Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Economic policy 3,338
- Economic conditions 2,919
- Government policy 1,438
- History 1,284
- Economics 1,279
- Business & Economics 1,277
- Economic History 1,063
- Education 809
- Politics and government 730
- Economic aspects 717
- Economic development 703
- Environmental policy 698
- Economic history 612
- Development 560
- Social aspects 553
- Management 526
- Political Science 509
- Computer networks 447
- Security measures 432
- Política económica 423
- Law and legislation 402
- Social policy 385
- Research 383
- Sustainable development 379
- Social Issues/Migration/Health 372
- Foreign relations 369
- Historia 369
- Energy policy 367
- Environmental aspects 360
- Social conditions 345
-
39581por Cooperman, Jessica“…By introducing young soldiers to what it saw as appropriately Americanized forms of Judaism and Jewish identity, the JWB hoped to prepare a generation of American Jewish men to assume positions of Jewish leadership while fitting comfortably into American society.This volume shows how, at this crucial turning point in world history, the JWB managed to use the policies and power of the U.S. government to advance its own agenda: to shape the future of American Judaism and to assert its place as a truly American religion…”
Publicado 2018
Libro electrónico -
39582por Egan, Mark“…Yet, it also stresses that a strategic approach to cyber security is essential, and that "tone at the top" will determine the effectiveness of any corporate cyber security policy." – Eric Benhamou, chairman of the board of directors, 3Com Corporation, palmOne, and PalmSource, Inc "This book is not about cyber security; it's about managing one's company and the role that cyber security plays in that scenario. …”
Publicado 2010
Libro electrónico -
39583Publicado 2007“…Inside, you'll find advice on topics such as The key elements your networks and systems need in order to make all other services run better Building and running reliable, scalable services, including web, storage, email, printing, and remote access Creating and enforcing security policies Upgrading multiple hosts at one time without creating havoc Planning for and performing flawless scheduled maintenance windows Managing superior helpdesks and customer care Avoiding the "temporary fix" trap Building data centers that improve server uptime Designing networks for speed and reliability Web scaling and security issues Why building a backup system isn't about backups Monitoring what you have and predicting what you will need How technically oriented workers can maintain their job's technical focus (and avoid an unwanted management role) Technical management issues, including morale, organization building, coaching, and maintaining positive visibility Personal skill techniques, including secrets for getting more done each day, ethical dilemmas, managing your boss, and loving your job System administration salary negotiation It's no wonder the first edition received Usenix SAGE's 2005 Outstanding Achievement Award! …”
Libro electrónico -
39584Publicado 2020“…The book also aims to be a useful reference for government donor agencies, their implementing partners, and other high-level decision makers, and can be used as a course text in schools of public health, public policy, medicine, and development. ACKNOWLEDGMENT: This work was conducted under the USAID Applying Science to Strengthen and Improve Systems (ASSIST) Project, USAID Award No. …”
Libro electrónico -
39585por Hucaby, Dave“…Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with th..…”
Publicado 2008
Libro electrónico -
39586por Logan, Syd“…Build Cross-Platform Applications without Compromise Throughout the book, Logan illuminates his techniques with realistic scenarios and extensive, downloadable code examples, including a complete cross-platform GUI toolkit based on Mozilla’s XUL that you can download, modify, and learn from. Coverage includes Policies and procedures used by Netscape, enabling them to ship Web browsers to millions of users on Windows, Mac OS, and Linux Delivering functionality and interfaces that are consistent on all platforms Understanding key similarities and differences among leading platform-specific GUI APIs, including Win32/.NET, Cocoa, and Gtk+ Determining when and when not to use native IDEs and how to limit their impact on portability Leveraging standards-based APIs, including POSIX and STL Avoiding hidden portability pitfalls associated with floating point, char types, data serialization, and types in C++ Utilizing platform abstraction libraries such as the Netscape Portable Runtime (NSPR) Establishing an effective cross-platform bug reporting and tracking system Creating builds for multiple platforms and detecting build failures across platforms when they occur Understanding the native runtime environment and its impact on installation Utilizing wxWidgets to create multi-platform GUI applications from a single code base Thoroughly testing application portability Understanding cross-platform GUI toolkit design with Trixul…”
Publicado 2008
Libro electrónico -
39587por Gupta, Ajay“…Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio..…”
Publicado 2004
Libro electrónico -
39588por Potter, Neil S.“…You will learn how to: Scope and develop an improvement plan Identify and prioritize risks and mitigate anticipated difficulties Derive metrics that accurately measure progress toward business goals Sell your improvement program in-house Initially target practitioners and projects most-open to new approaches and techniques Stay focused on goals and problems Align the actions of managers and practitioners Delay major policy documents and edicts until solutions have been practiced and tested Use existing resources to sp..…”
Publicado 2002
Libro electrónico -
39589por Bhaiji, Fahim Hussain Yusuf“…Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. …”
Publicado 2008
Libro electrónico -
39590por Abelson, Harold“…Miller , Senior Director for Technology Policy and Strategy, Microsoft Corporation “Most writing about the digital world comes from techies writing about technical matter for other tech..…”
Publicado 2008
Libro electrónico -
39591Publicado 2009“…Coverage includes • Choosing the right edition of Google Apps for you • Setting up Google Apps so it will be easier to use and manage • Migrating your email, contacts, and calendars to Google Apps • Administering and securing Google Apps • Integrating Google Apps with other software and services • Leveraging Google Sites to collaborate across teams, organizations, or the entire world • Making the most of Google Talk voice calls and instant messaging • Implementing Google’s office productivity tools, including Docs, Spreadsheets, and Presentations • Using policy management and message recovery to control and secure your messaging • Customizing efficient Google Apps Start Pages for you and your colleagues • Sharing important and useful videos with your colleagues • Maximizing the innovative features of Google’s new web browser, Chrome SCOTT GRANNEMAN is an author, teacher, and entrepreneur with extensive experience in Google Apps migration, setup, and training. …”
Libro electrónico -
39592Publicado 2009“…Implement high availability–and leverage SQL Server 2008’s major improvements to failover clustering and database mirroring Save time with SQL Server 2008’s new policy-based management tools Performance tune and troubleshoot a SQL Server 2008 environment. …”
Libro electrónico -
39593Publicado 2011“…This book Introduces GEF application components such as shapes, flow, logic, and text Explains Draw2D architecture, drawing features, and event processing Shows how to create and customize figures, use painting and borders, and work with each Draw2D Layout Manager Thoroughly explains GEF models, including domain and presentation information, populating diagrams, and more Shows how to use Zest’s content providers, filters, and layout algorithms Covers EditParts, EditPolicies, Tools, Commands, Actions, and much more The Eclipse Graphical Editing Framework (GEF) is the best resource for all Java tool developers who want to construct sophisticated graphical editing products that integrate with Eclipse, for experienced Eclipse users who want to start creating their own graphical tools, and for anyone who wants to see what makes GEF tick…”
Libro electrónico -
39594Publicado 2017“…We will then move on to AD schemas, global catalogs, LDAP, RODC, RMS, certificate authorities, group policies, and security best practices, which will help you gain a better understanding of objects and components and how they can be used effectively. …”
Libro electrónico -
39595Publicado 2017“…Addressing the documentation challenges you’ll face as you create business policies, procedures, work instructions, and records – includin..…”
Libro electrónico -
39596Publicado 2020“…As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments. …”
Libro electrónico -
39597Publicado 2020“…Anyone with a working knowledge of managing identity, access, policies, updates, and apps can take this exam. Although not necessary, experience with Microsoft 365 workloads, Windows 10 devices, and non-Windows devices will be helpful…”
Libro electrónico -
39598Publicado 2020“…By working through examples that use an STM32F7 Nucleo board, the STM32CubeIDE, and SEGGER debug tools, including SEGGER J-Link, Ozone, and SystemView, you'll gain an understanding of preemptive scheduling policies and task communication. The book will then help you develop highly efficient low-level drivers and analyze their real-time performance and CPU utilization. …”
Libro electrónico -
39599Publicado 2016“…. · Quickly review the BGP protocol, configuration, and commonly used features · Master generic troubleshooting methodologies that are relevant to BGP networks · Troubleshoot BGP peering issues, flapping peers, and dynamic BGP peering · Resolve issues related to BGP route installation, path selection, or route policies · Avoid and fix convergence problems · Address platform issues such as high CPU or memory usage · Scale BGP using route reflectors, diverse paths, and other advanced features · Solve problems with BGP edge architectures, multihoming, and load balancing · Secure BGP inter-domain routing with RPKI · Mitigate DDoS attacks with RTBH and BGP Flowspec · Understand common BGP problems with MPLS Layer 3 or Layer 2 VPN services · Troubleshoot IPv6 BGP for service providers, including 6PE and 6VPE · Overcome problems with VXLAN BGP EVPN data center deployments · Fully leverage BGP High Availability features, including GR, NSR, and BFD · Use new BGP enhancements for link-state distribution or tunnel setup This book is part of the Networking Technology Series from Cisco Press, ..…”
Libro electrónico -
39600Publicado 2012“…And he is on the leadership faculty of the Center for Security Studies of the Swiss Federal Institute of Technology in Zurich, where he teaches in the Master’s in Advanced Studies in Crisis Management and Security Policy. He is a frequent guest lecturer at the Wharton School/University of Pennsylvania, the U.S. …”