Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
781por Ortiz-Osés, Andrés, 1943-2021
Publicado 1976Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de Pastoral Madrid, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Seminario Diocesano de Jaén, Biblioteca Diocesana Bilbao, Biblioteca Central de Capuchinos de España, Biblioteca Universidad de Deusto)Libro -
782Publicado 2024Tabla de Contenidos: “…. -- See also -- Chapter 8: Compliance with GuardDuty, Macie, Inspector, and Analyzer -- Technical requirements -- Setting up and using Amazon GuardDuty -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Aggregating findings from multiple accounts in GuardDuty -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Setting up and using Amazon Macie -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Setting up and using Amazon Inspector -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Setting up and using AWS Security Hub -- Getting ready…”
Libro electrónico -
783por Hébert, Fred, 1988-Tabla de Contenidos: “…Syntax in Functions -- Pattern Matching -- Fancier Patterns -- Variables in a Bind -- Guards, Guards! -- What the If ?! -- In case ... of -- Which Should We Use? …”
Publicado 2013
Libro electrónico -
784Publicado 2007Tabla de Contenidos: “…De Alonso Ramírez De Vargas, México, 1670 / Los Arcos Triunfales En La Época De Carlos II: Una Aproximación Desde La Retórica / José De Ibarra Y La Dignificación Del Arte En La Nueva España / Francisco De Avellaneda: Entremesista Y Censor De Comedias «Por Su Majestad», Carlos II / Anexo: Descripción Poética De La Máscara Y Fiestas Que A Los Felices Años Y Salud Restaurada De El Rey Nuestro Señor Carlos II (Que Dios Guarde) Hizo La Nobleza De Esta Imperial Ciudad De México..…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
785Publicado 2012Tabla de Contenidos: “…Pro-Government and Opposition Groups: The Green Movement, the Revolutionary Guards, and the Basij…”
Libro electrónico -
786Publicado 2010Tabla de Contenidos: “…Option 1: Expand Opportunities at Existing Air Force Medical Service Facilities Option 2: Assign Air Force Providers to Shared or Joint Hospitals; Option 3: Increase Cooperation with Nonmilitary Hospitals; Option 4: Increase Reliance on the Air National Guard and Reserves During Wartime; Summary; CHAPTER SEVEN Conclusions; APPENDIXES; A. …”
Libro electrónico -
787por Champlain, Jack J.Tabla de Contenidos: “…Client Control ConsiderationsAlternatives to SAS 70-Type Audits; Notes; Chapter 6 Assessing the Financial Stability of Vendor Organizations, Examining Vendor Organization Contracts, and Examining Accounting Treatment of Computer Equipment and Software; Assessing Financial Stability of Vendor Organizations; Examining Vendor Organization Contracts; Examining Accounting Treatment of Computer Hardware and Software; Notes; Chapter 7 Physical Security; Physical Locks; Security Guards; Video Surveillance Cameras; General Emergency and Detection Controls; Heating, Ventilation, and Cooling Systems…”
Publicado 2003
Libro electrónico -
788Publicado 2016Tabla de Contenidos: “…Failable-KonstruktorenDestruktoren; Properties; Lazy Properties; Vererbung; Zugangskontrolle; Kapitel 9: Container, Mutability und weitere Sprachelemente; Arrays; Dictionaries; Funktionen als Datentyp; Funktionen als Rückgabewert; Nested Functions; Type Casting; Subscripts; Optionals; Das guard-Statement; Fehlerbehandlung; Availability Checking; Kapitel 10: Protokolle und Extensions; Protokolle; Methoden; Properties; Mutating; Konstruktoren; Delegation; Vererbung von Protokollen; Protokolle mit Extensions adaptieren; Protokolle und Container; Mehrere Protokolle adaptieren…”
Libro electrónico -
789Tabla de Contenidos: “…Fetching a Web Page Getting and Using Packages ; Accessing External Data Using F# Packages; Starting a Web Server and Serving Data using F# Packages; Summary; Chapter 3: Introducing Functional Programming; Starting with Numbers and Strings; Some Simple Types and Literals; Arithmetic Conversions; Arithmetic Comparisons; Simple Strings ; Working with Conditionals: && and || ; Defining Recursive Functions; Lists ; Options; Getting Started with Pattern Matching ; Matching on Structured Values ; Guarding Rules and Combining Patterns ; Further Ways of Forming Patterns…”
Libro electrónico -
790Publicado 2015Tabla de Contenidos: “…Chapter 7: Of Visitors and Chains of ResponsibilitiesA tale of two hierarchies; The Visitor pattern; Many hues of pattern matching; De-structuring; Typed patterns; Pattern guards; Tuple explosion; Partial functions; Visitor pattern - the Scala way; Lifting it up; The chain of responsibility; Scalaish Chain Of Responsibilities; Match and mismatch - the collect idiom; Summary; Chapter 8: Traversals - Mapping/Filtering/Folding/Reducing; Iterating the Scala way; A validation problem; Setting the stage ; First cut-using arrays; Second cut-using a map; Third cut-using a for expression…”
Libro electrónico -
791Publicado 2021Tabla de Contenidos: “…Chapter 4 Detective Controls -- Introduction -- Stage 1: Resources State -- AWS Config -- AWS Systems Manager -- Stage 2: Events Collection -- AWS CloudTrail -- Amazon CloudWatch Logs -- Amazon CloudWatch -- AWS Health -- Stage 3: Events Analysis -- AWS Config Rules -- Amazon Inspector -- Amazon GuardDuty -- AWS Security Hub -- AWS Systems Manager: State Manager, Patch Manager, and Compliance -- AWS Trusted Advisor -- Stage 4: Action -- AWS Systems Manager: Automation -- AWS Config Rules: Remediation -- Amazon EventBridge -- Summary -- Exam Essentials -- Review Questions…”
Libro electrónico -
792por Model, Mitchell L.Tabla de Contenidos: “…Control Statements; Conditionals; Loops; Simple Loop Examples; Initialization of Loop Values; Looping Forever; Loops with Guard Conditions; Iterations; Iteration Statements; Kinds of Iterations; Do; Collect; Combine; Search; Filter; Nested iterations; Recursive iterations; Exception Handlers; Python Errors; Tracebacks…”
Publicado 2010
Libro electrónico -
793por Norman, Thomas L.Tabla de Contenidos: “…DIGITAL; COMMAND/COMMUNICATIONS CONSOLES; GUARD CONSOLE FUNCTIONS; COMMUNICATIONS SYSTEMS; SUMMARY; CHAPTER NOTES; Chapter 7. …”
Publicado 2007
Libro electrónico -
794por Carr, Joseph J.Tabla de Contenidos: “…Shielding Electronic Circuits; Approaches to Shielding; Skin Effect and Skin Depth; Ground Planes; Shielded Boxes; Holes in Shields; Double Shielding; Multicompartment Shielding; Spray-On Shielding; Connectors, Meters, and Dials; Installing a Coaxial Connector; Guard Shielding; Grounding and Ground Loops; Chapter 6. …”
Publicado 2000
Libro electrónico -
795por Robinson, EdTabla de Contenidos: “…""Denial of Service Attacks""""Defensive Techniques for DoS Attacks""; ""File-Based or Directory-Based Attacks""; ""Defensive Technique for File-Based or Directory-Based Attacks""; ""SQL-Injection Attacks""; ""Defensive Techniques for SQL-Injection Attacks""; ""Cross-Site Scripting Attacks""; ""When HTML Script Injection Becomes a Problem""; ""Defensive Techniques for Cross-Site Scripting Attacks""; ""Child-Application Attacks""; ""Defensive Technique for Child-Application Attacks""; ""Guarding Against Attacks in the Real World""; ""Summary""; ""Chapter 7: Validating Input""…”
Publicado 2011
Libro electrónico -
796por Syme, DonTabla de Contenidos: “…Using open to Access Namespaces and ModulesUsing open to Access Namespaces and Modules; Using new and Setting Properties; Using new and Setting Properties; Fetching a Web Page; Fetching a Web Page; Summary; CHAPTER 3 Introducing Functional Programming; Starting with Numbers and Strings; Some Simple Types and Literals; Arithmetic Conversions; Arithmetic Comparisons; Simple Strings; Working with Conditionals: && and ||; Defining Recursive Functions; Lists; Options; Getting Started with Pattern Matching; Matching on Structured Values; Guarding Rules and Combining Patterns…”
Publicado 2012
Libro electrónico -
797Publicado 2014Tabla de Contenidos: “…Standard 2.7 Ongoing trainingStandard 2.8 Training of supervisors and managers; Standard 2.9 State authority and responsibility for training; Standard 2.10 State boards to coordinate training efforts; Hallcrest I; Hallcrest II; Number of employees; Some security guard companies are growing; ASIS International Private Security Officer Selection and Training Guideline; Recruitment of security officers; Training; Job description and performance evaluation; Security personnel; Summary; Additional resources; Chapter 3 - Company Policies and Procedures…”
Libro electrónico -
798por Astborg, JohanTabla de Contenidos: “…Interesting functions in an array moduleLists; Pattern matching and lists; Interesting functions in a list module; Sequences; Interesting functions in the sequence module; Sets; Maps; Interesting functions in the map module; Options; Strings; Interesting functions in the string module; Choosing data structures; Arrays; Lists; Sets; Maps; More on functional programming; Recursive functions; Tail recursion; Pattern matching; Incomplete pattern matching; Using guards; Pattern matching in assignment and input parameters; Active patterns; Introducing generics; Lazy evaluation; Units of measure…”
Publicado 2013
Libro electrónico -
799Publicado 2014Tabla de Contenidos: “…Using the Point-to-Point ProtocolWorking with Tunneling Protocols; Working with RADIUS; TACACS/TACACS+/XTACACS; VLAN Management; SAML; Understanding Authentication Services; LDAP; Kerberos; Single Sign-On Initiatives; Understanding Access Control; Mandatory Access Control; Discretionary Access Control; Role-Based Access Control; Rule-Based Access Control; Implementing Access Controlling Best Practices; Least Privileges; Separation of Duties; Time of Day Restrictions; User Access Review; Smart Cards; Access Control Lists; Port Security; Working with 802.1X; Flood Guards and Loop Protection…”
Libro electrónico -
800Publicado 2015Tabla de Contenidos:Libro electrónico