Mostrando 39,601 - 39,620 Resultados de 40,834 Para Buscar '"policial"', tiempo de consulta: 0.15s Limitar resultados
  1. 39601
    Publicado 2012
    “…And he is on the leadership faculty of the Center for Security Studies of the Swiss Federal Institute of Technology in Zurich, where he teaches in the Master’s in Advanced Studies in Crisis Management and Security Policy. He is a frequent guest lecturer at the Wharton School/University of Pennsylvania, the U.S. …”
    Video
  2. 39602
    Publicado 2012
    “…Use proven best practices to install Exchange Server 2013 from scratch or to upgrade from Exchange Server 2007/2010 Integrate Active Directory, DNS, fabric, and virtualization with Exchange Server 2013 Implement certificate-based Public Key Infrastructure (PKI) Plan, deploy, migrate to, and support public folders Protect your users and organization with both policy-based and content-enforced security Design and implement message archiving, retention, and eDiscovery Administer, optimize, and document your Exchange Server 2013 environment Architect all aspects of an integrated, enterprise-level Exchange Server 2013 environment Integrate Exchange Server with SharePoint Site Mailboxes, Enterprise Search, and more Leverage the robust Outlook client for Windows, Mac, Web, tablet, and mobile phones…”
    Libro electrónico
  3. 39603
    Publicado 2012
    “…Plan and migrate from Windows Server 2003 and 2008 Leverage powerful capabilities that are truly new in Windows Server 2012 Install Windows Server 2012 and the GUI-less Windows Server Core Upgrade to Windows Server 2012 Active Directory Utilize advanced AD capabilities including federated forests and identity management Plan and deploy network services, from DNS and DHCP to IPv6, IPAM, and IIS Protect systems and data with server-level security, transport-level security, and security policies Deliver true end-to-end secured anytime/anywhere access to remote/mobile clients Efficiently configure and manage users, sites, OUs, domains, and for­ests through Server Manager console Create more fault-tolerant environ­ments with DFS, clustering, and Network Load Balancing Leverage major Hyper-V virtualization improvements in availability, redun­dancy, and guest support Manage Active Directory more efficiently with Active Directory Administrative Center, Best Practice Analyzer, and PowerShell scripts Systematically tune, optimize, debug, and troubleshoot Windows Server 2012…”
    Libro electrónico
  4. 39604
    “…Interest in approaches and policies that ensure that any new substances substituted for chemicals of concern are assessed as carefully and thoroughly as possible has also burgeoned. …”
    Libro electrónico
  5. 39605
    por Kotler, Philip
    Publicado 2006
    “…., Adjunct Lecturer in Public Policy, John F. Kennedy School of Government, Harvard University “Kotler and Lee are teaching governments to motivate by invitation rather than intimidation. …”
    Libro electrónico
  6. 39606
    Publicado 2022
    “…What you will learn Become well-versed with cloud security concepts Get the hang of managing cloud identities Understand the zero-trust approach Adopt the Azure security cloud infrastructure Protect and encrypt your data Grasp Azure network security concepts Discover how to keep cloud resources secure Implement cloud governance with security policies and rules Who this book is for This book is for Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Azure Security Centre and other Azure security features. …”
    Libro electrónico
  7. 39607
    Publicado 2000
    “…What part did the Directorate play in the formulation of public policy? How did this role change? Through a study of the people behind the Directorate and its...…”
    Libro electrónico
  8. 39608
    Publicado 2017
    “…The study guide helps you master all the topics on the MCSA 70-741 exam for Windows Server 2016, including DNS implementation, including server configuration, zones, records, policies, DNSSEC, and DANE DHCP, including server installation, configuration, and scopes IPAM, including installation/configuration, DNS/DHCP management, and auditing Network connectivity and remote access solutions, including VPN, DirectAccess, NPS Radius, and wired clients Core and distributed network solutions, including IPv4 and IPv6 addressing, DFS, and branch office solutions Advanced network infrastructure…”
    Libro electrónico
  9. 39609
    por World Health Organization
    Publicado 2022
    “…Since the publication of the WHO Guidance for national tuberculosis programmes on the management of tuberculosis in children - second edition in 2014, new recommendations have been published in WHO guidelines and other policy documents on TB prevention, screening, diagnosis, treatment, management and models of care. …”
    Libro electrónico
  10. 39610
    Publicado 2020
    “…Along the way, you'll work with core algorithms, including deep Q-networks and policy gradients, along with industry-standard tools like PyTorch and OpenAI Gym. …”
    Grabación no musical
  11. 39611
    Publicado 2020
    “…Along the way, you'll work with core algorithms, including deep Q-networks and policy gradients, along with industry-standard tools like PyTorch and OpenAI Gym. …”
    Video
  12. 39612
    por James, Lawrence, 1943-
    Publicado 2013
    “…This view chimed with American foreign policy, and made the Americans rather more pragmatic about their demands for self-governance for Empire countries. …”
    Libro
  13. 39613
    Publicado 2019
    “…Psychology and Counseling Adult and Continuing Education Educational Theory Education Policy Civic Education and Leadership Special Education Rehabilitation Counseling Early Childhood Education Higher Education Lifelong Learning Philosophical issues in educational psychology and pedagogy. …”
    Libro electrónico
  14. 39614
  15. 39615
    Publicado 2019
    “…Para esto, se estudió a la Confederación Latinoamericana y del Caribe de Trabajadoras del Hogar (CONLACTRAHO), como un escenario regional; el Sindicato del Personal de Casas de Familia (Sinpecaf), de Argentina; la Federación Nacional de Sindicatos de Trabajadoras de Casa Particular (Fesintracap), de Chile, y la Unión de Trabajadoras Afrocolombianas del Servicio Doméstico (UTRASD), de Colombia In Latin America, the first fifteen years of the twenty-first century brought along with it a crisis panorama for the trade union movement, due to the establishment of corporatist logics, the strengthening of neoliberal policies that support the subsumptionś life to capital, and the establishment of cooperative relations on behalf of the working class with the superdominant class in which it is lost, the place of confrontation and the existence of a class struggle in societies is lost. …”
    Enlace del recurso
    Libro electrónico
  16. 39616
    Publicado 2020
    “…You will: Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan…”
    Libro electrónico
  17. 39617
    por Peter, Christophe
    Publicado 2015
    “…Second, as regards gender: boys are considered to be more allured by the virtual dimension.Third, as regards policy: video game playing is often set against “real” cultural practices. …”
    Electrónico
  18. 39618
    Publicado 2016
    “…Finally, in terms of the requirements set by clause 6.12 of the Department of Higher Education and Training policy on reworked publications, this book now contains more than 50% original content not published before. …”
    Electrónico
  19. 39619
    por Twum-Darko, Michael
    Publicado 2016
    “…It is also for policymakers and other stakeholders who need a better understanding of the impact of new developments on existing policies and regulations for their review or amendment…”
    Electrónico
  20. 39620
    por Bories-Sawala, Helga Elisabeth
    Publicado 2019
    “…Une partie originale est consacrée aux perceptions et comportements des requis du travail à l’égard de leurs compatriotes (prisonniers de guerre, volontaires, femmes françaises, déportés concentrationnaires), des autres étrangers (travailleurs de l’Ouest, internés militaires italiens, Polonais et Soviétiques) et des Allemands (employeurs, policiers, collègues de travail et femmes allemandes). …”
    Electrónico