Mostrando 12,141 - 12,160 Resultados de 12,164 Para Buscar '"The Transporter"', tiempo de consulta: 0.14s Limitar resultados
  1. 12141
    Publicado 2019
    Seriada digital
  2. 12142
    por Novo López, Pedro A. (ed.)
    Publicado 2016
    “…Sus líneas de investigación se centran en el ámbito de la historia urbana, prestando una atención especial a los procesos de configuración, construcción y desarrollo de las infraestructuras de transportes colectivos, los servicios urbanos esenciales como el abastecimiento de agua, la recogida de los residuos sólidos y líquidos de procedencia urbana e industrial y sus implicaciones sociales y medioambientales.…”
    Texto completo en Odilo
    Otros
  3. 12143
    Publicado 2018
    “…Faecal Sludge Management: Systems Approach for Implementation and Operation addresses the organization of the entire faecal sludge management service chain, from the collection and transport of sludge, and the current state of knowledge of treatment options, to the final end use or disposal of treated sludge. …”
    Electrónico
  4. 12144
    Publicado 2015
    Libro electrónico
  5. 12145
    Publicado 2007
    “…Este comportamiento del mercado turístico, junto con las TIC, ha provocado cambios en el sector: ha aumentado el porcentaje de turistas independientes, bajo la fórmula "do it yourself", el coste del transporte turístico se ha visto reducido a la aparición de las compañías "low cost" y los consumidores pueden contactar directamente con el proveedor de los servicios turísticos, sin necesidad de recurrir a empresas intermediarias. …”
    Clic para texto completo. Acceso abierto.
    Tesis
  6. 12146
    Publicado 2023
    “…It requires governments to: - provide physical security and decent working conditions- address diverse needs and psychosocial risk factors, and tackle stigma and discrimination- consider wider measures around childcare, transportation and safe accommodation.1.3. Getting support and protection right enhances retention of the existing workforce and will attract a new generation of HCWs.5. …”
    Libro electrónico
  7. 12147
    Publicado 2013
    “…Chapter 27, Heat, Air, and Moisture Control in Building AssemblieśђؤExamples, introduced explicit definitions with a new example for thermal bridging, and revised introductions to moisture transport analysis examples. Chapter 29, Refrigerants, has added data on HFO-1234yf and HFO-1234ze(E) and expanded content on environmental properties and compatibility with construction materials. …”
    Libro
  8. 12148
  9. 12149
    por Bäschlin, Nathalie
    Publicado 2020
    Libro electrónico
  10. 12150
    Publicado 1994
    Tesis
  11. 12151
    Publicado 2004
    “…En marzo de 1942, el primer transporte de hombres y mujeres y niños jiudíos salió de Drancy, en las alturas de París, hacia Auschbitz…”
    Ver más información
    DVD
  12. 12152
  13. 12153
    Revista digital
  14. 12154
    por A., Jesin
    Publicado 2014
    Libro electrónico
  15. 12155
    Publicado 2005
    “…Whether volume resuscitation should be started prehospitally or not is still controversial, as well as to what degree the blood pressure should be normotensive or hypotensive in the acute phase. Oxygen transport There is strong evidence for young and healthy individuals to tolerate a reduced haemoglobin concentration down to 5 g/L provided that the patient is kept normovolemic. …”
    Libro electrónico
  16. 12156
    por España
    Publicado 1598
    Tabla de Contenidos: “…Port. con esc. xil. real. Transporte-alquiler-precio-s. XVI-pragmáticas. Caballeros-pragmáticas-s. …”
    Libro
  17. 12157
    Publicado 2017
    Libro electrónico
  18. 12158
    por García Hurtado, María
    Publicado 2023
    Libro electrónico
  19. 12159
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
    Video
  20. 12160
    Publicado 2020
    “…Esto no es baladí, implica, en primer lugar, un profundo cambio de concepción y de operatividad del modelo energético, y no solo del sistema y del mercado eléctrico, también del transporte, del sector de la calefacción y refrigeración, y de los hábitos de consumo, con la ineludible transformación digital y con la necesidad de avanzar en la investigación de algunas fuentes renovables. …”
    Libro