Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Business & Economics 134
- Economic conditions 107
- Economic policy 107
- Management 86
- History 84
- Development 77
- Economic History 77
- Education 74
- Seguros 73
- Computer security 72
- Security measures 69
- Computer networks 61
- Quality control 59
- Computer software 58
- Insurance 49
- Engineering & Applied Sciences 47
- Historia 44
- Economics 41
- Medical care 37
- Quality assurance 36
- Evaluation 35
- Application software 34
- Government policy 33
- Testing 31
- Environment 30
- Governance 30
- Cloud computing 29
- Computer Science 29
- Data processing 28
- Education, Higher 28
-
2621Publicado 2022“…Il s'agit en fait de faire tenir ensemble des communautés souvent bien différentes et d'assurer aux nouveaux arrivants leur place au sein de l'ensemble. …”
Libro electrónico -
2622Publicado 2007“…Lou Ronnau, CCIE® No. 1536, is a technical leader in the Applied Intelligence group of the Customer Assurance Security Practice at Cisco. Jason Frazier is a technical leader in the Technology Systems Engineering group for Cisco. …”
Libro electrónico -
2623por Dowd, Mark“…Coverage includes • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike. …”
Publicado 2007
Libro electrónico -
2624Publicado 2008“…David Hanes, CCIE® No. 3491, is currently a senior engineer specializing in training, network design assistance, and troubleshooting of fax technologies for the Customer Assurance Engineering (CAE) group at Cisco®. Since joining Cisco in 1997, David has worked as a TAC engineer for the WAN, WAN Switching, and Multiservice Voice teams, a team lead for the Multiservice Voice team, and an escalation engineer covering a variety of voice and fax technologies. …”
Libro electrónico -
2625por Hillegass, Aaron“…Covering the bulk of what you need to know to develop full-featured applications for OS X, written in an engaging tutorial style, and thoroughly class-tested to assure clarity and accuracy, it is an invaluable resource for any Mac programmer. …”
Publicado 2008
Libro electrónico -
2626por Workshop on Developing and Strengthening the Global Supply Chain for Second-Line Drugs for Multidrug-Resistant TB“…To effectively treat patients diagnosed with drug-resistant (DR) tuberculosis (TB) and protect the population from further transmission of this infectious disease, an uninterrupted supply of quality-assured (QA), second-line anti-TB drugs (SLDs) is necessary. …”
Publicado 2013
Libro electrónico -
2627por Arcq, Étienne“…Quant à la procédure suivie pour son élaboration, tout d'abord : il fait suite aux Assises de l'enseignement et aux travaux du Conseil de l'Éducation et de la Formation qui ont assuré une large participation aux acteurs de la communauté éducative. …”
Publicado 2019
Electrónico -
2628Publicado 2017“…It is the gripping account of how an awkward and unemployed loner with virtually no recognizable leadership qualities and fluctuating political ideas turned into the charismatic, self-assured, virulently anti-Semitic leader with an all-or-nothing approach to politics with whom the world was soon to become tragically familiar. …”
Libro -
2629por Santoscoy, Bertha“…Ce cumul des fonctions fait de la Commission un organe sui generis, sans parallèle, qui assure à la conception des droits de l'homme une unité aussi bien politique que juridique. …”
Publicado 1995
Electrónico -
2630por Biard, Jean-François“…Car le mythe révolutionnaire semblait encore pouvoir seul assurer l’unité du socialisme... En suivant l’histoire de la planification nous sommes ainsi conduits à des méditations toujours actuelles sur la stratégie de la gauche. …”
Publicado 2020
Electrónico -
2631por Kaplan, Michel“…Il a dégagé avec clarté les traits de la tâche des fonctionnaires qui assurent l’entretien et l’exploitation, l’économie, dirait-on, des biens de la couronne ; il a présenté avec minutie la diversité d’origine de ces biens ; il a pu enfin avancer des hypothèses souvent convaincantes sur le rôle économique et social des grands domaines ainsi que sur les méthodes d’exploitation ; utilisation d’intermédiaires, personnel chargé de l’exploitation directe, forme des contrats et des baux, obligations réciproques des contractants, etc. …”
Publicado 2021
Electrónico -
2632por Organisation de coopération et de développement économiques.“…Aussi les organismes de crédit à l'exportation bénéficiant d'un soutien public jouent-ils un rôle crucial en accordant, assurant et garantissant ces financements. Cette publication offre une description détaillée des systèmes de crédit à l'exportation bénéficiant d'un soutien public qui sont en vigueur dans les pays de l’OCDE et dans certaines économies non membres. …”
Publicado 2003
Libro electrónico -
2633Publicado 2023“…The solution lies in better quality assurance (QA) - and Modern Game Testing will show you how to achieve just that. …”
Libro electrónico -
2634por Organization for Economic Cooperation and Development“…Pour asseoir une reprise durable, il est indispensable de mettre en ¿"uvre l'ambitieux Plan pour la reprise et la reÌsilience et d'assurer la viabiliteÌ des finances publiques en augmentant l'efficience des deÌpenses et en renforcÌʹant le cadre budgeÌtaire. …”
Publicado 2023
Libro electrónico -
2635Publicado 2022“…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
Video -
2636por Pretoria University Law Press“…Des changements éditoriaux mineurs ont été effectués afin d'assurer une certaine cohérence et éviter la répétition d'erreurs manifestes. …”
Publicado 2010
Libro electrónico -
2637Publicado 2008“…Les politiques de compensation sont nées dans une période d’optimisme quant à l’avènement d’une société plus égalitaire, et dans le prolongement des réformes politiques assurant la transition d’une école élitiste vers une école de masse unifiée, censée garantir l’égalité des chances. …”
Libro electrónico -
2638Publicado 2015“…The interactions between the reproductive system and the immune system are of particular interest, since the reproductive system is unique in that its primary role is to assure the continuity of the species, while the immune system provides internal protection and thus facilitates continued health and survival. …”
Libro electrónico -
2639por Bruno, Anne-Sophie“…En effet, si la notion contemporaine de risque n'est mobilisée pour l'industrie qu'à la fin du xixe siècle, par emprunt au monde de l'assurance, un ensemble de concepts qui s'y rattachent est usuel au moins dès le xve siècle, et les autorités ont toujours mis en place des dispositifs juridiques et sociaux pour parer à ces risques. …”
Publicado 2017
Electrónico -
2640por Labadie, Francine“…Le droit social, et particulièrement le droit du travail, ne semblent plus en capacité de jouer leur fonction par essence protectrice : l’équilibre recherché entre liberté du travail d’une part et sécurité d’autre part est ébranlé par la facilitation du recours au contrat à durée déterminée d’usage dans le droit positif ; par ailleurs l’instrumentalisation de l’assurance chômage ne règle pas de manière satisfaisante la couverture des périodes intertravail ; les disparités en termes de droits sociaux entre artistes salariés et artistes non salariés, pourtant en situation de dépendance économique, apparaissent de plus en plus injustifiées au regard des nouvelles conditions d’exercice professionnel ; la continuité des droits sociaux dans un système où se développe la pluriactivité n’est pas assurée. …”
Publicado 2015
Electrónico