Mostrando 4,421 - 4,440 Resultados de 7,264 Para Buscar 'Time Takes Time', tiempo de consulta: 0.15s Limitar resultados
  1. 4421
    “…The book underscores the importance of taking a whole-of-government and whole-of-society approach in addressing the rising tide of non-communicable diseases. …”
    Libro electrónico
  2. 4422
    Publicado 2001
    “…Managing.com combines the energy and opportunity of starting up, with the practical challenges of leading people and business in times of turbulent change. A mix of tactical insight, personal effectiveness and inspiration this is a handbook for wired managers and entrepreneurial companies everywhere. …”
    Libro electrónico
  3. 4423
    Publicado 2012
    “…Beautifully illustrated with large, vibrant photos, this book teaches you how to take control of your photography to get the image you want every time. …”
    Libro electrónico
  4. 4424
    Publicado 2014
    Libro electrónico
  5. 4425
    por Evrensel, Ayse
    Publicado 2013
    “…Nowadays the value of daily foreign exchange trading is more than one hundred times the value of annual international trade in goods and services. …”
    Libro electrónico
  6. 4426
    por Davis, Alison 1957-
    Publicado 2011
    “…Your hard work paid off: Management gave you the go-ahead. Now it’s time to communicate with employees. First step: close that PowerPoint and take out a blank sheet of paper..…”
    Libro electrónico
  7. 4427
    Publicado 2022
    Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
    Libro electrónico
  8. 4428
    Publicado 2014
    Libro electrónico
  9. 4429
    Publicado 2013
    Libro electrónico
  10. 4430
    por Quah, Euston
    Publicado 2012
    Libro
  11. 4431
    por Swanepoel, Stefan
    Publicado 2011
    Libro electrónico
  12. 4432
    Publicado 2011
    “…The introductory essay draws on the findings of the Commonwealth Commission on Respect and Understanding, which was chaired by Sen, and established to promote mutual communication and understanding among all faiths and communities in the Commonwealth. Its timely report, "Civil Paths to Peace", suggests that governments, media and educators—indeed, everyone—must take the time to understand the complexities around violent behaviour and its causes, without prejudging what these might be."…”
    Libro electrónico
  13. 4433
    por Evans, Chris, 1961-
    Publicado 2007
    “…The eighteenth century is often viewed as the heroic age of the British iron industry - a time of triumphant technological progress. In fact, it was an age of thwarted ambition, when the take-up of new technologies proved frustratingly slow. …”
    Libro electrónico
  14. 4434
    Publicado 2005
    Libro electrónico
  15. 4435
    Publicado 2021
    “…Inquiry, Knowledge, and Understanding takes inquiry as the starting point for epistemological theorisingtheorizing. …”
    Libro electrónico
  16. 4436
    por Wenz, Christian
    Publicado 2007
    “…With Programming ASP.NET AJAX, you'll learn how to create professional, dynamic web pages with Ajax in no time. Loaded with code and examples that demonstrate key aspects of the framework, this book is ideal not only for ASP.NET developers who want to take their applications a step further with…”
    Libro electrónico
  17. 4437
    por Grabel, Gary
    Publicado 2012
    Libro electrónico
  18. 4438
    Publicado 2004
    “…In Part 1, "Introduction to IBM WebSphere Digital Media Enabler V5.5", we will introduce digital media concepts, scenarios for using digital media, and highlight key features. Next, we will take an in-depth look at the WDME run-time architecture, store and programming model, data model, and customization points. …”
    Libro electrónico
  19. 4439
    “…However, the review also shows that investment climate reforms take time and many challenges still lie ahead. These include ongoing efforts to phase out unnecessary sectoral restrictions on investment, maintaining the momentum for broadening the privatisation programme and encouraging entrepreneurship by promoting transparency, accountability and competition…”
    Libro electrónico
  20. 4440
    Publicado 2023
    Tabla de Contenidos: “…MATERIAL SAFETY DATA SHEET (MSDS): DOCUMENTATION FOR HANDLING AND DISPOSAL -- TEMPERATURE, HUMIDITY-LEVEL AWARENESS, AND PROPER VENTILATION -- POWER SURGES, UNDER-VOLTAGE EVENTS, AND POWER FAILURES -- CHAPTER 33: Privacy, Licensing, Policy, and Incident Response -- INCIDENT RESPONSE -- LICENSING/DIGITAL RIGHTS MANAGEMENT (DRM)/END-USER LICENSE AGREEMENT (EULA) -- REGULATED DATA -- CHAPTER 34: Communication and Professionalism -- PROFESSIONAL APPEARANCE AND ATTIRE -- USE PROPER LANGUAGE AND AVOID JARGON, ACRONYMS, AND SLANG, WHEN APPLICABLE -- MAINTAIN A POSITIVE ATTITUDE/PROJECT CONFIDENCE -- ACTIVELY LISTEN, TAKE NOTES, AND AVOID INTERRUPTING THE CUSTOMER -- BE CULTURALLY SENSITIVE -- BE ON TIME (IF LATE, CONTACT THE CUSTOMER) -- AVOID DISTRACTIONS -- DEALING WITH DIFFICULT CUSTOMERS OR SITUATIONS -- SET AND MEET EXPECTATIONS/TIME LINE AND COMMUNICATE STATUS WITH THE CUSTOMER -- DEAL APPROPRIATELY WITH CUSTOMERS' CONFIDENTIAL AND PRIVATE MATERIALS -- CHAPTER 35: Scripting -- SCRIPT FILE TYPES -- USE CASES FOR SCRIPTING -- OTHER CONSIDERATIONS WHEN USING SCRIPTS -- CHAPTER 36: Remote Access -- METHODS/TOOLS -- SECURITY CONSIDERATIONS OF EACH ACCESS METHOD -- INDEX -- END USER LICENSE AGREEMENT…”
    Libro electrónico