Mostrando 13,601 - 13,620 Resultados de 14,238 Para Buscar '"FEDER"', tiempo de consulta: 0.12s Limitar resultados
  1. 13601
    Publicado 2016
    “…Emerging topics such as Federated Identify Management, IP Convergence, or Information Security Continuous Monitoring (ISCM) processes. …”
    Video
  2. 13602
    Publicado 2015
    “…Yet they are all required to fulfill their fiduciary duties and meet federal government reporting requirements and regulations in the same way. …”
    Libro electrónico
  3. 13603
    por Dufays, Jean-Louis
    Publicado 2021
    “…Enfin, à l’évidence, la question du sens constitue la question fondamentale par excellence, celle dont dépendent nécessairement toutes les autres et qui fédère les différents acteurs de l’école. Y consacrer un livre était donc le contraire d’un luxe : c’était une nécessité vitale. …”
    Electrónico
  4. 13604
    Publicado 2005
    “…It is worth to point out the national compass of WebMedia 2005, represented by the various Brazilian states of the papers authors: Alagoas, Bahia, Ceará, Distrito Federal, Espírito Santo, Goi ́s, Maranhão, Minas Gerais, Mato Grosso do Sul, Paraíba, Pernambuco, Paran ́, Rio de Janeiro, Rio Grande do Norte, Rio Grande do Sul, Santa Catarina and São Paulo.WebMedia 2005 offers 8 short-courses, which had been selected due to presenting attractive contents for both the undergraduate and graduate attendees, and simultaneously supplying a solid theoretical support for each student. …”
    Libro electrónico
  5. 13605
    Publicado 2020
    “…He has worked in engineering roles for firms including Wells Fargo Bank, Express Scripts, Federal Reserve Bank, and Optum…”
    Libro electrónico
  6. 13606
    Publicado 2023
    “…Master widely used cloud native platforms like Kubernetes, Calico, Kibana, Grafana, Anchor, and more to ensure secure infrastructure and software development Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how to select cloud-native platforms and integrate security solutions into the systemLeverage cutting-edge tools and platforms securely on a global scale in production environmentsUnderstand the laws and regulations necessary to prevent federal prosecutionBook DescriptionFor cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. …”
    Libro electrónico
  7. 13607
    Publicado 2008
    “…During the past five years, he has been involved in the design, implementation, and planning of large national networks for Bell Canada's federal government customers. Diane Teare is a professional in the networking, training, project management, and e-learning fields. …”
    Libro electrónico
  8. 13608
    Publicado 2014
    “…NASA insider Rod Pyle has used the agency's unique methods for driving innovation to train leaders from eBay, the Federal Reserve, Michelin tires, Conoco/Phillips, and many other Fortune 100 and 500 companies. now, for the first time, NASA's cutting-edge strategies for nurturing and fostering innovation are revealed. …”
    Libro electrónico
  9. 13609
    Publicado 2020
    “…Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. …”
    Libro electrónico
  10. 13610
    Publicado 2019
    “…Implementing AI sessions, including Carlos Rodrigues's (Siemens) look at how Siemens fights cybercrime with AI; Alex Ingerman's (Google) introduction to Federated ML, a new decentralized form of ML; Siddha Ganju's (NVIDIA) discussion of how to set-up deep learning on mobile devices; and Thomas Phelan (HPE BlueData) on how to spin up GPU-enabled AI, ML, and DL clusters in Docker containers. …”
    Video
  11. 13611
    Publicado 2014
    “…Whether you're a senior bank manager, a government regulator, or an individual investor, The Art of Bank M&A covers everything you need to know about the unique economic structures of banks and financial institutions and the federal regulations they must operate within. Sweeping changes brought on by the Dodd-Frank Act as well as the new economic environment still emerging from the 2007–2009 financial crisis makes this timely guide a must-read for everyone involved in banking and M&A. …”
    Libro electrónico
  12. 13612
    Publicado 2014
    “…Local jurisdictions are responsible for the public health response to positive findings. The Federal Bureau of Investigation is designated as the lead agency for the law enforcement response if a bioterrorism event is detected. …”
    Libro electrónico
  13. 13613
    Publicado 2013
    “…Delivering High-Quality Cancer Care: Charting a New Course for a System in Crisis provides information for cancer care teams, patients and their families, researchers, quality metrics developers, and payers, as well as HHS, other federal agencies, and industry to reevaluate their current roles and responsibilities in cancer care and work together to develop a higher quality care delivery system. …”
    Libro electrónico
  14. 13614
    Publicado 2014
    “…The Obama/Bernanke/Yellen Federal Reserve and its unstable dollar policies are accelerating our course toward disaster, the authors show, in numerous convincing examples. …”
    Grabación no musical
  15. 13615
    Publicado 2014
    “…The Obama/Bernanke/Yellen Federal Reserve and its unstable dollar policies are accelerating our course toward disaster, the authors show, in numerous convincing examples. …”
    Libro electrónico
  16. 13616
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
    Video
  17. 13617
    Publicado 2024
    “…Government officials in federal agencies, where adherence to NIST RMF is crucial, will find this resource especially useful for implementing and managing cybersecurity risks. …”
    Libro electrónico
  18. 13618
    por Azis, Iwan J.
    Publicado 2024
    “…(Ludger Schuknecht, Former German Federal Ministry of Finance, ex-OECD Deputy Secretary-General, and currently Vice President and Corporate Secretary of the Asian Infrastructure Investment Bank (AIIB)) “The role of micro, small, and medium enterprises is crucial in contributing to the development process. …”
    Libro electrónico
  19. 13619
    por Tudela Aranda, José
    Publicado 2016
    “…En estas páginas se defiende que se realice desde una explicitación del modelo federal que en buena medida es el Estado autonómico. …”
    Libro
  20. 13620
    Publicado 2017
    “…En cualquier caso, ese tardío catalanismo asumido por el movimiento obrero nunca fue más allá de una propuesta federalista de base plurinacional –alejada ya del modelo federal libertario– que pudiera satisfacer las demandas de especificidad nacional catalana dentro de la solidaridad con el resto de pueblos del Estado. …”
    Libro