Mostrando 39,581 - 39,600 Resultados de 40,834 Para Buscar '"policial"', tiempo de consulta: 0.17s Limitar resultados
  1. 39581
    por Cooperman, Jessica
    Publicado 2018
    “…By introducing young soldiers to what it saw as appropriately Americanized forms of Judaism and Jewish identity, the JWB hoped to prepare a generation of American Jewish men to assume positions of Jewish leadership while fitting comfortably into American society.This volume shows how, at this crucial turning point in world history, the JWB managed to use the policies and power of the U.S. government to advance its own agenda: to shape the future of American Judaism and to assert its place as a truly American religion…”
    Libro electrónico
  2. 39582
    por Egan, Mark
    Publicado 2010
    “…Yet, it also stresses that a strategic approach to cyber security is essential, and that "tone at the top" will determine the effectiveness of any corporate cyber security policy." – Eric Benhamou, chairman of the board of directors, 3Com Corporation, palmOne, and PalmSource, Inc "This book is not about cyber security; it's about managing one's company and the role that cyber security plays in that scenario. …”
    Libro electrónico
  3. 39583
    Publicado 2007
    “…Inside, you'll find advice on topics such as The key elements your networks and systems need in order to make all other services run better Building and running reliable, scalable services, including web, storage, email, printing, and remote access Creating and enforcing security policies Upgrading multiple hosts at one time without creating havoc Planning for and performing flawless scheduled maintenance windows Managing superior helpdesks and customer care Avoiding the "temporary fix" trap Building data centers that improve server uptime Designing networks for speed and reliability Web scaling and security issues Why building a backup system isn't about backups Monitoring what you have and predicting what you will need How technically oriented workers can maintain their job's technical focus (and avoid an unwanted management role) Technical management issues, including morale, organization building, coaching, and maintaining positive visibility Personal skill techniques, including secrets for getting more done each day, ethical dilemmas, managing your boss, and loving your job System administration salary negotiation It's no wonder the first edition received Usenix SAGE's 2005 Outstanding Achievement Award! …”
    Libro electrónico
  4. 39584
    Publicado 2020
    “…The book also aims to be a useful reference for government donor agencies, their implementing partners, and other high-level decision makers, and can be used as a course text in schools of public health, public policy, medicine, and development. ACKNOWLEDGMENT: This work was conducted under the USAID Applying Science to Strengthen and Improve Systems (ASSIST) Project, USAID Award No. …”
    Libro electrónico
  5. 39585
    por Hucaby, Dave
    Publicado 2008
    “…Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with th..…”
    Libro electrónico
  6. 39586
    por Logan, Syd
    Publicado 2008
    “…Build Cross-Platform Applications without Compromise Throughout the book, Logan illuminates his techniques with realistic scenarios and extensive, downloadable code examples, including a complete cross-platform GUI toolkit based on Mozilla’s XUL that you can download, modify, and learn from. Coverage includes Policies and procedures used by Netscape, enabling them to ship Web browsers to millions of users on Windows, Mac OS, and Linux Delivering functionality and interfaces that are consistent on all platforms Understanding key similarities and differences among leading platform-specific GUI APIs, including Win32/.NET, Cocoa, and Gtk+ Determining when and when not to use native IDEs and how to limit their impact on portability Leveraging standards-based APIs, including POSIX and STL Avoiding hidden portability pitfalls associated with floating point, char types, data serialization, and types in C++ Utilizing platform abstraction libraries such as the Netscape Portable Runtime (NSPR) Establishing an effective cross-platform bug reporting and tracking system Creating builds for multiple platforms and detecting build failures across platforms when they occur Understanding the native runtime environment and its impact on installation Utilizing wxWidgets to create multi-platform GUI applications from a single code base Thoroughly testing application portability Understanding cross-platform GUI toolkit design with Trixul…”
    Libro electrónico
  7. 39587
    por Gupta, Ajay
    Publicado 2004
    “…Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio..…”
    Libro electrónico
  8. 39588
    por Potter, Neil S.
    Publicado 2002
    “…You will learn how to: Scope and develop an improvement plan Identify and prioritize risks and mitigate anticipated difficulties Derive metrics that accurately measure progress toward business goals Sell your improvement program in-house Initially target practitioners and projects most-open to new approaches and techniques Stay focused on goals and problems Align the actions of managers and practitioners Delay major policy documents and edicts until solutions have been practiced and tested Use existing resources to sp..…”
    Libro electrónico
  9. 39589
    por Bhaiji, Fahim Hussain Yusuf
    Publicado 2008
    “…Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. …”
    Libro electrónico
  10. 39590
    por Abelson, Harold
    Publicado 2008
    “…Miller , Senior Director for Technology Policy and Strategy, Microsoft Corporation “Most writing about the digital world comes from techies writing about technical matter for other tech..…”
    Libro electrónico
  11. 39591
    Publicado 2009
    “…Coverage includes • Choosing the right edition of Google Apps for you • Setting up Google Apps so it will be easier to use and manage • Migrating your email, contacts, and calendars to Google Apps • Administering and securing Google Apps • Integrating Google Apps with other software and services • Leveraging Google Sites to collaborate across teams, organizations, or the entire world • Making the most of Google Talk voice calls and instant messaging • Implementing Google’s office productivity tools, including Docs, Spreadsheets, and Presentations • Using policy management and message recovery to control and secure your messaging • Customizing efficient Google Apps Start Pages for you and your colleagues • Sharing important and useful videos with your colleagues • Maximizing the innovative features of Google’s new web browser, Chrome SCOTT GRANNEMAN is an author, teacher, and entrepreneur with extensive experience in Google Apps migration, setup, and training. …”
    Libro electrónico
  12. 39592
    Publicado 2009
    “…Implement high availability–and leverage SQL Server 2008’s major improvements to failover clustering and database mirroring Save time with SQL Server 2008’s new policy-based management tools Performance tune and troubleshoot a SQL Server 2008 environment. …”
    Libro electrónico
  13. 39593
    Publicado 2011
    “…This book Introduces GEF application components such as shapes, flow, logic, and text Explains Draw2D architecture, drawing features, and event processing Shows how to create and customize figures, use painting and borders, and work with each Draw2D Layout Manager Thoroughly explains GEF models, including domain and presentation information, populating diagrams, and more Shows how to use Zest’s content providers, filters, and layout algorithms Covers EditParts, EditPolicies, Tools, Commands, Actions, and much more The Eclipse Graphical Editing Framework (GEF) is the best resource for all Java tool developers who want to construct sophisticated graphical editing products that integrate with Eclipse, for experienced Eclipse users who want to start creating their own graphical tools, and for anyone who wants to see what makes GEF tick…”
    Libro electrónico
  14. 39594
    Publicado 2017
    “…We will then move on to AD schemas, global catalogs, LDAP, RODC, RMS, certificate authorities, group policies, and security best practices, which will help you gain a better understanding of objects and components and how they can be used effectively. …”
    Libro electrónico
  15. 39595
    Publicado 2017
    “…Addressing the documentation challenges you’ll face as you create business policies, procedures, work instructions, and records – includin..…”
    Libro electrónico
  16. 39596
    Publicado 2020
    “…As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments. …”
    Libro electrónico
  17. 39597
    Publicado 2020
    “…Anyone with a working knowledge of managing identity, access, policies, updates, and apps can take this exam. Although not necessary, experience with Microsoft 365 workloads, Windows 10 devices, and non-Windows devices will be helpful…”
    Libro electrónico
  18. 39598
    Publicado 2020
    “…By working through examples that use an STM32F7 Nucleo board, the STM32CubeIDE, and SEGGER debug tools, including SEGGER J-Link, Ozone, and SystemView, you'll gain an understanding of preemptive scheduling policies and task communication. The book will then help you develop highly efficient low-level drivers and analyze their real-time performance and CPU utilization. …”
    Libro electrónico
  19. 39599
    Publicado 2016
    “…. · Quickly review the BGP protocol, configuration, and commonly used features · Master generic troubleshooting methodologies that are relevant to BGP networks · Troubleshoot BGP peering issues, flapping peers, and dynamic BGP peering · Resolve issues related to BGP route installation, path selection, or route policies · Avoid and fix convergence problems · Address platform issues such as high CPU or memory usage · Scale BGP using route reflectors, diverse paths, and other advanced features · Solve problems with BGP edge architectures, multihoming, and load balancing · Secure BGP inter-domain routing with RPKI · Mitigate DDoS attacks with RTBH and BGP Flowspec · Understand common BGP problems with MPLS Layer 3 or Layer 2 VPN services · Troubleshoot IPv6 BGP for service providers, including 6PE and 6VPE · Overcome problems with VXLAN BGP EVPN data center deployments · Fully leverage BGP High Availability features, including GR, NSR, and BFD · Use new BGP enhancements for link-state distribution or tunnel setup This book is part of the Networking Technology Series from Cisco Press, ..…”
    Libro electrónico
  20. 39600
    Publicado 2012
    “…And he is on the leadership faculty of the Center for Security Studies of the Swiss Federal Institute of Technology in Zurich, where he teaches in the Master’s in Advanced Studies in Crisis Management and Security Policy. He is a frequent guest lecturer at the Wharton School/University of Pennsylvania, the U.S. …”
    Video