Mostrando 28,421 - 28,440 Resultados de 45,231 Para Buscar '".do"', tiempo de consulta: 0.16s Limitar resultados
  1. 28421
    Publicado 2023
    “…It answers the following questions: What do we know about strategy? What can creative strategy do for you? …”
    Grabación no musical
  2. 28422
    Publicado 2014
    “…At the same time, Art. 3 of the constitution provides that no law should contravene the tenets and provisions of the holy religion of Islam in Afghanistan. But how do these different sources of law interact in conflicting legal fields? …”
    Libro electrónico
  3. 28423
    Publicado 2012
    “…At the centre of this book lies the question, "do the conspicuously successful and glittering new class of African Americans herald a new post-racial age?" …”
    Libro electrónico
  4. 28424
    Publicado 2020
    “…Trace mineral deficiencies (except for iodine, iron, and zinc) do not often develop spontaneously in adults on ordinary diets; infants are more vulnerable because their growth is rapid and their intake varies. …”
    Libro electrónico
  5. 28425
    Publicado 2018
    “…The contributors in this volume investigate the religious and spiritual lives of young people, especially as they relate to inclinations to do good for others. People are increasingly interested in, concerned about, and excited for the generational changes occurring to faith and giving, as young people become adults. …”
    Libro electrónico
  6. 28426
    Publicado 2017
    “…In recent years, this attention has created a global awareness of the risks of oil spills and the damage they do to the environment. Oil is a necessity in our industrial society, however, and a major component of our lifestyle. …”
    Libro electrónico
  7. 28427
    Publicado 2022
    “…When asked why, she explains that people do not like her and that they are always negatively judging her. …”
    Vídeo online
  8. 28428
    Publicado 2022
    “…Esta obra se propõe a refletir sobre a aplicação de dilemas morais como estratégia para o desenvolvimento da competência moral de crianças e jovens, em ambientes educativos, como é o caso da escola, trazendo a relevância do processo de formação e relações pedagógicas vivenciadas no ambiente escolar. …”
    Libro electrónico
  9. 28429
    por Sears, Dr. Woodrow
    Publicado 2007
    “…If you really want to become a good communicator, you can do it - with this guide. And the payoff will be immediate and obvious. …”
    Libro electrónico
  10. 28430
    por Perry, Greg
    Publicado 2006
    “…This Digital Short Cut shows you how to do work in Word 2007 as well as how to manage many of the Internet-based Word 2007 elements you need in today's online-connected world. …”
    Libro electrónico
  11. 28431
    por Miller, Michael R.
    Publicado 2006
    “…If you're selling a particular type of collectible - from pinbacks to Pez dispensers - how do you effectively list your products for auction and maximize your sales and profits? …”
    Libro electrónico
  12. 28432
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
    Video
  13. 28433
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques This course in the CASP series covers the following topics: Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys…”
    Video
  14. 28434
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: This domain is about: use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment. …”
    Video
  15. 28435
    por Overly, Michael R.
    Publicado 2021
    “…Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. …”
    Libro electrónico
  16. 28436
    Publicado 2023
    “…The flip side of the book, The Book of Business UnAwesome, shares the train-wreck stories of unsuccessful businesses and showcases what not to do. - Key concepts include the power of peripheral referrals and how to create content for your "third circle"--Explains how to re-recruiting your employees and re-court your customers Ensure that your business remains awesome, instead of unawesome, and apply these awesomely effective strategies to your business today…”
    Grabación no musical
  17. 28437
    Publicado 2024
    “…You'll become aware of biases that negatively impact professionals of color; recognizing that belonging and uniqueness don't have to be at odds; standing up and standing out: taking your career from the margins to center stage; what to do when mentoring fails-and the power of embracing and accepting help; staying true to yourself when your values collide with reality; and showing up strategically, intentionally asserting yourself, and competing. …”
    Grabación no musical
  18. 28438
    Publicado 2020
    “…They are then fully recyclable because thermosoftening plastics do not have covalent bonds between neighbouring polymer molecules. …”
    Libro electrónico
  19. 28439
    por Aral, Faruk
    Publicado 2021
    “…Does calf gender affect milk yield? Do insecticides reduce fertility? Could boar pheromones be an option to stimulate sow reproduction? …”
    Libro electrónico
  20. 28440
    Publicado 2020
    “…These machines need to drain the dirty water and replace with clean water. To do so an important component of these machines is a pump that is used to remove the dirty water. …”
    Libro electrónico