Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 882
- Congressos 700
- Bíblia 535
- Història 500
- Biblia 449
- History 422
- Filosofía 314
- Crítica e interpretación 270
- Óperas 270
- RELIGION 198
- Derecho 186
- Bible 183
- Teatro catalán 181
- Teatro francés 167
- Management 162
- Iglesia Católica 156
- legislación 154
- Historia y crítica 149
- Música 143
- Películas cinematográficas 131
- Law and legislation 129
- Leadership 129
- Crítica i interpretació 123
- Derecho civil 123
- Crítica, interpretació, etc 121
- Derecho laboral 111
- Social aspects 104
- Església Catòlica 97
- Seguros sociales 96
- United States 96
-
26841Publicado 2015“…Topic Areas Enabling ubiquitous, on-demand, scalable network access to shared pools of configurable IT resources Optimizing multitenant environments to efficiently serve multiple unpredictable consumers Using elasticity best practices to scale IT resources transparently and automatically Ensuring runtime reliability, operational resiliency, and automated recovery from any failure Establishing resilient cloud architectures that act as pillars for enterprise cloud solutions Rapi..…”
Libro electrónico -
26842Publicado 2016“…What You Will Learn Understand Internetworking, sources of network-based evidence and other basic technical fundamentals, including the tools that will be used throughout the book Acquire evidence using traffic acquisition software and know how to manage and handle the evidence Perform packet analysis by capturing and collecting data, along with content analysis Locate wireless devices, as well as capturing and analyzing wireless traffic data packets Implement protocol analysis and content matching; acquire evidence from NIDS/NIPS Act upon the data and evidence gathered by being able to connect the dots and draw links between various events Apply logging and interfaces, along with analyzing web proxies and understanding encrypted web traffic Use IOCs (Indicators of Compromise) and build real-world forensic solutions, dealing with malware In Detail We live in a highly networked world. …”
Libro electrónico -
26843Publicado 2021“…Through considering the way these networks have shaped the city by weaving the urbanites of the city center(s) and suburban areas, this elective has been focused on three station locations which act as gateways to the city center of Rotterdam: Meijersplein Airport station, Rotterdam Alexander rail-metro station and Slinge metro station. …”
Libro electrónico -
26844Publicado 2023“…You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks. …”
Grabación no musical -
26845Publicado 2017“…What You Will Learn Efficiently collect data from a large variety of monitoring objects Organize your data in graphs, charts, maps, and slide shows Write your own custom probes and monitoring scripts to extend Zabbix Configure Zabbix and its database to be high available and fault-tolerant Automate repetitive procedures using Zabbix's API FInd out how to monitor SNMP devices Manage hosts, users, and permissions while acting upon monitored conditions Set up your Zabbix infrastructure efficiently Customize the Zabbix interface to suit your system needs Monitor your VMware infrastructure in a quick and easy way with Zabbix In Detail Nowadays, monitoring systems play a crucial role in any IT environment. …”
Libro electrónico -
26846por Beriet, Grégory“…Il reste toutefois possible de multiplier les approches et de s’attacher aussi bien à décrire les corps brutalisés, qu’à s’interroger sur les logiques du passage à l’acte ou à analyser la « réception » des violences corporelles. …”
Publicado 2019
Electrónico -
26847por Lavergne, Benjamin“…Technique particulière de formulation des énoncés concrétisée dans des actes informels, la soft law recommande un modèle de comportement à ses destinataires. …”
Publicado 2017
Electrónico -
26848Publicado 2015“…Throughout, the focus is squarely on what matters most: transforming data into insights that are clear, accurate, and can be acted upon…”
Libro electrónico -
26849Publicado 2023“…Couvrant quatre décennies, l'action de ce fondateur de l'Europe est retracée dans ce volume où sont publiés les actes du colloque qui lui a été consacré en novembre 2021 à l'occasion du 110e anniversaire de sa naissance."…”
Libro electrónico -
26850por Hucaby, Dave“…The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. …”
Publicado 2004
Libro electrónico -
26851por Hucaby, Dave“…Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with th..…”
Publicado 2008
Libro electrónico -
26852por Raman, T. V., 1965-“…In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. …”
Publicado 2004
Libro electrónico -
26853Publicado 2004“…It features 100 proven methods to positively change the way you think and act—methods based on feedback from the hundreds of thousands of corporate and public seminar attendees Chandler speaks to each year. 100 Ways to Motivate Yourself will help you break through the negative barriers and banish the pessimistic thoughts that are preventing you from fulfilling your lifelong goals and dreams. …”
Libro electrónico -
26854por Elssamadisy, Amr, 1970-“…The pattern reference prepares you to Understand the core drivers, principles, and values associated with agile success Tightly focus development on delivering business value–and recognize the “smells” of a project headed off track Gain rapid, effective feedback practices: iteration, kickoff and stand-up meetings, demos, retrospectives, and much more Foster team development: co-location, self-organization, cross-functional roles, and how to bring the customer aboard Facilitate technical tasks and processes: testing, refactoring, continuous integration, simple design, collective code ownership, and pair programming Act as an effective coach, learning to engage the community and promote learning Integrate “clusters” of agile practices that work exceptionally well together Agile Adoption Patterns will help you whether you’re planning your first agile project, trying to improve your next project, or evangelizing agility throughout your organization. …”
Publicado 2009
Libro electrónico -
26855Publicado 2010“…Mike Rother explains how to improve our prevailing management approach through the use of two kata: Improvement Kata--a repeating routine of establishing challenging target conditions, working step-by-step through obstacles, and always learning from the problems we encounter; and Coaching Kata: a pattern of teaching the improvement kata to employees at every level to ensure it motivates their ways of thinking and acting. With clear detail, an abundance of practical examples, and a cohesive explanation from start to finish, Toyota Kata gives executives and managers at any level actionable routines of thought a..…”
Libro electrónico -
26856Publicado 2012“…Your employees will learn to think and act like owners and will become active participants in the financial performance of the business. …”
Libro electrónico -
26857Publicado 2019“…Further, the approach doesn’t just focus on delivering change; it builds an organization’s muscle to continuously change, making it healthier so that it can act with increased speed and agility to stay perpetually ahead of its competition. …”
Libro electrónico -
26858Publicado 2017“…Digital Forensics and Cyber Crime with Kali Linux Fundamentals LiveLessons introduces you to the world of digital forensics and acts as a primer for your future forensic work. This is a fundamentals course with a focus on the average network engineer, so you don’t need to be an IT expert to follow most of the concepts. …”
-
26859Publicado 2017“…Within the course, we will focus on creating the HTTP API to act as a gateway to the whole system and so-called Activities Service, responsible for handling the incoming messages (or actually the commands that will be distributed through the services bus). …”
-
26860Publicado 2008“…A rare few will establish the most profound connection, in which presenter and audience understand each other perfectly...discover common ground... and, together, decide to act. In this fully updated edition, Jerry Weissman, the world’s #1 presentation consultant, shows how to connect with even the toughest, most high-level audiences...and move them to action! …”
Libro electrónico