Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4221por Horton, IvorTabla de Contenidos: “…Understanding Storage Duration and ScopeAutomatic Variables; Positioning Variable Declarations; Global Variables; Static Variables; Variables with Specific Sets of Values; Old Enumerations; Type-Safe Enumerations; Namespaces; Declaring a Namespace; Multiple Namespaces; Summary; Chapter 3: Decisions and Loops; Comparing Values; The if Statement; Nested if Statements; The Extended if Statement; Nested if-else Statements; Logical Operators and Expressions; Logical AND; Logical OR; Logical NOT; The Conditional Operator; The switch Statement; Unconditional Branching…”
Publicado 2012
Libro electrónico -
4222por Shema, MikeTabla de Contenidos: “…Employing CountermeasuresValidating Input; Securing the Query; Protecting Information; Stay Current with Database Patches; Summary; Chapter 4. …”
Publicado 2010
Libro electrónico -
4223por Veer, E. A. VanderTabla de Contenidos: “…Social Ads (Targeted Announcements)Connect Facebook to Your Website with Widgets; High-Dollar Options; Customizing Facebook and Adding Apps; Modifying Your Home Page and Profile; Facebook Applications: An Overview; Facebook Games; Playing It Safe: Facebook Privacy; Privacy and Facebook: An Overview; Deciding How Much to Share; Controlling Access to Your Account; Adjusting Your Privacy Settings; Fighting Back; Facebook Mobile; How Facebook Mobile Works; Setting Up Facebook Mobile; Using Facebook Mobile; Checking In with Places; Appendix; Facebook Help; Getting Help from Other Facebook Members…”
Publicado 2011
Libro electrónico -
4224por Hetland, Magnus Lie. authorTabla de Contenidos: “…""; ""Exercises""; ""References""; ""Chapter 7: Greed Is Good? Prove It!""; ""Staying Safe, Step by Step""; ""The Knapsack Problem""; ""Fractional Knapsack""; ""Integer Knapsack""; ""Huffmanâ€?…”
Publicado 2014
Libro electrónico -
4225Publicado 2015Tabla de Contenidos: “…ImageMagickShutter; Compressing files; Zip/Unzip; File Roller; Split; Summary; Chapter 6: Other Raspberry Pi Projects; PwnPi; Raspberry Pwn; PwnBerry Pi; Defending your network; Intrusion detection and prevention; Snort; Content filter; KidSafe; Remote access with OpenVPN; Tor relays and routers; Raspberry Tor; Tor router; Running Raspberry Pi on your PC with QEMU Emulator; Other Raspberry Pi uses; Flight tracking using PiAware; PiPlay; PrivateEyePi; More uses; Summary; Index…”
Libro electrónico -
4226por Powers, David. authorTabla de Contenidos: “…; Can I Just Copy and Paste the Code?; How Safe Is PHP?; What Software Do I Need to Write PHP?…”
Publicado 2014
Libro electrónico -
4227por Schmidt, Ulrike, 1955-Tabla de Contenidos: “…; Key points to remember; 2 What to do in a crisis; Getting support; Keeping yourself safe; Trying not to slide down into a pit of loneliness and despair; Don't expect miracles! …”
Publicado 2004
Libro electrónico -
4228Publicado 2013Tabla de Contenidos: “…Chapter 43 - Cue ReactivityDEFINITION OF ADDICTION; EVOLUTIONARY AND BIOLOGICAL EXPLANATIONS; CONDITIONING AND LEARNING THEORIES; INVESTIGATION OF EXERCISE DEPENDENCE; NORMS, VALUES, AND EXPECTATIONS; SPECIFIC SUBSTANCES; BEHAVIORS THOUGHT TO BE AFFECTED BY ALCOHOL MYOPIA; NEUROBIOLOGY OF ECSTASY USE; CONNOTATIONS; CONCEPTUAL MODELS OF ADDICTIVE BEHAVIOR; PSYCHOSOCIAL FACTORS AND THE DEVELOPMENT OF ADDICTIVE BEHAVIORS; NEUROIMAGING EVIDENCE LINKING INTEROCEPTION AND CRAVING; PREVALENCE; CONCLUSION; THE BIOPSYCHOSOCIAL MODEL AND ADDICTION TREATMENT; NEGATIVE CORRELATES; SAFE SEX…”
Libro electrónico -
4229por Taylor, Chris, 1951-Tabla de Contenidos: “…Working with feelings and thoughtsUnblocking techniques; Empathy; Keeping communication open; Unconditional positive regard; Saying 'No'; Matching approach to attachment style; The anxious child; Chapter Five; Working with Conflict; The nature of conflict; Individual differences in conflict style; Inconsistencies in conflict style; Choices in conflict; Opportunity; Attachment patterns and conflict style; Keeping yourself safe; Communication: 'There are two people in this'; Effective listening; Knowing ourselves: why do adults retaliate?…”
Publicado 2010
Libro electrónico -
4230Publicado 2024Tabla de Contenidos: “…DeFalco -- Appropriating Sovereignty through Trials : British Imperial Expansion and Staging of Oppression through Law / Aman Kumar -- 'Protecting the Environment Is Not Illegal' : Ecological Activism, the Visualities of Law and Justice, and the Land Concession Crisis in Cambodia / Stéphanie Benzaquen-Gautier -- Veteran Mobilisation, Prosecutions, and the Contested Legacy of the Past in Northern Ireland : Deconstructing the 'Witch-Hunt' Narrative / Kevin Hearty and Kieran McEvoy -- Negative Aesthetic Experiences of Prosecuting the Barely Alive / Shannon Fyfe -- Elaborating on the 'Asymmetry' of Prosecuting Aged Defendants for Atrocities : A 'Multimodal-Visual Argumentation' Perspective / Konstantinos P. …”
Libro -
4231por Weissman, JerryTabla de Contenidos: “…Paraphrase Challenging Questions The Buffer Key Words The Double Buffer The Power of "You" The Triple Fail-Safe Case Study: Colin Powell 6. Provide the Answer (Martial Art: Balance). …”
Publicado 2008
Libro -
4232por Weissman, JerryTabla de Contenidos: “…Paraphrase Challenging Questions The Buffer Key Words The Double Buffer The Power of "You" The Triple Fail-Safe Case Study: Colin Powell 6. Provide the Answer (Martial Art: Balance). …”
Publicado 2005
Libro -
4233Publicado 2008Tabla de Contenidos: “….] -- Lipoic acid as an inducer of phase II detoxification enzymes through activation of Nrf2-dependent gene expression / Kate Peterson Shay, Swapna Shenvi, and Tory M. Hagen --…”
Libro -
4234Publicado 2021Tabla de Contenidos: “…State Authority -- Financial Data -- Credit History -- California Financial Information Privacy Act -- Data Security -- Recent Developments -- Data Breach Notification Laws -- Elements of State Data Breach Notification Laws -- Key Differences Among States Today -- Recent Developments -- Marketing Laws -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 International Privacy Regulation -- International Data Transfers -- European Union General Data Protection Regulation -- Adequacy Decisions -- U.S.-EU Safe Harbor and Privacy Shield -- Binding Corporate Rules -- Standard Contractual Clauses -- Other Approved Transfer Mechanisms -- APEC Privacy Framework -- Cross-Border Enforcement Issues -- Global Privacy Enforcement Network -- Resolving Multinational Compliance Conflicts -- Summary -- Exam Essentials -- Review Questions -- Appendix: Answers to Review Questions -- Chapter 1: Privacy in the Modern Era -- Chapter 2: Legal Environment -- Chapter 3: Regulatory Enforcement -- Chapter 4: Information Management…”
Libro electrónico -
4235por OECDTabla de Contenidos: “…Simultanbetriebsprüfungen -- E. Safe-Harbour-Regelungen -- F. Vorabverständigungen über die Verrechnungspreise -- G. …”
Publicado 2022
Libro electrónico -
4236por OECDTabla de Contenidos: “…Simultanbetriebsprüfungen -- E. Safe-Harbour-Regelungen…”
Publicado 2018
Libro electrónico -
4237Publicado 2017Tabla de Contenidos: “…Regulatory Approaches -- Comparison of U.S. versus International Financial Regulatory Regimes -- Introduction to the Dodd-Frank Act -- Key Points -- Knowledge Check -- Notes -- Chapter 8: Introduction to International Regulatory Regimes -- Introduction -- The Financial Stability Board -- The Basel Accords -- The European Systemic Risk Board -- Principles for Financial Market Infrastructures -- Key Points -- Knowledge Check -- Notes -- Chapter 9: Systemically Important Entities -- Introduction -- Introduction to Systemically Important Entities -- Classification of Entities as Systemically Important by the FSOC -- Bank SIFIs -- Nonbank SIFIs -- SIFMUs -- Globally Systemically Important Banks -- Total Loss-Absorbing Capacity (TLAC) Requirements -- Broad Impact of Financial Stability Requirements -- Key Points -- Knowledge Check -- Notes -- Chapter 10: The Volcker Rule -- Introduction -- Introduction to the Volcker Rule -- The Volcker Rule: Details -- Prohibition of Proprietary Trading -- Prohibition of Ownership or Sponsorship of Hedge Funds and Private Equity Funds -- The Volcker Rule and Systemically Risky Nonbank Financial Companies -- Activities That Are Permitted Despite the Volcker Rule -- Implementation of the Volcker Rule -- Volcker Rule: Criticism -- Key Points -- Knowledge Check -- Notes -- Chapter 11: Counterparty Credit Risk -- Introduction -- Overview of Derivative Securities -- Counterparty Exposure -- How Counterparty Credit Risk Is Managed -- Collateral -- Netting -- Central Counterparties -- Counterparty Credit Risk and Systemic Risk -- Key Points -- Knowledge Check -- Notes -- Chapter 12: The Dodd-Frank Act and Counterparty Credit Risk…”
Libro electrónico -
4238Publicado 2017Tabla de Contenidos: “…Cover -- Copyrights -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Beginning Your Kotlin Adventure -- Say hello to Kotlin -- Awesome Kotlin examples -- Dealing with Kotlin code -- Kotlin Playground -- Android Studio -- Configuring Kotlin for the project -- Using Kotlin in a new Android project -- Java to Kotlin converter (J2K) -- Alternative ways to run Kotlin code -- Kotlin under the hood -- The Kotlin standard library -- More reasons to use Kotlin -- Summary -- Chapter 2: Laying a Foundation -- Variables -- Type inference -- Strict null safety -- Safe call -- Elvis operator -- Not-null assertion -- The let function -- Nullability and Java -- Casts -- Safe/unsafe cast operator -- Smart casts -- Type smart casts -- Non-nullable smart cast -- Primitive data types -- Numbers -- Char -- Arrays -- The Boolean type -- Composite data types -- Strings -- String templates -- Ranges -- Collections -- Statements versus expressions -- Control flow -- The if statement -- The when expression -- Loops -- The for loop -- The while loop -- Other iterations -- Break and continue -- Exceptions -- The try... catch block -- Compile-time constants -- Delegates -- Summary -- Chapter 3: Playing with Functions -- Basic function declaration and usage -- Parameters -- Returning functions -- Vararg parameter -- Single-expression functions -- Tail-recursive functions -- Different ways of calling a function -- Default argument values -- Named arguments syntax -- Top-level functions -- Top-level functions under the hood -- Local functions -- Nothing return type -- Summary -- Chapter 4: Classes and Objects -- Classes -- Class declaration -- Properties -- Read-write versus read-only -- Property access syntax between Kotlin and Java -- Increment and decrement operators…”
Libro electrónico -
4239Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Microsoft 365 -- Chapter 1: Getting Started with Microsoft 365 Security and Compliance -- Technical requirements -- Introduction to Microsoft 365 offers, plans, and licenses -- Microsoft 365 plans and components -- Microsoft 365 licensing -- Introduction to Microsoft 365 security -- Introduction to Microsoft 365 compliance -- Summary -- Chapter 2: The Role of Microsoft Entra ID in Microsoft 365 Security -- Technical requirements -- Microsoft Entra ID plans and features -- Microsoft Entra ID roles and groups -- Azure roles, or Azure RBAC roles -- Microsoft Entra ID roles -- Classic roles -- Microsoft 365 roles in Microsoft Entra ID -- Best practices for roles -- Microsoft 365 groups -- Microsoft Entra ID Protection -- Summary -- Part 2: Microsoft 365 Security -- Chapter 3: Microsoft Defender for Office 365 -- Technical requirements -- Getting started with Microsoft Defender for Office 365 -- Protecting assets with Microsoft Defender for Office 365 -- Quarantine policy -- Anti-phishing -- Anti-spam -- Anti-malware -- Safe Attachment -- Safe Links -- Rules -- Attack simulation training -- Responding to alerts and mitigating threats -- Summary -- Chapter 4: Microsoft Defender for Endpoint -- Introducing Microsoft Defender for Endpoint -- Technical and license requirements -- Configuring Microsoft Defender for Endpoint -- Microsoft Defender Vulnerability Management dashboard -- Microsoft Defender for Endpoint Device inventory -- Windows devices -- Configuring advanced features in Microsoft Defender for Endpoint -- Security recommendations -- The Microsoft Defender for Endpoint configuration management dashboard -- Microsoft Defender for Endpoint Tutorials & -- simulations…”
Libro electrónico -
4240Publicado 2022Tabla de Contenidos: “…-Nietzsche, Ecce Homo -- Transition -- Notes -- Chapter 16 A Safe-To-Fail Culture of Experimentation -- Launch -- Agile and Lean Experimentation -- Safe-to-fail -- Learning -- Improvisation -- "What's Necessary, in Short, Is Not Just Imagination But the Institutionalization of Imagination…”
Libro electrónico