Mostrando 4,641 - 4,660 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.69s Limitar resultados
  1. 4641
    por Contreras, Claudio Anibal
    Publicado 2020
    Tabla de Contenidos: “…El problema de la constitución política en el Contrato -- Conclusiones: el problema de la constitucióncomo operación y el derecho como fuerza -- Capítulo séptimo -- El problema de la constitución del Tercer Estadoy la formación del constitucionalismode la Ley fundamental -- 1.El constitucionalismo moderno desde Sieyes:de los tres Estados, la nobleza, el clero, y el "tercer Estado", a la revolución y la formación de la "nación" -- 2. …”
    Libro electrónico
  2. 4642
    Publicado 2024
    Tabla de Contenidos: “…Executive Order 13873 - Securing the Information and Communications Technology and Services Supply Chain (2019) -- Executive Order 13870 - America's Cybersecurity Workforce (2019) -- Executive Order 13865 - Coordinating National Resilience to Electromagnetic Pulses (2019) -- Executive Order 13905 - Strengthening National Resilience through Responsible Use of Positioning, Navigation, and Timing Services (2020) -- Executive Order 14028 - Improving the Nation's Cybersecurity (2021) -- Executive Order 14110 - Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (2023) -- Summary -- References -- Part 4: What's Next -- Chapter 9: The Future of CI -- Increment and innovation of cybersecurity measures -- More robust encryption implementation -- Human factor and training -- PPPs -- Resilience and recovery -- Integration of IoT and smart technologies -- Supply chain security -- Advancements in threat detection technologies -- Greater regulatory and compliance requirements -- Cross-sector collaboration -- Summary -- Conclusion -- References -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  3. 4643
    por Matloff, Norman S.
    Publicado 2011
    “…Drug developers use it to evaluate clinical trials and determine which medications are safe and effective; archaeologists use it to sift through mounds of artifacts and track the spread of ancient civilizations; and actuaries use it to assess financial risks and keep economies running smoothly. …”
    Libro electrónico
  4. 4644
    por Beaver, Kevin
    Publicado 2013
    “…Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. …”
    Libro electrónico
  5. 4645
    Publicado 2022
    “…The digital world has never seemed more riddled with danger, even as Apple has done a fairly remarkable job across decades at keeping our Macs safe. But the best foot forward with security is staying abreast of past risks and anticipating future ones. …”
    Libro electrónico
  6. 4646
    Publicado 2010
    “…Perform “personal strategic planning” to stay on track, focused, and strong enough to say “no” to the wrong offers! …”
    Libro electrónico
  7. 4647
    Publicado 2019
    “…If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! …”
    Grabación musical
  8. 4648
    Publicado 2005
    Tabla de Contenidos: “…Make no little plans -- It's about your values -- Opportunities, ideation, and concept -- The importance of the first store -- Maximizing the retail experience through design -- Seamlessly connecting design to brand while staying on budget -- Merchandising : maximizing your profits -- Customizing customer service -- Go long -- Blueprint for execution -- Taking your organization long -- Kicking the economic model into gear -- Wellsprings to expansion -- Own Main & Main -- How to grow rapidly without stumbling -- Hot spots, oil stains, and the perfect location -- A walk through the locationing process -- Real estate : who needs who more, when -- Push the envelope -- Innovation as the path to growth -- Defining your mission in the new age of retail…”
    Libro electrónico
  9. 4649
    Publicado 2012
    “…Install applications from the Mac App Store, and stay safe with Gatekeeper. Stay in touch: Enjoy video calls with family and friends with FaceTime and chat them up with Messages. …”
    Libro electrónico
  10. 4650
    Publicado 2010
    “…But you can’t if you want to stay ahead of inflation and have any real (after inflation) return...…”
    Libro electrónico
  11. 4651
    Publicado 2017
    “…., 3D porous templates that support and stimulate the growth of healthy tissue and then safely dissolve once they have performed their functions. …”
    Libro electrónico
  12. 4652
    Publicado 2022
    “…The provider transparently reminds Natalie of the limits of confidentiality and informs her that she is going to call 9-1-1 for the purpose of keeping her safe. She asks Natalie to stay on camera while she makes the call…”
    Vídeo online
  13. 4653
    Publicado 2016
    “…Choose the right type of Internet service for your home Connect to the Internet--at home or away Choose and use the right web browser for your needs Browse and search the Web Shop safely online Use Facebook and other social media Find old friends and make new ones online Find news, sports, and weather online Enjoy TV shows, movies, and music online Get productive with online office apps Share your photos online Research your family tree online Manage your finances and track your health Play online games Email friends and family Video chat in real time Explore the mobile Internet with your tablet or smartphone Stay safe and secure while online…”
    Libro electrónico
  14. 4654
    por Rauland, Patrick
    Publicado 2024
    Tabla de Contenidos: “…Check your hosting before you launch -- Use an SSL certificate -- Keep WordPress core and plugins up to date -- Keep your version of PHP supported -- Two-factor login for administrators -- Scan for downtime -- Staying up to date with WooCommerce and open source software -- Follow the Developer Blog -- Annual conferences -- Contributing to WooCommerce -- Office hours -- Summary -- Index -- Other Books You May Enjoy…”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  15. 4655
    Publicado 2019
    Tabla de Contenidos: “…The Validity of Maslow's Theory -- Marketing Applications of Maslow's Theory -- Hidden Motives -- Motives and Technology -- Personality Development -- Personality Reflects Individual Differences -- Personality Is Consistent and Enduring -- Personality Can Change -- Freudian Theory -- Neo‐Freudian Personality Theory -- Personality Traits -- Innovators versus Laggards -- Open‐ versus Closed‐Minded -- Conformity versus Individuality -- Novel and Complex or Simple and Safe Experiences -- Preference for Thinking -- Preference for Written or Visual -- Importance of Possessions -- Compulsions and Fixations -- Consumer Ethnocentrism -- Personality and Color -- Anthropomorphism -- Product Personality and Gender -- Product Personality and Geography -- Self‐Perception -- The Extended Self -- Altering the Self -- Summary -- Review and Discussion Questions -- Hands‐on Assignments -- Key Terms -- 4 Consumer Perception and Positioning -- Sensory Information -- Sight -- Scent -- Touch -- Sound -- Taste -- Sensory Input and Culture -- The Absolute and Differential Thresholds -- The Absolute Threshold -- The Differential Threshold -- Product Pricing and Improvements -- Logos and Packaging -- Subliminal Perception -- Perceptual Selection -- Stimuli's Features -- Personal Expectations -- Consumer Motivation -- Perceptual Selectivity -- Perceptual Organization -- Figure and Ground -- Grouping -- Closure -- Interpretation: Cues -- Integral Indicators -- External Indicators -- Stereotyping -- Physical Appearance -- Descriptive Terms -- First Impressions -- Halo Effect -- Interpretation: Consumer Imagery -- Perceived Value -- Perceived Quality -- Price-Quality Relationship -- Brand Image -- Package Perceptions/Image -- Service Quality -- Retail Store Perceptions/Image -- Company Image -- Risk Perception -- The Components of Perceived Risk -- Reducing Perceived Risk…”
    Libro electrónico
  16. 4656
    Publicado 2022
    Tabla de Contenidos:
    Libro electrónico
  17. 4657
    Publicado 2017
    Tabla de Contenidos:
    Libro electrónico
  18. 4658
    Publicado 2018
    Tabla de Contenidos: “…-- Hello World of concurrency (using std::thread) -- Managing threads -- Thread launch -- Thread join -- Passing arguments into a thread -- Using Lambdas -- Ownership management -- Sharing data between threads -- Mutexes -- Avoiding deadlock -- Locking with std::unique_lock -- Condition variables -- A thread-safe stack data structure -- Summary…”
    Libro electrónico
  19. 4659
    Publicado 2019
    Tabla de Contenidos: “…-- Composition Versus Inheritance -- Field Inheritance and Accessors -- Singleton -- Object-Oriented Design with Lambdas -- Lambdas Versus Nested Classes -- Lambdas Versus Method References -- Exceptions and Exception Handling -- Safe Java Programming -- Chapter 6. Java's Approach to Memory and Concurrency -- Basic Concepts of Java Memory Management -- Memory Leaks in Java -- Introducing Mark-and-Sweep -- The Basic Mark-and-Sweep Algorithm -- How the JVM Optimizes Garbage Collection -- Evacuation -- The HotSpot Heap -- Other Collectors -- ParallelOld -- Finalization -- Finalization Details -- Java's Support for Concurrency -- Thread Lifecycle -- Visibility and Mutability -- Exclusion and Protecting State -- volatile -- Useful Methods of Thread -- Deprecated Methods of Thread…”
    Libro electrónico
  20. 4660
    Publicado 2023
    Tabla de Contenidos: “…Privacy and Security Laws -- Health Insurance Portability and Accountability Act -- The Health Information Technology for Economic and Clinical Health Act -- Gramm-Leach-Bliley Act -- Sarbanes-Oxley Act -- State Data Breach Notification Laws -- International Laws -- European Union General Data Protection Regulation -- Adequacy Decisions -- U.S.-EU Safe Harbor and Privacy Shield -- Laws, Regulations, and Standards -- Payment Card Industry Data Security Standard -- Critical Infrastructure Protection Program -- Conflicting International Legislation -- Information Security Management Systems -- ISO/IEC 27017:2015 -- Privacy in the Cloud -- Generally Accepted Privacy Principles -- ISO 27018 -- Direct and Indirect Identifiers -- Privacy Impact Assessments -- Cloud Forensics -- Forensic Requirements -- Cloud Forensic Challenges -- Collection and Acquisition -- Evidence Preservation and Management -- e-discovery -- Audit Processes, Methodologies, and Cloud Adaptations -- Virtualization -- Scope -- Gap Analysis -- Restrictions of Audit Scope Statements -- Policies -- Audit Reports -- Summary -- Exam Essentials -- Review Questions -- Chapter 10 Cloud Vendor Management -- The Impact of Diverse Geographical Locations and Legal Jurisdictions -- Security Policy Framework -- Policies -- Standards -- Procedures -- Guidelines -- Exceptions and Compensating Controls -- Developing Policies -- Enterprise Risk Management -- Risk Identification -- Risk Calculation -- Risk Assessment…”
    Libro electrónico