Mostrando 455,021 - 455,040 Resultados de 457,774 Para Buscar 'As*', tiempo de consulta: 0.92s Limitar resultados
  1. 455021
    Publicado 2017
    “…Comment se conformer au règlement, y compris: Comprendre vos données, et où et comment elles sont utilisées (par exemple, les fournisseurs de Cloud, disques physiques); La documentation que vous devez maintenir (comme les déclarations de l'information que vous recueillez et traitez, les dossiers de consentement des personnes concernées, les processus de la protection des données personnelles); Les "mesures techniques et organisationnelles appropriées" que vous devez prendre pour assurer votre conformité avec le règlement. Un index complet du Règlement général sur la protection des données, qui vous permette de trouver les articles pertinents rapidement et facilement. …”
    Libro electrónico
  2. 455022
    Publicado 2017
    “…Richard holds the AWS Solution Architect Professional level, AWS Developer and SysOps Administrator associate level certifications. Skill Level Intermediate What You Will Learn Lesson 1: Operations Overview Lesson 2: Account Security and Management Lesson 3: Managing Network Resources Lesson 4: Managing Object Storage Lesson 5: Managing Compute Resources Lesson 6: Managing Block Storage Lesson 7: Managing Databases Lesson 8: Monitoring and Logging Lesson 9: Managing Containeriz..…”
    Video
  3. 455023
    Publicado 2017
    “…The book covers application portfolio management methodology, creating rapid modernization tools and accelerators including assessment and automation tools. You will learn to identify and create application portfolios, manage the application portfolios, automate the migration of Java applications to the latest Java platform, undertake large-scale migrations by utilizing concepts such as wave planning, dependency analysis, and cost estimation. …”
    Libro electrónico
  4. 455024
    Publicado 2019
    “…The project will then delve into various aspects of managing a project including setting up your timeline and Gantt chart. …”
    Video
  5. 455025
    Publicado 2015
    “…He’s observed that only a few people are talking about Photoshop for RWD constructively, yet a majority (63% as of his last informal poll) of web designers are using Photoshop for more than simple asset creation. This transition is a pain point for many designers. …”
    Libro electrónico
  6. 455026
    Publicado 2013
    “…Once you have completed this training video for Microsoft Windows Server 2012 Certification (Exam 70-411 - Administering Windows Server 2012) you will have the knowledge required to design, implement and administer the basic services in a Windows Server environment, bringing you one step closer to achieving your Microsoft Certified Solutions Associate designation…”
    Video
  7. 455027
    Publicado 2017
    “…Ideal for all working and aspiring SQL Server database professionals, this course combines incomparable hands-on MCSA 70-761 exam preparation with practical skill-building for real-world data management. …”
    Video
  8. 455028
    Publicado 2017
    “…Brien has also spent the last two years training as a Scientist-Astronaut candidate and continues to pursue this area of interest. …”
    Video
  9. 455029
    Publicado 2016
    “…Receive a comprehensive overview of the history, methods, technologies, goals, and limitations of encryption Learn to make practical reasoned choices regarding the forms of encryption to avoid and the forms to deploy Explore stream ciphers, block ciphers, authenticated encryption systems, and symmetric key encryption Discover why the widely used MD-5 hashing algorithm should no longer be used for most encryption purposes Familiarize yourself with Transport Level Security (TLS), the most widely-used Internet encryption mechanism Learn to deploy DHKE, the asymmetric key exchange protocol for establishing encrypted Internet channels Understand RSA, the encryption features it enables, and why it’s the standard for digitally-signing electronic documents Learn to recognize encryption attacks and why government demands for backdoors might cripple modern cryptography Brian Sletten runs Bosatsu Consulting, Inc., which focuses on security, encryption, and other forward-leaning technologies. …”
    Video
  10. 455030
    Extraordinary influence how great leaders bring out the best in others
    Extraordinary Influence
    Extraordinary Influence
    Publicado 2018
    “…It releases certain neuro chemicals associated with well-being and higher performance. Amazingly, criticism creates just the opposite neural reaction. …”
    Libro electrónico
  11. 455031
    Publicado 2018
    “…Sie erfahren, was Softwarearchitekten erreichen müssen – und welche Kerndisziplinen und -praktiken dafür erforderlich sind, wie Sie die wesentlichen Prinzipien des Softwaredesigns in Bezug auf die Funktionalität, die Komponententrennung und das Datenmanagement meistern, inwieweit Programmierparadigmen die Arbeit der Softwareentwickler einer Disziplin unterwerfen, die ihre Handlungsspielräume einschränkt, welche architektonischen Aspekte von entscheidender Bedeutung und welche eher unwesentliche »Details« sind, wie Sie optimale übergeordnete Strukturen für das Web, Datenbanken, Fat Clients, Konsolen und eingebettete Anwendungen implementieren, wie Sie geeignete Grenzen und Layer definieren sowie Komponenten und Services organisieren, warum Softwaredesigns und -architekturen scheitern und wie man solchen Fehlschlägen vorbeugen (oder auch beheben) k..…”
    Libro electrónico
  12. 455032
    Publicado 2019
    “…Deitel , CEO and Chief Technical Officer of Deitel & Associates, Inc., is a graduate of MIT, where he studied Information Technology. …”
    Video
  13. 455033
    Publicado 2016
    “…All the project files and assets you'll need are available for download, including "before-and-after" files demonstrating initial setup and proper completion for every exercise…”
    Libro electrónico
  14. 455034
    Publicado 2021
    “…You will: Understand the basic principles of cryptography before digging into the details of authentication mechanisms Be familiar with the theories behind password generation and the different types of passwords, including graphical and grid-based passwords Be aware of the problems associated with the use of biometrics, especially with establishing a suitable level of biometric matching or the biometric threshold value Study examples of multi-factor authentication protocols and be clear on the principles Know how to establish authentication and how key establishment processes work together despite their differences Be well versed on the current standards for interoperability and compatibility Consider future authentication technologies to solve today's problems…”
    Libro electrónico
  15. 455035
    Publicado 2014
    “…Summary of Activities and Labs—Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. …”
    Libro electrónico
  16. 455036
    Publicado 2017
    “…What You Will Learn Comprehend processes and fles - the core abstraction mechanisms of the Linux kernel that promote effective simplification and dynamism Decipher process scheduling and understand effective capacity utilization under general and real-time dispositions Simplify and learn more about process communication techniques through signals and IPC mechanisms Capture the rudiments of memory by grasping the key concepts and principles of physical and virtual memory management Take a sharp and precise look at all the key aspects of interrupt management and the clock subsystem Understand concurrent execution on SMP platforms through kernel synchronization and locking techniques In Detail Mastering Linux Kernel Development looks at the Linux kernel, its internal arrangement and design, and various core subsystems, helping you to gain significant understanding of this open source marvel. …”
    Libro electrónico
  17. 455037
    Publicado 2020
    “…You'll then start building the user interface (UI) of a complete real-world app using the storyboards feature in the latest version of Xcode and implement the code for views, view controllers, data managers, and other aspects of mobile apps. The book will also help you apply iOS 14 features to existing apps and introduce you to SwiftUI, a new way to build apps for all Apple devices. …”
    Libro electrónico
  18. 455038
    Publicado 2016
    “….” - Balram Avittathur, Professor, Indian Institute of Management Calcutta “Supply Chain Management: Text and Cases is an excellent book with comprehensive treatment of theory and practice covering people, process, technology and systems aspects of supply chain management with best practices from the context of emerging economies. …”
    Libro electrónico
  19. 455039
    Publicado 2015
    “…Jennifer has worked with hundreds of organizations including GE, Hewlett-Packard, NASA, Boeing and the CDC She is a Certified Speaking Professional (CSP), granted to only 8% of the National Speaker’s Association and she invites you to visit her website at jenniferkahnweiler.com/ …”
    Video
  20. 455040
    Publicado 2020
    “…As you read this book, you'll: Figure out which features are right for you Configure your system securely to ensure that you and people you authorize are the only ones with access to live and stored video Find out how to build a system entirely offline, in which no video or live streams make their way to the internet at all Understand the different kinds of cloud-based storage of video, and which you might be comfortable with Learn about Apple HomeKit Secure Video, a new option available for iPhone and iPad users and certain camera systems (including Logitech Circle 2 and Eufy cameras) that provides the highest level of privacy currently available in cloud storage Get to know features found in home security cameras, and how they affect the quality and nature of video you capture Set your system so that alerts only appear for the kinds of motion, sound, or other triggers that meet your threshold Avoid becoming part of the surveillance state—or opt into a limited and controlled part of it with a fuller understanding of what that means Learn about the legal aspects and limits of recording audio and video, and how they might (or might not) help catch criminals Get in-depth insight into over 10 of the most popular home security video cameras and systems, including Amazon Blink and Ring, Eufy, Google Nest, NETGEAR Arlo, Logitech Circle, Wyze, and several others Figure out whether you want a multi-camera system that records video on your network or smart cameras that stream ..…”
    Libro electrónico