Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 439
- Historia 357
- Economic conditions 299
- Economics 259
- Economic policy 227
- Economía 223
- Education 212
- General 204
- Politics and government 188
- Social Science 184
- Law 169
- Federalismo 165
- Política y gobierno 162
- Economic history 150
- Political Science 143
- Research 134
- Management 130
- Ciencias políticas 129
- Business & Economics 121
- Law and legislation 120
- Mexico 113
- Finance 111
- Derecho 110
- History and criticism 109
- Study and teaching 109
- Government policy 108
- Sociology 102
- Ciencias Sociales 99
- United States 99
- Derecho constitucional 98
-
13601Publicado 2016“…Emerging topics such as Federated Identify Management, IP Convergence, or Information Security Continuous Monitoring (ISCM) processes. …”
-
13602Publicado 2015“…Yet they are all required to fulfill their fiduciary duties and meet federal government reporting requirements and regulations in the same way. …”
Libro electrónico -
13603por Dufays, Jean-Louis“…Enfin, à l’évidence, la question du sens constitue la question fondamentale par excellence, celle dont dépendent nécessairement toutes les autres et qui fédère les différents acteurs de l’école. Y consacrer un livre était donc le contraire d’un luxe : c’était une nécessité vitale. …”
Publicado 2021
Electrónico -
13604Publicado 2005“…It is worth to point out the national compass of WebMedia 2005, represented by the various Brazilian states of the papers authors: Alagoas, Bahia, Ceará, Distrito Federal, EspÃrito Santo, Goi ́s, Maranhão, Minas Gerais, Mato Grosso do Sul, ParaÃba, Pernambuco, Paran ́, Rio de Janeiro, Rio Grande do Norte, Rio Grande do Sul, Santa Catarina and São Paulo.WebMedia 2005 offers 8 short-courses, which had been selected due to presenting attractive contents for both the undergraduate and graduate attendees, and simultaneously supplying a solid theoretical support for each student. …”
Libro electrónico -
13605Publicado 2020“…He has worked in engineering roles for firms including Wells Fargo Bank, Express Scripts, Federal Reserve Bank, and Optum…”
Libro electrónico -
13606Publicado 2023“…Master widely used cloud native platforms like Kubernetes, Calico, Kibana, Grafana, Anchor, and more to ensure secure infrastructure and software development Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how to select cloud-native platforms and integrate security solutions into the systemLeverage cutting-edge tools and platforms securely on a global scale in production environmentsUnderstand the laws and regulations necessary to prevent federal prosecutionBook DescriptionFor cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. …”
Libro electrónico -
13607Publicado 2008“…During the past five years, he has been involved in the design, implementation, and planning of large national networks for Bell Canada's federal government customers. Diane Teare is a professional in the networking, training, project management, and e-learning fields. …”
Libro electrónico -
13608Publicado 2014“…NASA insider Rod Pyle has used the agency's unique methods for driving innovation to train leaders from eBay, the Federal Reserve, Michelin tires, Conoco/Phillips, and many other Fortune 100 and 500 companies. now, for the first time, NASA's cutting-edge strategies for nurturing and fostering innovation are revealed. …”
Libro electrónico -
13609Publicado 2020“…Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. …”
Libro electrónico -
13610Publicado 2019“…Implementing AI sessions, including Carlos Rodrigues's (Siemens) look at how Siemens fights cybercrime with AI; Alex Ingerman's (Google) introduction to Federated ML, a new decentralized form of ML; Siddha Ganju's (NVIDIA) discussion of how to set-up deep learning on mobile devices; and Thomas Phelan (HPE BlueData) on how to spin up GPU-enabled AI, ML, and DL clusters in Docker containers. …”
-
13611Publicado 2014“…Whether you're a senior bank manager, a government regulator, or an individual investor, The Art of Bank M&A covers everything you need to know about the unique economic structures of banks and financial institutions and the federal regulations they must operate within. Sweeping changes brought on by the Dodd-Frank Act as well as the new economic environment still emerging from the 2007–2009 financial crisis makes this timely guide a must-read for everyone involved in banking and M&A. …”
Libro electrónico -
13612Publicado 2014“…Local jurisdictions are responsible for the public health response to positive findings. The Federal Bureau of Investigation is designated as the lead agency for the law enforcement response if a bioterrorism event is detected. …”
Libro electrónico -
13613Publicado 2013“…Delivering High-Quality Cancer Care: Charting a New Course for a System in Crisis provides information for cancer care teams, patients and their families, researchers, quality metrics developers, and payers, as well as HHS, other federal agencies, and industry to reevaluate their current roles and responsibilities in cancer care and work together to develop a higher quality care delivery system. …”
Libro electrónico -
13614Publicado 2014“…The Obama/Bernanke/Yellen Federal Reserve and its unstable dollar policies are accelerating our course toward disaster, the authors show, in numerous convincing examples. …”
Grabación no musical -
13615Publicado 2014“…The Obama/Bernanke/Yellen Federal Reserve and its unstable dollar policies are accelerating our course toward disaster, the authors show, in numerous convincing examples. …”
Libro electrónico -
13616Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
Video -
13617Publicado 2024“…Government officials in federal agencies, where adherence to NIST RMF is crucial, will find this resource especially useful for implementing and managing cybersecurity risks. …”
Libro electrónico -
13618por Azis, Iwan J.“…(Ludger Schuknecht, Former German Federal Ministry of Finance, ex-OECD Deputy Secretary-General, and currently Vice President and Corporate Secretary of the Asian Infrastructure Investment Bank (AIIB)) “The role of micro, small, and medium enterprises is crucial in contributing to the development process. …”
Publicado 2024
Libro electrónico -
13619por Tudela Aranda, José“…En estas páginas se defiende que se realice desde una explicitación del modelo federal que en buena medida es el Estado autonómico. …”
Publicado 2016
Libro -
13620Publicado 2017“…En cualquier caso, ese tardío catalanismo asumido por el movimiento obrero nunca fue más allá de una propuesta federalista de base plurinacional –alejada ya del modelo federal libertario– que pudiera satisfacer las demandas de especificidad nacional catalana dentro de la solidaridad con el resto de pueblos del Estado. …”
Libro