Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Teatro español 2,723
- Historia 2,277
- Història 930
- History 797
- Comedia española 595
- Biblia 592
- Management 569
- Filosofía 566
- Development 508
- Engineering & Applied Sciences 490
- Economic conditions 474
- Crítica e interpretación 459
- Congressos 442
- Óperas 442
- Politics and government 395
- Application software 390
- Computer networks 365
- Iglesia Católica 360
- Economic policy 331
- Business & Economics 328
- Computer Science 316
- Education 310
- Research & information: general 310
- Derecho 300
- Technology: general issues 296
- Security measures 295
- Economics 290
- Zarzuelas 283
- Research 282
- Zarzuela española 282
-
68861Publicado 2022“…Incentives' is another word for professionalisation policy instruments (PBIs) and these can be categorised as PBIs arising from legislation or regulations, PBIs of a financial nature and PBIs intended to entice professionalisation activities through communication. For each PBI aimed at secondary education, the actor(s) targeted and the nature of the incentive were identified. …”
Libro electrónico -
68862Publicado 2018“…Topics include Introduction to wireless technologies and protocols Wireless infrastructure attacks Wireless client attacks Building your lab and attack hardware Aircrack-ng Cracking WEP Hacking WPA Performing wireless reconnaissance Evil twins and rogue access points Bluetooth security assessment and monitoring NFC security assessment Wireless defenses Performing security assessments of IoT devices Mobile device security Hacking Android devices Hacking iOS devices About the Instructor Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives and standards bodies. …”
-
68863Publicado 2018“…Agile and Change consultant Robert Annis presents the Model for Activating Change in your Organization (MACO). Robert walks you through the three phases of MACO—Assessment, Preparation, and Delivery—which are intentionally simple and intended to be continuously repeated. …”
-
68864Publicado 2020“…Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book Description Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. …”
Libro electrónico -
68865Publicado 2016“…This book provides comprehensive guidance for work at the enterprise Portfolio, Value Stream, Program, and Team levels, including the various roles, activities, and artifacts that constitute the Framework, along with the foundational elements of values, mindset, principles, and practices. …”
Libro electrónico -
68866Publicado 2017“…What You Will Learn Understand key data analysis techniques centered around machine learning Implement Java APIs and various techniques such as classification, clustering, anomaly detection, and more Master key Java machine learning libraries, their functionality, and various kinds of problems that can be addressed using each of them Apply machine learning to real-world data for fraud detection, recommendation engines, text classification, and human activity recognition Experiment with semi-supervised learning and stream-based data mining, building high-performing and real-time predictive models Develop intelligent systems centered around various domains such as security, Internet of Things, social networking, and more In Detail Machine Learning is one of the core area of Artificial Intelligence where computers are trained to self-learn, grow, change, and develop on their own without being explicitly programmed. …”
Libro electrónico -
68867Publicado 2015“…Analysis Techniques for Product Owners LiveLessons describes a set of simple yet powerful analysis techniques that product owners and team members who work with product owners can use to Understand stakeholders Understand context Understand the need Understand the solution(s) Organize and persist solution information Because no technique is appropriate in every situation, this course helps you determine the right time to use these techniques and the simplest way to apply them in order to establish a shared understanding of the problem and the best solutions to solve the problem. …”
-
68868Publicado 2017“…You will also be able to customize major reporting functions for your teams and set up forms and documents for sales, purchase, inventory, and so on. …”
Libro electrónico -
68869Publicado 2018“…They are critical to any problem, provide a complete solution, and act like reusable code. Using appropriate data structures and having a good understanding of algorithm analysis are key in JavaScript to solving crises and ensuring your application is less prone to errors. …”
Libro electrónico -
68870Publicado 2015“…A PROVEN, STEP-BY-STEP ROADMAP FOR TRANSFORMATION LEADERS – FAST, SIMPLE, AND COMPRESSED Corporate transformation and breakthrough performance without the confusion and complexity GEARED TO RAPIDLY ENGAGE THE FULL ORGANIZATION To equip leaders at all levels to lead your transformation in an aligned and engaging manner FOCUSES EVERYONE ON “DOING MORE ON LESS” Generates focused execution and avoid layering initiative upon initiative to conquer organizational gridlock DESIGNED TO “DISRUPT” HOW TRADITIONAL TRANSFORMATION PROGRAMS ARE DONE Introduces disruptive transformation competencies that drive innovation, growth, and a new way of activating change Corporate transformation is tough work, but extraordinar..…”
Libro electrónico -
68871Publicado 2018“…After these initial steps, you will learn to exploit many vulnerabilities including authentication, session management, injection-based, cross-site scripting, cross-site request forgery, and cryptographic implementations. …”
-
68872Publicado 2018“…Contains practical solutions to tackle common (and not-so-common) problems you might encounter in your day to day activities Who This Book Is For This book is for Database administrator's and Teradata users who are looking for a practical, one-stop resource to solve all their problems while handling their Teradata solution. …”
Libro electrónico -
68873Publicado 2021“…As a result, you will be able to make an impactful change in your organization toward a higher level of information security.What you will learnUnderstand and operationalize risk management concepts and important security operations activitiesDiscover how to identify, classify, and maintain information and assetsAssess and mitigate vulnerabilities in information systemsDetermine how security control testing will be undertakenIncorporate security into the SDLC (software development life cycle)Improve the security of developed software and mitigate the risks of using unsafe softwareWho this book is forIf you are looking to begin your career in an information security role, then this book is for you. …”
Libro electrónico -
68874Publicado 2021“…This end-to-end case study is split into a series of bitesize projects that are presented as exercises and activities, allowing you to challenge yourself in an enjoyable and attainable way.As you progress, you'll learn various practical skills, including how to serve static files to add CSS, JavaScript, and images to your application, how to implement forms to accept user input, and how to manage sessions to ensure a reliable user experience. …”
Libro electrónico -
68875Publicado 2014“…This unique product contains multiple types of video presentations, including live instructor whiteboarding, real world demonstrations, animations of network activity, dynamic KeyNote presentations, doodle videos, and hands-on router and switch CLI configuration and troubleshooting in real lab environments, allowing you to both learn the concepts and the hands-on application. …”
-
68876Publicado 2019“…Make robust and powerful cybersecurity tools with Python Book Description With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands lots of automation and innovation; the only language that dominates all its peers is Python. …”
Libro electrónico -
68877Publicado 2021“…You'll learn: How the new realities of digitalization, including big data and AI, are affecting audit work and financial management practices How learning fast about and from more diverse data sources is essential to the new accounting environment Why accounting information must start to speak to what will take place rather than about financial activities that have occurred What finance must do in a world of changing risks, data growth, fast digitization, and increased regulation The author makes a compelling case that accounting now faces a crunch: it needs to reshape itself from the core because conventional financial analysis is proving too cumbersome and slow for executives in digitalized organizations. …”
Libro electrónico -
68878Publicado 2021“…This book focuses on the human and social sciences and draws particular attention to the diverse encounters that occur between researchers and research participants at all stages of the research process when studying human subjects and activities. The book presents case studies of applied conversation analysis in a variety of professional contexts. …”
Libro electrónico -
68879Publicado 2020“…The essential contribution of HSPGs to these processes depends on the ability of HS to bind hundreds of proteins and to modulate their activity. This unique property allows HSPGs to exert multiple functions either structural, by conferring integrity and insolubility to the extracellular matrix, or functional, by regulating bioavailability and signaling of growth factors and cytokines. …”
Libro electrónico -
68880por Cingano, Federico“…This implies a focus on families with children and youths – as this is when decisions about human capital accumulation are made -- promoting employment for disadvantaged groups through active labour market policies, childcare supports and in-work benefits…”
Publicado 2014
Capítulo de libro electrónico