Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Economic policy 3,338
- Economic conditions 2,919
- Government policy 1,438
- History 1,284
- Economics 1,279
- Business & Economics 1,277
- Economic History 1,063
- Education 809
- Politics and government 730
- Economic aspects 717
- Economic development 703
- Environmental policy 698
- Economic history 612
- Development 560
- Social aspects 553
- Management 526
- Political Science 509
- Computer networks 447
- Security measures 432
- Política económica 423
- Law and legislation 402
- Social policy 385
- Research 383
- Sustainable development 379
- Social Issues/Migration/Health 372
- Foreign relations 369
- Historia 369
- Energy policy 367
- Environmental aspects 360
- Social conditions 345
-
38901por Callaghan, Brent“…Specific topics of interest include: NFS version 4, highlighting performance improvements, security features, and cross-platform interoperability for Internet operation RPC authentication and security Differences between NFS versions 2 and 3 Implementation issues for clients and servers Read-ahead and write-behind Caching policies The Lock Manager protocol Automounting NFS variants, including Spritely NFS, NQNFS, Trusted NFS, and NASD NFS NFS competitors: RFS, AFS, DCE/DFS, and CIFS The PCNFS protocol for implementing NFS on PC operating systems SPEC SFS benchmarks, WebNFS, and firewalls Comprehensive and current, NFS Illustrated is an essential resource for network professionals who want to use this widespread and evolving technology to its fullest…”
Publicado 2000
Libro electrónico -
38902por Simmons, Andrea C.“…As you walk through the year with Andrea, you will make significant inroads into improving your organisation's security as you: think creatively in order to provide solutions to ongoing issues create a workable information security policy make friends with the right people in order to facilitate critical changes pinpoint weaknesses and help your colleagues to see them through your eyes improve physical security by helping others to take personal responsibility learn strategies for the effective communication of key security messages in order to maximise use of the measures in place appreciate how all this helps you to address the human factors and reduce your cyber risks – which are ultimately security risks discover why it's essential to have a camera on you at all times! …”
Publicado 2012
Libro electrónico -
38903por McHale, Robert“…You’ll Learn How To • Craft legally compliant social media promotions, contests, sweepstakes, and advertising campaigns • Write effective social media policies and implement best practices for governance • Ensure the security of sensitive company and customer information • Properly monitor and regulate the way your employees use social media • Avoid high-profile social media mishaps that can instantly damage reputation, brand equity, and goodwill, and create massive potential liability • Avoid unintentional employment and labor law violations in the use of social media in pre-employment screening • Manage legal issues associated with game-based marketing, “virtual currencies,” and hyper-targeting • Manage the legal risks of user-generated content (UGC) • Protect your trademarks online, and overcome brandjacking and cybersquatting • Understand the e-discovery implications of social media in lawsuits…”
Publicado 2012
Libro electrónico -
38904por Institute of Medicine (U.S.)“…These experiences and lessons learned may be useful for stakeholders in moving the discussions, policies, and mechanisms forward to increase equitable access to quality health services without financial hardship for the informal workforce"--…”
Publicado 2016
Libro electrónico -
38905Publicado 2006“…Readers will learn How the Configuration Application Block is designed and can be used at runtime to easily read and write configuration data How the Configuration Application Block works at design time for all blocks How to use the Data Access Block to create a portable data layer How to use the Exception Handling Application Block to implement a policy-driven, application-wide exception handling system How to use the Logging and Instrumentation Application Block to log and instrument messages independent of the message destination How to add authentication, authorization, role membership, security cache, and profile membership features to an application with the Security Application Block How to use the Cryptography Application Block to add functionality to encrypt and decrypt data and create and compare hashes How to build your own application block and providers that “snap” right into Enterprise Library Whether you plan to extend Enterprise Library for your organization, or just use the existing application blocks to add functionality to your architecture in a consistent, extensible, integrated way, this book will guide you through the complexities and help you find a clear path to success…”
Libro electrónico -
38906por Gerner, Susanne“…The publication is aimed at participants and contributors to the study, gender equality policy actors, academic experts, political decision-makers and representatives of practical institutions. …”
Publicado 2020
Libro electrónico -
38907Publicado 2022“…In the second part we assess how moral design relates to related discourse, including business ethics, law and policy. In the third part of this book various case studies are highlighted that focus on particular moral design issues at the crossroads of technological innovation in the public and private sector. …”
Libro electrónico -
38908por Dewey, Susan“…These ethical challenges include: · Research methodology · Distinguishing research from activism · Navigating the politically and ideologically charged environments in which researchers must remain constantly attuned to the legal and public policy implications of their work · Possibilities for participatory sex work research processes · Strategies for incorporating participants in a variety of collaborative ways Sex work presents a unique set of challenges that are not always well understood by those working outside of anthropology and disciplines closely related to it. …”
Publicado 2013
Libro electrónico -
38909Publicado 2014“…By illuminating his formative years, studying the patronage of the Duchess of Burgundy within the court system and a policy of distinction marked by the pregnance of several political clans, by questioning the efflorescence of funeral orations of where pierced the disappointed hopes and the collective imagination of the nation, the present volume intends to fill the gaps of contemporary historiography long remained silent on the brief destiny of Marie-Adélaïde of Savoy and the climate of the court of Versailles between 1696 and 1712.…”
Libro electrónico -
38910Publicado 2024“…The authors also provide: Easy-to-follow, non-technical explanations of what AI is and how it works Examples of the use of AI for scientists working on mitigating climate change, showing how AI can better analyze data without human bias, remedy pattern recognition deficits, and make use of satellite and other data on a scale never seen before so policy makers can make informed decisions Real applications of AI in humanitarian action, whether in speeding disaster relief with more accurate data for first responders or in helping address populations that have experienced adversity with examples of how analytics is being used to promote inclusivity A deep focus on AI in healthcare where it is improving provider productivity and patient experience, reducing per-capita healthcare costs, and increasing care access, equity, and outcomes Discussions of the future of AI in the realm of social benefit organizations and efforts Beyond the work of the authors, contributors, and researchers highlighted in the book, AI For Good begins with a foreword from Microsoft Vice Chair and President Brad Smith. …”
Libro electrónico -
38911por Urmeneta, Alex“…It also delves into the ethical considerations, policy implications, and the central role educators play in harnessing the power of an AI informed educational experience. …”
Publicado 2024
Libro electrónico -
38912por Perelman, Chaïm 1912-1984“…For Aristotle, the epideictic genre was of limited importance in the civic realm since it did not concern facts or policies. Perelman, in contrast, believes not only that epideictic rhetoric warrants more attention, but that the values normally limited to that genre are in fact central to all argumentation. …”
Publicado 2000
Libro -
38913por Gerver, Richard“…Reforms, tweaks and new policies are not enough - a radical transformation is needed. …”
Publicado 2014
Libro -
38914por Young, John W., 1957-“…Though centred on the international policies of the USA and the USSR, the book throws light on almost every aspect of postwar international history from the rise of Mao's China to the fall of the Warsaw Pact, ranging from Vietnam to Angola, from Afghanistan to Cuba, from Margaret Thatcher to Kim II Sung. …”
Publicado 1994
Libro -
38915Publicado 2024“…He then offers real tools for readers, including eight suggestions for what a coherent AI policy should like -- from data rights to layered AI oversight to meaningful tax reform -- and closes with how ordinary citizens can push for what is so desperately needed. …”
Libro -
38916
-
38917
-
38918Publicado 2015Libro electrónico
-
38919Publicado 2017“…The aim of this work is to influence public policy and inform social debate on the bioethical challenges posed by the current food system and its evolution. …”
Libro electrónico -
38920Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
Video