Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,228
- Història 1,562
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 570
- Mapes 494
- Fonts 482
- Application software 475
- Documents pontificis 414
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 299
- Data processing 295
- Fonts històriques 283
- Color 277
- Crítica e interpretación 277
- Documentos 269
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
28681Publicado 2016Tabla de Contenidos: “…ISO 27001/27002Chapter - 8 - Assessment Methods; Evaluation methods and their attributes; Processes; Interviews; Examinations; Observations; Document Reviews; Testing; Automated; Manual; Chapter - 9 - Assessment Techniques for Each Kind of Control; Security assessment plan developmental process; Security assessment actions; Security controls by family; Chapter - 10 - System and Network Assessments; 800-115 introduction; Assessment techniques; Network testing purpose and scope; ACL Reviews; System-Defined Reviews; Testing roles and responsibilities; Security testing techniques…”
Libro electrónico -
28682Publicado 2015Tabla de Contenidos: “…""Chapter 2: Building Your Own E-Commerce Solution""""Data modeling in Elasticsearch""; ""Choosing between a query and a filter""; ""Searching your documents""; ""A match query""; ""Multifield match query""; ""Aggregating your results""; ""Terms aggregation""; ""Filter your results based on a date range""; ""Implementing a prize range filter""; ""Implementing a category filter""; ""Implementation of filters in Elasticsearch""; ""Searching with multiple conditions""; ""Sorting results""; ""Using the scroll API for consistent pagination""; ""Autocomplete in Elasticsearch""…”
Libro electrónico -
28683Publicado 2015Tabla de Contenidos: “…INTERROGATIONDECISION TO CONFESS; RATIONALIZATION; DENIALS; METHODS OF INTERROGATION; DOCUMENTING THE CONFESSION OR THE INTERVIEW; CONCLUSION; SUGGESTED READING; CHAPTER 11 - EVIDENCE; DEMONSTRATIVE EVIDENCE; DOCUMENTARY EVIDENCE; SOME RULES AND DEFINITIONS OF EVIDENCE; A FINAL WORD ABOUT EVIDENCE; REFERENCE; CHAPTER 12 - WRITTEN STATEMENTS, ADMISSIONS, AND CONFESSIONS; WRITTEN STATEMENTS; ALLOWABLE USES OF STATEMENTS; HISTORICAL BACKGROUND; TYPES OF CONSTRAINTS; CONFESSIONS AND ADMISSIONS; THE WRITTEN ADMISSION; VIDEOTAPED CONFESSIONS; VALUE OF THE CONFESSION; REFERENCE…”
Libro electrónico -
28684por Pacific-Asia Workshop on Computer Science in Industrial ApplicationTabla de Contenidos: “…Front Cover; Table of contents; Preface; Organizing committee; Section 1: Computer intelligence; Research and implementation of component extraction based on design document; Learning to rank experts in heterogeneous academic networks through mutual reinforcement; Research on security defense model of oil & gas gathering and transferring scada based on factor neural network; Research and implementation of K-means algorithm based on Hama; Education in the age of big data; Research on FBN-based security defense model of oil and gas SCADA network…”
Publicado 2014
Libro electrónico -
28685Publicado 2012Tabla de Contenidos: “…; Establish an Internal Work-Flow System; Creating a Master Client List; Creating a Master Job Tracking List; Tracking Your Jobs; Archiving Your Work; Creating a Business Card; Working with Vendors; Managing Your Time; Documenting Your Process Work; Finding an Internship; Ethical Considerations; Intermediate Level Checklist…”
Libro electrónico -
28686Publicado 2024Tabla de Contenidos: “…Safe Attachments -- Safe Documents -- Safe Attachments for SharePoint, OneDrive, and Teams -- Protecting from malicious links and phishing -- Safe Links technology -- Anti-phishing policies -- Empowering your users -- The Report Message add-in -- Protecting against compromised internal accounts or devices -- How advanced protection for internal mail works -- Examples of attacks mitigated -- Knowing and investigating what is happening in your environment -- Real-time reports -- Threat trackers -- Campaign views -- Automated investigation and response…”
Libro electrónico -
28687Publicado 2004Tabla de Contenidos: “…Els obrers de la construcció, segles XI-XV / Sandrine Victor -- Palau urbà i vida cavalleresca a Catalunya i Occitània (segles XII i XIII) / Martí Aurell i Cardona -- Les cases benestants a la Barcelona medieval (segles XII-XIII, inici del XIV) / Crme Batlle i Gallart -- La casa natal del poeta Andreu Febrer. Evidències documentals i arqueològiques d'una casa dels segles XIV i XV a Vic / Imma Ollich i Castanyer i Josep Pujades i Cavalleria -- La residència senyorial a Segòvia als segles XII al XIII / J. …”
991003837369706719 -
28688por Smith, BenTabla de Contenidos: “…Allowing the Right Users Access to the Right InformationDefending Every Layer as if It Were the Last Layer of Defense; Keeping a Record of Attempts to Access Information; Compartmentalizing and Isolating Resources; Avoiding the Mistakes Everyone Else Makes; Controlling the Cost of Meeting Security Objectives; Risk Management; Identifying Assets and Determining Their Value; Predicting Threats and Vulnerabilities to Assets; Documenting the Security Risks; Determining a Risk Management Strategy; Monitoring Assets; Tracking Changes to Risks; Risk Management Strategies; Mitigation; Transference…”
Publicado 2009
Libro electrónico -
28689por Cauldwell, PatrickTabla de Contenidos: “…Tests Communicate Your IntentSummary; Chapter 3: Continuous Integration; Integrate Early and Often; Build Servers; Fix a Broken Build before Integrating Changes; Summary; Part II: Process; Chapter 4: Done Is Done; Discuss Design Decisions; Every Class Has a Test Fixture; Each Fixture Exercises Only One Class; Code Coverage Is High; No Compiler Warnings; Static Analysis Tools Generate No Errors; Before Committing, Update; Documentation in Place; Summary; Chapter 5: Testing; Why Testing Doesn't Get Done; How Testing Will Make You a Better Developer; Code Coverage; Types of Tests…”
Publicado 2008
Libro electrónico -
28690Publicado 2015Tabla de Contenidos: “…Merging plugin and main program projectsCreating a C++ plugin for QML applications; Summary; Chapter 6: Getting Wired and Managing Downloads; Introducing Qt network programming; Utilizing QNetworkAccessManager; Making use of the progress bar; Writing multithreaded applications; Managing a system network session; Summary; Chapter 7: Parsing JSON and XML Documents to Use Online APIs; Setting up Qt for Android; Parsing JSON results; Parsing XML results; Building Qt applications for Android; Parsing JSON in QML; Summary; Chapter 8: Enabling Your Qt Application to Support Other Languages…”
Libro electrónico -
28691Cyber forensics a field manual for collecting, examining, and preserving evidence of computer crimesPublicado 2008Tabla de Contenidos: “…Appendix N: Locating Forensic Data in Windows RegistriesAppendix O: Sedona Principles for Electronic Document Production; Appendix P: Recap Federal Rules of Civil Procedure Involving E-Discovery Amendments; Appendix Q: Selected Acronyms; Appendix R: Generic Cellular Telephone Search Warrants; Appendix S: Generic Computer Search Warrant; Appendix T: Generic Affidavit for Search Warrant; Appendix U: Configuring the Investigator's Forensic Analysis Machine; Appendix V: Generic Search Warrant; Appendix W: Statement of Underlying Facts and Circumtances…”
Libro electrónico -
28692Publicado 2023Tabla de Contenidos: “…Organizing Targeting Activities -- Hard Leads -- Soft Leads -- Grouping Related Leads -- Lead Storage and Documentation -- The Request for Information Process -- Conclusion -- Chapter 5. …”
Libro electrónico -
28693Publicado 2019Tabla de Contenidos: “…The Field of Non-Fiction Prose; Literature of Fact; Literature of Personal Document; The Essay; 2. The Autobiographical Triangle: Witness, Confession, Challenge; The Rhetorical Sources of the Three Stances; Interchangeability of Autobiographical Stances; Gombrowicz Throws Down the Gauntlet; Then Who Is the Addressee of the Diary's Challenge?…”
Libro electrónico -
28694por Harmon, Paul, 1942-Tabla de Contenidos: “…; Matrix Management; The Management of Outsourced Processes; Value Chains and Process Standardization; Management Processes; Documenting Management Processes in an Architecture; Completing the Business Process Architecture Worksheet; Notes and References; Chapter 6. …”
Publicado 2007
Libro electrónico -
28695por Champlain, Michel deTabla de Contenidos: “…Predefined XML Tags for Documentation Comments; References; Index…”
Publicado 2005
Libro electrónico -
28696por Price, BradTabla de Contenidos: “…Chapter 6: Authoring and the Management Pack Life CycleAuthoring Management Packs; Exploring a Typical Life Cycle; Creating Management Pack Life-Cycle Controls; Documenting Changes; Using MP Studio 2007; Management Pack Considerations; The Bottom Line; Chapter 7: Monitoring with the Console; Console Overview; Customizing the Console; Maintenance Mode; The Bottom Line; Chapter 8: Audit Collection Services and Agentless Exception Monitoring; Exploring Audit Collection Services; Using Agentless Exception Monitoring; The Bottom Line; Chapter 9: Reporting; Installing Reporting Services…”
Publicado 2007
Libro electrónico -
28697por Vellani, Karim H., 1971-Tabla de Contenidos: “…Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures…”
Publicado 2007
Libro electrónico -
28698por Lindberg, VanTabla de Contenidos: “…The Cost of Creating KnowledgeThe Value of Secrets; The Nature of Information; It's All Good(s), or Information in Economic Theory; Rivalrous goods; Excludable goods; The four types of goods; Information As a Public Good; Changing the Nature of Information; Algorithms for creating knowledge; Making public goods private; The bargain; The purpose of intellectual property in economic terms; About "Property"; Property as a legal concept; Property as a bundle of rights; Property rights and enforcement; Evaluating the System; Chapter 2. The Patent Document; The Construction of a Patent…”
Publicado 2008
Libro electrónico -
28699por Kaczmarek, Steven D.Tabla de Contenidos: “…Planning for Configuration Manager SitesPreplanning Phase; Examine and Document Your Current Computing Environment; Identify Business and Technical Needs; Create a Test Lab; Planning Phase; Active Directory Planning; Checkpoints for Extending the Active Directory Schema for Configuration Manager; Site Mode Considerations; Mixed Mode; Native Mode; Checkpoints for Planning Configuration Manager Installations; Preinstallation Requirements; General Site Server Prerequisites; Site Database Server Prerequisites; SMS Provider Prerequisites; Configuration Manager Console Prerequisites…”
Publicado 2010
Libro electrónico -
28700por Greeff, GerhardTabla de Contenidos: “…Enterprise planning and supply-chain interactionLearning objectives; Introduction; Logistics planning and optimization; E-fulfillment; Business process optimization; Procurement management; Supplier relationship management; Customer relationship management; Material returns management; Product and plant knowledge management; Learning objectives; Introduction; Product life cycle management; Quality management; Laboratory information management systems; Document management; Production capability management; Learning objectives; Introduction; Labor management; Equipment management…”
Publicado 2004
Libro electrónico