Mostrando 4,901 - 4,920 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.72s Limitar resultados
  1. 4901
    por Santiso, Javier
    Publicado 2008
    “…Financial actors from developing countries are playing with other OECD financial giants as equals through their Sovereign Wealth Funds (SWFs). SWFs could become major actors of development finance if they chose to allocate 10 per cent of their portfolio to emerging and developing economies over the next decade, generating inflows of $1 400 billion, more than all OECD countries’ aid to developing economies put together…”
    Capítulo de libro electrónico
  2. 4902
    Publicado 2018
    “…Deep knowledge of the chemical composition, nutrients, physical properties, toxicology, and microbiological composition of food allows for the production of safe, high-quality foods. This knowledge is fundamental when producing, preserving, manipulating, and distributing food substances, especially to reduce the risks to consumer health. …”
    Libro electrónico
  3. 4903
    Publicado 2020
    “…One of the most complex challenges for the future of aviation is to ensure a safe integration of the expected air traffic demand. …”
    Libro electrónico
  4. 4904
    Publicado 2022
    “…New technologies and scientific discoveries are the solutions to the increasing demand for sufficient, safe, healthy, and sustainable foods influenced by the increased public awareness of their importance…”
    Libro electrónico
  5. 4905
    Publicado 2022
    “…Its safe use, and disposal at the end of its life cycle must be taken into account too. …”
    Libro electrónico
  6. 4906
    Publicado 1971
    Libro
  7. 4907
    Publicado 2022
    Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
    Libro electrónico
  8. 4908
    Publicado 2013
    Tabla de Contenidos: “…Transcultural contexts and soft power -- pt. II. Cinematic content and soft power -- pt. …”
    Enlace del recurso
    Libro electrónico
  9. 4909
    Publicado 2017
    Tabla de Contenidos: “…Firewall on a RouterSummary; Reference; 3 Software problems and solutions; Malware and Viruses; Types of Malware; Antivirus; Windows Defender; Updating; Scheduling Regular Scans; Rogue Antivirus; Antimalware; Don't Forget Your Mobile; Staying Up-To-Date; Types of Updates; Automatic Updates; Updates in Windows 10; Windows 10 peer-to-peer updates; Mobile Device Updates; Other Device Updates; Disaster Recovery; Keeping a Copy of Passwords; Backing Up Files; Online backups; Backing up phones and tablets; Setting and Restoring Restore Points; Summary; Reference; 4 Email safety and security…”
    Libro electrónico
  10. 4910
    por Avendaño, Rolando
    Publicado 2010
    “…Moreover, we compare target investments for these two groups by looking at the political regime in the sending and recipient country, under the hypothesis that this variable is not determinant for SWF investments. Finally, we provide a comparison of SWFs and other public funds based on governance features related to investment. …”
    Capítulo de libro electrónico
  11. 4911
    por Colombatto, Enrico
    Publicado 1991
    “…The subsidy, in principle, corresponds to the value of the difference between repayments according to market and "soft" conditions, that is, the difference between interest payments without and with soft terms. …”
    Capítulo de libro electrónico
  12. 4912
    Publicado 2024
    “…China must also possess soft power, such as attractive ideologies, values, and culture. …”
    Libro electrónico
  13. 4913
    Publicado 2020
    “…Using SuperCritical Fluids (SCFs) in various processes is not new, because Mother Nature has been processing minerals in aqueous solutions at critical and supercritical pressures for billions of years. …”
    Libro electrónico
  14. 4914
    Publicado 2007
    “…Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. …”
    Libro electrónico
  15. 4915
    Publicado 2012
    “…They demonstrate both the "why" and the "how" of creatively applying soft project management skills in the areas of leadership, conflict resolution, negoti…”
    Libro electrónico
  16. 4916
    Publicado 2013
    Tabla de Contenidos: “…; 3.5.7 Taxonomy Division: Degree of Simplicity in Multidimensional Value Function; 3.6 Value-Focused Thinking; 3.6.1 Four Major VFT Ideas; 3.6.2 The Benefits of VFT; 3.7 Summary; Key Terms; Acknowledgments; References; Chapter Four: Decision Analysis Soft Skills; 4.1 Introduction…”
    Libro electrónico
  17. 4917
    Publicado 2012
    “…You'll learn how to keep your system safe with the amazing new Gatekeeper, integrate Twitter and Facebook into your Mac life, get your head in the iCloud, and a host of other cool and practical new functions. …”
    Libro electrónico
  18. 4918
    Publicado 2017
    “…From the top ten tips and the breakdown of consumer risks, to social networking and parental security, this book is an essential guide for anyone and everyone trying to stay safe and secure in the evolving digital world. …”
    Libro electrónico
  19. 4919
    Publicado 2016
    “…You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. …”
    Libro electrónico
  20. 4920
    Publicado 2016
    “…Learn what types of entertainment are available to use on eBook readers, digital video recorders, digital music players, high-definition television sets, cable/satellite TV service providers, what types of entertainment are readily available via the Internet, and how to use your computer, smartphone or tablet as an entertainment device. Find ways to stay safe and protect yourself from identity theft or online crime when surfing the Internet, shopping online, playing games, doing online banking, and handling other Internet-related tasks…”
    Libro electrónico