Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4901por Santiso, Javier“…Financial actors from developing countries are playing with other OECD financial giants as equals through their Sovereign Wealth Funds (SWFs). SWFs could become major actors of development finance if they chose to allocate 10 per cent of their portfolio to emerging and developing economies over the next decade, generating inflows of $1 400 billion, more than all OECD countries’ aid to developing economies put together…”
Publicado 2008
Capítulo de libro electrónico -
4902Publicado 2018“…Deep knowledge of the chemical composition, nutrients, physical properties, toxicology, and microbiological composition of food allows for the production of safe, high-quality foods. This knowledge is fundamental when producing, preserving, manipulating, and distributing food substances, especially to reduce the risks to consumer health. …”
Libro electrónico -
4903Publicado 2020“…One of the most complex challenges for the future of aviation is to ensure a safe integration of the expected air traffic demand. …”
Libro electrónico -
4904Publicado 2022“…New technologies and scientific discoveries are the solutions to the increasing demand for sufficient, safe, healthy, and sustainable foods influenced by the increased public awareness of their importance…”
Libro electrónico -
4905Publicado 2022“…Its safe use, and disposal at the end of its life cycle must be taken into account too. …”
Libro electrónico -
4906
-
4907Publicado 2022Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
Libro electrónico -
4908Publicado 2013Tabla de Contenidos: “…Transcultural contexts and soft power -- pt. II. Cinematic content and soft power -- pt. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
4909Publicado 2017Tabla de Contenidos: “…Firewall on a RouterSummary; Reference; 3 Software problems and solutions; Malware and Viruses; Types of Malware; Antivirus; Windows Defender; Updating; Scheduling Regular Scans; Rogue Antivirus; Antimalware; Don't Forget Your Mobile; Staying Up-To-Date; Types of Updates; Automatic Updates; Updates in Windows 10; Windows 10 peer-to-peer updates; Mobile Device Updates; Other Device Updates; Disaster Recovery; Keeping a Copy of Passwords; Backing Up Files; Online backups; Backing up phones and tablets; Setting and Restoring Restore Points; Summary; Reference; 4 Email safety and security…”
Libro electrónico -
4910por Avendaño, Rolando“…Moreover, we compare target investments for these two groups by looking at the political regime in the sending and recipient country, under the hypothesis that this variable is not determinant for SWF investments. Finally, we provide a comparison of SWFs and other public funds based on governance features related to investment. …”
Publicado 2010
Capítulo de libro electrónico -
4911por Colombatto, Enrico“…The subsidy, in principle, corresponds to the value of the difference between repayments according to market and "soft" conditions, that is, the difference between interest payments without and with soft terms. …”
Publicado 1991
Capítulo de libro electrónico -
4912Publicado 2024“…China must also possess soft power, such as attractive ideologies, values, and culture. …”
Libro electrónico -
4913Publicado 2020“…Using SuperCritical Fluids (SCFs) in various processes is not new, because Mother Nature has been processing minerals in aqueous solutions at critical and supercritical pressures for billions of years. …”
Libro electrónico -
4914Publicado 2007“…Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. …”
Libro electrónico -
4915Publicado 2012“…They demonstrate both the "why" and the "how" of creatively applying soft project management skills in the areas of leadership, conflict resolution, negoti…”
Libro electrónico -
4916Publicado 2013Tabla de Contenidos: “…; 3.5.7 Taxonomy Division: Degree of Simplicity in Multidimensional Value Function; 3.6 Value-Focused Thinking; 3.6.1 Four Major VFT Ideas; 3.6.2 The Benefits of VFT; 3.7 Summary; Key Terms; Acknowledgments; References; Chapter Four: Decision Analysis Soft Skills; 4.1 Introduction…”
Libro electrónico -
4917Publicado 2012“…You'll learn how to keep your system safe with the amazing new Gatekeeper, integrate Twitter and Facebook into your Mac life, get your head in the iCloud, and a host of other cool and practical new functions. …”
Libro electrónico -
4918Publicado 2017“…From the top ten tips and the breakdown of consumer risks, to social networking and parental security, this book is an essential guide for anyone and everyone trying to stay safe and secure in the evolving digital world. …”
Libro electrónico -
4919Publicado 2016“…You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. …”
Libro electrónico -
4920Publicado 2016“…Learn what types of entertainment are available to use on eBook readers, digital video recorders, digital music players, high-definition television sets, cable/satellite TV service providers, what types of entertainment are readily available via the Internet, and how to use your computer, smartphone or tablet as an entertainment device. Find ways to stay safe and protect yourself from identity theft or online crime when surfing the Internet, shopping online, playing games, doing online banking, and handling other Internet-related tasks…”
Libro electrónico