Mostrando 1 - 20 Resultados de 29 Para Buscar '"IDMS"', tiempo de consulta: 0.07s Limitar resultados
  1. 1
    por Stoltenberg, Cal D.
    Publicado 2010
    Tabla de Contenidos: “…Book Cover; Title; Copyright; Contents; Series Preface; 1 Theoretical Foundations; 2 An Overview of the IDM; 3 The Level 1 Therapist; 4 The Level 2 Therapist; 5 The Level 3 Therapist; 6 The Supervisory Relationship; 7 Nuts and Bolts of Supervision; 8 Supervision Across Settings; 9 Supervisor Development and Training; 10 Ethical and Legal Issues; 11 A Qualitative Examination of the IDM; Epilogue; Appendix A: Case Conceptualization Format; Appendix B: Practicum Competencies Outline; Appendix C: Supervisee Information Form; References; Index…”
    Libro electrónico
  2. 2
    Publicado 2019
    Libro electrónico
  3. 3
  4. 4
    Publicado 2022
    “…IDM redpaper…”
    Libro electrónico
  5. 5
    Publicado 2019
    Materias:
    Libro electrónico
  6. 6
    por Thakker, Tushar. author
    Publicado 2015
    Tabla de Contenidos: “…Chapter 3: Preparing the Hosts for ProvisioningIntroduction to the Provisioning Process; Understanding Installation Orchestration; Classification of Hosts for an Installation; Supported Component Versions; Selected Topology for the Installation; Fusion Applications Provisioning Steps; Provisioning Steps for Identity Management Components; IDM Provisioning Steps for Earlier Versions of Fusion Applications; IDM Provisioning Steps for Fusion Applications 11.1.7 or Later; Provisioning Steps for Fusion Applications Components; Dependencies Between IDM and FA Provisioning Steps…”
    Libro electrónico
  7. 7
    Publicado 2019
    Tabla de Contenidos: “…-- SECTION 4: TEACHER EDUCATION AND TEACHER DEVELOPMENT -- Introduction -- Inclusion of Interdisciplinary Approach in Biology Teacher Trainees Mathematics Education in Slovakia -- Preparing STEM Teachers as Researchers: A Research Experiences for Undergraduates ProJect -- SECTION 5: CONCLUSION.-IdME – a Conclusion…”
    Libro electrónico
  8. 8
    por Hurtarte, Jeorge S.
    Publicado 2007
    Tabla de Contenidos: “…Front Cover; Understanding Fabless IC Technology; Copyright Page; Contents; Acknowledgements; Preface; PART 1 - Manufacturing Strategies: Understanding Fabless IC Technology; Chapter 1: More than a Decade of Transition in the Semiconductor Industry; 1.1 FSA is Established; 1.2 Early Success; 1.3 Early Success Trend Continues; 1.4 Semiconductor Business Models; 1.5 Outsourcing Will Accelerate; 1.6 IDMs are Going Fabless; 1.7 A Case Study: Cypress Semiconductor; 1.8 More IDMs are Outsourcing; 1.9 Geographic Manufacturing Centers; Chapter 2: Fabless Semiconductor Manufacturing…”
    Libro electrónico
  9. 9
    Publicado 2018
    Tabla de Contenidos: “…Aventuras en el ultramundo: Ambient, IDM y electrónica post-rave, 1989-2002 / Javier Blánquez ; 13. …”
    Libro
  10. 10
    Publicado 2023
    Tabla de Contenidos: “…-- Chapter 4 Harness Your Distinctions: The First Time You Discover Your Racial Identity Is Life-Transforming -- Lesson 4.1: Harness Your IDMs -- Lesson 4.2: Guard Against Excessive Skepticism -- Chapter 5 Job Interviews Happen Every Day: How Shampoo Changed My Life and Started My Career -- Lesson 5.1 Every Day Is an Interview for Your Next Promotion -- Lesson 5.2: Treat the Company Like You Own It -- Chapter 6 Make the Most of Your Mentor: The Right Mentor Makes All the Difference in the World -- Lesson 6.1: Find the Right Mentor -- Lesson 6.2: Becoming a Mentee Takes TIME -- Chapter 7 Recognize and Harness Your Champions: Champions Are Larger-Than-Life People Who Give You a Boost -- Lesson 7.1: Champions Are Not Mentors -- Lesson 7.2: Embrace the Discomfort of Accepting Help from Afar -- Lesson 7.3: Champions Come in All Shapes and Sizes -- Chapter 8 Overcome the Entry-Level Blues: What to Do When You Feel Like You're Running in Place -- Lesson 8.1: Volunteer for Projects -- Lesson 8.2: Beware the Consequences of Code-Switching -- Lesson 8.3: Learn When to Call on Your Allies…”
    Libro electrónico
  11. 11
    Publicado 2024
    Tabla de Contenidos: “…. -- Initiatives to Strengthen Project Management Capacity at Hitachi -- References -- 3.5 Farm Credit Mid-America Best Practices -- Farm Credit Mid-America Introduction -- Farm Credit Mid-America's Starting Point -- Adopting Project Management Best Practices -- References -- 3.6 NCS Integrated Delivery Methods (IDM) &amp -- Project Management Method (PMM) -- NCS Integrated Delivery Methods (IDM) -- NCS Project Management Method (PMM) -- Change Control Process -- 3.7 Managing Change Within Research and Development at Business Area Networks, Ericsson -- About Ericsson -- 3.8 Intel Corporation and "Map Days" -- 3.9 Apple Computer and Cell Phones -- 3.10 The Light at the End of the Tunnel -- 3.11 Managing Assumptions -- 3.12 Project Governance -- 3.13 Seven Fallacies That Delay Project Management Maturity -- 3.14 Motorola -- 3.15 Texas Instruments -- 3.16 Naviair: On Time-On Budget -- How to Make Big and Complex Programs a Success -- Organize and Report -- Communicate Everywhere -- Summary -- 3.17 Avalon Power and Light -- 3.18 Roadway Express -- 3.19 Kombs Engineering -- 3.20 Williams Machine Tool Company -- 4 Project Management Methodologies -- 4.0 Introduction -- 4.1 Excellence Defined -- 4.2 Recognizing the Need for Methodology Development -- Organizing -- Planning -- Managing -- 4.3 Enterprise Project Management Methodologies -- Light Methodologies -- Heavy Methodologies…”
    Libro electrónico
  12. 12
    Publicado 2014
    Tabla de Contenidos: “…7.4.2.1 Robust Bayes and imprecise probabilities -- 7.4.2.2 Some computational aspects -- 7.4.3 A closer exemplary look at a popular class of models: The IDM and other models based on sets of conjugate priors in exponential families -- 7.4.3.1 The general model -- 7.4.3.2 The IDM and other prior near-ignorance models -- 7.4.3.3 Substantial prior information and sensitivity to prior-data conflict -- 7.4.4 Some further comments and a brief look at other models for generalized Bayesian inference -- 7.5 Frequentist statistics with imprecise probabilities -- 7.5.1 The nonrobustness of classical frequentist methods -- 7.5.2 (Frequentist) hypothesis testing under imprecise probability: Huber-Strassen theory and extensions -- 7.5.2.1 A generalized Neyman-Pearson setting: Basic concepts -- 7.5.2.2 Globally least favourable pairs and Huber-Strassen theory -- 7.5.3 Towards a frequentist estimation theory under imprecise probabilities-some basic criteria and first results -- 7.5.3.1 Basic traditional criteria -- 7.5.3.2 Generalized unbiasedness -- 7.5.3.3 Minimum distance estimation -- 7.5.3.4 Asymptotics -- 7.5.4 A brief outlook on frequentist methods -- 7.6 Nonparametric predictive inference -- 7.6.1 Overview -- 7.6.2 Applications and challenges -- 7.7 A brief sketch of some further approaches and aspects -- 7.8 Data imprecision, partial identification -- 7.8.1 Data imprecision -- 7.8.1.1 The basic setting -- 7.8.1.2 Basic coarsening model -- 7.8.1.3 Coarse data in traditional statistics -- 7.8.2 Cautious data completion -- 7.8.3 Partial identification and observationally equivalent models -- 7.8.3.1 (Partial) Identifiability, identification regions -- 7.8.3.2 Partial identification and misclassification -- 7.8.4 A brief outlook on some further aspects -- 7.8.4.1 Partial identification and other concepts of imprecise probabilities…”
    Libro electrónico
  13. 13
    Publicado 2023
    Tabla de Contenidos: “…-- Single Sign-On: A Zero Trust Tactic -- OAuth Process -- SAML Process -- Two-Factor Authentication: A Tactic for Zero Trust -- Types of Two-Factor Authentication -- SMS Verification -- Email Verification -- Authenticator Soft Tokens (Like Google Authenticator, ID.me, Blizzard's Battlenet, and LastPass) -- Push Authentication (from Google, Apple, Microsoft, and Twitter) -- Universal 2nd Factor Authentication -- How Secure Is Two Factor Authentication? …”
    Libro electrónico
  14. 14
    Publicado 1972
    Libro
  15. 15
    “…This primer aims to provide policy makers a broad-brush understanding of the various dimensions of digital identity management (IdM). Consistent with the Seoul Ministerial Declaration, it also aims to support efforts to address public policy issues for securely managing and protecting digital identities, with a view to strengthening confidence in the online activities crucial to the growth of the Internet Economy…”
    Capítulo de libro electrónico
  16. 16
    Publicado 2024
    Tabla de Contenidos: “…JavaScript analysis -- Specialized web technology fingerprinting libraries -- Proactive web security measures with Python -- Input validation and data sanitization -- Secure authentication and authorization -- Secure session management -- Secure coding practices -- Implementing security headers -- Summary -- Chapter 4: Exploiting Web Vulnerabilities Using Python -- Web application vulnerabilities - an overview -- SQL injection -- XSS -- IDOR -- A case study concerning web application security -- SQL injection attacks and Python exploitation -- Features of SQLMap -- How SQLMap works -- Basic usage of SQLMap -- Intercepting with MITMProxy -- XSS exploitation with Python -- Understanding how XSS works -- Reflected XSS (non-persistent) -- Stored XSS (persistent) -- Python for data breaches and privacy exploitation -- XPath -- CSS Selectors -- Summary -- Chapter 5: Cloud Espionage - Python for Cloud Offensive Security -- Cloud security fundamentals -- Shared Responsibility Model -- Cloud deployment models and security implications -- Encryption, access controls, and IdM -- Security measures offered by major cloud providers -- Access control in cloud environments -- Impact of malicious activities -- Python-based cloud data extraction and analysis -- Risks of hardcoded sensitive data and detecting hardcoded access keys -- Enumerating EC2 instances using Python (boto3) -- Exploiting misconfigurations in cloud environments -- Types of misconfigurations -- Identifying misconfigurations -- Exploring Prowler's functionality -- Enhancing security, Python in serverless, and infrastructure as code (IaC) -- Introducing serverless computing -- Introduction to IaC -- Summary -- Part 3: Python Automation for Advanced Security Tasks -- Chapter 6: Building Automated Security Pipelines with Python Using Third-Party Tools…”
    Libro electrónico
  17. 17
    Publicado 2011
    “…In today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. …”
    Libro electrónico
  18. 18
    Publicado 2003
    Tabla de Contenidos: “…Troubleshooting and debugging -- 18.1 Isolating problems -- 18.2 Tracing eClient -- 18.2.1 Configuring IDM.properties file -- 18.2.2 Sample log file -- 18.3 Tracing EIP Java API -- 18.3.1 Configuring log manager -- 18.3.2 Sample log file -- 18.4 Additional trace information -- 18.5 Debugging your application -- 18.5.1 Debugging Java code using stdout -- 18.5.2 Debugging JavaScript code -- 18.6 Typical problems -- 18.7 Support channels -- 18.7.1 Official support Web site -- 18.7.2 Forums -- Chapter 19. …”
    Libro electrónico
  19. 19
  20. 20