Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 691
- Application software 556
- Management 480
- Engineering & Applied Sciences 453
- History 380
- Computer networks 299
- Computer programs 291
- Computer Science 278
- Data processing 255
- Design 238
- Photography 235
- Cloud computing 234
- Python (Computer program language) 234
- Leadership 233
- Digital techniques 217
- Programming 212
- Computer programming 202
- Taxation 196
- Security measures 193
- Computer software 192
- Computer security 188
- Web site development 187
- Examinations 186
- Historia 184
- Database management 180
- Artificial intelligence 178
- Business & Economics 177
- Operating systems (Computers) 175
- Web sites 166
- Machine learning 149
-
781Publicado 2018“…For each of its three main topics—demand, supply, and risk—a concise theoretical orientation leads directly into consideration of specific economic models and econometric techniques, collectively covering the following: Double-log demand systems Linear expenditure systems Almost ideal demand systems Rotterdam models Random parameters logit demand models Frequency-severity models Compound distribution models Cobb-Douglas production functions Translogarithmic cost functions Generalized Leontief cost functions Density estimation techniques Copula models SAS procedures that facilitate estimation of demand, supply, and risk models include the following, among others: PROC MODEL PROC COPULA PROC SEVERITY PROC KDE PROC LOGISTIC PROC HPCDM PROC IML PROC REG PROC COUNTREG PROC QLIM An empirical example, SAS programming code, and a complete data set accompany each econometric model, empowering you to practice these techniques while reading. …”
Libro electrónico -
782Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
Video -
783Publicado 2023“…You will have the knowledge and skills required to do the following: The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques This course in the CASP series covers the following topics: Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys…”
Video -
784Publicado 2023“…You will have the knowledge and skills required to do the following: This domain is about: use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment. …”
Video -
785Publicado 2018“…The Publication is following the yearly Editions of EVA FLORENCE. The State of Art is presented regarding the Application of Technologies (in particular of digital type) to Cultural Heritage. …”
Libro electrónico -
786Publicado 2007“…These studies documented results from 182 IVM children. Two studies had follow-up data, but no studies had followed the children more than two years. …”
Libro electrónico -
787Publicado 2010“…We extracted results from the following outcomes: mortality, retention in treatment, use of illegal drugs, quality of life and serious adverse outcomes. …”
Libro electrónico -
788por Canadian Agency for Drugs and Technologies in Health“…The recommendations were generated following HTERP deliberations based on evidence reviewed in a CADTH Health Technology Assessment (HTA) report. …”
Publicado 2020
Libro electrónico -
789por McMahon, Tim P.Tabla de Contenidos: “…Cover -- Half Title -- Series -- Title -- Copyright -- Dedication -- Contents -- Acknowledgments -- Introduction -- Introduction -- 1 The nature of charisma -- Historical and theoretical background of charisma -- Behavioral characteristics of charismatic leaders -- The contrasting aspects of charisma: personalized and socialized -- 2 Barack Obama's charismatic leadership -- Background and rise to prominence -- Overview of Obama's leadership skills, accomplishments, and public persona -- Analysis of Obama's socialized charismatic leadership -- 3 Donald Trump's charismatic leadership -- Background and rise to prominence -- Overview of Trump's leadership skills, style, and public persona -- Analysis of Trump's personalized charismatic approach -- Relationship with religious communities and impact on these groups -- 4 Charismatic bonds and religious followers -- How charismatic leaders build relationships with religious followers -- The role of religious rhetoric and symbolism in fostering loyalty -- Comparative analysis of Obama and Trump strategies in engaging religious communities -- 5 The power of charisma in political mobilization -- Understanding how politicians mobilize their base -- Presidential charisma in political campaigns and governance -- 6 The bright and dark sides of charisma -- Benefits and risks of charismatic leadership -- Exploration of how different segments of the population viewed each leader -- Examination of the psychological and emotional effects of charismatic leadership on followers -- Concluding thoughts -- Index…”
Publicado 2024
Libro electrónico -
790por Weisinger, HendrieTabla de Contenidos: “…Without the '' But'' -- Tell Them What You Want -- Be Timing-Oriented -- Use Questions Socratically -- When Words Don't Work: Use Your Actions -- Use Your Expectations -- Acknowledge That It's Subjective -- Put Motivation in Your Criticisms -- Use Their World -- Follow Up, Follow Up, Follow Up -- Know Your Criteria for Criticizing -- Listen to Yourself -- Stay Cool, Calm, and Collected -- Tips in Action -- Section II: Frequent, Challenging, and Difficult Criticism Situations -- So You're Afraid to Criticize Your Boss? …”
Publicado 2000
Libro electrónico -
791por Blaine, Brad, 1960-Tabla de Contenidos: “…Peter's call, naming, and confession -- The footwashing, the prediction of the denials, and Peter's promise to follow Jesus -- Swordplay and denials -- The race to the empty tomb -- John 21 as gospel supplement -- The fishing expedition and the miraculous catch of fish -- Shepherd and martyr…”
Publicado 2007
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
792por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Policy Recommendations for Regulatory Reform -- VI. Follow-Up Workd by the OECD…”
Publicado 1997
Libro electrónico -
793por Gussak, DavidTabla de Contenidos: “…How it began -- The jailhouse meeting -- More art and the follow-up -- The deposition -- The testimony -- The case study : summary, reflections, and ethics -- Art therapists as expert witnesses : three more capital cases -- Forensic art therapy revisited…”
Publicado 2012
Libro electrónico -
794por Sonnino, PaulTabla de Contenidos: “…Introduction: the state of the question -- The sex life of Anne of Austria -- The candidacy of Claude Imbert -- The Fouquet connection -- Calais -- Follow the money -- A tale of two families -- The testament of Cardinal Mazarin -- The cover-up -- Was Eustache Dauger gay?…”
Publicado 2016
Sumario
Libro -
795Publicado 2022“…We will start with an overview of the book followed by requisite concepts from Java and JavaFX that will be used throughout this book. …”
Libro electrónico -
796por Brysk, Alison, 1960-Tabla de Contenidos: “…Introduction : globalization and private wrongs -- Norm change in global civil society -- Children across borders : new subjects -- New strategies : "follow the money" -- New rights : "our bodies, ourselves" -- Conclusion : private authority and global governance…”
Publicado 2005
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
797por Smith, James A.Tabla de Contenidos: “…The marks of an apostle -- The historical context of Paul, the Philippians, and the letter -- The socio-philosophical context of Paul and his writing -- (Dis)closure : closely following Philippians 1:1-18 -- Failing to close : (re)citation, (re)iteration, comment…”
Publicado 2005
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
798Publicado 2019Tabla de Contenidos: “…From camp followers to a global army of labor -- Colonial legacies and labor export -- The wages of peace and war -- Supplying war -- Assembling a transnational workforce -- Dark routes -- Activism -- Relations -- Home -- Conclusion : empire's labor…”
Libro electrónico -
799Publicado 2021Tabla de Contenidos: “…Introduction: Depoliticizing the world -- Asserting expertise and pledging technical solutions -- Formatting neutrality -- Gaining time and losing momentum -- Following a functional-pragmatic path -- Monopolizing legitimacy -- Avoiding responsibility -- Conclusion: The politics of IO (de)politicization…”
Libro electrónico -
800Publicado 2020Tabla de Contenidos: “…Informational meetings: Research -- Discuss -- Follow-up…”
Libro