Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 453
- History 424
- Development 371
- Economics 297
- Application software 283
- Education 278
- Social aspects 255
- Historia 220
- Computer programs 214
- Engineering & Applied Sciences 209
- Cloud computing 206
- Data processing 200
- Computer networks 183
- Artificial intelligence 174
- Economic aspects 147
- Computer Science 139
- Information technology 134
- Security measures 134
- Technological innovations 133
- Database management 132
- Computer security 130
- Government policy 129
- Economic conditions 128
- Social Issues/Migration/Health 125
- Leadership 120
- Research 116
- Computer software 115
- Business & Economics 109
- Design 109
- Social conditions 109
-
10001Publicado 2017Tabla de Contenidos: “…-- Barriers to Influence -- Overcome the Barriers: Use an Influence Model to Guide You -- Plan, But Do Not Come Across as Self-Seeking -- Get "Two for the Price of One" -- The Book's Organization -- Notes -- Part II: The Influence Model -- Chapter 2: The Influence Model: Trading What They Want for What You've Got (Using Reciprocity and Exchange) -- Ignore the Law of Reciprocity at Your Peril -- Exchange: The Art of Give and Take That Permeates All Influence Tactics -- The Cohen-Bradford Influence without Authority Model -- Self-Created Barriers to Influencing -- Notes -- Chapter 3: Goods and Services: The Currencies of Exchange -- Coin of the Realm: The Concept of Currencies -- Frequently Valued Currencies -- Some Cautions -- Using Currencies: Complexities and Restrictions -- Expanding Your "Currency Pool" -- Self-Traps in Using Currencies -- Pay in the Currency Others Value, Not Just What You Would Value -- Resenting Having to Go Out of the Way -- A Word of Warning: Beware False Advertising -- Last Word: Some Currencies Really Are Not Convertible -- Notes -- Chapter 4: How to Know What They Want: Understanding Their Worlds (and the Forces Acting on Them) -- Two Forces That Can Explain All Behavior -- How to Know What Might Be Important to the Other Person -- The Potential Ally's Environment -- Where Are They Headed? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10002por van der Velde, Paul, author“…Written from an insider's perspective, this important book offers a profoundly multidisciplinary perspective on the way globalization is shaping national interest strategies across two continents De Asia-Europe Meeting (ASEM) werd in het leven geroepen in 1996 om zo Azië en Europa dichter bij elkaar brengen. …”
Publicado 2011
Libro electrónico -
10003“…Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. …”
Libro electrónico -
10004Publicado 2013“…This book provides an overview of the research related to psychological assessment across South Africa. The thirty-six chapters provide a combination of psychometric theory and practical assessment applications in order to combine the currently disparate research that has been conducted locally in this field. …”
Libro electrónico -
10005Publicado 2017Tabla de Contenidos: “…-- Configuring the Cisco Sourcefire IDS to send log data to the OSSIM server -- Router and switch logs -- Configuring Cisco IOS to log to the syslog service of the OSSIM server -- Operating system logs -- Collecting logs from a Windows system -- Installing and configuring NXLog CE across your Windows hosts -- Application logs -- Reading an application log file with an HIDS agent on Windows -- Network visibility -- Summary -- Chapter 9: ICS Computer Security -- Endpoint hardening -- Narrowing the attack surface -- Limiting the impact of a compromise -- Microsoft Enhanced Mitigation Experience Toolkit& -- #160 -- -- Configuring EMET for a Rockwell Automation application server -- Microsoft AppLocker -- Microsoft AppLocker configuration -- Configuration and change management -- Patch management -- Configuring Microsoft Windows Server Update Services for the industrial zone -- Configuring the Cisco ASA firewall -- Creating the Windows Server Update Services server -- Configuring Windows client computers to get updates from the WSUS server -- Endpoint protection software -- Host-based firewalls -- Anti-malware software -- Types of malware -- Application whitelisting software -- Application whitelisting versus blacklisting -- How application whitelisting works -- Symantec's Embedded Security: Critical system protection…”
Libro electrónico -
10006Publicado 2018Tabla de Contenidos: “…Launching your stack with Heat -- Viewing the resources and output of a stack created with Heat -- Deleting a Heat stack -- Updating a Heat stack -- Installing and configuring Ansible for OpenStack -- Using Ansible to launch instances -- Using Ansible to orchestrate software installation -- Using Ansible to orchestrate software installations across multiple instances -- Using Ansible to fully orchestrate the -- creation of a web server and load balancer stack -- Chapter 10: Using OpenStack Dashboard -- Introduction - OpenStack Dashboard -- Using OpenStack Dashboard for key management -- Using OpenStack Dashboard to manage Neutron networks and routers -- Using OpenStack Dashboard for security group management -- Using OpenStack Dashboard to launch instances -- Using OpenStack Dashboard to delete instances -- Using OpenStack Dashboard to add new projects -- Using OpenStack Dashboard for user management -- Using OpenStack Dashboard with LBaaS -- Using OpenStack Dashboard with OpenStack Orchestration -- Index…”
Libro electrónico -
10007Publicado 2021Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- 1 Blockchain and Internet of Things Across Industries -- 1.1 Introduction -- 1.2 Insight About Industry -- 1.2.1 Agriculture Industry -- 1.2.2 Manufacturing Industry -- 1.2.3 Food Production Industry -- 1.2.4 Healthcare Industry -- 1.2.5 Military -- 1.2.6 IT Industry -- 1.3 What is Blockchain? …”
Libro electrónico -
10008por Culler, David E.“…It then examines the design issues that are critical to all parallel architecture across the full range of modern design, covering data access, communication performance, coordination of cooperative work, and correct implementation of useful semantics. …”
Publicado 1999
Libro electrónico -
10009Publicado 2022Tabla de Contenidos: “…-- 3 Qurʾānic Inscriptions at the Great Mosque of Cordoba -- 3.1 Reading al-Manṣūr's Extension: the ʿĀmirid Epigraphic Programme on the Eastern Façade (Figure 67) -- Chapter 6 The Dār al-Ṣināʿa: ʿĀmirid Patronage of the Luxury Arts -- 1 The Origins of the Dār al-Ṣināʿa -- 1.1 Structure of the Industry -- 1.2 Craftsmen Working across Media -- 1.3 Materials -- 1.3.1 Stone and Marble -- 1.3.2 Ivory -- 1.3.3 Perfumes and Perfume Containers -- 1.3.4 Other Object Types -- 2 Iṣtināʿ: The Strategic Use of Objects -- 2.1 Precedents for Patronage: The Two Jaʿfars -- 2.2 Anonymous Objects -- 2.3 How al-Manṣūr Used Objects -- Chapter 7 Building a Corpus of ʿĀmirid Art -- 1 Objects Associated with al-Manṣūr -- 1.1 The Andalusiyyīn Minbar (Dated 369/980 and 375/985 -- Figures 5-7 -- Appendix 4.4) -- 1.2 Al-Manṣūr's Marble Basin (Dated 377/987-8 -- Figures 108-109, 113-118 -- Appendix 4.7) -- 2 Objects Associated with ʿAbd al-Malik al-Muẓaffar (r. 1002-8) -- 2.1 The Pamplona Casket (Dated 395/1004-5 -- Figures 120-127 -- Appendix 4.11) -- 2.2 The Braga Pyxis (Datable 1004-8, Figures 11, 15 -- Appendix 4.12) -- 2.3 Marble Basins -- 2.3.1 Basin Made for ʿAbd al-Malik (Datable 1004-7, Figures 128-133 -- Appendix 4.13) -- 2.3.2 Basin Made for ʿAbd al-Malik, Found in Toledo (Appendix 4.14)…”
Libro electrónico -
10010por Kersh, NatashaTabla de Contenidos: “…Facilitating Active Citizenship Through Adult Education Across Europe and Beyond -- Introduction -- Regional Divergences -- Southern Europe - Greece, Cyprus, Malta, Italy, Spain and Portugal -- France, Austria and Germany -- UK, The Netherlands and Ireland -- Turkey -- Northern Europe - Denmark, Finland and Sweden -- Hungary -- Baltic Countries - Estonia, Latvia and Lithuania -- Summary -- References…”
Publicado 2021
Libro electrónico -
10011por Cilliers, JakkieTabla de Contenidos: “…Obstacles to a Revolution in Agriculture -- Achieving Food Security -- The Challenge for the Future -- Lessons from Elsewhere -- Modelling a Coordinated Push on Africa's Agricultural Sector: The African Agriculture Revolution Scenario -- The Contributions from Technology and Innovation -- Conclusion: Aiming at Food Security and Growth -- Further Reading -- 6 Boosting Education -- Recent Education Trends in Africa -- Comparing Education in Africa with Other Regions -- The Low Quality of Education in Africa -- Rates of Gender Exclusion -- Africa's Future Education Requirements -- Modelling the Impact of Improved Quality, Quantity and Nature of Education Across Gender: The Boosting Education Scenario -- From Basics to Technology -- Conclusion: Prioritising Education Outcomes -- Further Reading -- 7 Poverty, Inequality and Growth -- Globalisation and the Sense of Relative Deprivation -- The Interplay Between Inequality and Growth -- The SDGs and Measuring Extreme Poverty -- The Impact of the Additional Poverty Lines -- The Current Situation in Africa -- The Potential of Social Grants to Reduce Poverty -- The Promise of an African Welfare State? …”
Publicado 2021
Libro electrónico -
10012
-
10013por van't Land, Hilligje“…This open access book is a collection of short essays, accessible through open access, takes the interested reader on a tour across the global higher education landscape and addresses pertinent themes and challenges in higher education. …”
Publicado 2021
Libro electrónico -
10014por OECDTabla de Contenidos: “…A fragile "K-shaped" recovery is accentuating economic and financial disparities across countries in the wake of successive crises -- 1.1.2. …”
Publicado 2022
Libro electrónico -
10015Publicado 2015Tabla de Contenidos: “…Coverage of childcare and pre-school services is low across all income quintiles -- Build more inclusive schools -- Figure 2.7. …”
Libro electrónico -
10016por Publishing, OECD“…At the same time, it provides striking evidence of the sheer size of the variations across countries in most indicators of health system resources, activity and expenditure. …”
Publicado 2001
Libro electrónico -
10017por Weikum, Gerhard“…<br> <br>The authors emphasize formal models that are easily applied across fields, th…”
Publicado 2002
Libro electrónico -
10018por Abbas, Hoveyda“…Through a thorough examination of various political institutions, the role of different social groups and the evolution of our politics, this book will help students understand the basic concepts and notions of political theory, and illustrate how these concepts apply to political systems across the world…”
Publicado 2012
Libro electrónico -
10019Publicado 2015“…A general purpose graphical modeling language used to specify, analyze, and design systems that may include hardware, software, and personnel, SysML is now being adopted by companies across a broad range of industries, including aerospace and defense, automotive, and IT system developers. …”
Libro electrónico -
10020Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The All New PHP -- Scalar type hints -- Return type hints -- Anonymous classes -- Generator delegation -- Generator return expressions -- The null coalesce operator -- The spaceship operator -- Constant arrays -- Uniform variable syntax -- Throwables -- Group use declarations -- Catching multiple exceptions types -- Class constant visibility modifiers -- Iterable pseudo-type -- Nullable types -- Void return types -- Summary -- Chapter 2: Embracing Standards -- PSR-1 - basic coding standard -- PSR-2 - coding style guide -- PSR-3 - logger interface -- PSR-4 - autoloading standard -- PSR-6 - caching interface -- PSR-7 - HTTP message interface -- PSR-13 - hypermedia links -- Summary -- Chapter 3: Error Handling and Logging -- Error handling -- Error -- ArithmeticError -- DivisionByZeroError -- AssertionError -- ParseError -- TypeError -- Uncaught error handler -- Triggering errors -- Exception -- Creating a custom exception handler -- Rethrowing exceptions -- Uncaught Exception handler -- Logging -- Native logging -- Logging with Monolog -- Summary -- Chapter 4: Magic Behind Magic Methods -- Using __construct() -- Using __destruct() -- Using __call() -- Using __callStatic() -- Using __set() -- Using __get() -- Using __isset() -- Using __unset() -- Using __sleep() -- Using __wakeup() -- Using __toString() -- Using __invoke() -- Using __set_state() -- Using __clone() -- Using __debugInfo() -- Usage statistics across popular platforms -- Summary -- Chapter 5: The Realm of CLI -- Understanding PHP CLI -- The Console component -- Setting up the Console component -- Creating a console command -- Dealing with inputs -- Using Console component helpers -- Input/output streams -- Process control…”
Libro electrónico