Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 2
- Computer security 2
- Management 2
- Programming 2
- Security measures 2
- Social Sciences 2
- American 1
- American literature 1
- Application software 1
- Aren 1
- Aren’t 1
- Asperger's syndrome 1
- Autism 1
- Autistic children 1
- Bollobás 1
- Buffett, Warren 1
- Bullying 1
- Business planning 1
- Call 1
- Capitalists and financiers 1
- Care 1
- Child & Youth Development 1
- Commercial products 1
- Commodity exchanges 1
- Computer Science 1
- Computer network resources 1
- Computers and families 1
- Computers and family 1
- Development 1
- Diet therapy 1
-
1
-
2Publicado 2007Tabla de Contenidos: “…/ Cyndy Scheibe -- How do researchers study youth and the media? / Dafna Lemish -- Who's looking out for the kids? how advocates use media research to promote children's interests / Kathryn E. …”
Libro -
3
-
4Publicado 2011Tabla de Contenidos: “…-- Where to Update Your Status -- How to Update Your Status -- Determining Who Sees Your Status Updates -- Deciding What to Write About -- Employing "Facebook Grammar" -- 9 Exchanging Private Messages -- Understanding Facebook's Private Messages -- It's Just Like Email-Except It Isn't -- Reading and Replying to Messages -- Deleting Messages -- Sending a New Message -- Adding Attachments to a Message -- 10 Chatting with Your Kids-Live -- What's Chat-and Who Uses It? …”
Libro electrónico -
5Publicado 2018“…When she was younger, Lauren used to have friends but was also tormented by another girl in her class who would stare at her and threaten her to "watch her back." …”
Vídeo online -
6por Criddle, LindaTabla de Contenidos: “…; Assessing the Risks; Protecting Yourself; Watch Your Own Behavior; Looking for Telltale Signs; Getting the Message Across to Your Kids; Chapter 7: Step 4: Don't Let Them Know Where You Live; What Just Happened?…”
Publicado 2006
Libro electrónico -
7por Bollobás, EnikőTabla de Contenidos: “…The language games of irony and make-believe (Edward Albee, Who's Afraid of Virginia Woolf?) 59CHAPTER TWO: EXTENDING THE PERFORMATIVE 71; Performativity in theories of the subject 73; Performance and performative constructions of the subject 85; Performativity of reading and writing 89; Presupposition 92; Presupposition and the (performative) production of meaning 93; CHAPTER THREE: PERFORMING GENDER 97; Recipes for men and women: gender as (hetero)sexualized performance 103; Gender performances and performative genders 106…”
Publicado 2010
Libro electrónico -
8Publicado 2015Tabla de Contenidos: “…Title Page; Copyright; Dedication; Pregame Warm-Up: Or, Read This Before You Read This Book; The Big Game: Living and Dying with Your Living Trust; A Few Things You Should Know about My Coaching Style; Your Final Locker Room Pep Talk Before Training Begins; Acknowledgments; For Those without Whom This Revised Edition Wouldn't Exist; For Those Who Happen to Be My Children; For Those Who Made the Cut; The First Quarter: Establishing Your Living Trust; Chapter 1: How You Established Your Living Trust Without a Clear Understanding of What It Is and How It Works; What Does It All Mean?…”
Libro electrónico -
9
-
10por Buffett, Warren, 1930-Tabla de Contenidos: “…MARKET 'S MOODS; LISTEN FOR OPPORTUNITY'S CALL; KNOW THE DIFFERENCE BETWEEN PRICE AND VALUE; SEEK INTRINSIC VALUE; EXPECT TO BE OUT OF STEP; EARNINGS, EARNINGS, EARNINGS; LOOK FORWARD, NOT BACK; AVOID RISK; DON'T GAMBLE; WATCH FOR UNUSUAL CIRCUMSTANCES; DON'T BE SURPRISED BY CIRCUMSTANCES; AVOID EXCESSIVE DEBT; LOOK FOR SCREAMING BARGAINS; ARBITRAGE WHEN POSSIBLE; BE PATIENT; THINK FOR YOURSELF; HAVE THE RIGHT TOOLS…”
Publicado 2007
Libro electrónico -
11por Erle, SchuylerTabla de Contenidos: “…; Why You Can't Watch Broadcast TV…”
Publicado 2005
Libro electrónico -
12Publicado 2022Tabla de Contenidos: “…-- Don't Quit Your Day Job Just Yet -- Part 4 Beyond the Console -- Chapter 13 Building Your Twitch Community -- Check Me Out Now: Publicizing Your Stream -- Twitter -- TikTok -- Instagram -- Hover -- YouTube -- Creating a social media strategy -- Who Is "The Fam" and Why Do They Matter? -- Oh hai, Mark: Talking to Chat -- The Fam includes other streamers too…”
Libro electrónico -
13
-
14Publicado 2016Tabla de Contenidos: “…The Natural Environment -- Marketing Insight: The Green Marketing Revolution -- The Technological Environment -- The Political-legal Environment -- Marketing Insight: Watching Out for Big Brother -- Forecasting and Demand Measurement -- The Measures of Market Demand -- A Vocabulary for Demand Measurement -- Estimating Current Demand -- Estimating Future Demand -- Summary -- Applications -- Marketing Excellence: Microsoft -- Marketing Excellence: Ferrero -- Chapter 4: Conducting Marketing Research -- The Scope of Marketing Research -- Importance of Marketing Insights -- Who Does Marketing Research? …”
Libro electrónico -
15Publicado 2017Tabla de Contenidos: “…Start -- 7:00 a.m.: Arrive Early to Ensure Everything Is Ready -- 7:30 a.m.: Arrange Who Sits Where -- 7:45 a.m.: It's Time for Music to Create a Relaxed Atmosphere -- 7:50 a.m.: Greeting Your Trainees -- 8:00 a.m.: Let's Get Ready to Rumble! …”
Libro electrónico -
16Publicado 2023Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
Libro electrónico -
17Publicado 2023Tabla de Contenidos: “…Address Institutional Barriers to Success -- Be a Well-Being Role Model -- Manage with Well-Being Skills -- What We Say Matters -- Management Style Matters -- Well-Being Training Matters -- Be a Force of Change -- Praise and Persistence -- Pushback -- Communicate Often and Vary the Messenger -- How I Help Hopkins Get Healthy -- That's a Wrap -- Chapter 9 Culture Killers: Watch Out for the Speed Bumps -- Culture Killer #1-All Talk, No Action -- Culture Killer #2-Lack of Accountability -- Culture Killer #3-The Antagonist -- Culture Killer #4-The Arrogant -- Culture Killer #5-Losing Focus (or Never Having It to Start With) -- Culture Killer #6-Faster Is Not Better -- Culture Killer #7-Ignoring the Actual Work -- Culture Killer #8-Passion Without a Foundation -- Culture Killer #9-When Your Goal Is Return on Investment (ROI) -- The Speed of Change -- That's a Wrap! …”
Libro electrónico -
18CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Malvertising -- Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Man-made environmental problems -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- Part 2 Improving Your Own Personal Security -- Chapter 4 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment…”
Libro electrónico -
19Publicado 2023Tabla de Contenidos: “…-- Biting Off More Than You Can Chew: The Pitfalls of Using Leverage -- Watch Your Step: Understanding the Real Risks behind Commodities -- Sovereign government risk -- Geopolitical risk -- Speculative risk -- Corporate governance risk -- Tracking Commodities from 2008 through the 2020 Global Pandemic -- Origins of the 2008 crisis -- The 2020 Pandemic -- Managing Risk -- Due diligence: Just do it -- Commodity companies -- Managed funds -- Futures market -- Commodity fundamentals -- Diversify, diversify, diversify…”
Libro electrónico