Mostrando 6,821 - 6,840 Resultados de 14,132 Para Buscar '"FEDER"', tiempo de consulta: 0.20s Limitar resultados
  1. 6821
    por Pérez Chávez, José
    Publicado 2019
    Tabla de Contenidos: “…Intro -- CONTENIDO -- ABREVIATURAS -- INTRODUCCION -- Capítulo I Generalidades del Derecho del trabajo -- Principios generales -- El Derecho del trabajo y los principios constitucionales -- Origen y estructura de la Ley Federal del Trabajo -- Características del Derecho del trabajo -- Principales conceptos -- Capítulo II Relaciones individuales de trabajo -- La relación laboral y sus formalidades -- Requisitos de los contratos de trabajo -- Modalidades de los contratos establecidas en la LFT -- Modificación de las condiciones generales de trabajo -- ¿Cuándo es admisible la modificación de las condiciones de trabajo? …”
    Libro electrónico
  2. 6822
    por Pérez Chávez, José
    Publicado 2019
    Tabla de Contenidos: “…Obligaciones fiscales -- Inscripción en el Registro Federal de Contribuyentes (RFC) -- Llevar contabilidad -- Expedir comprobantes fiscales -- Expedir comprobantes fiscales de pagos efectuados a residentes en el extranjero -- Formulación del estado de posición financiera -- Presentar declaración anual -- Presentar declaraciones informativas -- Obtener y conservar documentación comprobatoria de operaciones celebradas con partes relacionadas residentes en el extranjero -- Por el pago de dividendos -- Llevar un control de los inventarios -- Información por operaciones superiores a 100,000.00 -- Información por préstamos, aportaciones o aumentos de capital -- Llevar una cuenta de capital de aportación -- Llevar una cuenta de utilidad fiscal neta -- B. …”
    Libro electrónico
  3. 6823
    por Vanderburg, Eric A.
    Publicado 2021
    Tabla de Contenidos: “…Maintenance Automation -- Monitoring Techniques -- Collector Protocols and Methods -- Tagging -- Log Analysis -- Baselines -- Thresholds -- Trending -- Automated Event Responses -- Log Scrubbing -- Verification of Continuous Monitoring Activities -- Management Tools -- Chapter Review -- Questions -- Answers -- Chapter 11 Security in the Cloud -- Data Security -- Encryption -- Public Key Infrastructure -- Encryption Protocols -- Tunneling Protocols -- Ciphers -- Storage Security -- Protected Backups -- Network Security -- Segmentation -- Firewall -- DDoS Protection -- Packet Capture -- Network Flow -- IDS/IPS -- Packet Broker -- APIs -- Effects of Cloud Service Models on Security Implementation -- Endpoint Protection -- Host-Based Firewall -- Antivirus/Antimalware -- Endpoint Detection and Response -- Data Loss Prevention -- Exercise 11-1: Creating a DLP Policy for Office 365 -- NAC -- Hardening -- Application Whitelisting -- Impact of Security Tools to Systems and Services -- Access Control -- Identification -- Authentication -- Authorization -- Single Sign-On -- Federation -- Access Control Protocols -- Access Control Methodologies -- Multifactor Authentication -- Chapter Review -- Questions -- Answers -- Chapter 12 Security Best Practices -- Cloud Security Engineering -- Implementing Layered Security -- Protecting Against Availability Attacks -- Least Privilege -- Separation of Duties -- Security Automation -- Security Governance and Strategy -- Developing Company Security Policies -- Account Management Policies -- Documenting Security Procedures -- Assessment and Auditing -- Leveraging Established Industry Standards and Regulations -- Applying Platform-Specific Security Standards -- Data Classification -- Legal Holds -- Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365 -- Keeping Employees and Tools Up to Date…”
    Libro electrónico
  4. 6824
    por OECD
    Publicado 2020
    Tabla de Contenidos: “…Policy and implementation -- Federal policies: -- Policies in the Wallonia region (SPW) -- Environment -- Labour rights -- People with disabilities and long-term unemployed -- Policies of the Flemish community -- Environment -- Labour rights -- Strategic frameworks -- 2. …”
    Libro electrónico
  5. 6825
    Publicado 2002
    Tabla de Contenidos: “…Rareté des mécanismes de coordination des politiques dans les fédérations -- Notes -- Glossaire des abréviations -- Bibliographie -- Annexe I. …”
    Libro electrónico
  6. 6826
    Publicado 2015
    Tabla de Contenidos: “…The Hadoop Distributed Filesystem -- The Design of HDFS -- HDFS Concepts -- Blocks -- Namenodes and Datanodes -- Block Caching -- HDFS Federation -- HDFS High Availability -- The Command-Line Interface -- Basic Filesystem Operations -- Hadoop Filesystems -- Interfaces -- The Java Interface -- Reading Data from a Hadoop URL -- Reading Data Using the FileSystem API -- Writing Data -- Directories -- Querying the Filesystem -- Deleting Data -- Data Flow -- Anatomy of a File Read -- Anatomy of a File Write -- Coherency Model -- Parallel Copying with distcp -- Keeping an HDFS Cluster Balanced -- Chapter 4. …”
    Libro electrónico
  7. 6827
    Publicado 2016
    Tabla de Contenidos: “…Getting Started -- Getting Started with Sample Reports Projects -- Report Groups -- Adding Totals to a Table or Matrix Report -- Expression Basics -- Introducing Aggregate Functions and Totals -- Sorting -- Exercise -- Design the Dataset Query -- Design and Lay Out a Table Report -- Add Summary Totals and Drill-Down -- Aggregate Detail Row Summaries -- Create Parameter List -- Summary -- Part III: Advanced and Analytic Reporting -- Chapter 7: Advanced Report Design -- Pagination and Flow Control -- Headers and Footers -- Tablix Headers and Detail Cells -- Designing the Page Headers -- Composite Reports and Embedded Content -- Unlocking the Textbox -- Padding and Indenting -- Embedded Formatting -- Designing Master/Detail Reports -- Repeating Data Regions: Table, Matrix, and List -- Groups and Dataset Scope -- More Aggregate Functions and Totals -- Designing Subreports -- Federating Data with a Subreport -- Navigating Reports -- Creating a Document Map -- Exercises -- Exercise 1: Create a Report Template -- Exercise 2: Create a Report from the Template with Dynamic Expressions -- Summary -- Chapter 8: Graphical Report Design -- Visual Design Principles -- Keep Charts Simple -- Properties, Oh My! …”
    Libro electrónico
  8. 6828
    Publicado 2021
    Tabla de Contenidos: “…Front Cover -- Title Page -- Copyright Page -- About the Authors -- Brief Contents -- Detailed Contents -- Applying Macroeconomics to the Real World -- Symbols Used in This Book -- Preface -- Part 1 Introduction -- Chapter 1 Introduction to Macroeconomics -- 1.1 What Macroeconomics Is About -- Long-Run Economic Growth -- Business Cycles -- Unemployment -- Inflation -- The International Economy -- Macroeconomic Policy -- Aggregation -- 1.2 What Macroeconomists Do -- Macroeconomic Forecasting -- Macroeconomic Analysis -- Macroeconomic Research -- Data Development -- In Touch with Data and Research: Developing and Testing an Economic Theory -- 1.3 Why Macroeconomists Disagree -- Classicals Versus Keynesians -- A Unified Approach to Macroeconomics -- Chapter 2 The Measurement and Structure of the National Economy -- 2.1 National Income Accounting: The Measurement of Production, Income, and Expenditure -- In Touch with Data and Research: The National Income and Product Accounts in Malaysia -- Why the Three Approaches Are Equivalent -- 2.2 Gross Domestic Product -- The Product Approach to Measuring GDP -- In Touch with Data and Research: Natural Resources, the Environment, and the National Income Accounts -- The Expenditure Approach to Measuring Gdp -- The Income Approach to Measuring GDP -- 2.3 Saving and Wealth -- Measures of Aggregate Saving -- The Uses of Private Saving -- Relating Saving and Wealth -- 2.4 Real GDP, Price Indexes, and Inflation -- Real GDP -- Price Indexes -- In Touch with Data and Research: The Computer Revolution and Chain-Weighted GDP -- In Touch with Data and Research: CPI Inflation Versus Core Inflation -- Application The Federal Reserve's Preferred Inflation Measures -- 2.5 Interest Rates -- Part 2 Long-Run Economic Performance -- Chapter 3 Productivity, Output, and Employment…”
    Libro electrónico
  9. 6829
    Publicado 2004
    Tabla de Contenidos: “…Fundamental concepts in process integration -- 2.1 The need for a unifying technique -- 2.1.1 Similarities between intra- and inter-enterprise integration -- 2.1.2 Summary -- 2.2 Process integration concepts and notations -- 2.2.1 Collaboration and interaction -- 2.2.2 Connectors and adapters -- 2.2.3 Classification of interaction between subsystems -- 2.3 QoS capabilities framework -- 2.3.1 Operability -- 2.3.2 Availability -- 2.3.3 Federation -- 2.3.4 Performance -- 2.3.5 Security -- 2.3.6 Standards compliance -- 2.3.7 Transactionality -- 2.4 Application patterns for Application Integration -- 2.5 Application patterns for Extended Enterprise -- 2.6 Summary -- Chapter 3. …”
    Libro electrónico
  10. 6830
    Publicado 2024
    Tabla de Contenidos: “…Understanding ABAC -- Other access control models for multi-account environments -- Choosing the right access control model -- Managing IAM identities -- Managing both human and non-human identities -- Types of credentials and their use cases -- IAM users, groups, and roles -- External identities and federation in AWS -- Comparing IAM identity types -- Managing IAM policies -- Understanding IAM policies -- Creating and managing IAM policies -- Advanced IAM policy use cases -- IAM in multi-account deployments -- Challenges with managing large-scale IAM deployments -- Centralized IAM management -- Cross-account access -- Sharing resources at scale -- Automating IAM implementation in a DevOps world -- Best practices for multi-account IAM -- Summary -- Questions -- Answers -- Further reading -- Chapter 4: Data Protection - Encryption, Key Management, and Data Storage Best Practices -- AWS encryption mechanisms and services -- AWS approach to encryption -- Types of encryption supported by AWS -- The AWS Encryption SDK -- Key features -- Managing cryptographic keys -- Key management services in AWS -- KMS in-depth overview -- CloudHSM integration and use cases -- Compliance in AWS key management -- Data protection in key AWS services -- S3 buckets -- EBS volumes -- EFS filesystems -- RDS databases -- DynamoDB tables -- Data protection in other AWS services -- Unified data protection strategy -- Summary -- Questions -- Answers -- Further reading -- Chapter 5: Introduction to AWS Security Services -- Unpacking threat and vulnerability detection -- GuardDuty-your AWS security sentinel -- Detective-your AWS security analyst -- Inspector-your AWS security auditor -- CloudTrail Lake and Security Lake-your AWS analytics powerhouses -- Best practices for threat and vulnerability detection -- Managing security governance and compliance…”
    Libro electrónico
  11. 6831
    Publicado 2021
    Tabla de Contenidos: “…Considering a social enterprise -- Encouraging intrapreneurship -- Chapter 6 Preparing the Business Plan -- Finding a Reason to Write a Business Plan -- Building confidence -- Testing your ideas -- Showing how much money you need -- Providing planning experience -- Satisfying financiers' concerns -- Writing Up Your Business Plan -- Defining your readership -- Creating the plan -- Maintaining confidentiality -- Doing due diligence -- Using Business Planning Software -- Recognising the limits of software -- Reviewing packages -- Presenting Your Plan -- Starring in show time -- Handling feedback -- Making an elevator pitch -- Chapter 7 Getting Help -- Connecting with Government Services -- Accessing national government support -- Relating to a region -- Choosing Small Business Associations -- The Federation of Small Businesses -- Forum of Private Business -- The British Chambers of Commerce -- A few more strings to your bow -- Universities and Colleges -- Entering an Incubator -- Finding the right type of incubator -- Getting into an incubator -- Considering the cost -- Finding out more -- Assisting Inventors -- Chapter 8 Finding the Money -- Assessing How Much Money You Need -- Projecting receipts -- Estimating expenses -- Working out the closing cash balances -- Setting out your cash-flow projection -- Testing your assumptions -- Reviewing Your Financing Options -- Deciding between debt capital and equity capital -- Examining your own finances -- Determining the Best Source of Finance for You -- Considering the costs -- Sharing ownership and control -- Limiting personal liability -- Going for Debt -- Borrowing from banks -- Going with the government -- Financing cash flow -- Getting physical -- Uniting with a credit union -- Borrowing from family and friends -- Sharing Out the Spoils -- Benefiting from business angels -- Playing to the crowd…”
    Libro electrónico
  12. 6832
    Publicado 2024
    Tabla de Contenidos: “…Poisoning-assisted inference -- Attack scenarios -- Mitigations -- Example attribute inference attack -- Membership inference attacks -- Statistical thresholds for ML leaks -- Label-only data transferring attack -- Blind membership inference attacks -- White box attacks -- Attack scenarios -- Mitigations -- Example membership inference attack using the ART -- Summary -- Chapter 10: Privacy-Preserving AI -- Privacy-preserving ML and AI -- Simple data anonymization -- Advanced anonymization -- K-anonymity -- Anonymization and geolocation data -- Anonymizing rich media -- Differential privacy (DP) -- Federated learning (FL) -- Split learning -- Advanced encryption options for privacy-preserving ML -- Secure multi-party computation (secure MPC) -- Homomorphic encryption -- Advanced ML encryption techniques in practice -- Applying privacy-preserving ML techniques -- Summary -- Part 4: Generative AI and Adversarial Attacks -- Chapter 11: Generative AI - A New Frontier -- A brief introduction to generative AI -- A brief history of the evolution of generative AI -- Generative AI technologies -- Using GANs -- Developing a GAN from scratch -- WGANs and custom loss functions -- Using pre-trained GANs -- Pix2Pix -- CycleGAN -- Pix2PixHD -- Progressive Growing of GANs (PGGAN) -- BigGAN -- StarGAN v2 -- StyleGAN series -- Summary -- Chapter 12: Weaponizing GANs for Deepfakes and Adversarial Attacks -- Use of GANs for deepfakes and deepfake detection -- Using StyleGAN to generate convincing fake images -- Creating simple deepfakes with GANs using existing images -- Making direct changes to an existing image -- Using Pix2PixHD to synthesize images -- Fake videos and animations -- Other AI deepfake technologies -- Voice deepfakes -- Deepfake detection -- Using GANs in cyberattacks and offensive security -- Evading face verification…”
    Libro electrónico
  13. 6833
    Publicado 2011
    Tabla de Contenidos: “…Moller Architects ; Koge Kyst Denmark / Topotek 1 ; InfoBox BHF / Caramel architekten ZT GMBH ; Taringa Transit Oriented Design / Suters Architects ; City interventions in Prague / Sporadical architektonická kancelár ; Reykjavik city center Kvos / Argos Gullinsniđ, Studio Granada ; East Darling Harbour / Suters Architects ; Europan 10 / Eriksen Skajaa Architects ; Federal Archives Berlin (Bundesarchiv)/ 100Landschaftsarchitektur ; King George Square / Suters Architects ; Neugestaltung Marktplatz Mönchengladbach - Rheydt / Topotek 1; Croydon's Wellesley road - Park Lane / Hawkins - Brown ; Erlebnisraum Römerstrasse / Kadawittfeld architektur ; Takoma Park Sidewalk competition / Studio27 (Studio twentyseven architecture) ; Park auf der Harburger Schlossinsel / Topotek 1 ; Arco de Bicentenario / JSa - Javier Sánchez ; Enbankment of the drava River Maribor EPK 2012 / Atelier Tekuto ; University of California San Diego - East Campus Health Sciences Parking Structure / Pugh + Scarpa Architects Inc. ; Landschaftspark erftstadt (Archaelogical Landscape Park) / 1100Landschaftsarchitektur ; Tucson Gateway Competition / Linde and Space, LLC ; The urban shed competition (Butterfly wing) / Jordan Parnass Digital Architecture ; "R(H)Ein-Blicke" Im Unesco-Welterbe Oberes Mittelrheintal / 100 Landschaftsarchitektur ; Innovative design competition for the central waterfront / West8, Dutoit Allsopp Hillier, Schollen & Company, Diamond & Schmitt Architects, Arup, Halsall Associates, David Dennis Design ; Byens ø -Kultur Og Oplevelses Omrade (Cultural Harbour) / Cornelius + Vöge…”
    Libro
  14. 6834
    por Eeckhout, A.
    Publicado 1910
    Libro
  15. 6835
    por Crespo, Miguel
    Publicado 2002
    Libro
  16. 6836
    Publicado 1984
    Libro
  17. 6837
    Publicado 1969
    Libro
  18. 6838
    Libro
  19. 6839
    Publicado 1999
    Libro
  20. 6840
    Publicado 1977
    Revista