Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 16,333
- Biblia 6,635
- Filosofía 4,700
- Universidad Pontificia de Salamanca (España) 4,581
- Crítica e interpretación 4,066
- Derecho 3,730
- RELIGION 3,643
- Educación 3,556
- Història 3,436
- Iglesia Católica 3,131
- Ciencias sociales 2,924
- Moral cristiana 2,518
- Teología dogmática 2,467
- Psicología 2,345
- Teología 2,339
- Management 2,201
- Sermones 2,189
- Development 2,161
- Derecho canónico 2,109
- History 1,989
- Education 1,951
- Derecho civil 1,950
- Documentales 1,893
- Universidad Pontificia de Salamanca, Facultad de Educación 1,877
- Engineering & Applied Sciences 1,850
- Medicina 1,761
- Tecnología 1,716
- Philosophy 1,704
- Application software 1,700
- Economía 1,618
-
642481por Mariscotti, Eduardo Esteban“…Thus, due to the importance of risk management in the business world and the necessary involvement of the CEO and the board of directors, it seems appropriate that executives get access to a book about risks, ethics, compliance and human resources directed not only to compliance experts but also to any organizational leader. …”
Publicado 2020
Libro electrónico -
642482Publicado 2019“…The objective of this paper is to introduce the major innovative Power H92 and Power H922 offerings and their relevant functions: The new IBM POWER9TM processor, which is available at frequencies of 2.8 - 3.8 GHz, 2.9 - 3.8 GHz, 2.8 - 3.8 GHz, 3.4 - 3.9 GHz, 3.5 - 3.9 GHz, and 3.8 - 4.0 GHz. Significantly strengthened cores and larger caches. …”
Libro electrónico -
642483Publicado 2015“…Built with a decentralized structure that’s perfect for a distributed team, Git manages branching, committing, complex merges, and task switching with minimal ceremony so you can concentrate on your code. About the Book Written for developers familiar with version control and ready for the good stuff in Git. …”
Libro electrónico -
642484Publicado 2019“…If you want to compete and win in the digital era, you have to Think Like Amazon …”
Libro electrónico -
642485Publicado 2024“…Understand how to capitalize on the Potential of AI: Learn how the next generation of AI tools can expand human creativity and intelligence, not diminish it. …”
Libro electrónico -
642486por Institute for Quality and Efficiency in Health CareTabla de Contenidos: “…Methods -- 4. Results -- 5. Conclusion -- References for English extract -- Appendix A. …”
Publicado 2022
Libro electrónico -
642487Publicado 2024Tabla de Contenidos: “…Review Questions -- Chapter 7 PKI and Cryptographic Applications -- Asymmetric Cryptography -- Public and Private Keys -- RSA -- ElGamal -- Elliptic Curve Cryptography -- Diffie-Hellman Key Exchange -- Quantum Cryptography -- Hash Functions -- SHA Family -- MD5 -- RIPEMD -- Comparison of Hash Function Value Lengths -- Digital Signatures -- HMAC -- Digital Signature Standard -- Public Key Infrastructure -- Certificates -- Certificate Authorities -- Certificate Life Cycle -- Certificate Formats -- Asymmetric Key Management -- Hybrid Cryptography -- Applied Cryptography -- Portable Devices -- Email -- Web Applications -- Steganography and Watermarking -- Networking -- Emerging Applications -- Cryptographic Attacks -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 8 Principles of Security Models, Design, and Capabilities -- Secure Design Principles -- Objects and Subjects -- Closed and Open Systems -- Secure Defaults -- Fail Securely -- Keep It Simple and Small -- Zero-Trust -- Trust but Verify -- Privacy by Design -- Secure Access Service Edge (SASE) -- Techniques for Ensuring CIA -- Confinement -- Bounds -- Isolation -- Access Controls -- Trust and Assurance -- Understand the Fundamental Concepts of Security Models -- Trusted Computing Base -- State Machine Model -- Information Flow Model -- Noninterference Model -- Composition Theories -- Take-Grant Model -- Access Control Matrix -- Bell-LaPadula Model -- Biba Model -- Clark-Wilson Model -- Brewer and Nash Model -- Select Controls Based on Systems Security Requirements -- Common Criteria -- Authorization to Operate -- Understand Security Capabilities of Information Systems -- Memory Protection -- Virtualization -- Trusted Platform Module (TPM) -- Interfaces -- Fault Tolerance -- Encryption/Decryption -- Manage the Information System Life Cycle -- Summary -- Study Essentials…”
Libro electrónico -
642488por Meyer, Eric A.“…Cascading Style Sheets (CSS) is poised to make its mark on the Web. With good implementations in Internet Explorer 5.0 and Opera 3.6, and 100% support expected in Netscape's "Mozilla" browser, signs are that CSS is rapidly becoming a useful, reliable, and powerful tool for web authors. …”
Publicado 2000
Libro electrónico -
642489por Carroll, Brandon“…CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. …”
Publicado 2004
Libro electrónico -
642490por Bainbridge, William Sims“…Bainbridge is a Renaissance man who is helping to both create and elucidate the potential future worlds that confront us. …”
Publicado 2007
Libro electrónico -
642491Publicado 2007“…Short cut…”
Libro electrónico -
642492Publicado 2007“…What This Short Cut Covers 3 Introduction 4 Section 1: Typing and Running Your First Program in Phrogram 9 Section 2: How Your First Program Works 19 Section 3: Moving Your UFO on the Screen 30 Section 4: Bouncing Your UFO Around the Screen 44 Section 5: Keyboard Control of Your UFO 60 Section 6: Organize Your Program as It Grows 67 Section 7: UFO Escape! …”
Libro electrónico -
642493Publicado 2007“…His clients include the Walt Disney Co., the BBC, Kellogg’s, and Coca-Cola. Dawes’ work has been featured in numerous journals, including idN, Creative Review, MacUser, Computer Arts, Create, The Guardian, and Communications Arts. …”
Libro electrónico -
642494Publicado 2006“…Guide to using and defining MPLS VPN services…”
Libro electrónico -
642495Publicado 2002“…Additionally, the tutorial example programs are downloadable from the Sun Web site, so that you can adapt them to implementations of the JMS API and the J2EE platform. …”
Libro electrónico -
642496por Goleniewski, Lillian“…The author’s extensive international experience in communicating to an audience drawn from diverse cultures and differing levels of familiarity with technical concepts and the English language enables her to enliven subject matter that otherwise can be dauntingly unapproachable. I commend this book to anyone seeking to develop their understanding of developing communications technologies, regardless of their technical background.” — Peter Leonard , Managing Partner, Technology and Communications, Gilbert & Tobin Lawyers “ Telecommunications Essentials provides a thorough overview of all aspects of the telecommunications network. …”
Publicado 2002
Libro electrónico -
642497Publicado 2007“…Praise for Project Management Accounting: Budgeting, Tracking, and Reporting Costs and Profitability "You don't need to be a Six Sigma Black Belt or a CPA to understand the principles and the practical tools presented by Callahan, Stetz, and Brooks in Project Management Accounting . …”
Libro electrónico -
642498Publicado 1999“…For intermediate and advanced developers, its treatment of database design and queries provides a handy treatment that otherwise has to be gleaned from relatively uninteresting textbooks, while its programming chapters constitute a handy reference to some basic operations that can be perform..…”
Libro electrónico -
642499Publicado 2008“…Advice on how specific language features affect security has been missing. The CERT ® C Secure Coding Standard fills this need.” –Randy Meyers, Chairman of ANSI C “For years we have relied upon the CERT/CC to publish advisories documenting an endless stream of security problems. …”
Libro electrónico -
642500por Horlin, FrancoisTabla de Contenidos: “…Coarse timing estimation -- 5.5 Coarse CFO estimation -- 5.6. Fine timing estimation -- 5.7. …”
Publicado 2008
Libro electrónico