Mostrando 641,201 - 641,220 Resultados de 653,357 Para Buscar 'C5N~', tiempo de consulta: 2.38s Limitar resultados
  1. 641201
    Publicado 2023
    Tabla de Contenidos: “…4.7.1.2 Issues in Security -- 4.7.1.3 Governance and Regulation on the Internet of Drones Adaption -- 4.7.2 Research Gap and Future Direction on IoMD -- 4.8 Conclusions -- References -- 5. CoVacciDrone: An Algorithmic-Drone-Based COVID-19 Vaccine Distribution Strategy -- 5.1 Introduction -- 5.2 Dividing Sections into COVID Divisions with Voronoi Diagrams -- 5.3 Cost Optimization with Dynamic Connectivity -- 5.4 Dynamic Connectivity with Euler Tour Trees -- 5.5 Dynamic Connectivity with Cut-sets -- 5.6 Results and Observation -- References -- 6. …”
    Libro electrónico
  2. 641202
    por Goel, Anita
    Publicado 2012
    Tabla de Contenidos:
    Libro electrónico
  3. 641203
    por J.K. Lasser Institute
    Publicado 2022
    Tabla de Contenidos:
    Libro electrónico
  4. 641204
    por Gucer, Vasfi, Ceylan, Sanver
    Publicado 2005
    Tabla de Contenidos: “…4.2.1 Components of Tivoli Software Distribution -- 4.2.2 Software distribution process overview -- 4.3 Data Moving -- 4.3.1 Using the Data Moving Service -- 4.4 Enterprise Data Warehouse integration -- Chapter 5. Deployment Services -- 5.1 Activity Planner -- 5.1.1 Activity Planner components -- 5.1.2 Roles required for the Activity Planner -- 5.1.3 Types of activities -- 5.1.4 Activity Plan Editor -- 5.1.5 Activity Plan Monitor -- 5.1.6 Activity Planner commands -- 5.2 Change Manager -- 5.2.1 Change Manager components -- 5.2.2 Sample Change Manager scenario -- 5.3 Enterprise Directory integration -- 5.3.1 Exchanging data with a directory server -- 5.3.2 Manipulating DirectoryContext objects -- 5.3.3 Directory query libraries and query directories -- 5.4 Resource Manager and pervasive devices -- 5.4.1 Choosing where to install the Resource Manager components -- 5.4.2 Web Gateway installation -- 5.4.3 Web objects -- 5.4.4 Registering the resource types -- 5.4.5 Associating endpoints with the resource gateway -- 5.4.6 Enrolling pervasive devices -- 5.4.7 Installing and configuring devices for resource manager -- 5.4.8 Installing the device agent for Windows CE devices -- 5.4.9 The user ID of palm devices -- 5.4.10 Inventory scans on pervasive devices -- 5.5 Pristine Manager -- 5.5.1 Pristine Manager architecture and new components -- 5.5.2 Supported platforms for pristine installation -- 5.5.3 Key terms -- 5.5.4 Pristine Manager concepts -- 5.5.5 Prerequisites -- 5.5.6 Installing pristine machines -- 5.5.7 Customizing Pristine Manager -- 5.5.8 Adding an Operating System Element to a reference model -- 5.5.9 Pristine Manager commands -- 5.5.10 IBM Tivoli Enterprise Console notification -- Chapter 6. …”
    Libro electrónico
  5. 641205
    por Das, Lyla. B.
    Publicado 2011
    Tabla de Contenidos:
    Libro electrónico
  6. 641206
    Publicado 2019
    “…Herbert Tröndle, im Alter von 98 Jahren. Tröndle gehörte wegen seiner schriftstellerischen Tätigkeit, nicht zuletzt als Kommentator des StGB, als gefragter Gutachter vor dem Deutschen Bundestag und dem Bundesverfassungsgericht, aufgrund einer wirkmächtigen akademischen Lehrtätigkeit sowie durch die Kraft seiner Persönlichkeit zu den führenden deutschen Strafrechtswissenschaftlern des XX. …”
    Libro
  7. 641207
  8. 641208
    por Medrano, Manuel José
    Publicado 1725
    Tabla de Contenidos: “…Domingo de Guzman. 2. primera parte progresos de sus fundaciones y vidas de los ilustres hijos que la ennoblecieron, desde la muerte de su glorioso Patriarcha, hasta el año de MCCC : tomo segundo, desde el año de MCCXXI hasta el fin del siglo XIII. 3. segunda parte ... : tomo primero, trata de los sucesos, fundaciones y vidas de los santos y heroes ilustres que pertenecen a los primeros cinquenta años. 4. segunda parte, progressos de sus fundaciones y vidas de los illustres hijos que la ennoblecieron ... : tomo segundo ... 5. tercera parte ..., contiene los varios ... accidentes del siglo XV de la Iglesia y III de dicha religión ...: tomo primero, trata de los sucesos, fundaciones y vidas de los santos ... que pertenecen a los primeros L años…”
    Accés lliure via BiPaDi
    Accés lliure via BiPaDi
    Accés lliure via BiPaDi
    Accés lliure via BiPaDi
    Accés lliure via BiPaDi
    Libro
  9. 641209
    por Erner, Guillaume
    Publicado 2010
    Tabla de Contenidos: “…MÁS LAS REDES QUE LAS INFLUENCIAS; 2. ¿QUIÉNES SON LOS INFLUENCIADORES?; CAPÍTULO V LAS TENDENCIAS: UN PROCESO SIN (...)…”
    Libro electrónico
  10. 641210
    Publicado 2005
    Tabla de Contenidos: “…Introducción; 5.1. De la ideología comunicacional; 5.2. De los criterios de gestión; 6. …”
    Libro electrónico
  11. 641211
    por Rodríguez Becerra, Manuel
    Publicado 2015
    Tabla de Contenidos: “…VARIACIÓN DE NIVELES DE AGUA (...) -- FIGURA 5. CORTE TRANSVERSAL TÍPICO EN UN (...) -- FIGURA 6. …”
    Libro electrónico
  12. 641212
    por Vázquez Allegue, Jaime
    Publicado 2019
    Tabla de Contenidos: “…Versiones de la Biblia -- 5.1. Versiones antiguas -- 5.2. Versiones modernas -- 5.3. …”
    Libro electrónico
  13. 641213
    por Chaparro Amaya, Adolfo
    Publicado 2023
    Tabla de Contenidos: “…Rebis. "La danza hermética en un mundo cibernético" -- Diquis Tiquis (Costa Rica). …”
    Libro electrónico
  14. 641214
    por Lewandowska, Julia
    Publicado 2019
    Tabla de Contenidos: “…La palabra no olvida de donde vino»: las interpelaciones autorales -- 1.1.1. La autoría en la Alta Edad Moderna: un acercamiento teórico histórico -- 1.1.2. …”
    Libro electrónico
  15. 641215
    Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
    Libro electrónico
  16. 641216
    por Joshua Goldstein
    Publicado 2021
    Tabla de Contenidos: “…-- Chapter 2 Realist Theories -- Realism -- Power -- Defining Power -- Estimating Power -- Elements of Power -- The International System -- Anarchy and Sovereignty -- Balance of Power -- Great Powers and Middle Powers -- Power Distribution -- Hegemony -- The Great Power System, 1500-2000 -- Alliances -- Purposes of Alliances -- NATO -- Public Opinion and International Relations Public Opinion and ICAN -- Seeking the Collective Good NATO in Afghanistan -- Other Alliances -- Regional Alignments -- Strategy -- Statecraft -- Policy Perspectives Prime Minister of India, Narendra Modi -- Rationality in International Relations -- The Prisoner's Dilemma -- Chapter Review -- Let's Debate the Issue Can the United States and China Coexist Peacefully? …”
    Libro electrónico
  17. 641217
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Supplier Diversity -- Chapter 1 Understanding the Growing Demand for Supplier Diversity -- Breaking Down What Supplier Diversity Is and Isn't -- What it is -- What it's not -- Investigating Whether Supplier Diversity Is Still Necessary -- Looking at reasons supplier diversity is still necessary -- Considering what supplier diversity needs to do to stay relevant -- Examining External Drivers Redefining Supplier Diversity -- Growth of minority entrepreneurship -- Demographic shifts: The changing face of the majority -- Social activism/economic inclusion -- Accountability to secondary stakeholders -- Recognizing Why Organizations Are Recommitting to Supplier Diversity -- Complex business challenges/ strategic advantage -- Increased focus on collaboration in the supply chain -- Compliance with the law -- Accountability to primary stakeholders -- Corporate social responsibility/stewardship -- Chapter 2 Understanding the Foundation of Supplier Diversity -- Looking at Where It All Began -- Executive Order 10925 (1961): Established Committee on Equal Opportunity Employment -- Executive Order 11246 (1965): Established Requirements for Non-discriminatory Practices -- Executive Orders 11458 (1969) and 11625 (1971): Economic Entrepreneurial b Equality -- Public Law 95-507 (1978) -- Examining the Evolution of Supplier Diversity -- Compliance with federal law (1969-1990) -- The right thing to do (1990s-early 2000s) -- Making the business case (2000s-present) -- Pondering the Future of Supplier Diversity -- Business and program globalization -- Strategic advantage -- Economic imperative…”
    Libro electrónico
  18. 641218
    Publicado 2019
    Tabla de Contenidos:
    Libro electrónico
  19. 641219
    Publicado 2018
    Tabla de Contenidos: “…Designing application solutions using Azure Functions -- Durable Functions -- Workflow-driven applications using Logic Apps -- Designing application solutions using Logic Apps -- Designing for serverless computing using Azure Container Instances -- Creating containers -- Container orchestrations -- Azure Service Fabric -- Life cycle management -- API Management -- API Gateway -- API Management portal -- Developer portal -- Cloud-native deployments versus migrating assets -- Summary -- Questions -- Further reading -- Chapter 5: Robust Networking Implementations -- Technical requirements -- Azure Virtual Network -- IP addresses -- Public IP address -- Private IP address -- Creating a public IP address -- DNS -- Creating a VNet with two subnets -- Azure Load Balancer -- Probes -- Azure Traffic Manager -- Azure Application Gateway -- External connectivity for Azure Virtual Networks -- Azure VPN -- Site-to-site VPN -- VNet-to-VNet VPN -- Point-to-site VPN -- ExpressRoute -- Network security strategies -- DMZ -- Network Security Groups -- Creating a NSG -- User Defined Routes -- Creating User Defined Routes -- Virtual network service tunneling -- Web Application Firewall -- Summary -- Questions -- Further reading -- Chapter 6: Connecting Hybrid Applications -- Azure Relay service -- Hybrid connections -- WCF Relays -- Azure Data Management Gateway for Data Factory -- Azure On-premises Data Gateway -- Azure App Service Hybrid Connections -- Azure App Service Virtual Network Integration -- Azure AD Application Proxy -- Joining VMs to domains -- Enabling Azure AD Domain Services -- Adding the VM to the managed domain -- Summary -- Questions -- Further reading -- Chapter 7: Using Storage Solutions -- Technical requirements -- Azure Storage and replication types -- Storage account types -- General-purpose v1 (GPv1) -- Blob storage -- General-purpose v2 (GPv2)…”
    Libro electrónico
  20. 641220
    Publicado 2018
    Tabla de Contenidos: “…-- Case studies of social engineering -- CEO fraud -- Financial phishing -- Social media phishing -- Ransomware phishing -- Bitcoin phishing -- Social engineering case study - Keepnet labs phishing simulation -- Analysis of top ten industries -- Examination of total emails sent within one year -- Evaluation of social engineering attacks of the top five companies with the largest number of users -- Tips -- Summary -- Chapter 11: Ask the Experts - Part 1 -- Troy Hunt -- Jonathan C. …”
    Libro electrónico