Mostrando 1 - 19 Resultados de 19 Para Buscar 'Who's Watching the Kids', tiempo de consulta: 0.10s Limitar resultados
  1. 1
    Publicado 2017
    Libro electrónico
  2. 2
    Publicado 2007
    Tabla de Contenidos: “…/ Cyndy Scheibe -- How do researchers study youth and the media? / Dafna Lemish -- Who's looking out for the kids? how advocates use media research to promote children's interests / Kathryn E. …”
    Libro
  3. 3
    por Jackson, Luke, 1988-
    Publicado 2002
    Libro electrónico
  4. 4
    Publicado 2011
    Tabla de Contenidos: “…-- Where to Update Your Status -- How to Update Your Status -- Determining Who Sees Your Status Updates -- Deciding What to Write About -- Employing "Facebook Grammar" -- 9 Exchanging Private Messages -- Understanding Facebook's Private Messages -- It's Just Like Email-Except It Isn't -- Reading and Replying to Messages -- Deleting Messages -- Sending a New Message -- Adding Attachments to a Message -- 10 Chatting with Your Kids-Live -- What's Chat-and Who Uses It? …”
    Libro electrónico
  5. 5
    Publicado 2018
    “…When she was younger, Lauren used to have friends but was also tormented by another girl in her class who would stare at her and threaten her to "watch her back." …”
    Vídeo online
  6. 6
    por Criddle, Linda
    Publicado 2006
    Tabla de Contenidos: “…; Assessing the Risks; Protecting Yourself; Watch Your Own Behavior; Looking for Telltale Signs; Getting the Message Across to Your Kids; Chapter 7: Step 4: Don't Let Them Know Where You Live; What Just Happened?…”
    Libro electrónico
  7. 7
    por Bollobás, Enikő
    Publicado 2010
    Tabla de Contenidos: “…The language games of irony and make-believe (Edward Albee, Who's Afraid of Virginia Woolf?) 59CHAPTER TWO: EXTENDING THE PERFORMATIVE 71; Performativity in theories of the subject 73; Performance and performative constructions of the subject 85; Performativity of reading and writing 89; Presupposition 92; Presupposition and the (performative) production of meaning 93; CHAPTER THREE: PERFORMING GENDER 97; Recipes for men and women: gender as (hetero)sexualized performance 103; Gender performances and performative genders 106…”
    Libro electrónico
  8. 8
    Publicado 2015
    Tabla de Contenidos: “…Title Page; Copyright; Dedication; Pregame Warm-Up: Or, Read This Before You Read This Book; The Big Game: Living and Dying with Your Living Trust; A Few Things You Should Know about My Coaching Style; Your Final Locker Room Pep Talk Before Training Begins; Acknowledgments; For Those without Whom This Revised Edition Wouldn't Exist; For Those Who Happen to Be My Children; For Those Who Made the Cut; The First Quarter: Establishing Your Living Trust; Chapter 1: How You Established Your Living Trust Without a Clear Understanding of What It Is and How It Works; What Does It All Mean?…”
    Libro electrónico
  9. 9
    por Leonard, Scott, 1967-
    Publicado 2014
    Libro electrónico
  10. 10
    por Buffett, Warren, 1930-
    Publicado 2007
    Tabla de Contenidos: “…MARKET 'S MOODS; LISTEN FOR OPPORTUNITY'S CALL; KNOW THE DIFFERENCE BETWEEN PRICE AND VALUE; SEEK INTRINSIC VALUE; EXPECT TO BE OUT OF STEP; EARNINGS, EARNINGS, EARNINGS; LOOK FORWARD, NOT BACK; AVOID RISK; DON'T GAMBLE; WATCH FOR UNUSUAL CIRCUMSTANCES; DON'T BE SURPRISED BY CIRCUMSTANCES; AVOID EXCESSIVE DEBT; LOOK FOR SCREAMING BARGAINS; ARBITRAGE WHEN POSSIBLE; BE PATIENT; THINK FOR YOURSELF; HAVE THE RIGHT TOOLS…”
    Libro electrónico
  11. 11
    por Erle, Schuyler
    Publicado 2005
    Tabla de Contenidos: “…; Why You Can't Watch Broadcast TV…”
    Libro electrónico
  12. 12
    Publicado 2022
    Tabla de Contenidos: “…-- Don't Quit Your Day Job Just Yet -- Part 4 Beyond the Console -- Chapter 13 Building Your Twitch Community -- Check Me Out Now: Publicizing Your Stream -- Twitter -- TikTok -- Instagram -- Hover -- YouTube -- Creating a social media strategy -- Who Is "The Fam" and Why Do They Matter? -- Oh hai, Mark: Talking to Chat -- The Fam includes other streamers too…”
    Libro electrónico
  13. 13
    Publicado 2009
    Libro electrónico
  14. 14
    Publicado 2016
    Tabla de Contenidos: “…The Natural Environment -- Marketing Insight: The Green Marketing Revolution -- The Technological Environment -- The Political-legal Environment -- Marketing Insight: Watching Out for Big Brother -- Forecasting and Demand Measurement -- The Measures of Market Demand -- A Vocabulary for Demand Measurement -- Estimating Current Demand -- Estimating Future Demand -- Summary -- Applications -- Marketing Excellence: Microsoft -- Marketing Excellence: Ferrero -- Chapter 4: Conducting Marketing Research -- The Scope of Marketing Research -- Importance of Marketing Insights -- Who Does Marketing Research? …”
    Libro electrónico
  15. 15
    Publicado 2017
    Tabla de Contenidos: “…Start -- 7:00 a.m.: Arrive Early to Ensure Everything Is Ready -- 7:30 a.m.: Arrange Who Sits Where -- 7:45 a.m.: It's Time for Music to Create a Relaxed Atmosphere -- 7:50 a.m.: Greeting Your Trainees -- 8:00 a.m.: Let's Get Ready to Rumble! …”
    Libro electrónico
  16. 16
    Publicado 2023
    Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
    Libro electrónico
  17. 17
    Publicado 2023
    Tabla de Contenidos: “…Address Institutional Barriers to Success -- Be a Well-Being Role Model -- Manage with Well-Being Skills -- What We Say Matters -- Management Style Matters -- Well-Being Training Matters -- Be a Force of Change -- Praise and Persistence -- Pushback -- Communicate Often and Vary the Messenger -- How I Help Hopkins Get Healthy -- That's a Wrap -- Chapter 9 Culture Killers: Watch Out for the Speed Bumps -- Culture Killer #1-All Talk, No Action -- Culture Killer #2-Lack of Accountability -- Culture Killer #3-The Antagonist -- Culture Killer #4-The Arrogant -- Culture Killer #5-Losing Focus (or Never Having It to Start With) -- Culture Killer #6-Faster Is Not Better -- Culture Killer #7-Ignoring the Actual Work -- Culture Killer #8-Passion Without a Foundation -- Culture Killer #9-When Your Goal Is Return on Investment (ROI) -- The Speed of Change -- That's a Wrap! …”
    Libro electrónico
  18. 18
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Malvertising -- Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Man-made environmental problems -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- Part 2 Improving Your Own Personal Security -- Chapter 4 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment…”
    Libro electrónico
  19. 19
    Publicado 2023
    Tabla de Contenidos: “…-- Biting Off More Than You Can Chew: The Pitfalls of Using Leverage -- Watch Your Step: Understanding the Real Risks behind Commodities -- Sovereign government risk -- Geopolitical risk -- Speculative risk -- Corporate governance risk -- Tracking Commodities from 2008 through the 2020 Global Pandemic -- Origins of the 2008 crisis -- The 2020 Pandemic -- Managing Risk -- Due diligence: Just do it -- Commodity companies -- Managed funds -- Futures market -- Commodity fundamentals -- Diversify, diversify, diversify…”
    Libro electrónico