Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 31
- Normalización 29
- Normas generales 29
- Security measures 28
- Historia 26
- Engineering & Applied Sciences 25
- Electrical & Computer Engineering 22
- Telecommunications 22
- Economics 16
- Firewalls (Computer security) 11
- Història 11
- Educación superior 10
- Documentales 9
- Novela sueca 9
- Obres anteriors al 1800 9
- Medios de comunicación social 8
- Certification 7
- Examinations 7
- History 7
- Pintura 7
- Management 6
- metodología 6
- Antropología 5
- Antropología social 5
- Biografia 5
- Crítica e interpretación 5
- Dret 5
- Electronic data processing personnel 5
- Etnología 5
- Legislació 5
-
681Publicado 2018Tabla de Contenidos: “…WordPress system user -- NGINX configuration -- PHP and PHP-FPM configuration -- Starting NGINX and PHP-FPM -- MariaDB Configuration -- SELinux configuration -- WordPress installation tasks -- WordPress CLI installation -- Creating the WordPress database -- Downloading, configuring, and installing WordPress -- WordPress plugins and theme installation -- Running the WordPress playbook -- Summary -- Questions -- Further reading -- Chapter 6: Targeting Multiple Distributions -- Technical requirements -- Launching multiple Vagrant boxes -- Multi-operating system considerations -- Adapting the roles -- Operating system family -- The stack-install role -- The stack-config role -- The wordpress role -- Running the playbook -- Summary -- Questions -- Further reading -- Chapter 7: The Core Network Modules -- Technical requirements -- Manufacturer and device support -- The modules -- A10 Networks -- Cisco Application Centric Infrastructure (ACI) -- Cisco AireOS -- Apstra Operating System (AOS) -- Aruba Mobility Controller -- Cisco Adaptive Security Appliance (ASA) -- Avi Networks -- Big Switch Networks -- Citrix Netscaler -- Huawei CloudEngine (CE) -- Arista CloudVision (CV) -- Lenovo CNOS -- Cumulus Linux (CL) -- Dell operating system 10 (DellOS10) -- Ubiquiti EdgeOS -- Lenovo Enterprise Networking Operating System (ENOS) -- Arista EOS -- F5 BIG-IP -- FortiGate FortiManager -- FortiGate FortiOS -- illumos -- Cisco IOS and IOS XR -- Brocade IronWare -- Juniper Junos -- Nokia NetAct -- Pluribus Networks Netvisor OS -- Cisco Network Services Orchestrator (NSO) -- Nokia Nuage Networks Virtualized Services Platform (VSP) -- Cisco NX-OS (NXOS) -- Mellanox ONYX -- Ordnance -- Open vSwitch (OVS) -- Palo Alto Networks PAN-OS -- Radware -- Nokia Networks Service Router Operating System (SROS) -- VyOS -- System -- Interacting with a network device…”
Libro electrónico -
682
-
683por International Transport Forum.“…This document explores the key elements of bilateral air service agreements (ASAs) and recent trends towards increasing liberalisation and examines linkages between ASAs and cross border airline alliance. …”
Publicado 2014
Capítulo de libro electrónico -
684
-
685Publicado 2015“…The ASAE CAE preparation guide featuring 100 exam questions This is the ASAE test prep resource for the CAE exam, which leads to certification as an association executive. …”
Libro electrónico -
686
-
687Publicado 2011“…The official study guide helps you master all the topics on the CCNP Security FIREWALL exam, including ASA interfaces IP connectivity ASA management Recording ASA activity Address translation Access control Proxy services Traffic inspection and handling Transparent firewall mode Virtual firewalls High availability ASA service modules This volume is part of the Official Cert Guide Series from Cisco Press. …”
Libro electrónico -
688Publicado 2012“…The official study guide helps you master all the topics on the CCNP Security FIREWALL exam, including: ASA interfaces IP connectivity ASA management Recording ASA activity Address translation Access control Proxy services Traffic inspection and handling Transparent firewall mode Virtual firewalls High availability ASA service modules CCNP Security FIREWALL 642-618 Official Cert Guide is part of a recommended learning path f..…”
Libro electrónico -
689Publicado 2016“…Topics covered include Networking security fundamentals: concepts, policies, strategy Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6) Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs Access all CCNA Security commands: use as a quick, offline resource for research and solutions Logical how-to topic groupings provide one-stop research Great for review before CCNA Security certification exams Compact size makes it easy to carry with you, wherever you go “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs “What Do You Want to Do?” …”
Libro electrónico -
690
-
691
-
692por Gentle, James E. author“…He has held several national offices in the ASA and has served as associate editor of journals of the ASA as well as for other journals in statistics and computing. …”
Publicado 2007
Libro electrónico -
693por Virtanen, TuomasTabla de Contenidos: “…15.8.3 Advances 426 -- 15.8.4 Combination with Other Methods 427 -- 15.9 Discussion and Conclusion 428 -- Acknowledgments 429 -- References 430 -- 16 Computational Auditory Scene Analysis and Automatic Speech Recognition 433 / Arun Narayanan, DeLiang Wang -- 16.1 Introduction 433 -- 16.2 Auditory Scene Analysis 434 -- 16.3 Computational Auditory Scene Analysis 435 -- 16.3.1 Ideal Binary Mask 435 -- 16.3.2 Typical CASA Architecture 438 -- 16.4 CASA Strategies 440 -- 16.4.1 IBM Estimation Based on Local SNR Estimates 440 -- 16.4.2 IBM Estimation using ASA Cues 442 -- 16.4.3 IBM Estimation as Binary Classification 448 -- 16.4.4 Binaural Mask Estimation Strategies 451 -- 16.5 Integrating CASA with ASR 452 -- 16.5.1 Uncertainty Transform Model 454 -- 16.6 Concluding Remarks 458 -- Acknowledgment 458 -- References 458 -- 17 Uncertainty Decoding 463 / Hank Liao -- 17.1 Introduction 463 -- 17.2 Observation Uncertainty 465 -- 17.3 Uncertainty Decoding 466 -- 17.4 Feature-Based Uncertainty Decoding 468 -- 17.4.1 SPLICE with Uncertainty 470 -- 17.4.2 Front-End Joint Uncertainty Decoding 471 -- 17.4.3 Issues with Feature-Based Uncertainty Decoding 472 -- 17.5 Model-Based Joint Uncertainty Decoding 473 -- 17.5.1 Parameter Estimation 475 -- 17.5.2 Comparisons with Other Methods 476 -- 17.6 Noisy CMLLR 477 -- 17.7 Uncertainty and Adaptive Training 480 -- 17.7.1 Gradient-Based Methods 481 -- 17.7.2 Factor Analysis Approaches 482 -- 17.8 In Combination with Other Techniques 483 -- 17.9 Conclusions 484 -- References 485 -- Index 487.…”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
694
-
695
-
696
-
697por Pluche, Noël-Antoine, 1688-1761 aut
Publicado 1757Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra)Libro -
698Publicado 2004“…En ambas manos, se estudiaron nueve variables dermatoglíficas cuantitativas (número de arcos, rizos, asas cubitales, asas radiales, cuenta total de crestas digitales, cuenta de crestas a-b y d-t, ángulo atd e índice de transversalidad) y 29 variables cualitativas, calculando sus odds ratio e intervalos de confianza del 95%. …”
Acceso restringido con credenciales UPSA
Artículo digital -
699Publicado 2004“…En ambas manos, se estudiaron nueve variables dermatoglíficas cuantitativas (número de arcos, rizos, asas cubitales, asas radiales, cuenta total de crestas digitales, cuenta de crestas a-b y d-t, ángulo atd e índice de transversalidad) y 29 variables cualitativas, calculando sus odds ratio e intervalos de confianza del 95%. …”
Enlace del recurso
Artículo digital -
700Publicado 2018“…Volume 1 focuses on security policies and standards; infrastructure security; perimeter security (Next-Generation Firewall, Next-Generation Intrusion Prevention Systems, and Adaptive Security Appliance [ASA]), and the advanced threat protection and content security sections of the CCIE Security v5 blueprint. …”
Libro electrónico