Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4641por Contreras, Claudio AnibalTabla de Contenidos: “…El problema de la constitución política en el Contrato -- Conclusiones: el problema de la constitucióncomo operación y el derecho como fuerza -- Capítulo séptimo -- El problema de la constitución del Tercer Estadoy la formación del constitucionalismode la Ley fundamental -- 1.El constitucionalismo moderno desde Sieyes:de los tres Estados, la nobleza, el clero, y el "tercer Estado", a la revolución y la formación de la "nación" -- 2. …”
Publicado 2020
Libro electrónico -
4642Publicado 2024Tabla de Contenidos: “…Executive Order 13873 - Securing the Information and Communications Technology and Services Supply Chain (2019) -- Executive Order 13870 - America's Cybersecurity Workforce (2019) -- Executive Order 13865 - Coordinating National Resilience to Electromagnetic Pulses (2019) -- Executive Order 13905 - Strengthening National Resilience through Responsible Use of Positioning, Navigation, and Timing Services (2020) -- Executive Order 14028 - Improving the Nation's Cybersecurity (2021) -- Executive Order 14110 - Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (2023) -- Summary -- References -- Part 4: What's Next -- Chapter 9: The Future of CI -- Increment and innovation of cybersecurity measures -- More robust encryption implementation -- Human factor and training -- PPPs -- Resilience and recovery -- Integration of IoT and smart technologies -- Supply chain security -- Advancements in threat detection technologies -- Greater regulatory and compliance requirements -- Cross-sector collaboration -- Summary -- Conclusion -- References -- Index -- Other Books You May Enjoy…”
Libro electrónico -
4643por Matloff, Norman S.“…Drug developers use it to evaluate clinical trials and determine which medications are safe and effective; archaeologists use it to sift through mounds of artifacts and track the spread of ancient civilizations; and actuaries use it to assess financial risks and keep economies running smoothly. …”
Publicado 2011
Libro electrónico -
4644por Beaver, Kevin“…Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. …”
Publicado 2013
Libro electrónico -
4645Publicado 2022“…The digital world has never seemed more riddled with danger, even as Apple has done a fairly remarkable job across decades at keeping our Macs safe. But the best foot forward with security is staying abreast of past risks and anticipating future ones. …”
Libro electrónico -
4646Publicado 2010“…Perform “personal strategic planning” to stay on track, focused, and strong enough to say “no” to the wrong offers! …”
Libro electrónico -
4647Publicado 2019“…If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! …”
Grabación musical -
4648Publicado 2005Tabla de Contenidos: “…Make no little plans -- It's about your values -- Opportunities, ideation, and concept -- The importance of the first store -- Maximizing the retail experience through design -- Seamlessly connecting design to brand while staying on budget -- Merchandising : maximizing your profits -- Customizing customer service -- Go long -- Blueprint for execution -- Taking your organization long -- Kicking the economic model into gear -- Wellsprings to expansion -- Own Main & Main -- How to grow rapidly without stumbling -- Hot spots, oil stains, and the perfect location -- A walk through the locationing process -- Real estate : who needs who more, when -- Push the envelope -- Innovation as the path to growth -- Defining your mission in the new age of retail…”
Libro electrónico -
4649Publicado 2012“…Install applications from the Mac App Store, and stay safe with Gatekeeper. Stay in touch: Enjoy video calls with family and friends with FaceTime and chat them up with Messages. …”
Libro electrónico -
4650Publicado 2010“…But you can’t if you want to stay ahead of inflation and have any real (after inflation) return...…”
Libro electrónico -
4651Publicado 2017“…., 3D porous templates that support and stimulate the growth of healthy tissue and then safely dissolve once they have performed their functions. …”
Libro electrónico -
4652Publicado 2022“…The provider transparently reminds Natalie of the limits of confidentiality and informs her that she is going to call 9-1-1 for the purpose of keeping her safe. She asks Natalie to stay on camera while she makes the call…”
Vídeo online -
4653Publicado 2016“…Choose the right type of Internet service for your home Connect to the Internet--at home or away Choose and use the right web browser for your needs Browse and search the Web Shop safely online Use Facebook and other social media Find old friends and make new ones online Find news, sports, and weather online Enjoy TV shows, movies, and music online Get productive with online office apps Share your photos online Research your family tree online Manage your finances and track your health Play online games Email friends and family Video chat in real time Explore the mobile Internet with your tablet or smartphone Stay safe and secure while online…”
Libro electrónico -
4654por Rauland, PatrickTabla de Contenidos: “…Check your hosting before you launch -- Use an SSL certificate -- Keep WordPress core and plugins up to date -- Keep your version of PHP supported -- Two-factor login for administrators -- Scan for downtime -- Staying up to date with WooCommerce and open source software -- Follow the Developer Blog -- Annual conferences -- Contributing to WooCommerce -- Office hours -- Summary -- Index -- Other Books You May Enjoy…”
Publicado 2024
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull)Acceso restringido con credenciales UPSA
Libro electrónico -
4655Publicado 2019Tabla de Contenidos: “…The Validity of Maslow's Theory -- Marketing Applications of Maslow's Theory -- Hidden Motives -- Motives and Technology -- Personality Development -- Personality Reflects Individual Differences -- Personality Is Consistent and Enduring -- Personality Can Change -- Freudian Theory -- Neo‐Freudian Personality Theory -- Personality Traits -- Innovators versus Laggards -- Open‐ versus Closed‐Minded -- Conformity versus Individuality -- Novel and Complex or Simple and Safe Experiences -- Preference for Thinking -- Preference for Written or Visual -- Importance of Possessions -- Compulsions and Fixations -- Consumer Ethnocentrism -- Personality and Color -- Anthropomorphism -- Product Personality and Gender -- Product Personality and Geography -- Self‐Perception -- The Extended Self -- Altering the Self -- Summary -- Review and Discussion Questions -- Hands‐on Assignments -- Key Terms -- 4 Consumer Perception and Positioning -- Sensory Information -- Sight -- Scent -- Touch -- Sound -- Taste -- Sensory Input and Culture -- The Absolute and Differential Thresholds -- The Absolute Threshold -- The Differential Threshold -- Product Pricing and Improvements -- Logos and Packaging -- Subliminal Perception -- Perceptual Selection -- Stimuli's Features -- Personal Expectations -- Consumer Motivation -- Perceptual Selectivity -- Perceptual Organization -- Figure and Ground -- Grouping -- Closure -- Interpretation: Cues -- Integral Indicators -- External Indicators -- Stereotyping -- Physical Appearance -- Descriptive Terms -- First Impressions -- Halo Effect -- Interpretation: Consumer Imagery -- Perceived Value -- Perceived Quality -- Price-Quality Relationship -- Brand Image -- Package Perceptions/Image -- Service Quality -- Retail Store Perceptions/Image -- Company Image -- Risk Perception -- The Components of Perceived Risk -- Reducing Perceived Risk…”
Libro electrónico -
4656
-
4657Publicado 2017Tabla de Contenidos:Libro electrónico
-
4658Publicado 2018Tabla de Contenidos: “…-- Hello World of concurrency (using std::thread) -- Managing threads -- Thread launch -- Thread join -- Passing arguments into a thread -- Using Lambdas -- Ownership management -- Sharing data between threads -- Mutexes -- Avoiding deadlock -- Locking with std::unique_lock -- Condition variables -- A thread-safe stack data structure -- Summary…”
Libro electrónico -
4659Publicado 2019Tabla de Contenidos: “…-- Composition Versus Inheritance -- Field Inheritance and Accessors -- Singleton -- Object-Oriented Design with Lambdas -- Lambdas Versus Nested Classes -- Lambdas Versus Method References -- Exceptions and Exception Handling -- Safe Java Programming -- Chapter 6. Java's Approach to Memory and Concurrency -- Basic Concepts of Java Memory Management -- Memory Leaks in Java -- Introducing Mark-and-Sweep -- The Basic Mark-and-Sweep Algorithm -- How the JVM Optimizes Garbage Collection -- Evacuation -- The HotSpot Heap -- Other Collectors -- ParallelOld -- Finalization -- Finalization Details -- Java's Support for Concurrency -- Thread Lifecycle -- Visibility and Mutability -- Exclusion and Protecting State -- volatile -- Useful Methods of Thread -- Deprecated Methods of Thread…”
Libro electrónico -
4660Publicado 2023Tabla de Contenidos: “…Privacy and Security Laws -- Health Insurance Portability and Accountability Act -- The Health Information Technology for Economic and Clinical Health Act -- Gramm-Leach-Bliley Act -- Sarbanes-Oxley Act -- State Data Breach Notification Laws -- International Laws -- European Union General Data Protection Regulation -- Adequacy Decisions -- U.S.-EU Safe Harbor and Privacy Shield -- Laws, Regulations, and Standards -- Payment Card Industry Data Security Standard -- Critical Infrastructure Protection Program -- Conflicting International Legislation -- Information Security Management Systems -- ISO/IEC 27017:2015 -- Privacy in the Cloud -- Generally Accepted Privacy Principles -- ISO 27018 -- Direct and Indirect Identifiers -- Privacy Impact Assessments -- Cloud Forensics -- Forensic Requirements -- Cloud Forensic Challenges -- Collection and Acquisition -- Evidence Preservation and Management -- e-discovery -- Audit Processes, Methodologies, and Cloud Adaptations -- Virtualization -- Scope -- Gap Analysis -- Restrictions of Audit Scope Statements -- Policies -- Audit Reports -- Summary -- Exam Essentials -- Review Questions -- Chapter 10 Cloud Vendor Management -- The Impact of Diverse Geographical Locations and Legal Jurisdictions -- Security Policy Framework -- Policies -- Standards -- Procedures -- Guidelines -- Exceptions and Compensating Controls -- Developing Policies -- Enterprise Risk Management -- Risk Identification -- Risk Calculation -- Risk Assessment…”
Libro electrónico