications developer, formerly with The New York Times Digital Advertising in the Post-Obama Era —Daniel Scarvalone, Associate Director of Research and Data at Bully Pulpit Interactive (BPI), a digital marketer for the Democratic party Election Forecasting in the Media —Natalie Jackson, Senior Polling Editor at The Huffington Post…”
    Libro electrónico
  16. 24576
    Publicado 2018
    Tabla de Contenidos: “…Mitko Bogdansoki -- Securing the weakest link in the cyber security chain against social engineering attacks -- Introduction -- Social engineering definition -- Social engineering attacks life cycle -- Taxonomy of the social engineering attacks -- Phishing -- Dumpster diving -- Shoulder surfing -- Advanced Persistent Treat (APT) -- Reverse social engineering -- Baiting -- Waterholing -- Tailgating -- Trojan horses -- Surfing online content -- Role-playing -- Pretexting -- Spear phishing -- Quid pro quo -- Vishing -- Real-world examples of social engineering attacks -- Staying safe from social engineering attacks -- References -- Ozan Ucar and Orhan Sari -- Ask the expert-tips to prevent social engineering (SE) and personal real-life experiences of SE -- Keepnet Phishing Simulator is an excellent tool for fighting against phishing attacks -- Template management -- Edit button -- Adding a new template -- Report manager -- Phishing incident responder -- Sami Lahio -- Chapter 14: Ask the Experts - Part 4 -- Oguzhan Filizlibay -- The aftermath - what follows a social engineering attack? …”
    Libro electrónico
  17. 24577
    Publicado 2016
    “…A través de casi 30 campañas de clientes tan prestigiosos como Amazon, BMW, Citybank, Rolling Stone, EDS, Holiday Inn, Lee Jeans, Miller, Nestlé, Skoda o Subway, descubrirás los errores y aciertos cometidos por estas marcas a la hora de querer posicionarse en el mercado a través de la publicidad así como a saber identificar la idea esencial y cómo sacarle el jugo para lograr multiplicar el valor de la creatividad. …”
    Libro electrónico
  18. 24578
    Publicado 2018
    “…It enables developers to build and deploy decentralized applications that can be relied on to work without fraud, censorship or interference from third parties. …”
    Libro electrónico
  19. 24579
    Publicado 2021
    “…Identity Core is a flagship library packaged with ASP.NET Core projects that helps in securing ASP.NET applications using features such as authentication, role management, and so on. . Getting authentication and authorization done right in your website can help keep your users and their data safe from attacks. …”
    Video
  20. 24580
    Publicado 2021
    “…We also highlight how the file I/O events are captured in IBM QRadar® and offenses are generated based on predefined rules. After the offenses are generated, we show how the cases are automatically generated in IBM Cloud Pak® for Security by using the IBM QRadar SOAR Plugin, with a manually automated method to log a case in IBM Cloud Pak for Security. …”
    Libro electrónico