Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,228
- Història 1,562
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 570
- Mapes 494
- Fonts 482
- Application software 475
- Documents pontificis 414
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 299
- Data processing 295
- Fonts històriques 283
- Color 277
- Crítica e interpretación 277
- Documentos 269
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
29981Publicado 2021Tabla de Contenidos: “…Applying Windows hardening -- Hardening by the infrastructure team -- Creating a hardening checklist -- Creating a patching strategy -- The complexity of patching -- Distribution of tasks (patching roles and assignments) -- Distribution and deployment of patches -- Types of patches -- Applying security to AD -- Secure administrative hosts -- Windows Server Security documentation -- Mastering endpoint security -- Windows updates -- Why move to Windows 10? …”
Libro electrónico -
29982Publicado 2022Tabla de Contenidos: “…Employee Retirement Income Security Act -- Patient Protection and Affordable Care Act -- Laws Administered by the Department of Homeland Security or the Department of Justice -- H2A Temporary Agricultural Workers -- Immigration and Nationality Act -- Miscellaneous Laws and Concepts -- Drug Free Workplace Act -- Garnishment of Wages -- Harassment -- Lilly Ledbetter Fair Pay Act -- LGBTQ Sex-Based Discrimination -- Retaliation -- Sexual Harassment -- Worker Adjustment and Retraining Notification Act -- Retention of Documents -- SHRM-SCP Only -- Summary -- Key Terms -- Exam Essentials -- Review Questions -- Part 5 The Organization Knowledge Domain -- Chapter 15 Structure of the HR Function -- Exam Notables -- The SHRM Exam Objectives -- Human Resources as a Core Competency -- The Role of Human Resources -- HR's Job -- Integrating Human Resources -- Human Resource Service Models -- Centralized/Decentralized HR Structures -- Outsourcing -- Measuring Human Resource Contributions -- Competency and Knowledge Alignment -- Delivering Messages -- Exchanging Organizational Information -- Listening -- Networking -- Relationship Building -- SHRM SCP Only -- Summary -- Key Terms -- Exam Essentials -- Review Questions -- Chapter 16 Organizational Effectiveness and Development -- Exam Notables -- The SHRM Exam Objectives -- Organizational Effectiveness and Development Defined -- People Interventions -- Individual Behaviors -- Group and Team Dynamics -- Process Interventions -- International Organization for Standardization -- Structural Interventions -- Customer or Product -- Functional -- Geographic -- Matrix -- Managing Change -- Competency and Knowledge Alignment -- Teamwork -- Conflict Management -- SHRM SCP Only -- Summary -- Key Terms -- Exam Essentials -- Review Questions -- Chapter 17 Workforce Management -- Exam Notables -- The SHRM Exam Objectives…”
Libro electrónico -
29983Publicado 2022Tabla de Contenidos: “…Canva Support -- Scribus: The Powerful, Professional, Open Source Desktop Publishing Program -- Feature Highlights -- Design Capabilities -- Scribus Support -- Vectr: A Free, Basic Online Vector Drawing Program -- Feature Highlights -- Graphics Creation -- Vectr Support -- Inkscape: Pro-quality Open Source Vector Drawing Software -- Feature Highlights -- Graphics Creation -- Inkscape Support -- Krita: The Powerful Open Source Digital Drawing and Painting Program -- Feature Highlights -- Document Creation -- Brush Presets -- Krita Support -- FreeCAD: Open Source Parametric 3D Modeling Software -- Feature Highlights -- Drafting Capabilities -- FreeCAD Support -- Blender: The Ultimate Open Source 3D Creation Software -- Feature Highlights -- Rendering Capabilities -- Blender Support -- Summary -- Chapter 4: Photo Editing Software -- PhotoScape: An Easy-to-Use Photo Editor for Beginners -- Feature Highlights -- Tools -- Filters -- Objects -- PhotoScape Support -- Paint.NET: Basic Image Editing for Windows -- Feature Highlights -- Editing Capabilities -- Graphics Creation -- Paint.NET Support -- GIMP: The Premier Open Source Image Editor -- Feature Highlights -- Editing Capabilities -- Graphics Creation -- GIMP Support -- Pixlr: Web-Based and Mobile Device Photo Editing -- Pixlr X -- Pixlr E -- Photomash Studio -- Pixlr Support -- Darktable: An Open Source Photography Workflow Program -- Feature Highlights -- Darktable Support -- FotoSketcher: Automatically Turn Photos into Digital Art -- Feature Highlights -- Editing Capabilities -- FotoSketcher Support -- Summary -- Chapter 5: Audio-Video Capture, Conversion, and Editing Software -- fre:ac (Free Audio Converter): An Open Source Audio CD Ripping Program -- Feature Highlights -- fre:ac Support -- Audacity: A Powerful, Open Source Audio Editor -- Feature Highlights -- Editing Capabilities…”
Libro electrónico -
29984por OECDTabla de Contenidos: “…Tendances récentes en matière d'association des parties prenantes -- Obligation d'association des parties prenantes à l'élaboration des textes législatifs et réglementaires -- Consultation aux différents stades de l'élaboration des textes législatifs et réglementaires -- Documents disponibles à l'appui de l'association des parties prenantes -- Association des parties prenantes à l'évaluation ex post -- Période minimale de consultation du public -- Formes d'association des parties prenantes -- Utilisation des TIC pour associer les parties prenantes aux différents stades de l'élaboration des textes -- Planification réglementaire -- Commentaires issus des consultations : réactions et utilisation -- Analyse d'impact de la réglementation (AIR) -- Tendances récentes en matière d'AIR -- Adoption de l'AIR : obligations formelles et pratique -- Exemptions d'AIR et conséquences -- Tests de seuil pour l'AIR -- Analyse des coûts, des avantages et des effets redistributifs -- Types d'impacts évalués en AIR -- Évaluation ex post -- Tendances récentes de l'évaluation ex post -- Éléments nécessaires à l'évaluation ex post -- Méthodologie de l'évaluation ex post -- Analyses ponctuelles de la réglementation existante conduite dans les 12 dernières années -- Gestion continue de la réglementation -- References -- Chapitre 3. …”
Publicado 2018
Libro electrónico -
29985por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…. -- Résultats obtenus à ce jour -- Note sur les types de documents utilisés dans ce rapport -- Chapitre 2. …”
Publicado 2001
Libro electrónico -
29986por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Le transport intermodal aux Pays- Bas -- Recherche et développement -- Royaume-Uni -- Politique -- Le Livre Blanc sur les transports -- Documents de suivi -- Une politique de distribution durable -- Une politique maritime -- La politique du Royaume-Uni en matière de transport intermodal de marchandises -- Une stratégie pour les principales plates-formes d'échange de marchandises -- Protocole d'accord -- Une politique pour l'aviation -- Une politique pour les ports -- Une politique pour les voies navigables intérieures -- Une politique de planification -- Organisation -- Le gouvernement -- gouvernement régional -- gouvernement local -- Les agences du gouvernement et autres organes gouvernementaux -- Organismes de recherche -- Procédure parlementaire…”
Publicado 2001
Libro electrónico -
29987por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Service public réglementé -- Applications de sûreté et de sécurité -- Applications dans le domaine du transport -- Applications routières -- Aviation civile -- Transport maritime -- Transport ferroviaire -- Applications industrielles -- Les services basés sur la localisation (LBS) -- Assistance personnelle à la navigation pour les mal-voyants -- Assistance aux personnes souffrant de la maladie d'Alzheimer avec perte de mémoire -- Protection de la personne et appels d'urgence -- Surveillance et prédiction des catastrophes -- Optimisation des opérations de secours aux sinistrés de catastrophes -- Applications de maintien de l'ordre et d'établissement de la responsabilité -- Conclusion -- Chapitre 6 - Produits de sécurité : anatomie de la carte d'identité électronique italienne -- Synthèse -- Objectif -- La solution adoptée -- Structure du document -- Impression -- Figure 1. Instruments (solution adoptée) -- Gravure au laser -- Hologramme de sécurité -- Zone à lecture optique -- Figure 2. …”
Publicado 2004
Libro electrónico -
29988Publicado 2016Tabla de Contenidos: “…-- Types of Fund -- Summary -- Part 1 - Introduction to Investment -- Investment environment -- Islamic investment funds -- Investment Objectives -- The Meaning of an Offering or Placement -- The Meaning of a Unit or Share of an AIF -- The Meaning of Investor -- PR 2.3 Minimum Information to be Included in a Prospectus -- Collective Investment Schemes (CIS) and the Investment Management Process -- Unregulated funds -- Asset Classes-Securities, Derivatives, Alternatives -- Investment strategies -- Using derivatives -- Portfolio management -- Investment performance -- Risk versus reward -- Performance ratios -- Alpha Ratio -- Beta Ratio -- Sharpe Ratio -- Treynor Ratio -- Investment management fees and costs -- Annual Management Fees -- Performance Fees -- Initial and Exit Fees -- Summary -- Part 2 - Regulation and Fund Structures -- Overview of regulation -- Regulation and directives -- AIFMD and AIFMs -- EEA Firms -- Retail funds -- UCITS Directive -- Money laundering -- Principles and recommendations -- Fund Structures-Companies, Trusts, Partnerships, Common Funds -- Fund of funds -- Multimanager funds -- Other structures -- Retail funds -- Alternative Investment Funds -- Hedge funds -- Open Ended and Closed Funds -- Fund Jurisdictions -- Key Players in the Operation of a Fund -- Retail/mutual fund custodian -- Fund administration -- Prime broker/brokers -- Setting up a Fund -- Outsourcing -- Documentation and agreements -- Summary…”
Libro electrónico -
29989Publicado 2016Tabla de Contenidos: “…-- Describe typical TOC for an end state EA document created for your earlier engagement -- How do you evaluate architecture conforms to the enterprise architecture? …”
Libro electrónico -
29990Publicado 2019Tabla de Contenidos: “…Issues in the Summarization of a Spoken Document -- 7.6. Tamil Language -- 7.6.1. Tamil Unicode -- 7.7. …”
Libro electrónico -
29991Publicado 2018Tabla de Contenidos: “…-- WinOps -- DevSecOps -- Why DevOps -- Traceability -- Reliability -- Speed -- Test-driven development -- Continuous integration -- Continuous deployment -- Challenges of DevOps -- The value of PowerShell -- Summary -- Questions -- Further reading -- Chapter 10: Creating Your Own PowerShell Repository -- Package management -- Centralization -- Interacting with repositories -- Knowledge management -- Documentation with PlatyPS -- PowerShell repository -- Setup -- Modules -- Signing -- Version control -- PowerShellGet -- Execution -- Dedicated user -- JEA -- Deploying and upgrading -- PowerShellGet -- End user updates -- Automatic updates -- JEA servers -- Summary -- Questions -- Further reading -- Chapter 11: VSCode and PowerShell Release Pipelines -- Configuration -- Interface -- Extensibility -- Preparing for a release pipeline -- Working with different hosts -- Plaster -- Creating templates -- Packaging templates -- PSScriptAnalyzer…”
Libro electrónico -
29992Publicado 2017Tabla de Contenidos: “…Merging SparkR DataFrames -- Using User Defined Functions (UDFs) -- Using SparkR for computing summary statistics -- Using SparkR for data visualization -- Visualizing data on a map -- Visualizing graph nodes and edges -- Using SparkR for machine learning -- Summary -- Chapter 9: Developing Applications with Spark SQL -- Introducing Spark SQL applications -- Understanding text analysis applications -- Using Spark SQL for textual analysis -- Preprocessing textual data -- Computing readability -- Using word lists -- Creating data preprocessing pipelines -- Understanding themes in document corpuses -- Using Naive Bayes classifiers -- Developing a machine learning application -- Summary -- Chapter 10: Using Spark SQL in Deep Learning Applications -- Introducing neural networks -- Understanding deep learning -- Understanding representation learning -- Understanding stochastic gradient descent -- Introducing deep learning in Spark -- Introducing CaffeOnSpark -- Introducing DL4J -- Introducing TensorFrames -- Working with BigDL -- Tuning hyperparameters of deep learning models -- Introducing deep learning pipelines -- Understanding Supervised learning -- Understanding convolutional neural networks -- Using neural networks for text classification -- Using deep neural networks for language processing -- Understanding Recurrent Neural Networks -- Introducing autoencoders -- Summary -- Chapter 11: Tuning Spark SQL Components for Performance -- Introducing performance tuning in Spark SQL -- Understanding DataFrame/Dataset APIs -- Optimizing data serialization -- Understanding Catalyst optimizations -- Understanding the Dataset/DataFrame API -- Understanding Catalyst transformations -- Visualizing Spark application execution -- Exploring Spark application execution metrics -- Using external tools for performance tuning -- Cost-based optimizer in Apache Spark 2.2.…”
Libro electrónico -
29993por Freeman, Adam. authorTabla de Contenidos: “…Understanding the Anatomy of an HTML Element -- Understanding Attributes -- Understanding Element Content -- Understanding Void Elements -- Understanding the Document Structure -- Understanding Bootstrap -- Applying Basic Bootstrap Classes -- Modifying Style Context -- Modifying Sizes -- Using Bootstrap to Style Tables -- Ensuring the Correct Table Structure -- Using Bootstrap to Create Forms -- Using Bootstrap to Create Grids -- Creating Responsive Grids -- Summary -- Chapter 5: JavaScript Primer -- Preparing the Example Project -- Understanding the Script Element -- Using Statements -- Defining and Using Functions -- Defining Functions with Parameters -- Defining Functions That Return Results -- Detecting Functions -- Using Variables and Types -- Using the Primitive Types -- Working with Booleans -- Working with Strings -- Working with Numbers -- Creating Objects -- Using Object Literals -- Using Functions as Methods -- Extending Objects -- Working with Objects -- Detecting Objects -- Reading and Modifying the Property Values -- Enumerating an Object's Properties -- Adding and Deleting Properties and Methods -- Determining Whether an Object Has a Property -- Using JavaScript Operators -- Using Conditional Statements -- The Equality Operator vs. the Identity Operator -- Explicitly Converting Types -- Converting Numbers to Strings -- Converting Strings to Numbers -- Working with Arrays -- Using an Array Literal -- Detecting an Array -- Reading and Modifying the Contents of an Array -- Enumerating the Contents of an Array -- Using the Built-in Array Methods -- Comparing undefined and null Values -- Checking for null or undefined -- Working with Promises -- Working with JSON -- Summary -- Chapter 6: SportsStore: A Real Application -- Getting Started -- Preparing the Data -- Creating the Data Structure -- Adding the Data -- Testing the Data Service…”
Publicado 2014
Libro electrónico -
29994por Clarke, Glen E.Tabla de Contenidos: “…Self Test Answers -- Chapter 13: Maintaining and Supporting a Network -- Network Upgrades -- Installing Patches and Updates -- Exercise 13-1 Patching a System with Windows Update -- Antivirus and Antispyware Software -- Backing Up Network Data -- Exercise 13-2 Backing Up and Restoring Data on a Windows Server -- Providing Fault Tolerance -- Exercise 13-3 Understanding and Configuring Fault Tolerance -- Network Documentation -- Monitoring and Logging -- Certification Sumary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 14: Network Security -- Understanding Attack Types -- Understanding System Security -- Exercise 14-1 Setting Permissions on Registry Keys -- Exercise 14-2 Modifying User Rights on a Windows System -- Exercise 14-3 Implementing Auditing in Windows -- Implementing Network Security -- Exercise 14-4 Enabling a Windows XP/Windows Server 2003 Firewall -- Securing Communication -- Exercise 14-5 Configuring IPsec to Secure Network Traffic -- Disaster Recovery and Fault Tolerance -- Guidelines to Protect the Network -- Certification Sumary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 15: Troubleshooting the Network -- Managing Network Problems -- Exercise 15-1 Using Device Manager -- Network Troubleshooting Methodology -- System or Operator Problems -- Checking Physical and Logical Indicators -- Exercise 15-2 Checking Event Logs -- Exercise 15-3 Using System Monitor -- Network Troubleshooting Resources -- Other Symptoms and Causes of Network Problems -- Network Troubleshooting Tools -- Certification Sumary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Appendix A: About the Download -- Steps to Download MasterExam -- System Requirements -- MasterExam -- CertCam Video Training -- Lab Files -- PDF Lab Book -- Glossary & Exam Objectives -- Help -- Removing Installation -- Technical Support…”
Publicado 2012
Libro electrónico -
29995Publicado 2016Tabla de Contenidos: “…Identify the Subject Drive -- Query the Subject Disk for Information -- Document Device Identification Details -- Query Disk Capabilities and Features with hdparm -- Extract SMART Data with smartctl -- Enable Access to Hidden Sectors -- Remove a DCO -- Remove an HPA -- Drive Service Area Access -- ATA Password Security and Self-Encrypting Drives -- Identify and Unlock ATA Password-Protected Disks -- Identify and Unlock Opal Self-Encrypting Drives -- Encrypted Flash Thumb Drives -- Attach Removable Media -- Optical Media Drives -- Magnetic Tape Drives -- Memory Cards -- Attach Other Storage -- Apple Target Disk Mode -- NVME SSDs -- Other Devices with Block or Character Access -- Closing Thoughts -- Chapter 6: Forensic Image Acquisition -- Acquire an Image with dd Tools -- Standard Unix dd and GNU dd -- The dcfldd and dc3dd Tools -- Acquire an Image with Forensic Formats -- The ewfacquire Tool -- AccessData ftkimager -- SquashFS Forensic Evidence Container -- Acquire an Image to Multiple Destinations -- Preserve Digital Evidence with Cryptography -- Basic Cryptographic Hashing -- Hash Windows -- Sign an Image with PGP or S/MIME -- RFC-3161 Timestamping -- Manage Drive Failure and Errors -- Forensic Tool Error Handling -- Data Recovery Tools -- SMART and Kernel Errors -- Other Options for Failed Drives -- Damaged Optical Discs -- Image Acquisition over a Network -- Remote Forensic Imaging with rdd -- Secure Remote Imaging with ssh -- Remote Acquisition to a SquashFS Evidence Container -- Acquire a Remote Disk to EnCase or FTK Format -- Live Imaging with Copy-On-Write Snapshots -- Acquire Removable Media -- Memory Cards -- Optical Discs -- Magnetic Tapes -- RAID and Multidisk Systems -- Proprietary RAID Acquisition -- JBOD and RAID-0 Striped Disks -- Microsoft Dynamic Disks -- RAID-1 Mirrored Disks -- Linux RAID-5 -- Closing Thoughts…”
Libro electrónico -
29996Publicado 2012Tabla de Contenidos: “…-- Agile Manifesto Values and Principles -- Individuals and Interactions over Processes and Tools -- Working Software over Comprehensive Documentation -- Customer Collaboration over Contract Negotiation -- Responding to Change over Following a Plan -- Agile Methodologies -- Examples…”
Libro electrónico -
29997Publicado 2023Tabla de Contenidos: “…General Data Protection Regulation -- EU-US Safe Harbor -- US Privacy Act of 1974 -- International Cooperation -- Import/Export Restrictions -- Trans-border Data Flow -- Important Laws and Regulations -- US Computer Fraud and Abuse Act -- HIPAA -- United States Breach Notification Laws -- Ethics -- The (ISC)2 Code of Ethics -- The (ISC)2 Code of Ethics Canons in Detail -- Computer Ethics Institute -- IABs Ethics and the Internet -- Information Security Governance -- Security Policy and Related Documents -- Policy -- Components of Program Policy -- Policy Types -- Procedures -- Standards -- Guidelines -- Baselines -- Personnel Security -- Candidate Screening and Hiring -- Onboarding -- Employee Termination -- Security Awareness and Training -- Gamification -- Security Champions -- Access Control Defensive Categories and Types -- Preventive -- Detective -- Corrective -- Recovery -- Deterrent -- Compensating -- Comparing Access Controls -- Risk Analysis -- Assets -- Threats and Vulnerabilities -- Risk=Threat x Vulnerability -- Impact -- Risk Analysis Matrix -- Calculating Annualized Loss Expectancy -- Asset Value -- Exposure Factor -- Single Loss Expectancy -- Annual Rate of Occurrence -- Annualized Loss Expectancy -- Total Cost of Ownership -- Return on Investment -- Budget and Metrics -- Risk Response -- Accept the Risk -- Risk Acceptance Criteria -- Mitigate the Risk -- Transfer the Risk -- Risk Avoidance -- Quantitative and Qualitative Risk Analysis -- The Risk Management Process -- Risk Maturity Modeling -- Security and Third Parties -- Service Provider Contractual Security -- Minimum Security Requirements -- Service Level Agreements and Service Level Requirements -- Attestation -- Right to Penetration Test/Right to Audit -- Supply Chain Risk Management -- Risks Associated With Hardware, Software, and Services -- Vendor Governance -- Acquisitions…”
Libro electrónico -
29998Publicado 2013Tabla de Contenidos: “…Introduction -- 2. Designing documents for a particular audience -- 3. Recipes…”
Libro electrónico -
29999Publicado 2023Tabla de Contenidos: “…Configuring Defender for Endpoint Settings -- Configuring Defender for Endpoint Options -- Integrating Defender for Endpoint with Intune -- Establishing a Service-to-Service Connection -- Enabling Compliance Policy Evaluation -- Enabling App Protection Policy Evaluation -- Configuring a Compliance Policy -- Configuring a Conditional Access Policy -- Onboarding Devices to Defender for Endpoint -- Onboarding Windows Devices -- Onboarding with Intune -- Endpoint Detection and Response (EDR) Policy -- Other Onboarding Alternatives -- Onboarding macOS Devices -- Onboarding a Configuration Profile -- Extensions Configuration Profile -- Full Disk Access Configuration Profile -- Network Filter Configuration Profile -- Notifications Configuration Profile -- Background Services Configuration Profile -- Onboarding iOS Devices -- All Devices -- Supervised Devices -- Unsupervised Devices -- Onboarding Android Devices -- Bring Your Own Device -- Enterprise Enrolled Devices -- Reviewing and Responding to Endpoint Vulnerabilities -- Recommendations -- Remediation -- Inventories -- Weaknesses -- Event Timeline -- Baseline Assessment -- Creating a Security Profile -- Reviewing Assessment Results -- Creating and Managing Exceptions -- Reviewing and Responding to Risks -- Investigate -- Attack Story -- Alerts -- Assets -- Investigations -- Evidence and Response -- Respond -- Taking Actions -- Resolve -- Tuning -- Automate -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 10: Implementing Microsoft Purview Information Protection and Data Lifecycle Management -- Implementing and managing sensitive info types using keywords, keyword lists, or regular expressions -- Managing sensitive information types -- Using keywords -- Using regular expressions -- Using built-in functions -- Using document fingerprinting -- Using Exact Data Match…”
Libro electrónico -
30000Publicado 2023Tabla de Contenidos: “…Understanding how data warehouses are different from databases -- Significance of ETL in data warehouse -- Learning about BigQuery -- Features of BigQuery -- Setting up and configuring a fully managed data warehouse with BigQuery -- Enabling BigQuery from the console -- Creating a BigQuery dataset -- Using an existing public dataset -- Creating a table in the dataset -- Performing simple analytics -- Summary of operational aspects and design considerations -- Summary -- Part 3: Semi-Structured, Unstructured Data, and NoSQL Design -- 6 -- Designing for Semi-Structured Data -- Semi-structured data -- Pros and cons of semi-structured data -- Use cases of semi-structured data -- NoSQL for semi-structured data -- Data structures supported by NoSQL databases -- Firestore and its features -- Setting up Firestore -- Collection -- Document -- Subcollection -- Security -- Client libraries and APIs -- Indexing -- Single-field index -- Composite index -- Collection group query -- Data model considerations -- Hierarchical format -- Denormalized format -- Easy querying with RunQuery API -- API endpoint and method -- The parent parameter -- JSON body format -- StructuredQuery -- The from clause -- The where clause -- Putting the pieces together -- Implementing RunQuery API programmatically -- Summary -- 7 -- Unstructured Data Management -- Use cases -- Processing unstructured data -- Storage options in Google Cloud -- Cloud Storage, classes, and features -- Unstructured data storage with BigQuery -- External sources -- External connections -- Unstructured data analytics with BigQuery -- Summary -- Part 4: DevOps and Databases -- 8 -- DevOps and Databases -- Upgrades, updates, and patching -- Security, privacy, and encryption -- Replication and availability -- Scalability -- Performance and throughput -- SLA, SLI, and SLO -- Data federation…”
Libro electrónico