Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,228
- Història 1,562
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 570
- Mapes 494
- Fonts 482
- Application software 475
- Documents pontificis 414
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 299
- Data processing 295
- Fonts històriques 283
- Color 277
- Crítica e interpretación 277
- Documentos 269
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
29561Publicado 2022Tabla de Contenidos: “…-- How to Contact the Publisher -- Chapter 1 Security Operations and Administration -- Comply with Codes of Ethics -- Understand, Adhere to, and Promote Professional Ethics -- (ISC)2 Code of Ethics -- Organizational Code of Ethics -- Understand Security Concepts -- Conceptual Models for Information Security -- Confidentiality -- Integrity -- Availability -- Accountability -- Privacy -- Nonrepudiation -- Authentication -- Safety -- Fundamental Security Control Principles -- Access Control and Need-to-Know -- Job Rotation and Privilege Creep -- Document, Implement, and Maintain Functional Security Controls -- Deterrent Controls -- Preventative Controls -- Detective Controls -- Corrective Controls -- Compensating Controls -- The Lifecycle of a Control -- Participate in Asset Management -- Asset Inventory -- Lifecycle (Hardware, Software, and Data) -- Hardware Inventory -- Software Inventory and Licensing -- Data Storage -- Implement Security Controls and Assess Compliance -- Technical Controls -- Physical Controls -- Administrative Controls -- Periodic Audit and Review -- Participate in Change Management -- Execute Change Management Process -- Identify Security Impact -- Testing/Implementing Patches, Fixes, and Updates -- Participate in Security Awareness and Training -- Security Awareness Overview -- Competency as the Criterion -- Build a Security Culture, One Awareness Step at a Time -- Participate in Physical Security Operations…”
Libro electrónico -
29562Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Exploring Various Document Classes -- Preparing your LaTeX tools -- Getting ready -- See also -- Writing a short text -- How to do it... -- How it works... -- See also -- Developing a thesis -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Designing a book -- How to do it... -- How it works... -- There's more... -- See also -- Creating a presentation -- How to do it... -- How it works... -- There's more... -- See also -- Designing a CV -- Getting ready -- How to do it... -- How it works... -- Writing a letter -- How to do it... -- How it works... -- There's more... -- Producing a leaflet -- How to do it... -- How it works... -- There's more... -- Building a large poster -- How to do it... -- How it works... -- There's more... -- Chapter 2: Tuning the Text -- Improving justification and hyphenation -- How to do it... -- How it works... -- Adding margin notes -- How to do it... -- How it works... -- There's more... -- Converting numbers to words -- How to do it... -- How it works... -- There's more... -- Putting text into a colorful box -- How to do it... -- How it works... -- There's more... -- Visualizing the layout -- How to do it... -- How it works... -- There's more... -- Visualizing boxes of letters and symbols -- How to do it... -- How it works... -- Typesetting in a grid -- How to do it... -- How it works... -- There's more... -- Absolute positioning of text -- How to do it... -- How it works... -- There's more... -- Adding drop caps -- How to do it... -- How it works... -- There's more... -- Fitting text to a shape -- How to do it... -- How it works... -- There's more... -- Creating a pull quote -- How to do it... -- How it works... -- There's more... -- Chapter 3: Adjusting Fonts -- Using standard font commands…”
Libro electrónico -
29563Publicado 2024Tabla de Contenidos: “…-- Catalog and contract document design -- Set up Cosmos DB -- Write the integration code -- Searching contracts and data assets -- Put the pieces together -- Summary -- Chapter 9: Data Quality Management -- Why is data quality important? …”
Libro electrónico -
29564Publicado 2024Tabla de Contenidos: “…-- Common integrations -- Sales solutions -- Marketing solutions -- Customer Support systems -- Finance and accounting systems -- Document generation -- eSignature -- Data enrichment -- Customer Data Platforms -- Systems integrations overview -- Types of integrations -- Key considerations -- Transformation and mapping -- Who should be involved? …”
Libro electrónico -
29565Publicado 2024Tabla de Contenidos: “…The chaincode -- Deployment -- Summary -- Further reading -- Chapter 5: Hosting a Blockchain Network on Elastic Kubernetes Service -- Technical requirements -- Introduction to Hyperledger Fabric on EKS -- Architecture and components -- Dynamic scalability -- Container orchestration -- Resilience and high availability -- Creating an EKS cluster for hosting the Hyperledger Fabric blockchain -- Deploying a Hyperledger Fabric blockchain network on EKS -- Persistent Storage -- Fabric components -- Common deployment challenges -- Key considerations - Security, scaling, and monitoring -- Enterprise deployments -- Security -- High availability -- Scaling -- Testing and troubleshooting a Hyperledger Fabric blockchain network on EKS -- Summary -- Further reading -- Chapter 6: Building Records with Amazon Quantum Ledger Database -- Introduction to Amazon Quantum Ledger Database -- Architecture -- QLDB and blockchain -- Use cases for blockchain -- Creating a QLDB instance -- Troubleshooting -- Creating the ledger from the AWS Management Console -- Using AWS Command-Line Interface -- Using the AWS SDK for Python -- Data modeling in QLDB -- Data modeling pitfalls to avoid -- Data model for a blockchain supply chain application -- Best practices for data modeling -- Creating a document -- Referencing and embedding documents -- Indexing -- Versioning -- Managing data history -- Querying data in QLDB -- CRUD operations -- Executing queries programmatically -- Data verification -- Common query access patterns -- Key considerations for security, scalability, and monitoring -- Security -- Scalability -- Monitoring -- Summary -- Further reading -- Part 3: Deploying and Implementing Blockchain Solutions on Azure -- Chapter 7: Hosting a Corda DLT Network on Azure Kubernetes Service -- Technical requirements -- Understanding Corda and AKS -- Key features of Corda DLT…”
Libro electrónico -
29566por Pinto, RohanTabla de Contenidos: “…-- Educating the user about informed consent -- Understanding informed consent -- Legal and regulatory frameworks for informed consent -- Challenges and limitations of informed consent -- Improving informed consent -- The future of informed consent -- The re-purposed data problem -- Privacy by design -- The Personal Information Protection and Electronic Documents Act (PIPEDA) -- The role of consent in other jurisdictions -- Challenges to meaningful informed consent -- Alternatives to consent -- Enforcement models in informed consent -- The future of privacy -- Summary -- Chapter 8: IAM - the Security Perspective -- IAM security fundamentals -- IAM principals -- Access control models and frameworks -- Identity governance and administration -- Identity lifecycle management -- Threat detection and IAM security -- Security information and event management -- Repercussions of a weak SIEM system -- Compliance and regulatory considerations -- Importance of compliance in IAM -- Key regulations and compliance frameworks -- Challenges and risks in IAM compliance -- Future trends in IAM compliance -- Emerging technologies in IAM security -- Challenges and future directions in IAM security -- Summary -- Part 3 - Digital Identity Era: The Near Future -- Chapter 9: Self-Sovereign Identity -- Introduction to SSI -- Why SSI matters -- Cryptography in SSI…”
Publicado 2024
Libro electrónico -
29567Publicado 2024Tabla de Contenidos: “…-- Taking the driver's seat -- Our wins - embracing outsourcing as a key enabler -- Building trust and partnership -- Educational foundations -- Documentation and pilot projects - essential tools -- Fostering quality, upskilling, and collaboration -- Choosing your approach -- Contracts and KPIs - the triple-A approach -- Navigating challenges and pitfalls -- Evolution of outsourcing and insourcing -- Outsourcing data engineering and beyond -- Embracing outsourced education and data literacy -- Data science - a selective outsourcing strategy -- Outsourcing innovation and incubations -- Achieving maximum performance - nearshore versus offshore…”
Libro electrónico -
29568Publicado 2017Tabla de Contenidos: “…4.6.2 SMS and Control Measures -- 4.6.3 Operational Aspects in SMS -- 4.6.4 MOC -- 4.6.5 SMS Performance Standard -- 4.7 Conclusion -- LIST OF ABBREVIATIONS -- References -- Further Reading -- III - Qualitative Hazard Analysis -- 1.0 PRELIMINARY HAZARD ANALYSIS -- 1.1 Preliminary Hazard Analysis Definitions and Necessity -- 1.2 Preliminary Hazard: Goals and Characteristics -- 1.2.1 Goal of PrHA -- 1.2.2 Characteristics of PrHA -- 1.3 Scope and Boundary Definition -- 1.4 Hazard Identification -- 1.4.1 Common Sources of Hazards -- 1.4.2 Information Related to Hazard Identification -- 1.4.3 Preliminary Hazard List -- 1.5 Data Collection -- 1.5.1 Specification -- 1.5.2 Design Review Interactive Sessions -- 1.5.3 Detail Engineering Drawings and Schematics -- 1.5.4 Previous Analyses and Lessons Learnt -- 1.5.5 Interview -- 1.5.6 Miscellaneous Other Sources -- 1.6 Scenario Development and Classification -- 1.7 Preliminary Hazard Analysis Methodology -- 1.7.1 Consequence Analysis -- 1.7.2 Likelihood Analysis -- 1.7.3 Categorizing and Risk Ranking -- 1.7.4 Conduct Review -- 1.7.5 Safety/Control Measures -- 1.7.6 Decision Making -- 1.8 Output and Results -- 1.9 Further Discussions -- 1.9.1 Timing and Software Issues -- 1.9.2 Common Hazard With Effects and Controls -- 2.0 "WHAT IF" AND "WHAT IF" CHECKLIST ANALYSIS -- 2.1 Characteristic Features and Purpose -- 2.2 Scope and Boundary -- 2.3 The Team -- 2.4 Documents and Information -- 2.5 Planning and Preparation Stage -- 2.6 Outline of Procedure -- 2.7 Result and Documentation -- 2.8 Application Notes -- 2.9 Discussions -- 3.0 CHECKLIST ANALYSIS -- 3.1 Checklist Characteristic Features -- 3.2 Purpose of the Checklist -- 3.3 Scope and Boundary -- 3.4 Prereview Preparation -- 3.5 The Analysis -- 3.6 Common Checklist -- LIST OF ABBREVIATIONS -- References -- Further Reading -- IV - Guided Word Hazard Analysis…”
Libro electrónico -
29569Publicado 2005Tabla de Contenidos: “…Introduction to IBM Lotus Workplace 2.0.1 -- 1.1 Overview of Lotus Workplace 2.0.1 -- 1.1.1 IBM Lotus Workplace Messaging -- 1.1.2 IBM Lotus Workplace Team Collaboration -- 1.1.3 IBM Lotus Workplace Collaborative Learning -- 1.1.4 IBM Lotus Workplace Documents -- 1.1.5 IBM Lotus Workplace Builder and applications -- 1.1.6 IBM Lotus Workplace Web Content Management -- 1.1.7 IBM Workplace Client Technology -- 1.2 Architectural overview -- 1.3 Overview of the installation process -- 1.4 Foundation products overview -- 1.4.1 WebSphere Application Server -- 1.4.2 WebSphere Portal -- 1.4.3 IBM DB2 UDB -- 1.4.4 LDAP -- 1.5 Structure of this book -- Chapter 2. …”
Libro electrónico -
29570por Gavin, LeeTabla de Contenidos: “…The Message Repository Manager (MRM) -- 15.1 Business scenario -- 15.2 Overview of the MRM -- 15.2.1 Repository -- 15.2.2 Message set project -- 15.2.3 Message set -- 15.2.4 Message definition files -- 15.2.5 Message category files -- 15.2.6 Model importers -- 15.2.7 Model editors -- 15.2.8 Model generators -- 15.2.9 Model validators -- 15.3 Creating the message set -- 15.4 Modeling the existing message -- 15.4.1 Message modeling concepts -- 15.4.2 Global and local objects -- 15.4.3 Simple types available for modeling -- 15.4.4 Initial logical message model -- 15.4.5 Initial implementation design decisions -- 15.5 Creating the message definition -- 15.5.1 Creating the message definition file -- 15.5.2 Creating the message -- 15.6 Generating external information -- 15.6.1 Message dictionary generation -- 15.6.2 Message set documentation generation -- 15.6.3 XML Schema generation -- 15.6.4 Web Service Definition Language generation -- 15.7 Generating internal documentation for the model -- 15.7.1 Generating message set documentation as HTML -- 15.7.2 Generating XML Schemas -- 15.8 Message model importers -- 15.8.1 Consideration for importing COBOL and C structures -- 15.8.2 Considerations for importing XML schema and XML DTD files -- 15.9 Importing an XML Schema -- 15.10 Namespaces -- 15.10.1 The message model -- 15.11 Creating the new message set with namespaces -- 15.12 New message design -- 15.13 Creating namespaced message definition files -- 15.14 Value constraints -- 15.14.1 Length constraints -- 15.14.2 Range constraints -- 15.14.3 Enumeration constraints -- 15.14.4 Precision constraints -- 15.14.5 Pattern constraints -- 15.15 Populating the Passenger message definition -- 15.15.1 Creating a global simple type -- 15.15.2 Referencing a global type…”
Publicado 2004
Libro electrónico -
29571Publicado 2020Tabla de Contenidos: “…-- 1.5 Executing a network penetration test -- 1.5.1 Phase 1: Information gathering -- 1.5.2 Phase 2: Focused penetration -- 1.5.3 Phase 3: Post-exploitation and privilege escalation -- 1.5.4 Phase 4: Documentation -- 1.6 Setting up your lab environment -- 1.6.1 The Capsulecorp Pentest project -- 1.7 Building your own virtual pentest platform -- 1.7.1 Begin with Linux -- 1.7.2 The Ubuntu project -- 1.7.3 Why not use a pentest distribution? …”
Libro electrónico -
29572Publicado 2019Tabla de Contenidos: “…379 -- Bibliographie 383 -- 1 Documents. 383 -- 2 Littérature secondaire407 -- Glossaire. 425 -- 1 Personnalités . 425 -- 2 Organisations . 429 -- Annexes -- Annexe I: Tableau chronologique (1960-2013) des accords et des documents officiels pris en compte dans l'analyse par arène de négociation 439 -- Annexe II: Liste des mots clés utilisés dans les recherches 441 -- Annexe III: Nombre des documents trouvés en fonction -- des organisations et des tranches temporelles 443 -- Annexe IV: Liste des entretiens réalisés . 445 -- Liste des figures et des tableaux . 447.…”
Libro electrónico -
29573Publicado 2006Tabla de Contenidos: “…Weaver -- Managing the center: the director as coach / M. Mattison -- Documentation strategies and the institutional socialization of writing centers / B. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
29574por Marti Sentanes, EstherTabla de Contenidos: “…Bibliografia; 11. Apèndix documental; 12. Índex d'il·lustracions…”
Publicado 2006
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
29575por Teso, Pablo delTabla de Contenidos: “…El equipo de producción ejecutivaEstándares de calidad según la Metodología DPA; 3.1.4 | El Guionista-Editor; El Guionista-Editor como Consultor; El Guionista-Editor como Co-autor; El Guionista-Editor como Gerente; Estándares de calidad según la Metodología DPA; El equipo de desarrollo de guión; El Guionista; El Guionista y el Guionista-Editor como autores de la película; El guión de un documental; Estándares de calidad según la Metodología DPA; El Jefe de Investigación; Las áreas de investigación; El equipo de Investigación de Guión; Estándares de calidad según la Metodología DPA…”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29576Publicado 2013Tabla de Contenidos: “…; LOS TRATADOS DE UTRECHT Y EL NUEVO ORDEN EN OCCIDENTE; Introducción; El fin de los Habsburgos Españoles y la llegada de una nueva dinastía; La Guerra de Sucesión Española; Los Tratados de Utrecht; El balance de la Guerra; UNA CONSECUENCIA DE UTRECHT.EL TRATADO DE RASTADT DE 1714 Y EL RETORNO AL REEQUILIBRIO EN EUROPA; Introducción; El cambio de circunstancias; El reequilibrio continental del siglo XVIII: el Tratado de Rastadt; Apéndice documental; Año 1714 Decreto imperial de Comisión…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29577por Morales Pérez, SoledadTabla de Contenidos: “…La temporalització i les eines de la planificació; 2.1. Documents i eines per a la planificació: el calendari de producció; 3. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
29578por Jiménez Cavallé, PedroTabla de Contenidos: “…GARAY; CLONCLUSIONES; APÉNDICE DOCUMENTAL; 1. Fe de Bautismo del Expediente de limpieza de sangre…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29579
Manuscrito -
29580Publicado 2014Tabla de Contenidos: “…. - L'ACTION JUDICIAIRE DE LA CHANCELLERIE; L'action efficace de la justice contre les usures; a) Les divers types de procès; b) Des résultats rapidement obtenus; c) Les effets de la centralisation barcelonaise; Le temps des procès : logique de la documentation; L'écriture et la présentation des enquêtes…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull)Lectura limitada a 1 usuario concurrente.
Libro electrónico