Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Economic policy 3,338
- Economic conditions 2,919
- Government policy 1,438
- History 1,284
- Economics 1,279
- Business & Economics 1,277
- Economic History 1,063
- Education 809
- Politics and government 730
- Economic aspects 717
- Economic development 703
- Environmental policy 698
- Economic history 612
- Development 560
- Social aspects 553
- Management 526
- Political Science 509
- Computer networks 447
- Security measures 432
- Política económica 423
- Law and legislation 402
- Social policy 385
- Research 383
- Sustainable development 379
- Social Issues/Migration/Health 372
- Foreign relations 369
- Historia 369
- Energy policy 367
- Environmental aspects 360
- Social conditions 345
-
39601Publicado 2012“…And he is on the leadership faculty of the Center for Security Studies of the Swiss Federal Institute of Technology in Zurich, where he teaches in the Master’s in Advanced Studies in Crisis Management and Security Policy. He is a frequent guest lecturer at the Wharton School/University of Pennsylvania, the U.S. …”
-
39602Publicado 2012“…Use proven best practices to install Exchange Server 2013 from scratch or to upgrade from Exchange Server 2007/2010 Integrate Active Directory, DNS, fabric, and virtualization with Exchange Server 2013 Implement certificate-based Public Key Infrastructure (PKI) Plan, deploy, migrate to, and support public folders Protect your users and organization with both policy-based and content-enforced security Design and implement message archiving, retention, and eDiscovery Administer, optimize, and document your Exchange Server 2013 environment Architect all aspects of an integrated, enterprise-level Exchange Server 2013 environment Integrate Exchange Server with SharePoint Site Mailboxes, Enterprise Search, and more Leverage the robust Outlook client for Windows, Mac, Web, tablet, and mobile phones…”
Libro electrónico -
39603Publicado 2012“…Plan and migrate from Windows Server 2003 and 2008 Leverage powerful capabilities that are truly new in Windows Server 2012 Install Windows Server 2012 and the GUI-less Windows Server Core Upgrade to Windows Server 2012 Active Directory Utilize advanced AD capabilities including federated forests and identity management Plan and deploy network services, from DNS and DHCP to IPv6, IPAM, and IIS Protect systems and data with server-level security, transport-level security, and security policies Deliver true end-to-end secured anytime/anywhere access to remote/mobile clients Efficiently configure and manage users, sites, OUs, domains, and forests through Server Manager console Create more fault-tolerant environments with DFS, clustering, and Network Load Balancing Leverage major Hyper-V virtualization improvements in availability, redundancy, and guest support Manage Active Directory more efficiently with Active Directory Administrative Center, Best Practice Analyzer, and PowerShell scripts Systematically tune, optimize, debug, and troubleshoot Windows Server 2012…”
Libro electrónico -
39604por National Research Council (U.S.). Committee on the Design and Evaluation of Safer Chemical Substitutions“…Interest in approaches and policies that ensure that any new substances substituted for chemicals of concern are assessed as carefully and thoroughly as possible has also burgeoned. …”
Publicado 2014
Libro electrónico -
39605por Kotler, Philip“…., Adjunct Lecturer in Public Policy, John F. Kennedy School of Government, Harvard University “Kotler and Lee are teaching governments to motivate by invitation rather than intimidation. …”
Publicado 2006
Libro electrónico -
39606Publicado 2022“…What you will learn Become well-versed with cloud security concepts Get the hang of managing cloud identities Understand the zero-trust approach Adopt the Azure security cloud infrastructure Protect and encrypt your data Grasp Azure network security concepts Discover how to keep cloud resources secure Implement cloud governance with security policies and rules Who this book is for This book is for Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Azure Security Centre and other Azure security features. …”
Libro electrónico -
39607Publicado 2000“…What part did the Directorate play in the formulation of public policy? How did this role change? Through a study of the people behind the Directorate and its...…”
Libro electrónico -
39608Publicado 2017“…The study guide helps you master all the topics on the MCSA 70-741 exam for Windows Server 2016, including DNS implementation, including server configuration, zones, records, policies, DNSSEC, and DANE DHCP, including server installation, configuration, and scopes IPAM, including installation/configuration, DNS/DHCP management, and auditing Network connectivity and remote access solutions, including VPN, DirectAccess, NPS Radius, and wired clients Core and distributed network solutions, including IPv4 and IPv6 addressing, DFS, and branch office solutions Advanced network infrastructure…”
Libro electrónico -
39609por World Health Organization“…Since the publication of the WHO Guidance for national tuberculosis programmes on the management of tuberculosis in children - second edition in 2014, new recommendations have been published in WHO guidelines and other policy documents on TB prevention, screening, diagnosis, treatment, management and models of care. …”
Publicado 2022
Libro electrónico -
39610Publicado 2020“…Along the way, you'll work with core algorithms, including deep Q-networks and policy gradients, along with industry-standard tools like PyTorch and OpenAI Gym. …”
Grabación no musical -
39611Publicado 2020“…Along the way, you'll work with core algorithms, including deep Q-networks and policy gradients, along with industry-standard tools like PyTorch and OpenAI Gym. …”
Video -
39612por James, Lawrence, 1943-“…This view chimed with American foreign policy, and made the Americans rather more pragmatic about their demands for self-governance for Empire countries. …”
Publicado 2013
Libro -
39613Publicado 2019“…Psychology and Counseling Adult and Continuing Education Educational Theory Education Policy Civic Education and Leadership Special Education Rehabilitation Counseling Early Childhood Education Higher Education Lifelong Learning Philosophical issues in educational psychology and pedagogy. …”
Libro electrónico -
39614
-
39615Publicado 2019“…Para esto, se estudió a la Confederación Latinoamericana y del Caribe de Trabajadoras del Hogar (CONLACTRAHO), como un escenario regional; el Sindicato del Personal de Casas de Familia (Sinpecaf), de Argentina; la Federación Nacional de Sindicatos de Trabajadoras de Casa Particular (Fesintracap), de Chile, y la Unión de Trabajadoras Afrocolombianas del Servicio Doméstico (UTRASD), de Colombia In Latin America, the first fifteen years of the twenty-first century brought along with it a crisis panorama for the trade union movement, due to the establishment of corporatist logics, the strengthening of neoliberal policies that support the subsumptionś life to capital, and the establishment of cooperative relations on behalf of the working class with the superdominant class in which it is lost, the place of confrontation and the existence of a class struggle in societies is lost. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
39616Publicado 2020“…You will: Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan…”
Libro electrónico -
39617por Peter, Christophe“…Second, as regards gender: boys are considered to be more allured by the virtual dimension.Third, as regards policy: video game playing is often set against “real” cultural practices. …”
Publicado 2015
Electrónico -
39618Publicado 2016“…Finally, in terms of the requirements set by clause 6.12 of the Department of Higher Education and Training policy on reworked publications, this book now contains more than 50% original content not published before. …”
Electrónico -
39619por Twum-Darko, Michael“…It is also for policymakers and other stakeholders who need a better understanding of the impact of new developments on existing policies and regulations for their review or amendment…”
Publicado 2016
Electrónico -
39620por Bories-Sawala, Helga Elisabeth“…Une partie originale est consacrée aux perceptions et comportements des requis du travail à l’égard de leurs compatriotes (prisonniers de guerre, volontaires, femmes françaises, déportés concentrationnaires), des autres étrangers (travailleurs de l’Ouest, internés militaires italiens, Polonais et Soviétiques) et des Allemands (employeurs, policiers, collègues de travail et femmes allemandes). …”
Publicado 2019
Electrónico