Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 361
- Development 296
- History 270
- Engineering & Applied Sciences 250
- Application software 219
- Computer Science 184
- Computer networks 179
- Artificial intelligence 169
- Data processing 152
- Historia 149
- Leadership 148
- Technological innovations 126
- Business & Economics 120
- Organizational change 113
- Computer software 111
- Education 108
- Security measures 104
- Information technology 102
- Economic conditions 99
- Computer security 98
- Machine learning 96
- Social aspects 96
- Design 95
- Research & information: general 93
- Climatic changes 87
- Technology: general issues 87
- Software engineering 86
- History of engineering & technology 85
- Economic policy 84
- Computer programs 80
-
7101por Nomani, QamarTabla de Contenidos: “…-- Regulatory frameworks and compliance standards -- GDPR -- HIPAA -- SOC 2 -- Federal Risk and Authorization Management Program -- California Consumer Privacy Act -- California Privacy Rights Act -- Personal Data Protection Act -- Federal Information Security Management Act -- ISO 27001 -- PCI DSS -- NIST Cybersecurity Framework -- Cloud Security Alliance Cloud Controls Matrix -- Center for Internet Security benchmark controls -- Cloud governance frameworks -- AWS WAF -- MCSB -- Adapting cloud governance to the organization's need -- Global versus regional compliance considerations -- Use cases, scenarios, and examples -- Use case #1 - Data protection and privacy -- Use case #2 - Incident reporting and notification -- Use case #3 - Compliance audits -- Challenges, CSPM roles, and future trends -- Challenges in compliance and governance -- CSPM's role in effective compliance management and governance -- Future trends in compliance and governance -- Summary…”
Publicado 2024
Libro electrónico -
7102Publicado 2015Tabla de Contenidos: “…-- Database Tables -- Primary and Foreign Keys -- Queries -- Understanding Basic SQL Syntax -- Using SELECT Statement -- Using the JOIN Statement -- Using the UPDATE Statement -- Using the DELETE Statement -- Using the INSERT Statement -- Using the SQL Comment -- Executing Queries in SQL Server -- Summary -- CHAPTER 13: DATABASE PROGRAMMING WITH SQL SERVER AND ADO.NET -- ADO.NET -- ADO.NET Data Namespaces -- The SqlConnection Class -- Working with the Connection String Parameters -- Opening and Closing the Connection -- The SqlCommand Class -- The SqlDataAdapter Class -- The DataSet Class -- DataView -- The ADO.NET Classes in Action -- Data Binding -- BindingContext and CurrencyManager -- Binding Controls -- Binding Examples -- Summary -- CHAPTER 14: ASP.NET -- Thin-Client Architecture -- Web Forms versus Windows Forms -- Windows Forms Advantages -- Web Forms Advantages -- Web Applications: The Basic Pieces -- Web Servers -- Browsers -- HyperText Markup Language -- JavaScript -- Cascading Style Sheets…”
Libro electrónico -
7103por Heijden, Ferdinand van derTabla de Contenidos: “…5.2.1 Optimal Online Estimation in Linear-Gaussian Systems -- 5.2.2 Suboptimal Solutions for Non-linear Systems -- 5.3 Finite Discrete-Time State Variables -- 5.3.1 Hidden Markov Models -- 5.3.2 Online State Estimation -- 5.3.3 Offline State Estimation -- 5.4 Mixed States and the Particle Filter -- 5.4.1 Importance Sampling -- 5.4.2 Resampling by Selection -- 5.4.3 The Condensation Algorithm -- 5.5 Genetic State Estimation -- 5.5.1 The Genetic Algorithm -- 5.5.2 Genetic State Estimation -- 5.5.3 Computational Issues -- 5.6 State Estimation in Practice -- 5.6.1 System Identification -- 5.6.2 Observability, Controllability and Stability -- 5.6.3 Computational Issues -- 5.6.4 Consistency Checks -- 5.7 Selected Bibliography -- 6 Supervised Learning -- 6.1 Training Sets -- 6.2 Parametric Learning -- 6.2.1 Gaussian Distribution, Mean Unknown -- 6.2.2 Gaussian Distribution, Covariance Matrix Unknown -- 6.2.3 Gaussian Distribution, Mean and Covariance Matrix Both Unknown -- 6.2.4 Estimation of the Prior Probabilities -- 6.2.5 Binary Measurements -- 6.3 Non-parametric Learning -- 6.3.1 Parzen Estimation and Histogramming -- 6.3.2 Nearest Neighbour Classification -- 6.3.3 Linear Discriminant Functions -- 6.3.4 The Support Vector Classifier -- 6.3.5 The Feedforward Neural Network -- 6.4 Adaptive Boosting - Adaboost -- 6.5 Convolutional Neural Networks (CNNs) -- 6.5.1 Convolutional Neural Network Structure -- 6.5.2 Computation and Training of CNNs -- 6.6 Empirical Evaluation -- 6.7 Selected Bibliography -- 7 Feature Extraction and Selection -- 7.1 Criteria for Selection and Extraction -- 7.1.1 Interclass/Intraclass Distance -- 7.1.2 Chernoff-Bhattacharyya Distance -- 7.1.3 Other Criteria -- 7.2 Feature Selection -- 7.2.1 Branch-and-Bound -- 7.2.2 Suboptimal Search -- 7.2.3 Several New Methods of Feature Selection -- 7.2.4 Implementation Issues…”
Publicado 2017
Libro electrónico -
7104Publicado 2024Tabla de Contenidos: “…-- La détente politique plutôt que la détente militaire : la CSCE et les mesures de confiance -- L'émergence du débat sur les droits de l'homme : les ambiguïtés françaises -- La compétition franco-soviétique en Méditerranée à l'heure de la détente en Europe -- Une opposition de plus en plus marquée dans un espace toujours plus stratégique pour la France -- Défense, renseignement et coopération militaire : le temps du renouveau anticommuniste en Méditerranée occidentale? -- Les adaptations de la stratégie gaullienne à Chypre -- Statu quo régional pour "condominium" global : le Proche-Orient post-nassérien, point d'ancrage de la mésentente franco-américaine -- Paris, Washington et le renouveau égyptien : deux stratégies pour un même but? …”
Libro electrónico -
7105Publicado 2024Tabla de Contenidos: “…5.6 Summary -- References -- Chapter 6 Sustainable Mental Health Services for Rural Schools -- 6.1 Introduction -- 6.1.1 Mental Health of Rural Adolescents is Worrying -- 6.1.2 The Shortage of Rural Mental Health Resources -- 6.1.3 Sustainable Mental Health Service Model -- 6.2 Mental Health Screening -- 6.2.1 Description of Mental Health General Screening and Special Screening -- 6.2.2 Service Pattern of Mental Health Screening -- 6.2.3 Case Study of Conducting Mental Health General Screening in Rural Areas -- 6.3 Multimodal Observation -- 6.3.1 Unique Functions of Multimodal Observation -- 6.3.2 How to Observe Mental Status with a "Wristband" -- 6.4 Intervention -- 6.4.1 Group Counseling -- 6.4.2 Self-Adapted Mental Course Design System -- 6.5 Apply Advanced Technologies in Rural Schools -- 6.5.1 Improve Traditional Mental Screening with Advanced Intelligent Techniques -- 6.5.2 Future Implications of Multimodal Tools in Mental Health -- 6.5.3 Implement Psychological Intervention by Telepsychology -- References -- Chapter 7 Smart Building -- 7.1 Introduction to Smart Building -- 7.1.1 Definition of Smart Building -- 7.1.2 Features of Smart Buildings -- 7.1.3 Development of Smart Buildings -- 7.2 Toward a More Perceptive Smart Building -- 7.2.1 Overview -- 7.2.2 A Solution to Multisource Sensing Data Fusion for Smart Building -- 7.2.3 Leveraging the Perception in Real Time -- 7.3 National Speed Skating Oval: A Case Study -- 7.3.1 Overview -- 7.3.2 Multisensory Data Collection and Storage -- 7.3.3 Devices Monitoring and Visualization -- 7.3.4 Improvements on Ice State and Energy Predicting -- 7.3.5 Regulation Strategy for Ice-Making and Cooling System -- 7.4 Discussion on Smart Home for Rural Areas -- References -- Chapter 8 Natural and Emotional Interaction Techniques with AI for Smart Services -- 8.1 Introduction…”
Libro electrónico -
7106por Das, SubhajitTabla de Contenidos: “…-- Orthogonalization effect in R -- Summary -- References -- Chapter 8: Executing A/B Testing and Controlled Experiments -- Technical requirements -- Designing and conducting A/B tests -- Concepts -- Planning your A/B test -- Implementation details -- Controlled experiments and causal inference -- Enhancing causal inference -- Beyond A/B testing - multi-armed bandit tests and factorial designs -- Ethical considerations -- Common pitfalls and challenges -- Strategies for dealing with incomplete data -- Mitigating spill-over effects -- Adaptive experimentation - when and how to adjust your experiment -- Implementing A/B test analysis in R -- Step 1 - Generating synthetic data -- Step 2 - Exploratory data analysis (EDA) -- Step 3 - Statistical testing -- Step 4 - Multivariate analysis -- Step 5 - Interpreting results -- Step 6 - Checking assumptions of the t-test -- Step 7 - Effect-size calculation -- Step 8 - Power analysis -- Step 9 - Post-hoc analyses -- Step 10 - Visualizing interaction effects -- Summary -- Chapter 9: Implementing Doubly Robust Estimation -- Technical requirements -- What is doubly robust estimation? …”
Publicado 2024
Libro electrónico -
7107Publicado 2017Tabla de Contenidos: “…Servlet request listener -- Servlet request attribute listener -- Session attribute listener -- Session binding listener -- Session activation listener -- Servlet context listener -- Servlet context attribute listener -- Asynchronous servlet -- Non blocking I/O -- Protocol handler -- Dynamic context registration -- External resources and themes -- Web fragments -- Security -- File descriptor security -- Programmatic security -- Form login -- Create a custom JAAS module -- Summary -- Chapter 14: Writing a JSF Application -- MVC -- Components -- Use -- Structure -- Configuring and developing your application -- Internationalization -- Navigation -- Navigation inside the page -- Phases and listeners -- Working with Facelets -- Web templates -- Custom functions -- Custom tags -- Security -- ACL permissions and PicketBox -- Summary -- Chapter 15: Sharing the Web Sessions -- Clustering -- Infinispan -- Distributable applications -- Cluster domains -- Customize the domains -- Summary -- Chapter 16: WildFly in Cloud -- OpenShift -- WildFly installation -- Command-line tools -- Exposed services -- Summary -- Chapter 17: Share your Data -- Infinispan and the cluster -- LRU and LIRS -- JGroups configuration -- Singleton HA Services -- Writing the Service -- Writing the Activator -- Client for the Service -- Summary -- Chapter 18: Deployment -- Deployment types -- Enterprise packages -- Web archive -- Java archive -- EJB -- Client application -- Simple Java library -- Resource adapters -- Extension packages -- Datasources -- Service archives -- Deployment tools -- Administrator tools -- HA deploy -- Development tools -- Summary -- Chapter 19: Working with OSGi -- Modules -- OSGi in WildFly -- Installation -- Deployment of bundles -- Maven bundle plugin -- Summary -- Index…”
Libro electrónico -
7108por OECDTabla de Contenidos: “…-- Intercultural attitudes and values as part of global competency -- Students' respect for people from other cultures -- Interest in learning about other cultures, awareness of global issues, agency, self-efficacy, cognitive adaptability and perspective taking -- Ethical judgements and media literacy -- Notes -- References -- 2 Attitudes and values in subject-specific curriculum -- How can attitudes and values be linked to subject-specific learning goals and content?…”
Publicado 2021
Libro electrónico -
7109por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Les politiques en faveur de l'innovation doivent être recalibrées afin de soutenir cette dernière sans privilégier les entreprises en place, et de s'adapter au caractère de plus en plus mondialisé de l'innovation. -- 4.2.4. …”
Publicado 2018
Libro electrónico -
7110Publicado 2023Tabla de Contenidos: “…Upper secondary education requires purposefully designed pathways that promote deeper skills acquisition -- Investing in assessment expertise is essential for a national certification to continually adapt to the needs of education and society -- Strengthening pathways in upper secondary education -- Issue 1: Reviewing students' transitions and orientation into upper secondary education -- Issue 2: Creating valued vocational pathways through upper secondary education -- Issue 3: Designing pathways with clear and sequential progression out of upper secondary education -- Consolidating Lithuania's upper secondary certification to meet learners' diverse needs and promote higher-order, complex learning -- Issue 1. …”
Libro electrónico -
7111por Hahn, Marcelo GuerraTabla de Contenidos: “…Singleton -- Factory -- Adapter -- Composite -- Observer -- Command -- Applying design patterns -- The problem -- Trade-offs -- Systemwide impact -- Users -- Using domain-driven design -- An example of a real-world project -- Summary -- Questions -- Further reading -- Chapter 12: Incorporating Design Patterns in C++ Applications -- Technical requirements -- Design patterns in game development -- The singleton pattern -- The factory pattern -- The flyway pattern -- Design patterns in data-intensive applications -- The proxy pattern -- The decorator pattern -- The iterator pattern -- Design patterns in enterprise applications -- SOA -- Summary -- Questions -- Further reading -- Chapter 13: Networking and Security -- Technical requirements -- Introduction to networks, the OSI model, and network programming using sockets -- The OSI model -- Network applications under the hood -- Programming network applications using sockets -- Understanding network protocols -- Designing an echo server -- Securing applications -- Securing network applications -- Summary -- Questions -- Further reading -- Chapter 14: Debugging and Testing -- Technical requirements -- Understanding the root cause of an issue -- RCA overview -- Prevention is better than cure - good coding behavior -- The uninitialized variable problem -- Side effects in compound expressions -- Mixed signed and unsigned problems -- Order of evaluation problem -- Compile-time checking versus runtime checking -- Avoiding memory leaks -- Debugging programs -- Tools for debugging a C/C++ program -- GDB overview -- Examples of GDB -- Setting breakpoints and inspection variable values -- Practical debugging strategies -- Static and dynamic analysis -- Static analysis -- Dynamic analysis -- Testing, TDD, and BDD -- Unit testing -- TDD -- BDD -- Summary -- Further reading…”
Publicado 2023
Libro electrónico -
7112Publicado 2023Tabla de Contenidos: “…Planning a sensitivity label solution for your organization -- Creating and managing SITs -- Setting up sensitivity labels and policies -- Setting up labels -- Setting up label policies -- Using sensitivity labels -- Configuring and using Activity explorer -- Using sensitivity labels with Teams, SharePoint, OneDrive, and Office apps -- Summary -- Questions -- Further reading -- Chapter 12: Managing Microsoft Purview Data Loss Prevention -- Planning and implementing DLP -- Managing DLP policies for Microsoft 365 workloads -- Creating a DLP policy -- Testing your DLP policy -- Editing your DLP policy -- DLP reporting and alerting capabilities -- Using PowerShell with DLP reporting -- Required permissions for DLP reports -- Further alerting capabilities -- Implementing Endpoint DLP -- Summary -- Questions -- Further reading -- Chapter 13: Managing Microsoft Purview Data Lifecycle Management -- Planning for data lifecycle management -- Records management -- Analyzing reports and dashboards -- Content explorer -- Activity explorer -- Configuring retention labels and policies -- Creating a retention label -- Creating a retention label policy -- Applying retention labels -- Creating a retention policy -- Planning and implementing adaptive scopes -- Finding and recovering deleted Microsoft 365 data -- User mailboxes -- OneDrive -- Summary -- Questions -- Further reading -- Part 4: Managing Compliance Features in Microsoft 365 -- Chapter 14: Monitoring and Analyzing Audit Logs and Reports in Microsoft Purview -- Planning for auditing and reporting -- Investigating compliance activities by using audit logs -- Performing an audit log search -- Reviewing and interpreting compliance reports and dashboards -- Configuring alert policies -- Configuring audit log retention policies -- Summary -- Questions -- Further reading…”
Libro electrónico -
7113Publicado 2002Tabla de Contenidos: “…3.1.4 HiperSockets (iQDIO) and Internal Coupling-3 (IC-3) channel definitions -- 3.1.5 Enhanced Multiple Image Facility -- 3.1.6 Channel planning for availability -- 3.1.7 Configuration guidelines and recommendations -- 3.2 Parallel channel -- 3.2.1 Connectivity -- 3.3 ESCON channel -- 3.3.1 Connectivity -- 3.4 Fibre Connection channel -- 3.4.1 Description -- 3.4.2 Connectivity -- 3.4.3 Migrating from ESCON to FICON connectivity -- 3.4.4 FICON distance solutions -- 3.5 FICON channel in Fibre Channel Protocol (FCP) mode -- 3.5.1 Connectivity -- 3.6 Open Systems Adapter-2 channel -- 3.6.1 Connectivity -- 3.7 OSA-Express channel -- 3.7.1 Connectivity -- 3.8 External Time Reference -- 3.8.1 Connectivity -- 3.9 Parallel Sysplex channels -- 3.9.1 Connectivity -- 3.10 HiperSockets -- 3.10.1 Connectivity -- Chapter 4. …”
Libro electrónico -
7114por Marchioni, FrancescoTabla de Contenidos: “…Developing Applications with JBoss JMS Provider -- A short introduction to JMS -- The building blocks of JMS -- The JBoss messaging subsystem -- Creating and using connection factories -- Using JMS destinations -- Adding message-driven beans to your application -- Cooking message-driven beans -- Adding the JMS producer -- Compiling and deploying the application -- Optimizing JMS connections -- Specifying which message to receive using selectors -- Using JMS to integrate with external systems -- A real-world example - HornetQ and ActiveMQ integration -- Installing the ActiveMQ resource adapter -- Consuming ActiveMQ messages -- Summary -- 8. …”
Publicado 2013
Libro electrónico -
7115Publicado 2010Tabla de Contenidos: “…TFO Blacklist Operation -- Directed Mode -- Adaptive and Static TCP Buffering -- Replication Acceleration -- Application Traffic Policy -- Application Groups -- Traffic Classifiers -- Policy Maps -- Negotiating Policies -- EndPoint Mapper Classification -- Monitoring and Reporting -- Automatic Discovery Statistics -- Connection Statistics and Details -- WAN Optimization Statistics -- Network Profiling -- Understanding WAAS Performance Improvement -- Understanding Device and System Performance and Scalability Metrics -- Executive Reports -- Integration with Third-Party Visibility Systems -- WAN Optimization Monitoring with XML-API -- Application Response Time Monitoring -- Summary -- Chapter 9 Configuring Application Acceleration -- Application Acceleration Overview -- CIFS Acceleration -- Windows Print Acceleration -- NFS Acceleration -- MAPI Acceleration -- HTTP Acceleration -- SSL Acceleration -- Video Acceleration -- Enabling Acceleration Features -- Additional Video Settings -- Configuring SSL Acceleration -- Configuring Disk Encryption -- Managing the Secure Store -- Configuring SSL Accelerated Services -- Using the CM GUI to Configure SSL -- Using the CLI to Configure SSL -- Configuring Preposition -- Acceleration Monitoring and Reporting -- Acceleration Monitoring Using Device CLI -- Acceleration Monitoring Using CM GUI -- Acceleration Monitoring with XML-API -- CIFSStats -- SSLStats -- VideoStats -- HttpStats -- MapiStats -- NfsStats -- Summary -- Chapter 10 Branch Office Virtualization -- Branch Office Virtualization Overview -- Overview of Virtual Blades -- Management of Virtual Blades -- Virtual Blade Hardware Emulation -- Virtualization Capable WAAS Platforms -- Creating Virtual Blades -- Guest OS Boot Image -- Configuring Virtual Blade Resources -- Virtual Blade Interface Bridging Considerations -- Starting Virtual Blades…”
Libro electrónico -
7116Publicado 2018Tabla de Contenidos: “…SDI -- Fiber Optic -- Thunderbolt -- USB -- FireWire -- Cat 5 and Cat 6 Ethernet cable -- Video Signal Distribution Hardware -- EDID Managers, Video Amplifiers, Replicators, Extenders, Repeaters, Splitters, and Distribution -- Datapath -- Matrox Triple Head -- Video Scalers -- Video Mixers -- Video Cable Adapters and Signal Converters -- Wireless Video -- RF Modulator -- Cat 5/6 Extenders -- Analog-to-Digital Converters (ADC) and Digital-to-Analog Converters (DAC) -- MEDIA SERVERS -- Types of Media Servers -- Timeline-Based Media Servers -- Layer/Cue Stack-Based Media Servers -- Node-Based Media Servers -- VJ-Based Media Servers -- Common Media Server Features -- Built-In Mapping and Masking Features -- Max # of Inputs -- Max # of Outputs -- Max # of Layers -- Max # of Simultaneous HD Videos -- Notable Supported Protocols -- PROJECTORS -- Projector Types -- DLP -- LCD -- LCoS -- Laser -- Technical Specifications of Projectors -- Lumens -- Resolution and Aspect Ratio -- Contrast Ratio -- Inputs/Outputs -- Fan/Air Flow/Filters -- Network Capable -- Installation -- Projector Lenses -- Types of Lenses -- Working with Projectors -- Focus -- Keystone -- Lens Shift -- Convergence -- Calculating Surface Brightness/Luminance -- Calculating Screen Size, Throw Distance, and/or Lens Needed -- Calculating Pixel Size, Pixels per Square Inch (PPI), and Approximate Perceived Pixel Size -- Projection Calculators -- Warping and Projection Mapping -- Masks -- Using Multiple Projectors -- Blending -- Step 1: Calculate the Overlap -- Step 2: Align the Projected Rasters to the Calculated Overlap -- Step 3: Adjust the Media Server's Blend Function to the Same Percentage of Overlap -- Step 4: Adjust the Gain, Gradient, or Blend Amount in the Media Server -- Projector-Related Equipment -- Lamps -- Dowsers -- Mounts and Cages -- PROJECTION SCREENS AND SURFACES…”
Libro electrónico -
7117Publicado 2018Tabla de Contenidos: “…Change Knowledge -- Strategic Risk Area 3. Managing Adaptation Resources -- Strategic Risk Area 4. Understanding Important Leverage Points -- Tactical Change Areas -- Chapter 16 Culture Change Management Tools and Methodologies -- Planning for Culture Change Management -- Start the CCM Methodology with a No-Layoff Policy -- Resiliency…”
Libro electrónico -
7118Publicado 2010Tabla de Contenidos: “…How It Works -- When to Use It -- Wrapping a Function Sequence in a Nested Closure (Ruby) -- Simple C# Example (C#) -- Using Method Chaining (Ruby) -- Function Sequence with Explicit Closure Arguments (Ruby) -- Using Instance Evaluation (Ruby) -- Chapter 39: Literal List -- How It Works -- When to Use It -- Chapter 40: Literal Map -- How It Works -- When to Use It -- The Computer Configuration Using Lists and Maps (Ruby) -- Evolving to Greenspun Form (Ruby) -- Chapter 41: Dynamic Reception -- How It Works -- When to Use It -- Promotion Points Using Parsed Method Names (Ruby) -- Promotion Points Using Chaining (Ruby) -- Removing Quoting in the Secret Panel Controller (JRuby) -- Chapter 42: Annotation -- How It Works -- When to Use It -- Custom Syntax with Runtime Processing (Java) -- Using a Class Method (Ruby) -- Dynamic Code Generation (Ruby) -- Chapter 43: Parse Tree Manipulation -- How It Works -- When to Use It -- Generating IMAP Queries from C# Conditions (C#) -- Chapter 44: Class Symbol Table -- How It Works -- When to Use It -- Statically Typed Class Symbol Table (Java) -- Chapter 45: Textual Polishing -- How It Works -- When to Use It -- Polished Discount Rules (Ruby) -- Chapter 46: Literal Extension -- How It Works -- When to Use It -- Recipe Ingredients (C#) -- Part V: Alternative Computational Models -- Chapter 47: Adaptive Model -- How It Works -- When to Use It -- Chapter 48: Decision Table -- How It Works -- When to Use It -- Calculating the Fee for an Order (C#) -- Chapter 49: Dependency Network -- How It Works -- When to Use It -- Analyzing Potions (C#) -- Chapter 50: Production Rule System -- How It Works -- When to Use It -- Validations for club membership (C#) -- Eligibility Rules: extending the club membership (C#) -- Chapter 51: State Machine -- How It Works -- When to Use It -- Secret Panel Controller (Java)…”
Libro electrónico -
7119
-
7120Publicado 2012Tabla de Contenidos: “…Federated Identity Management -- eXtensible Access Control Markup Language (XACML) -- Simple Object Access Protocol (SOAP) -- Single Sign On (SSO) -- Service Provisioning Markup Language (SPML) -- Certificate-based Authentication -- Attestation -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 18 Security Activities Across the Technology Life Cycle -- End-to-End Solution Ownership -- Understanding the Results of Solutions in Advance -- Systems Development Life Cycle -- Adapt Solutions to Address Emerging Threats and Security Trends -- Validate the System Design -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- Appendix: About the Download -- Downloading the ISO File -- System Requirements -- Installing and Running MasterExam -- MasterExam -- LearnKey Online Training -- Help -- Removing Installations -- Technical Support -- LearnKey Technical Support -- Glossary…”
Libro electrónico