Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
181Publicado 2013Libro electrónico
-
182
-
183
-
184
-
185
-
186por Bragg, Steven M.Tabla de Contenidos: “…Days Sales in Receivables Index Accounts Receivable Investment; Ending Receivable Balance; Inventory to Sales Ratio; Inventory Turnover; Inventory to Working Capital Ratio; Liquidity Index; Accounts Payable Days; Accounts Payable Turnover; Current Ratio; Quick Ratio; Cash Ratio; Sales to Current Assets Ratio; Working Capital Productivity; Days of Working Capital; Weighted Working Capital; Defensive Interval Ratio; Current Liability Ratio; Required Current Liabilities to Total Current Liabilities Ratio; Working Capital to Debt Ratio; Risky Asset Conversion Ratio…”
Publicado 2012
Libro electrónico -
187por Barnett, Thomas P. M.“…Where's the world going, and how do we become a leader again in the most profound reordering since the end of World War II? The "great powers" are no longer just the world's major nation-states, but powerful forces moving with us and past us. …”
Publicado 2009
Libro -
188Publicado 2024“…Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. …”
Video -
189Publicado 2023Tabla de Contenidos: “…Creating the BP_Enemy blueprint -- Testing the game -- Summary -- Chapter 8: Handling Collisions -- Technical requirements -- Understanding collision detection -- Setting the collision presets -- Using collisions for game interactions -- Downloading and creating the weapon, defense tower, and fireball actors -- Picking up weapons -- Spawning a weapon for the enemy -- Defense tower firing fireballs -- Moving the fireball and checking whether the target is hit -- Processing a defense tower hit -- Summary -- Chapter 9: Improving C++ Code Quality -- Technical requirements -- Refactoring code -- Combining the PlayerAvatarAnimInstance and EnemyAnimInstance classes -- Making PangaeaCharacter the parent class of APlayerAvatar and AEnemy -- Refining code -- Using caching variables -- Creating a fireball pool -- Outputting debug messages -- Using the UE_LOG macro -- Printing debug messages to the screen -- Checking an Actor instance's actual class type -- Summary -- Part 3 - Making a Complete Multiplayer Game -- Chapter 10: Making Pangaea a Network Multiplayer Game -- Technical requirements -- Comparing single-player and multiplayer games -- Launching the multiplayer Pangaea game in the editor -- Understanding multiplayer game network modes -- Handling network synchronizations -- Notifying player attacks with RPCs -- Syncing actor variables to clients with replications -- Updating the character health bar with RepNotify -- Processing hits on the server -- Spawning fireballs on the server side -- Summary -- Chapter 11: Controlling the Game Flow -- Technical requirements -- Designing the Pangaea game's flow -- Creating the UI widgets -- Creating BP_LobbyWidget -- Creating BP_HUDWidget -- Creating BP_GameOverWidget -- Adding networking functions to PangaeaGameInstance -- Adding UI widgets to game levels -- Adding the game timer…”
Libro electrónico -
190Publicado 2017“…Of key importance in the area of materials science is the end properties of the materials following processing. …”
Libro electrónico -
191por Rickels, Laurence A. 1954- Verfasser“…He charges that the overview, according to which art making rarefies daydreaming and delivers omnipotence, overlooks the underlying defense contract. We are hooked to creativity, because it offers the best defense against acknowledging the ultimate and untenable masochistic wish to be refused. …”
Publicado 2021
Libro electrónico -
192Publicado 2014Libro electrónico
-
193
-
194Publicado 2024Libro electrónico
-
195Publicado 2023“…The historical region of the Strait of Gibraltar, considered the end of the 'known world' until the modern age, is studied as an intercontinental and cultural bridge.The core of the work is an examination of 32 groups of remains, classified according to communicational, strategic and environmental factors. …”
Libro electrónico -
196Publicado 2024“…You'll also explore the essentials of Prisma Cloud, Prisma Access, Cortex XDR, and Cortex XSOAR. By the end of this course, you'll have the skills and knowledge needed to excel in Palo Alto Networks cybersecurity and contribute to the security and resilience of today's digital environments. …”
Video -
197Publicado 2022“…The end of the Cold War in 1991 brought the United States more than two decades of global leadership and prosperity. …”
Libro electrónico -
198Publicado 2024Tabla de Contenidos: “…-- Chemical sector -- Impact of a compromised chemical sector -- Cyberattack scenarios in the chemical sector -- Commercial facilities sector -- Impact of a compromised commercial facilities sector -- Cyberattack scenarios in the commercial facilities sector -- Communications sector -- Impact of a compromised communications sector -- Cyberattack scenarios in the communications sector -- Critical manufacturing sector -- Impact of a compromised critical manufacturing sector -- Cyberattack scenarios in the critical manufacturing sector -- Dams sector -- Impact of a compromised dams sector -- Cyberattack scenarios in the dams sector -- Defense industrial base sector -- Impact of a compromised defense industrial base sector -- Cyberattack scenarios in the defense industrial base sector -- Emergency services sector -- Impact of a compromised emergency services sector -- Cyberattack scenarios in the emergency services sector -- Energy sector -- Impact of a compromised energy sector -- Cyberattack scenarios in the energy sector -- Preventing and mitigating cyberattacks -- Financial services sector -- Impact of a compromised financial services sector -- Cyberattack scenarios in the financial services sector -- Food and agriculture services sector -- Impact of a compromised food and agriculture sector -- Cyberattack scenarios in the food and agriculture services sector -- Government facilities sector -- Impact of a compromised government facilities sector -- Cyberattack scenarios in the government facilities sector -- Healthcare and public health sector -- Impact of a compromised healthcare and public health sector…”
Libro electrónico -
199
-
200Publicado 2017Tabla de Contenidos: “…-- References -- Notes -- Chapter 7: 1/N -- Fallacy: Equally Weighted Portfolios Are Superior to Optimized Portfolios -- The Case for 1/N -- Setting the Record Straight -- Empirical Evidence in Defense of Optimization -- Practical Problems with 1/N -- Broken Clock -- The Bottom Line -- References -- Note -- Section Three: Challenges to Asset Allocation…”
Libro electrónico