Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
801Publicado 2014Tabla de Contenidos: “…2.4 Balancing Security Measures with Business Operations2.5 Summary; 2.6 Safety and Security Principles Checklist; References; 3 - Security Plan Development and Risk Assessment; 3.1 Safety and Security Plans and Procedures; 3.2 Risk Assessment; 3.3 Quantifying Safety and Security Initiatives; 3.4 Summary of Security Plan Development and Risk Assessment; 3.5 Security Plan Development and Risk Assessment Checklist; References; 4 - Safety and Security Program Administration; 4.1 OSHA Employer Safety Requirements; 4.2 Considerations and Staffing for Security Guard Forces…”
Libro electrónico -
802
-
803por Delaney, Laurel J. authorTabla de Contenidos: “…Legal Protection in the Online EnvironmentDomain Name Protection: Part of Your IP Protection; Other Legal Considerations: Labor Laws, Contracts, and Agreements; Opening Your Bank Account; Maximizing Tax Benefits for Your Multinational Business; More Ways to Guard Your Bottom Line; Trade and Customs Duties; Interest-Charge Domestic International Sales Corporation; Summary; Notes; Chapter 4: Exploring Your Territory; Market Research-a Dreaded Chore, a Powerful Tool; Get Yourself Organized; Choosing Your Market-Pleasure, Profit, Competitive Advantage, or Challenge ?…”
Publicado 2014
Libro electrónico -
804Publicado 2024Tabla de Contenidos: “…Use Managed Service Accounts (MSAs) or Group Managed Service Accounts (gMSAs) -- Limit Service Account Privileges -- Monitor for Unusual Activity -- Implement Kerberos Armoring -- Enable Kerberos Ticket Lifetime Policies -- Monitor and Protect the KRBTGT Account -- Implement Credential Guard -- Use Extended Protection for Authentication -- Regularly Update and Patch Systems -- Educate Users and Administrators -- Consider Network Segmentation -- Bonus Chapter -- Install VMware Player & Kali Linux -- Kali Linux -- Setting the IP address -- Kali Linux -- Updating -- Installing Metasploitable 2…”
Libro electrónico -
805Publicado 2024Tabla de Contenidos: “…-- Changing the question -- A monetary countermovement -- 2 Imaginaries of Money -- The barter story -- The Babylonian story -- Two imaginaries with distinct agencies -- 3 Sell It Forward: The Form and Reason of Today's Conventional Money -- The mechanics of private bank money creation -- The unsustainable consequences of the process of private bank money creation -- Commodifying a relationship to sell it forward -- The mechanics of central bank money creation -- Money today: an infrastructural arrangement grabbed to serve a financial elite -- Interlude 1 Money Commons Imaginary -- Money commons -- Guarding from cooptation of the money commons -- Part II Varieties of Monies -- 4 Give It Forward: The Form and Reason of Citizen Money -- Absent (the connecting device of) money -- Can debt initiate the work of connecting a local economy? …”
Libro electrónico -
806Publicado 2023Tabla de Contenidos: “…CASE STUDY 11: Southwest County Foodbank: Nonprofit Board Advocacy -- CASE STUDY 12: Volunteer and Donor Recruitment on Social Media -- VII Budgets, Financial Reports, and Management Control -- 14 Types of Nonprofit Income: Financial and Cash Management Considerations -- 15 Resiliency Tactics During Financial Crisis: The Nonprofit Resiliency Framework -- CASE STUDY 13: Throwing the First E-Stone -- CASE STUDY 14: When the Funding Stops -- VIII Managing Volunteers and Staff -- 16 Exploring the Dynamics of Volunteer and Staff Interactions: From Satisfaction to Conflict -- 17 Volunteers as Boundary Workers: Negotiating Tensions Between Volunteerism and Professionalism in Nonprofit Organizations -- CASE STUDY 15: Changing of the Guard: Leadership Change in Nonprofit Organizations -- CASE STUDY 16: Turning the Tide: Transitioning from Volunteers to Paid Staff -- IX Accountability and Evaluation -- 18 Accountability Online: Understanding the Web-Based Accountability Practices of Nonprofit Organizations -- 19 Measuring the Networked Nonprofit: Using Data to Change the World -- CASE STUDY 17: Technology and Transparency at the Museum -- CASE STUDY 18: Measure Twice, Cut Once: Performance Evaluation in Nonprofit Organizations…”
Libro electrónico -
807por Hosmer, Stephen T.“…The research focused on two questions: (1) Why did the Iraqi Regular Army and Republican Guard forces do so little fighting? and (2) Why did Iraqi leaders fail to adopt certain defensive measures that would h…”
Publicado 2007
Libro electrónico -
808Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Swift Basics - Variables and Functions -- Variables -- Optional types -- Enumeration types -- Basic flow statements -- The if statements - how to control the code flow -- Loops -- The while loops -- The switch statement -- Functions -- What is a tuple? -- What is the guard statement? -- How to tackle huge problems - bottom-up versus top-down -- Summary -- Chapter 2: Getting Familiar with Xcode and Playgrounds -- Installing Xcode -- Exploring Xcode -- What do we see on the screen? …”
Libro electrónico -
809Publicado 2013“…At the same time, new health technologies pose significant challenges for governments, particularly in relation to ensuring the technologies are safe, effective, and provide appropriate value for (public) money. To guard against the possible dangers arising from new health technologies, and to maximize the benefits, all European governments regulate their development, marketing, and public financing. …”
Capítulo de libro electrónico -
810por Leonard, AnghelTabla de Contenidos: “…Introducing type pattern matching for switch -- 64. Adding guarded pattern labels in switch -- 65. Dealing with pattern label dominance in switch -- 66. …”
Publicado 2024
Libro electrónico -
811por Valk, LaurensTabla de Contenidos: Enlace al texto completo en streaming en EBSCOhost
Publicado 2014
Libro electrónico -
812Publicado 2020Tabla de Contenidos: “…-- Northern lights: the Swedish advantage -- Dutch comfort: we were the champions -- Southern miracles: from rear-guard to forefront -- Balkan troubles: the weight of the past -- Russian roulette: the value of life -- Chapter 8. …”
Libro electrónico -
813Publicado 2015Tabla de Contenidos: “…Multiple Redis databasesKeys without a namespace; Using Swap; Not planning and configuring the memory properly; An inappropriate persistence strategy; Summary; Chapter 7: Security Techniques (Guard Your Data); The basic security; Obfuscating critical commands; Networking security; Protecting Redis with firewall rules; Running Redis on the loopback network interface; Running Redis in a Virtual Private Cloud; Encrypting client-to-server communication; Running stunnel on both the server and the client; Running stunnel on the server and using a Redis client that supports SSL; Summary…”
Libro electrónico -
814Publicado 2015Tabla de Contenidos: “…PCB Layout OptimizationLength Matching; Fiber Weave Effect; Crosstalk Reduction; Interleaving; Guard trace; Signal-to-ground ratio; Ground placement; Orthogonal placement; Component (vertical to horizontal) cancellation; Non-Ideal Return Path; Power Integrity; Repeaters; Introduction to re-timers; Introduction to re-drivers; Modeling and simulation; PCIe considerations; References; 3 Channel modeling and simulation; Transmission Lines; Causality; Checking for Model Causality; Causal Frequency-Dependent Model; Copper Surface Roughness; Modified Hammerstad model; Huray model; Conductivity…”
Libro electrónico -
815por Consumer DummiesTabla de Contenidos: “…Tapping Friends, Family, and LoversFinding an Angel; Daring to Use Venture Capital; Selling Stock to the Public: An IPO; Finding Other Ways to Finance Growth; Guarding Your Interests; Chapter 3: Setting Your Franchise's Wheels in Motion; Surveying Your Options for Locale; Setting Up Shop: Finding Your Franchise's Habitat; Avoiding Encroachment; Securing Your Space After Finding Your Piece of Heaven; Getting the Goods: Merchandise and Supplies; Receiving Merchandise; Maintaining Inventory; Getting Good Training Before and After You Open Your Franchise; Chapter 4: Starting a Home-Based Business…”
Publicado 2015
Libro electrónico -
816Publicado 2015Tabla de Contenidos: “…; Modules; Summary; Chapter 4: Controlling Access to Resources; The bootstrap process; Authentication; chef-client; Knife; Custom API calls; Authorization; The Open Source Chef server; Enterprise Chef; Object permissions; Groups; Summary; Chapter 5: Starting the Journey to the World of Recipes; Resources; Guard attributes; Lazy evaluation of attributes; The package resource; The cookbook_file resource; The directory resource; The file resource…”
Libro electrónico -
817por Russinovich, Mark E.Tabla de Contenidos: “…Object SecurityObject Retention; Resource Accounting; Object Names; Session Namespace; Synchronization; Spinlocks; Queued Spinlocks; Instack Queued Spinlocks; Executive Interlocked Operations; Low-IRQL Synchronization; Fast Mutexes and Guarded Mutexes; Executive Resources; Push Locks; System Worker Threads; Windows Global Flags; Local Procedure Calls (LPCs); Kernel Event Tracing; Wow64; System Calls; Exception Dispatching; User Callbacks; File System Redirection; Registry Redirection and Reflection; I/O Control Requests; 16-bit Installer Applications; Printing; Restrictions; Conclusion…”
Publicado 2009
Libro electrónico -
818por Horton, JohnTabla de Contenidos: “…The enhanced update methodThe enhanced draw method; Summary; Chapter 6: Platformer - Bob, Beeps, and Bumps; The SoundManager class; Introducing Bob; Multiphase collision detection; Player input; Animating Bob; Summary; Chapter 7: Platformer - Guns, Life, Money, and the Enemy; Ready aim fire; Pickups; The drone; The guard; Summary; Chapter 8: Platformer - Putting It All Together; Bullet collision detection; Adding some fire tiles; Eye candy; The new platform tiles; The new scenery objects; Scrolling parallax backgrounds; Pause menu with moveable viewport; Levels and game rules…”
Publicado 2015
Libro electrónico -
819por Cesarini, FrancescoTabla de Contenidos: “…Sequential Erlang; Conditional Evaluations; The case Construct; Variable Scope; The if Construct; Guards; Built-in Functions; Object Access and Examination; Type Conversion; Process Dictionary; Meta Programming; Process, Port, Distribution, and System Information; Input and Output; Recursion; Tail-Recursive Functions; Tail-Call Recursion Optimization; Two accumulators example…”
Publicado 2009
Libro electrónico -
820Publicado 2023Tabla de Contenidos: “…-- Chapter 25 How to Crack a Safe -- Chapter 26 Find a Safe Space -- Chapter 27 Well, That Was Unexpected -- Chapter 28 Opening a Door on Security -- Chapter 29 How to Tailgate an Opaque Door -- Chapter 30 The Guard Who Was Too Polite -- Chapter 31 The Swan Effect -- Chapter 32 What's in the Box? …”
Libro electrónico