Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,658
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 357
- Música 348
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
28421Publicado 2023“…It answers the following questions: What do we know about strategy? What can creative strategy do for you? …”
Grabación no musical -
28422Publicado 2014“…At the same time, Art. 3 of the constitution provides that no law should contravene the tenets and provisions of the holy religion of Islam in Afghanistan. But how do these different sources of law interact in conflicting legal fields? …”
Libro electrónico -
28423Publicado 2012“…At the centre of this book lies the question, "do the conspicuously successful and glittering new class of African Americans herald a new post-racial age?" …”
Libro electrónico -
28424Publicado 2020“…Trace mineral deficiencies (except for iodine, iron, and zinc) do not often develop spontaneously in adults on ordinary diets; infants are more vulnerable because their growth is rapid and their intake varies. …”
Libro electrónico -
28425Publicado 2018“…The contributors in this volume investigate the religious and spiritual lives of young people, especially as they relate to inclinations to do good for others. People are increasingly interested in, concerned about, and excited for the generational changes occurring to faith and giving, as young people become adults. …”
Libro electrónico -
28426Publicado 2017“…In recent years, this attention has created a global awareness of the risks of oil spills and the damage they do to the environment. Oil is a necessity in our industrial society, however, and a major component of our lifestyle. …”
Libro electrónico -
28427Publicado 2022“…When asked why, she explains that people do not like her and that they are always negatively judging her. …”
Vídeo online -
28428Publicado 2022“…Esta obra se propõe a refletir sobre a aplicação de dilemas morais como estratégia para o desenvolvimento da competência moral de crianças e jovens, em ambientes educativos, como é o caso da escola, trazendo a relevância do processo de formação e relações pedagógicas vivenciadas no ambiente escolar. …”
Libro electrónico -
28429por Sears, Dr. Woodrow“…If you really want to become a good communicator, you can do it - with this guide. And the payoff will be immediate and obvious. …”
Publicado 2007
Libro electrónico -
28430por Perry, Greg“…This Digital Short Cut shows you how to do work in Word 2007 as well as how to manage many of the Internet-based Word 2007 elements you need in today's online-connected world. …”
Publicado 2006
Libro electrónico -
28431por Miller, Michael R.“…If you're selling a particular type of collectible - from pinbacks to Pez dispensers - how do you effectively list your products for auction and maximize your sales and profits? …”
Publicado 2006
Libro electrónico -
28432Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
Video -
28433Publicado 2023“…You will have the knowledge and skills required to do the following: The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques This course in the CASP series covers the following topics: Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys…”
Video -
28434Publicado 2023“…You will have the knowledge and skills required to do the following: This domain is about: use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment. …”
Video -
28435por Overly, Michael R.“…Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. …”
Publicado 2021
Libro electrónico -
28436The book of business awesome how engaging your customers and employees can make your business thrivePublicado 2023“…The flip side of the book, The Book of Business UnAwesome, shares the train-wreck stories of unsuccessful businesses and showcases what not to do. - Key concepts include the power of peripheral referrals and how to create content for your "third circle"--Explains how to re-recruiting your employees and re-court your customers Ensure that your business remains awesome, instead of unawesome, and apply these awesomely effective strategies to your business today…”
Grabación no musical -
28437Publicado 2024“…You'll become aware of biases that negatively impact professionals of color; recognizing that belonging and uniqueness don't have to be at odds; standing up and standing out: taking your career from the margins to center stage; what to do when mentoring fails-and the power of embracing and accepting help; staying true to yourself when your values collide with reality; and showing up strategically, intentionally asserting yourself, and competing. …”
Grabación no musical -
28438Publicado 2020“…They are then fully recyclable because thermosoftening plastics do not have covalent bonds between neighbouring polymer molecules. …”
Libro electrónico -
28439por Aral, Faruk“…Does calf gender affect milk yield? Do insecticides reduce fertility? Could boar pheromones be an option to stimulate sow reproduction? …”
Publicado 2021
Libro electrónico -
28440Publicado 2020“…These machines need to drain the dirty water and replace with clean water. To do so an important component of these machines is a pump that is used to remove the dirty water. …”
Libro electrónico