Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 115
- History 109
- Policía 102
- Police 94
- Politics and government 31
- Política y gobierno 28
- Law and legislation 27
- Prevention 26
- Social aspects 25
- Social conditions 23
- Crime 22
- Criminología 22
- Investigación criminal 22
- Crime prevention 20
- Political aspects 20
- Law 18
- Law enforcement 18
- National security 16
- Police administration 16
- Psychological aspects 16
- Security measures 16
- Terrorism 16
- Criminal justice, Administration of 15
- Criminology, Penology & Juvenile Delinquency 15
- Government policy 15
- Policia 15
- police 15
- Computer networks 14
- Criminal investigation 14
- Derecho penal 14
-
1681
-
1682
-
1683
-
1684Publicado 2022Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
Libro electrónico -
1685Publicado 2014“…Chapters focus on the historic mass protests against the anti-immigrant Sensenbrenner Bill; coverage of police brutality against peaceful activists; efforts to widen access to digital media tools and skills for low-wage immigrant workers; paths to participation in DREAM activism; and the implications of professionalism for transmedia organizing. …”
Libro electrónico -
1686Publicado 2008“…Using Hungary, Poland, Romania, and the Ukraine as case studies, she demonstrates the limits of conditionality in the face of national social perceptions and elucidates the three key points around which a consensus within the state must emerge before international institutions can expect liberalization: domestic officials must be uncertain about how changing policies will affect their interests; the status of international and domestic institutions must not be in jeopardy; and the proposed polices must seem credible. In making her case, Epstein cleverly bridges the gap between the rationalist and constructivist schools of thought.Offering new data on and fresh interpretations of reforming central bank policies, privatizing banks with foreign capital, democratizing civil-military relations, and denationalizing defense policy, In Pursuit of Liberalism extends well beyond the scope of previous book-length studies…”
Libro electrónico -
1687por International Energy Agency.“…Indonesia has implemented important changes since the IEA published its first review of the country’s energy polices in 2008. Key milestones include the 2007 Law on Energy, the 2008 National Energy Policy, the 2009 Law on Electricity, and the 2009 Law on Mineral and Coal Mining. …”
Publicado 2015
Libro electrónico -
1688Publicado 2022“…Using newly available Chinese sources, Gewirtz details how the leadership purged the key reformist politician Zhao Ziyang, quashed the student movement, recast the transformations of the 1980s as the inevitable products of consensus, and indoctrinated China and the international community in the new official narrative.Never Turn Back offers a revelatory look at how different China’s rise might have been and at the foundations of strongman rule under Xi Jinping, who has intensified the policing of history to bolster his own authority."--The Belknap Press of Harvard University Press…”
Libro -
1689por Zaki, Jamil, 1980-“…We meet a former neo-Nazi who is now helping extract people from hate groups, ex-prisoners discussing novels with the judge who sentenced them, Washington police officers changing their culture to decrease violence among their ranks, and NICU nurses fine-tuning their empathy so that they don't succumb to burnout. …”
Publicado 2019
Libro -
1690por Ruiz, Julius, 1973-“…He rejects both 'revisionist' right-wing writers such as César Vidal who cite Paracuellos as evidence that the Republic committed Soviet-style genocide and left-wing historians such as Paul Preston, who in his Spanish Holocaust argues that the massacres were primarily the responsibility of the Soviet secret police, the NKVD. The book argues that Republican actions influenced the Soviets, not the other way round: Paracuellos intensified Stalin's fears of a 'Fifth Column' within the USSR that facilitated the Great Terror of 1937-38. …”
Publicado 2017
Libro -
1691
-
1692
-
1693Publicado 2022“…"When should a surveillance system that is used in preventive policing sacrifice the privacy of citizens to prevent criminality? …”
Libro electrónico -
1694Publicado 2023“…Dies ist die These von Andrea Kretschmann, die sie anhand einer teilnehmenden Beobachtung polizeilicher Simulationen für das Policing von Protest in Europa entwickelt. Im Rahmen dieser Simulationen wird politische Ordnung vor allem auf sinnliche Weise hergestellt: Inszenierung, Theater und Spiel laden die inneren Abläufe der Staatsgewalt mit einer neuen Expressivität auf und lassen ein assoziativ-ereignisgetriebenes Vorgehen erkennen, das im Gegensatz zu klassischen Herangehensweisen dezidiert unsystematisch verfährt. …”
Libro electrónico -
1695por Traub, James“…Indeed, both Annan and the institution he incarnates were so deeply shaken after the invasion of Iraq that critics, and even some friends, began asking whether this sixty-year-old experiment in global policing has outlived its usefulness. Do its failures arise from its own structure and culture, or from a clash with an American administration determined to go its own way in defiance of world opinion? …”
Publicado 2006
Libro -
1696Publicado 2012“…Illustrator en 42 recettes Tout graphiste qui se respecte passe forcément par l'apprentissage d'Illustrator, l'irremplaçable logiciel de dessin vectoriel d'Adobe, qui permet de concevoir logos, schémas, diagrammes, polices de caractères et illustrations en tous genres. …”
Libro electrónico -
1697Publicado 2006“…The exam covers topics on IP QOS, classification and marking mechanisms, queuing mechanisms, traffic shaping and policing mechanisms, congestion avoidance mechanisms, link efficiency mechanisms, modular QOS command-line interface, and QOS Best Practices. …”
Libro electrónico -
1698por Höglund, Johan“…—Graeme Macdonald, University of Warwick, UK “Höglund’s work is critical to understanding the current cultural moment in the US, wherein the ‘policing of the imagination’ is resisted at the margins, while cultural elites and the US state promote climate emergency narratives that attempt to naturalize alternatives to the socio-ecological violence of capitalist expansion via imperialism and colonialism.” …”
Publicado 2024
Libro electrónico -
1699Publicado 2017“…And that would include his invention of Stalin, who would take Lenin's system of the gulag and the secret police to new heights…”
Libro -
1700