Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Leadership 17
- Development 14
- Management 14
- Social aspects 12
- Application software 9
- History 8
- Computer software 7
- Software architecture 7
- Computer programming 6
- Design 6
- Employee motivation 6
- Information technology 6
- Marketing 6
- Technological innovations 6
- Business & Economics 5
- Communication in management 5
- Computer networks 5
- Historia 5
- Organizational change 5
- Psychological aspects 5
- Self-actualization (Psychology) 5
- Success in business 5
- Web site development 5
- Business 4
- Database management 4
- Electronic data processing 4
- Entrepreneurship 4
- Influence (Psychology) 4
- Interpersonal relations 4
- Photography 4
-
221Publicado 2018Libro electrónico
-
222
-
223Publicado 2022“…Topics include: How to install and configure Zoom Choosing whether or when to use the Zoom web app Configuring your physical setup and hardware for best audio and video quality Mastering meeting participation, including the various methods of "speaking up" Zoom's many mobile and desktop views for seeing other people and shared screens The best ways to present using PowerPoint and Keynote Finding the best combination of screens and devices to manage each of your presentations Becoming a host and starting meetings with one other person or 1,000 Conducting polls and managing breakout rooms Using automatic transcription and captioning features How to preserve your privacy when sharing apps, presentations, or other parts of your screen Recording a meeting for later playback, presentation, or a podcast Deciding whether to upgrade to a paid Zoom tier for meetings you host Zoom's security options, including end-to-end encryption How co-host and alternate host roles work in managing a meeting…”
Libro electrónico -
224por Waschke, Marvin. author“…Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. …”
Publicado 2017
Libro electrónico -
225por Petreley, NickTabla de Contenidos: “…; See Also; Bypass the Boot Manager; Bypassing the Installer; Mounting Disks; Hacking the Hack…”
Publicado 2005
Libro electrónico -
226por Seibold, ChrisTabla de Contenidos: “…Table of Contents; Preface; Conventions Used in This Book; Menu Symbols; Attribution and Permissions; Safari® Books Online; How to Contact Us; Acknowledgments; Chapter 1. What's New in Lion?…”
Publicado 2011
Libro electrónico -
227Publicado 2010Libro electrónico
-
228por Bijsterveld, Karin. author“…It is common for us today to associate the practice of science primarily with the act of seeing—with staring at computer screens, analyzing graphs, and presenting images. …”
Publicado 2019
Libro electrónico -
229Publicado 2013“…Organizational change expert Paul Meshanko has studied how the human brain responds in various workplace situations--and his conclusion is astonishing: People perform at their highest level when treated with respect. Conversely, when an employee is emotionally attacked by disrespectful behavior, he or she shuts down. …”
Libro electrónico -
230por De Grazia, Victoria, 1946-“…The Perfect Fascist pivots from the intimate story of an inconvenient marriage-brilliantly reconstructed through family letters and court records-to a riveting account of Mussolini's rise and fall. It invites us to see in the vain, loyal, lecherous, and impetuous Attilio Teruzzi, a decorated military officer with few scruples and a penchant for parades, an exemplar of fascism's New Man. …”
Publicado 2020
Libro -
231Publicado 2023Tabla de Contenidos: “…The knowledge base of the reporter -- Naming conventions -- False urgency -- Executive summary -- Breaking down and testing systems -- Breaking down hardware versus the operating system -- Breaking down a web API -- Understanding the steps -- The problems with this method of troubleshooting -- Previous and common events - checking for the simple problems -- Prior Root Cause Analysis (RCA) documents -- Timeline analysis -- Comparison -- The best approach -- Effective research both online and among peers -- The art of the Google search -- Skimming the content quickly and refining it -- Never forget your internal resources -- Breaking down source code efficiently -- Code you've never seen -- When that fails -- Logging plus code -- In practice - applying what you've learned -- Summary -- Chapter 6: Operational Framework - Managing Infrastructure and Systems -- Technical requirements -- Approaching systems administration as a discipline -- Design -- Installation -- Configuration -- App deployment -- Management -- Upgrade -- Uninstallation -- Understanding IT service management -- ITIL -- DevOps -- Seeing systems administration as multiple layers and multiple towers -- Automating systems provisioning and management -- Infrastructure as Code -- Immutable infrastructure -- In practice - applying what you've learned -- Lab architecture -- Lab contents -- Lab instructions -- Summary -- Further readings -- Chapter 7: Data Consumed - Observability Data Science -- Technical requirements -- Making data-driven decisions -- Defining the question and options -- Determining which data to use -- Identifying which data is already available -- Collecting the missing data -- Analyzing all datasets together -- Presenting the decision as a record -- Documenting the lessons learned in the process -- Solving problems through a scientific approach -- Formulation -- Hypothesis…”
Libro electrónico -
232Publicado 2025Tabla de Contenidos: “…-- Game Narrative Breakdown Examples -- NBA 2K16 -- Premise -- In a Nutshell -- Main Characters -- Key Story Beats -- Act 1 -- Act 2 -- Act 3 -- Positives of the Narrative -- Negatives of the Narrative -- In Conclusion -- THE LAST OF US (2013) -- Premise -- In a Nutshell -- Main Characters -- Key Story Beats -- Act 1 -- Act 2 -- Act 3 -- Positives of the Narrative -- Negatives of the Narrative -- In Conclusion -- Addendum: The Last of Us HBO Series (2023) -- Visual Limitations of the Game Medium -- Ingredients for a Successful Adaptation -- Notes -- References -- Chapter 11 Breaking In -- Entry Points -- Attitude -- Familiarity -- Larger Perspective Than Games -- If You Come From Another Medium, What Should You Expect? …”
Libro electrónico -
233
-
234
-
235Publicado 2016“…Zaki Ahmad passed away shortly after finishing the book and before having a chance to see its publication. Prof. Ahmad was InTech's long term collaborator and edited his first book with us in 2011 (''Recent Trends in Processing and Degradation of Aluminium Alloys''). …”
Libro electrónico -
236
-
237Publicado 2011Tabla de Contenidos: “…Working with Human Nature -- Why, What, When, and How Things Happen -- The Concept of Theory X and Theory Y -- Human Needs and Response -- Human Nature at Work -- Managers-Nurture-Nature-What We Give Attention to Flourishes -- What We Ignore Dies -- Manager's Checklist for Chapter 2 -- 3. …”
Libro electrónico -
238Publicado 2022“…"Augustine's Confessions and Contemporary Concerns takes each of the thirteen books of Augustine's classic omnibiography to see how the major themes contained therein still speak to each of us today. …”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro -
239Publicado 2017Tabla de Contenidos: “…-- Moving from Unilateral Control to Mutual Learning -- Summary -- Chapter Four: Facilitating with the Mutual Learning Approach -- The Mutual Learning Approach -- Values of the Mutual Learning Mindset -- Transparency and Curiosity: Creating a Common Pool of Understanding -- Informed Choice and Accountability: For Better Decisions and Commitment -- Compassion -- Assumptions of the Mutual Learning Mindset -- I Have Information -- So Do Others -- Each of Us Sees Things Others Don't -- Differences Are Opportunities for Learning…”
Libro electrónico -
240por Berlin, DanielTabla de Contenidos: “…Cover -- Copyright -- Table of Contents -- Preface -- Permissions -- O'Reilly Online Learning -- How to Contact Us -- Acknowledgments -- Part I. Career -- Chapter 1. …”
Publicado 2021
Libro electrónico