Listing 1 - 10 of 86 | << page >> |
Sort by
|
Choose an application
Travailler mieux et sans stress. La boîte mail pourrait être à elle seule une illustration de la cacophonie du monde du travail d'aujourd'hui ! Des actions multiples et diverses à réaliser, des volumes d'informations en constante augmentation, des interruptions permanentes, des temps perdus à retrouver dossiers ou documents importants dans les arcanes de cet outil incontournable. L'objet de ce livre concret et pratique est de vous réconcilier avec cette « e-boîte aux lettres ». Accompagné des traits d'humour de Luc Tesson, Laurent Gessay vous propose un monde où votre boîte mail reprend sa juste place. Il vous dévoile des solutions simples que vous pourrez mettre en oeuvre de manière personnalisée. Grâce à cette méthode appliquée au quotidien, vous libérez votre mental, améliorez votre concentration et donnez plus de sens à vos actions. Vous avez désormais, entre vos mains, la possibilité de faire cohabiter sérénité et efficacité dans votre vie professionnelle.
Choose an application
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security.
Choose an application
The monograph Actors of Globalization portrays a group of New York businessmen engaged in global trade from 1784 to 1812. It follows their businesses around the world and shows how through wit, flexibility, and the help of a worldwide net of business partners the merchants were able to quickly rise to global entrepreneurs speculating on wars, food crises and slave revolts. The ramifications of their commerce were felt at home, where the merchants invested in land and city development, established new financial institutions and contributed to a rising consumer culture. This book brings together global and local history, arguing that private actors played an important role in the economic and social development of the young United States.
Merchants --- Business networks --- International trade --- Business networking --- Networking, Business --- Networks, Business --- Social networks --- Industrial clusters --- Strategic alliances (Business) --- Businesspeople --- History. --- History --- E-books --- Commerce
Choose an application
Social networks --- Computer networks --- Computer network resources --- Security measures --- Networking, Social --- Networks, Social --- Social networking --- Social support systems --- Support systems, Social --- Interpersonal relations --- Cliques (Sociology) --- Microblogs
Choose an application
Choose an application
In IPv6 networks, hosts can have multiple IPv6 addresses per interface and have multiple interfaces. This means that the applications or the kernel must be able to select the right source address, especially when the network services can be linked to this source address. The IETF (Apple, Cisco and Google) are developing 'provisioning domains' to this effect, Cisco has put in the open source community Linux kernel patches to allow applications to select such 'provisioning domains'. The goal of this Master thesis is to analyse the best ways for applications to select the provisioning domains (whether there is a human interaction or not), and write libraries and at least modify one interactive application exploiting this feature. The development must be done in Linux. Knowledge in Linux kernel development is required.
Choose an application
Le concept du Capital Psychologique ou PsyCap est défini comme un état psychologique positif de développement de l’individu. (Luthans, Youssef, & Avolio, 2007). En Belgique, quelques recherches ont été effectuées sur le PsyCap, mais la majorité des études ont été réalisées aux États-Unis. Dans la psychologie organisationnelle, plusieurs recherches ont démontré que le PsyCap est lié aux meilleures performances et à des attitudes positives, telles que la satisfaction au travail, l’engagement organisationnel et à une réduction de l’intention de quitter le travail ou turnover (e.g. Peterson, Luthans, Avolio, Walumbwa & Zhang, 2011). Dans leur revue de la littérature sur le PsyCap, Newman, Ucbasaran, Zhu et Hirst (2014) suggèrent que le PsyCap peut aider les individus à développer des réseaux avec les collègues au travail (Comportement de Réseau-Networking behavior), ce qui pourrait leur fournir un soutien ainsi que l’accès à l’information et permettre donc le développement des attitudes positives envers l’organisation. Mais ces relations n’ont pas encore été testées. Néanmoins, des études ont démontré qu’avoir des réseaux sociaux solides au niveau intra-organisationnel diminue le turnover parce que les employés qui perçoivent avoir un haut niveau de soutien de la part de leurs collègues éprouvent un sens d’obligation envers eux et sont donc moins susceptibles de vouloir quitter leur travail (e.g Moynihan & Pandey, 2007). Sur base de la littérature, la première hypothèse de cette étude postule que le Capital Psychologique est relié positivement aux comportements de réseau tandis que la deuxième hypothèse postule un lien significatif entre ce dernier et le niveau de satisfaction, engagement et turnover des employés. Par ailleurs, la troisième, quatrième et cinquième hypothèse postule un effet de médiation de networking behaviour sur la relation entre le PsyCap et la satisfaction au travail, l’engagement et le turnover respectivement. L’étude développée démontre que le PsyCap est en effet relié au comportement de réseau (networking) d’une part et d’une autre part, l’étude montre la présence d’un effet médiateur de networking sur la relation entre le PsyCap et l’engagement au travail ainsi que le turnover.
Choose an application
Quatrième de couverture : "De plus en plus souvent l'information journalistique arrive directement sur les "murs" de nos réseaux sociaux, en priorité Facebook ou Twitter, mais aussi LinkedIn ou Snapchat et bien sûr via des vidéos mises en ligne sur YouTube ou DailyMotion. La médiation de ces plateformes pour accéder à l'information d'actualité n'est pas neutre. L'objet de ce livre est d'essayer de comprendre ce qui change dans notre rapport aux médias, notre relation à l'information dès lors que se met petit à petit en place un nouvel écosystème de l'information à l'ère des réseaux socionumériques. Que partage-t-on ? Comment le faisons-nous ? Comment commentons-nous l'actualité sur Twitter ou Facebook ? Quels nouveaux usages, quels arts de faire les internautes mettent-ils en oeuvre pour utiliser les dispositifs offerts par ces plateformes : hashtags, like, retweet, emojis et émoticônes... A l'heure des fake news, des risques d'enfermement dans des "bulles de filtre" via les recommandations de nos "amis" et des algorithmes, il est indispensable, pour le bon fonctionnement de nos démocraties, de prendre pleinement conscience du bouleversement qui se joue sous nos yeux, dans nos pratiques quotidiennes d'information."
Online social networks --- Current events --- Réseaux sociaux --- --Facebook (Electronic resource) --- Twitter --- Online social networks. --- Current events. --- Facebook (Electronic resource) --- Twitter. --- --Social Networking --- Communications Media --- Internet --- utilization --- Social Networking --- Internet - utilization
Choose an application
Examples of the value that can be created and captured through crowdsourcing go back to at least 1714 when the UK used crowdsourcing to solve the Longitude Problem, obtaining a solution that would enable the UK to become the dominant maritime force of its time. Today, Wikipedia uses crowds to provide entries for the world's largest and free encyclopedia. Partly fuelled by the value that can be created and captured through crowdsourcing, interest in researching the phenomenon has been remarkable. Despite this - or perhaps because of it - research into crowdsourcing has been conducted in different research silos, within the fields of management (from strategy to finance to operations to information systems), biology, communications, computer science, economics, political science, among others.
Crowdsourcing. --- Group decision making. --- Business networks. --- Business networking --- Networking, Business --- Networks, Business --- Social networks --- Industrial clusters --- Strategic alliances (Business) --- Collective decision making --- Decision-making, Group --- Decision making --- Crowd sourcing --- Distributed cognition --- Human computation
Choose an application
A new, counterintuitive theory for how social networks influence the spread of behaviorNew social movements, technologies, and public-health initiatives often struggle to take off, yet many diseases disperse rapidly without issue. Can the lessons learned from the viral diffusion of diseases be used to improve the spread of beneficial behaviors and innovations? In How Behavior Spreads, Damon Centola presents over a decade of original research examining how changes in societal behavior--in voting, health, technology, and finance-occur and the ways social networks can be used to influence how they propagate. Centola's startling findings show that the same conditions accelerating the viral expansion of an epidemic unexpectedly inhibit the spread of behaviors. While it is commonly believed that "weak ties"-long-distance connections linking acquaintances-lead to the quicker spread of behaviors, in fact the exact opposite holds true. Centola demonstrates how the most well-known, intuitive ideas about social networks have caused past diffusion efforts to fail, and how such efforts might succeed in the future. Pioneering the use of Web-based methods to understand how changes in people's social networks alter their behaviors, Centola illustrates the ways in which these insights can be applied to solve countless problems of organizational change, cultural evolution, and social innovation. His findings offer important lessons for public health workers, entrepreneurs, and activists looking to harness networks for social change.Practical and informative, How Behavior Spreads is a must-read for anyone interested in how the theory of social networks can transform our world.
Human behavior. --- Social networks. --- Networking, Social --- Networks, Social --- Social networking --- Social support systems --- Support systems, Social --- Interpersonal relations --- Cliques (Sociology) --- Microblogs --- Action, Human --- Behavior, Human --- Ethology --- Human action --- Human beings --- Human biology --- Physical anthropology --- Psychology --- Social sciences --- Psychology, Comparative --- Behavior
Listing 1 - 10 of 86 | << page >> |
Sort by
|