Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 439
- Historia 357
- Economic conditions 299
- Economics 259
- Economic policy 227
- Economía 223
- Education 212
- General 204
- Politics and government 188
- Social Science 184
- Law 169
- Federalismo 165
- Política y gobierno 162
- Economic history 150
- Political Science 143
- Research 134
- Management 130
- Ciencias políticas 129
- Business & Economics 121
- Law and legislation 120
- Mexico 113
- Finance 111
- Derecho 110
- History and criticism 109
- Study and teaching 109
- Government policy 108
- Sociology 102
- Ciencias Sociales 99
- United States 99
- Derecho constitucional 98
-
6821por Pérez Chávez, JoséTabla de Contenidos: “…Intro -- CONTENIDO -- ABREVIATURAS -- INTRODUCCION -- Capítulo I Generalidades del Derecho del trabajo -- Principios generales -- El Derecho del trabajo y los principios constitucionales -- Origen y estructura de la Ley Federal del Trabajo -- Características del Derecho del trabajo -- Principales conceptos -- Capítulo II Relaciones individuales de trabajo -- La relación laboral y sus formalidades -- Requisitos de los contratos de trabajo -- Modalidades de los contratos establecidas en la LFT -- Modificación de las condiciones generales de trabajo -- ¿Cuándo es admisible la modificación de las condiciones de trabajo? …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
6822por Pérez Chávez, JoséTabla de Contenidos: “…Obligaciones fiscales -- Inscripción en el Registro Federal de Contribuyentes (RFC) -- Llevar contabilidad -- Expedir comprobantes fiscales -- Expedir comprobantes fiscales de pagos efectuados a residentes en el extranjero -- Formulación del estado de posición financiera -- Presentar declaración anual -- Presentar declaraciones informativas -- Obtener y conservar documentación comprobatoria de operaciones celebradas con partes relacionadas residentes en el extranjero -- Por el pago de dividendos -- Llevar un control de los inventarios -- Información por operaciones superiores a 100,000.00 -- Información por préstamos, aportaciones o aumentos de capital -- Llevar una cuenta de capital de aportación -- Llevar una cuenta de utilidad fiscal neta -- B. …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
6823por Vanderburg, Eric A.Tabla de Contenidos: “…Maintenance Automation -- Monitoring Techniques -- Collector Protocols and Methods -- Tagging -- Log Analysis -- Baselines -- Thresholds -- Trending -- Automated Event Responses -- Log Scrubbing -- Verification of Continuous Monitoring Activities -- Management Tools -- Chapter Review -- Questions -- Answers -- Chapter 11 Security in the Cloud -- Data Security -- Encryption -- Public Key Infrastructure -- Encryption Protocols -- Tunneling Protocols -- Ciphers -- Storage Security -- Protected Backups -- Network Security -- Segmentation -- Firewall -- DDoS Protection -- Packet Capture -- Network Flow -- IDS/IPS -- Packet Broker -- APIs -- Effects of Cloud Service Models on Security Implementation -- Endpoint Protection -- Host-Based Firewall -- Antivirus/Antimalware -- Endpoint Detection and Response -- Data Loss Prevention -- Exercise 11-1: Creating a DLP Policy for Office 365 -- NAC -- Hardening -- Application Whitelisting -- Impact of Security Tools to Systems and Services -- Access Control -- Identification -- Authentication -- Authorization -- Single Sign-On -- Federation -- Access Control Protocols -- Access Control Methodologies -- Multifactor Authentication -- Chapter Review -- Questions -- Answers -- Chapter 12 Security Best Practices -- Cloud Security Engineering -- Implementing Layered Security -- Protecting Against Availability Attacks -- Least Privilege -- Separation of Duties -- Security Automation -- Security Governance and Strategy -- Developing Company Security Policies -- Account Management Policies -- Documenting Security Procedures -- Assessment and Auditing -- Leveraging Established Industry Standards and Regulations -- Applying Platform-Specific Security Standards -- Data Classification -- Legal Holds -- Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365 -- Keeping Employees and Tools Up to Date…”
Publicado 2021
Libro electrónico -
6824por OECDTabla de Contenidos: “…Policy and implementation -- Federal policies: -- Policies in the Wallonia region (SPW) -- Environment -- Labour rights -- People with disabilities and long-term unemployed -- Policies of the Flemish community -- Environment -- Labour rights -- Strategic frameworks -- 2. …”
Publicado 2020
Libro electrónico -
6825Publicado 2002Tabla de Contenidos: “…Rareté des mécanismes de coordination des politiques dans les fédérations -- Notes -- Glossaire des abréviations -- Bibliographie -- Annexe I. …”
Libro electrónico -
6826Publicado 2015Tabla de Contenidos: “…The Hadoop Distributed Filesystem -- The Design of HDFS -- HDFS Concepts -- Blocks -- Namenodes and Datanodes -- Block Caching -- HDFS Federation -- HDFS High Availability -- The Command-Line Interface -- Basic Filesystem Operations -- Hadoop Filesystems -- Interfaces -- The Java Interface -- Reading Data from a Hadoop URL -- Reading Data Using the FileSystem API -- Writing Data -- Directories -- Querying the Filesystem -- Deleting Data -- Data Flow -- Anatomy of a File Read -- Anatomy of a File Write -- Coherency Model -- Parallel Copying with distcp -- Keeping an HDFS Cluster Balanced -- Chapter 4. …”
Libro electrónico -
6827Publicado 2016Tabla de Contenidos: “…Getting Started -- Getting Started with Sample Reports Projects -- Report Groups -- Adding Totals to a Table or Matrix Report -- Expression Basics -- Introducing Aggregate Functions and Totals -- Sorting -- Exercise -- Design the Dataset Query -- Design and Lay Out a Table Report -- Add Summary Totals and Drill-Down -- Aggregate Detail Row Summaries -- Create Parameter List -- Summary -- Part III: Advanced and Analytic Reporting -- Chapter 7: Advanced Report Design -- Pagination and Flow Control -- Headers and Footers -- Tablix Headers and Detail Cells -- Designing the Page Headers -- Composite Reports and Embedded Content -- Unlocking the Textbox -- Padding and Indenting -- Embedded Formatting -- Designing Master/Detail Reports -- Repeating Data Regions: Table, Matrix, and List -- Groups and Dataset Scope -- More Aggregate Functions and Totals -- Designing Subreports -- Federating Data with a Subreport -- Navigating Reports -- Creating a Document Map -- Exercises -- Exercise 1: Create a Report Template -- Exercise 2: Create a Report from the Template with Dynamic Expressions -- Summary -- Chapter 8: Graphical Report Design -- Visual Design Principles -- Keep Charts Simple -- Properties, Oh My! …”
Libro electrónico -
6828Publicado 2021Tabla de Contenidos: “…Front Cover -- Title Page -- Copyright Page -- About the Authors -- Brief Contents -- Detailed Contents -- Applying Macroeconomics to the Real World -- Symbols Used in This Book -- Preface -- Part 1 Introduction -- Chapter 1 Introduction to Macroeconomics -- 1.1 What Macroeconomics Is About -- Long-Run Economic Growth -- Business Cycles -- Unemployment -- Inflation -- The International Economy -- Macroeconomic Policy -- Aggregation -- 1.2 What Macroeconomists Do -- Macroeconomic Forecasting -- Macroeconomic Analysis -- Macroeconomic Research -- Data Development -- In Touch with Data and Research: Developing and Testing an Economic Theory -- 1.3 Why Macroeconomists Disagree -- Classicals Versus Keynesians -- A Unified Approach to Macroeconomics -- Chapter 2 The Measurement and Structure of the National Economy -- 2.1 National Income Accounting: The Measurement of Production, Income, and Expenditure -- In Touch with Data and Research: The National Income and Product Accounts in Malaysia -- Why the Three Approaches Are Equivalent -- 2.2 Gross Domestic Product -- The Product Approach to Measuring GDP -- In Touch with Data and Research: Natural Resources, the Environment, and the National Income Accounts -- The Expenditure Approach to Measuring Gdp -- The Income Approach to Measuring GDP -- 2.3 Saving and Wealth -- Measures of Aggregate Saving -- The Uses of Private Saving -- Relating Saving and Wealth -- 2.4 Real GDP, Price Indexes, and Inflation -- Real GDP -- Price Indexes -- In Touch with Data and Research: The Computer Revolution and Chain-Weighted GDP -- In Touch with Data and Research: CPI Inflation Versus Core Inflation -- Application The Federal Reserve's Preferred Inflation Measures -- 2.5 Interest Rates -- Part 2 Long-Run Economic Performance -- Chapter 3 Productivity, Output, and Employment…”
Libro electrónico -
6829Publicado 2004Tabla de Contenidos: “…Fundamental concepts in process integration -- 2.1 The need for a unifying technique -- 2.1.1 Similarities between intra- and inter-enterprise integration -- 2.1.2 Summary -- 2.2 Process integration concepts and notations -- 2.2.1 Collaboration and interaction -- 2.2.2 Connectors and adapters -- 2.2.3 Classification of interaction between subsystems -- 2.3 QoS capabilities framework -- 2.3.1 Operability -- 2.3.2 Availability -- 2.3.3 Federation -- 2.3.4 Performance -- 2.3.5 Security -- 2.3.6 Standards compliance -- 2.3.7 Transactionality -- 2.4 Application patterns for Application Integration -- 2.5 Application patterns for Extended Enterprise -- 2.6 Summary -- Chapter 3. …”
Libro electrónico -
6830Publicado 2024Tabla de Contenidos: “…Understanding ABAC -- Other access control models for multi-account environments -- Choosing the right access control model -- Managing IAM identities -- Managing both human and non-human identities -- Types of credentials and their use cases -- IAM users, groups, and roles -- External identities and federation in AWS -- Comparing IAM identity types -- Managing IAM policies -- Understanding IAM policies -- Creating and managing IAM policies -- Advanced IAM policy use cases -- IAM in multi-account deployments -- Challenges with managing large-scale IAM deployments -- Centralized IAM management -- Cross-account access -- Sharing resources at scale -- Automating IAM implementation in a DevOps world -- Best practices for multi-account IAM -- Summary -- Questions -- Answers -- Further reading -- Chapter 4: Data Protection - Encryption, Key Management, and Data Storage Best Practices -- AWS encryption mechanisms and services -- AWS approach to encryption -- Types of encryption supported by AWS -- The AWS Encryption SDK -- Key features -- Managing cryptographic keys -- Key management services in AWS -- KMS in-depth overview -- CloudHSM integration and use cases -- Compliance in AWS key management -- Data protection in key AWS services -- S3 buckets -- EBS volumes -- EFS filesystems -- RDS databases -- DynamoDB tables -- Data protection in other AWS services -- Unified data protection strategy -- Summary -- Questions -- Answers -- Further reading -- Chapter 5: Introduction to AWS Security Services -- Unpacking threat and vulnerability detection -- GuardDuty-your AWS security sentinel -- Detective-your AWS security analyst -- Inspector-your AWS security auditor -- CloudTrail Lake and Security Lake-your AWS analytics powerhouses -- Best practices for threat and vulnerability detection -- Managing security governance and compliance…”
Libro electrónico -
6831Publicado 2021Tabla de Contenidos: “…Considering a social enterprise -- Encouraging intrapreneurship -- Chapter 6 Preparing the Business Plan -- Finding a Reason to Write a Business Plan -- Building confidence -- Testing your ideas -- Showing how much money you need -- Providing planning experience -- Satisfying financiers' concerns -- Writing Up Your Business Plan -- Defining your readership -- Creating the plan -- Maintaining confidentiality -- Doing due diligence -- Using Business Planning Software -- Recognising the limits of software -- Reviewing packages -- Presenting Your Plan -- Starring in show time -- Handling feedback -- Making an elevator pitch -- Chapter 7 Getting Help -- Connecting with Government Services -- Accessing national government support -- Relating to a region -- Choosing Small Business Associations -- The Federation of Small Businesses -- Forum of Private Business -- The British Chambers of Commerce -- A few more strings to your bow -- Universities and Colleges -- Entering an Incubator -- Finding the right type of incubator -- Getting into an incubator -- Considering the cost -- Finding out more -- Assisting Inventors -- Chapter 8 Finding the Money -- Assessing How Much Money You Need -- Projecting receipts -- Estimating expenses -- Working out the closing cash balances -- Setting out your cash-flow projection -- Testing your assumptions -- Reviewing Your Financing Options -- Deciding between debt capital and equity capital -- Examining your own finances -- Determining the Best Source of Finance for You -- Considering the costs -- Sharing ownership and control -- Limiting personal liability -- Going for Debt -- Borrowing from banks -- Going with the government -- Financing cash flow -- Getting physical -- Uniting with a credit union -- Borrowing from family and friends -- Sharing Out the Spoils -- Benefiting from business angels -- Playing to the crowd…”
Libro electrónico -
6832Publicado 2024Tabla de Contenidos: “…Poisoning-assisted inference -- Attack scenarios -- Mitigations -- Example attribute inference attack -- Membership inference attacks -- Statistical thresholds for ML leaks -- Label-only data transferring attack -- Blind membership inference attacks -- White box attacks -- Attack scenarios -- Mitigations -- Example membership inference attack using the ART -- Summary -- Chapter 10: Privacy-Preserving AI -- Privacy-preserving ML and AI -- Simple data anonymization -- Advanced anonymization -- K-anonymity -- Anonymization and geolocation data -- Anonymizing rich media -- Differential privacy (DP) -- Federated learning (FL) -- Split learning -- Advanced encryption options for privacy-preserving ML -- Secure multi-party computation (secure MPC) -- Homomorphic encryption -- Advanced ML encryption techniques in practice -- Applying privacy-preserving ML techniques -- Summary -- Part 4: Generative AI and Adversarial Attacks -- Chapter 11: Generative AI - A New Frontier -- A brief introduction to generative AI -- A brief history of the evolution of generative AI -- Generative AI technologies -- Using GANs -- Developing a GAN from scratch -- WGANs and custom loss functions -- Using pre-trained GANs -- Pix2Pix -- CycleGAN -- Pix2PixHD -- Progressive Growing of GANs (PGGAN) -- BigGAN -- StarGAN v2 -- StyleGAN series -- Summary -- Chapter 12: Weaponizing GANs for Deepfakes and Adversarial Attacks -- Use of GANs for deepfakes and deepfake detection -- Using StyleGAN to generate convincing fake images -- Creating simple deepfakes with GANs using existing images -- Making direct changes to an existing image -- Using Pix2PixHD to synthesize images -- Fake videos and animations -- Other AI deepfake technologies -- Voice deepfakes -- Deepfake detection -- Using GANs in cyberattacks and offensive security -- Evading face verification…”
Libro electrónico -
6833Publicado 2011Tabla de Contenidos: “…Moller Architects ; Koge Kyst Denmark / Topotek 1 ; InfoBox BHF / Caramel architekten ZT GMBH ; Taringa Transit Oriented Design / Suters Architects ; City interventions in Prague / Sporadical architektonická kancelár ; Reykjavik city center Kvos / Argos Gullinsniđ, Studio Granada ; East Darling Harbour / Suters Architects ; Europan 10 / Eriksen Skajaa Architects ; Federal Archives Berlin (Bundesarchiv)/ 100Landschaftsarchitektur ; King George Square / Suters Architects ; Neugestaltung Marktplatz Mönchengladbach - Rheydt / Topotek 1; Croydon's Wellesley road - Park Lane / Hawkins - Brown ; Erlebnisraum Römerstrasse / Kadawittfeld architektur ; Takoma Park Sidewalk competition / Studio27 (Studio twentyseven architecture) ; Park auf der Harburger Schlossinsel / Topotek 1 ; Arco de Bicentenario / JSa - Javier Sánchez ; Enbankment of the drava River Maribor EPK 2012 / Atelier Tekuto ; University of California San Diego - East Campus Health Sciences Parking Structure / Pugh + Scarpa Architects Inc. ; Landschaftspark erftstadt (Archaelogical Landscape Park) / 1100Landschaftsarchitektur ; Tucson Gateway Competition / Linde and Space, LLC ; The urban shed competition (Butterfly wing) / Jordan Parnass Digital Architecture ; "R(H)Ein-Blicke" Im Unesco-Welterbe Oberes Mittelrheintal / 100 Landschaftsarchitektur ; Innovative design competition for the central waterfront / West8, Dutoit Allsopp Hillier, Schollen & Company, Diamond & Schmitt Architects, Arup, Halsall Associates, David Dennis Design ; Byens ø -Kultur Og Oplevelses Omrade (Cultural Harbour) / Cornelius + Vöge…”
Libro -
6834
-
6835
-
6836
-
6837
-
6838
-
6839
-
6840