Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 4
- Database management 3
- Security measures 3
- Aspectes religiosos 2
- Data processing 2
- Església Catòlica 2
- Integrated circuits 2
- Mathematics 2
- Matrimoni 2
- Obres anteriors al 1800 2
- 3D Cadastre 1
- 3D cadastral registration 1
- 3D cadastral survey system 1
- 3D cadastre 1
- 3D cadastres 1
- 3D deed 1
- 3D land administration 1
- 3D parcel 1
- 3D real property 1
- 3D volumetric parcel 1
- African Americans 1
- BIM 1
- Biometric identification 1
- Business 1
- Career development 1
- Chip scale packaging 1
- Comparative education 1
- Computer crimes 1
- Computer security 1
- Creatine kinase 1
-
1por Stoltenberg, Cal D.Tabla de Contenidos: “…Book Cover; Title; Copyright; Contents; Series Preface; 1 Theoretical Foundations; 2 An Overview of the IDM; 3 The Level 1 Therapist; 4 The Level 2 Therapist; 5 The Level 3 Therapist; 6 The Supervisory Relationship; 7 Nuts and Bolts of Supervision; 8 Supervision Across Settings; 9 Supervisor Development and Training; 10 Ethical and Legal Issues; 11 A Qualitative Examination of the IDM; Epilogue; Appendix A: Case Conceptualization Format; Appendix B: Practicum Competencies Outline; Appendix C: Supervisee Information Form; References; Index…”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2Publicado 2019Libro electrónico
-
3
-
4Publicado 2022“…IDM redpaper…”
Libro electrónico -
5Publicado 2019Materias:Libro electrónico
-
6por Thakker, Tushar. authorTabla de Contenidos: “…Chapter 3: Preparing the Hosts for ProvisioningIntroduction to the Provisioning Process; Understanding Installation Orchestration; Classification of Hosts for an Installation; Supported Component Versions; Selected Topology for the Installation; Fusion Applications Provisioning Steps; Provisioning Steps for Identity Management Components; IDM Provisioning Steps for Earlier Versions of Fusion Applications; IDM Provisioning Steps for Fusion Applications 11.1.7 or Later; Provisioning Steps for Fusion Applications Components; Dependencies Between IDM and FA Provisioning Steps…”
Publicado 2015
Libro electrónico -
7Publicado 2019Tabla de Contenidos: “…-- SECTION 4: TEACHER EDUCATION AND TEACHER DEVELOPMENT -- Introduction -- Inclusion of Interdisciplinary Approach in Biology Teacher Trainees Mathematics Education in Slovakia -- Preparing STEM Teachers as Researchers: A Research Experiences for Undergraduates ProJect -- SECTION 5: CONCLUSION.-IdME – a Conclusion…”
Libro electrónico -
8por Hurtarte, Jeorge S.Tabla de Contenidos: “…Front Cover; Understanding Fabless IC Technology; Copyright Page; Contents; Acknowledgements; Preface; PART 1 - Manufacturing Strategies: Understanding Fabless IC Technology; Chapter 1: More than a Decade of Transition in the Semiconductor Industry; 1.1 FSA is Established; 1.2 Early Success; 1.3 Early Success Trend Continues; 1.4 Semiconductor Business Models; 1.5 Outsourcing Will Accelerate; 1.6 IDMs are Going Fabless; 1.7 A Case Study: Cypress Semiconductor; 1.8 More IDMs are Outsourcing; 1.9 Geographic Manufacturing Centers; Chapter 2: Fabless Semiconductor Manufacturing…”
Publicado 2007
Libro electrónico -
9Publicado 2018Tabla de Contenidos: “…Aventuras en el ultramundo: Ambient, IDM y electrónica post-rave, 1989-2002 / Javier Blánquez ; 13. …”
Libro -
10Publicado 2023Tabla de Contenidos: “…-- Chapter 4 Harness Your Distinctions: The First Time You Discover Your Racial Identity Is Life-Transforming -- Lesson 4.1: Harness Your IDMs -- Lesson 4.2: Guard Against Excessive Skepticism -- Chapter 5 Job Interviews Happen Every Day: How Shampoo Changed My Life and Started My Career -- Lesson 5.1 Every Day Is an Interview for Your Next Promotion -- Lesson 5.2: Treat the Company Like You Own It -- Chapter 6 Make the Most of Your Mentor: The Right Mentor Makes All the Difference in the World -- Lesson 6.1: Find the Right Mentor -- Lesson 6.2: Becoming a Mentee Takes TIME -- Chapter 7 Recognize and Harness Your Champions: Champions Are Larger-Than-Life People Who Give You a Boost -- Lesson 7.1: Champions Are Not Mentors -- Lesson 7.2: Embrace the Discomfort of Accepting Help from Afar -- Lesson 7.3: Champions Come in All Shapes and Sizes -- Chapter 8 Overcome the Entry-Level Blues: What to Do When You Feel Like You're Running in Place -- Lesson 8.1: Volunteer for Projects -- Lesson 8.2: Beware the Consequences of Code-Switching -- Lesson 8.3: Learn When to Call on Your Allies…”
Libro electrónico -
11Publicado 2024Tabla de Contenidos: “…. -- Initiatives to Strengthen Project Management Capacity at Hitachi -- References -- 3.5 Farm Credit Mid-America Best Practices -- Farm Credit Mid-America Introduction -- Farm Credit Mid-America's Starting Point -- Adopting Project Management Best Practices -- References -- 3.6 NCS Integrated Delivery Methods (IDM) & -- Project Management Method (PMM) -- NCS Integrated Delivery Methods (IDM) -- NCS Project Management Method (PMM) -- Change Control Process -- 3.7 Managing Change Within Research and Development at Business Area Networks, Ericsson -- About Ericsson -- 3.8 Intel Corporation and "Map Days" -- 3.9 Apple Computer and Cell Phones -- 3.10 The Light at the End of the Tunnel -- 3.11 Managing Assumptions -- 3.12 Project Governance -- 3.13 Seven Fallacies That Delay Project Management Maturity -- 3.14 Motorola -- 3.15 Texas Instruments -- 3.16 Naviair: On Time-On Budget -- How to Make Big and Complex Programs a Success -- Organize and Report -- Communicate Everywhere -- Summary -- 3.17 Avalon Power and Light -- 3.18 Roadway Express -- 3.19 Kombs Engineering -- 3.20 Williams Machine Tool Company -- 4 Project Management Methodologies -- 4.0 Introduction -- 4.1 Excellence Defined -- 4.2 Recognizing the Need for Methodology Development -- Organizing -- Planning -- Managing -- 4.3 Enterprise Project Management Methodologies -- Light Methodologies -- Heavy Methodologies…”
Libro electrónico -
12Publicado 2014Tabla de Contenidos: “…7.4.2.1 Robust Bayes and imprecise probabilities -- 7.4.2.2 Some computational aspects -- 7.4.3 A closer exemplary look at a popular class of models: The IDM and other models based on sets of conjugate priors in exponential families -- 7.4.3.1 The general model -- 7.4.3.2 The IDM and other prior near-ignorance models -- 7.4.3.3 Substantial prior information and sensitivity to prior-data conflict -- 7.4.4 Some further comments and a brief look at other models for generalized Bayesian inference -- 7.5 Frequentist statistics with imprecise probabilities -- 7.5.1 The nonrobustness of classical frequentist methods -- 7.5.2 (Frequentist) hypothesis testing under imprecise probability: Huber-Strassen theory and extensions -- 7.5.2.1 A generalized Neyman-Pearson setting: Basic concepts -- 7.5.2.2 Globally least favourable pairs and Huber-Strassen theory -- 7.5.3 Towards a frequentist estimation theory under imprecise probabilities-some basic criteria and first results -- 7.5.3.1 Basic traditional criteria -- 7.5.3.2 Generalized unbiasedness -- 7.5.3.3 Minimum distance estimation -- 7.5.3.4 Asymptotics -- 7.5.4 A brief outlook on frequentist methods -- 7.6 Nonparametric predictive inference -- 7.6.1 Overview -- 7.6.2 Applications and challenges -- 7.7 A brief sketch of some further approaches and aspects -- 7.8 Data imprecision, partial identification -- 7.8.1 Data imprecision -- 7.8.1.1 The basic setting -- 7.8.1.2 Basic coarsening model -- 7.8.1.3 Coarse data in traditional statistics -- 7.8.2 Cautious data completion -- 7.8.3 Partial identification and observationally equivalent models -- 7.8.3.1 (Partial) Identifiability, identification regions -- 7.8.3.2 Partial identification and misclassification -- 7.8.4 A brief outlook on some further aspects -- 7.8.4.1 Partial identification and other concepts of imprecise probabilities…”
Libro electrónico -
13Publicado 2023Tabla de Contenidos: “…-- Single Sign-On: A Zero Trust Tactic -- OAuth Process -- SAML Process -- Two-Factor Authentication: A Tactic for Zero Trust -- Types of Two-Factor Authentication -- SMS Verification -- Email Verification -- Authenticator Soft Tokens (Like Google Authenticator, ID.me, Blizzard's Battlenet, and LastPass) -- Push Authentication (from Google, Apple, Microsoft, and Twitter) -- Universal 2nd Factor Authentication -- How Secure Is Two Factor Authentication? …”
Libro electrónico -
14
-
15por Organisation for Economic Co-operation and Development.“…This primer aims to provide policy makers a broad-brush understanding of the various dimensions of digital identity management (IdM). Consistent with the Seoul Ministerial Declaration, it also aims to support efforts to address public policy issues for securely managing and protecting digital identities, with a view to strengthening confidence in the online activities crucial to the growth of the Internet Economy…”
Publicado 2009
Capítulo de libro electrónico -
16Publicado 2024Tabla de Contenidos: “…JavaScript analysis -- Specialized web technology fingerprinting libraries -- Proactive web security measures with Python -- Input validation and data sanitization -- Secure authentication and authorization -- Secure session management -- Secure coding practices -- Implementing security headers -- Summary -- Chapter 4: Exploiting Web Vulnerabilities Using Python -- Web application vulnerabilities - an overview -- SQL injection -- XSS -- IDOR -- A case study concerning web application security -- SQL injection attacks and Python exploitation -- Features of SQLMap -- How SQLMap works -- Basic usage of SQLMap -- Intercepting with MITMProxy -- XSS exploitation with Python -- Understanding how XSS works -- Reflected XSS (non-persistent) -- Stored XSS (persistent) -- Python for data breaches and privacy exploitation -- XPath -- CSS Selectors -- Summary -- Chapter 5: Cloud Espionage - Python for Cloud Offensive Security -- Cloud security fundamentals -- Shared Responsibility Model -- Cloud deployment models and security implications -- Encryption, access controls, and IdM -- Security measures offered by major cloud providers -- Access control in cloud environments -- Impact of malicious activities -- Python-based cloud data extraction and analysis -- Risks of hardcoded sensitive data and detecting hardcoded access keys -- Enumerating EC2 instances using Python (boto3) -- Exploiting misconfigurations in cloud environments -- Types of misconfigurations -- Identifying misconfigurations -- Exploring Prowler's functionality -- Enhancing security, Python in serverless, and infrastructure as code (IaC) -- Introducing serverless computing -- Introduction to IaC -- Summary -- Part 3: Python Automation for Advanced Security Tasks -- Chapter 6: Building Automated Security Pipelines with Python Using Third-Party Tools…”
Libro electrónico -
17Publicado 2011“…In today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. …”
Libro electrónico -
18Publicado 2003Tabla de Contenidos: “…Troubleshooting and debugging -- 18.1 Isolating problems -- 18.2 Tracing eClient -- 18.2.1 Configuring IDM.properties file -- 18.2.2 Sample log file -- 18.3 Tracing EIP Java API -- 18.3.1 Configuring log manager -- 18.3.2 Sample log file -- 18.4 Additional trace information -- 18.5 Debugging your application -- 18.5.1 Debugging Java code using stdout -- 18.5.2 Debugging JavaScript code -- 18.6 Typical problems -- 18.7 Support channels -- 18.7.1 Official support Web site -- 18.7.2 Forums -- Chapter 19. …”
Libro electrónico -
19por Sutton, Agneta, 1942-
Publicado 1990Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universitat Ramon Llull)Libro -
20