Mostrando 642,481 - 642,500 Resultados de 645,079 Para Buscar 'C5N~', tiempo de consulta: 2.03s Limitar resultados
  1. 642481
    por Mariscotti, Eduardo Esteban
    Publicado 2020
    “…Thus, due to the importance of risk management in the business world and the necessary involvement of the CEO and the board of directors, it seems appropriate that executives get access to a book about risks, ethics, compliance and human resources directed not only to compliance experts but also to any organizational leader. …”
    Libro electrónico
  2. 642482
    Publicado 2019
    “…The objective of this paper is to introduce the major innovative Power H92 and Power H922 offerings and their relevant functions: The new IBM POWER9TM processor, which is available at frequencies of 2.8 - 3.8 GHz, 2.9 - 3.8 GHz, 2.8 - 3.8 GHz, 3.4 - 3.9 GHz, 3.5 - 3.9 GHz, and 3.8 - 4.0 GHz. Significantly strengthened cores and larger caches. …”
    Libro electrónico
  3. 642483
    Publicado 2015
    “…Built with a decentralized structure that’s perfect for a distributed team, Git manages branching, committing, complex merges, and task switching with minimal ceremony so you can concentrate on your code. About the Book Written for developers familiar with version control and ready for the good stuff in Git. …”
    Libro electrónico
  4. 642484
    Publicado 2019
    “…If you want to compete and win in the digital era, you have to Think Like Amazon …”
    Libro electrónico
  5. 642485
    Publicado 2024
    “…Understand how to capitalize on the Potential of AI: Learn how the next generation of AI tools can expand human creativity and intelligence, not diminish it. …”
    Libro electrónico
  6. 642486
    Tabla de Contenidos: “…Methods -- 4. Results -- 5. Conclusion -- References for English extract -- Appendix A. …”
    Libro electrónico
  7. 642487
    Publicado 2024
    Tabla de Contenidos: “…Review Questions -- Chapter 7 PKI and Cryptographic Applications -- Asymmetric Cryptography -- Public and Private Keys -- RSA -- ElGamal -- Elliptic Curve Cryptography -- Diffie-Hellman Key Exchange -- Quantum Cryptography -- Hash Functions -- SHA Family -- MD5 -- RIPEMD -- Comparison of Hash Function Value Lengths -- Digital Signatures -- HMAC -- Digital Signature Standard -- Public Key Infrastructure -- Certificates -- Certificate Authorities -- Certificate Life Cycle -- Certificate Formats -- Asymmetric Key Management -- Hybrid Cryptography -- Applied Cryptography -- Portable Devices -- Email -- Web Applications -- Steganography and Watermarking -- Networking -- Emerging Applications -- Cryptographic Attacks -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 8 Principles of Security Models, Design, and Capabilities -- Secure Design Principles -- Objects and Subjects -- Closed and Open Systems -- Secure Defaults -- Fail Securely -- Keep It Simple and Small -- Zero-Trust -- Trust but Verify -- Privacy by Design -- Secure Access Service Edge (SASE) -- Techniques for Ensuring CIA -- Confinement -- Bounds -- Isolation -- Access Controls -- Trust and Assurance -- Understand the Fundamental Concepts of Security Models -- Trusted Computing Base -- State Machine Model -- Information Flow Model -- Noninterference Model -- Composition Theories -- Take-Grant Model -- Access Control Matrix -- Bell-LaPadula Model -- Biba Model -- Clark-Wilson Model -- Brewer and Nash Model -- Select Controls Based on Systems Security Requirements -- Common Criteria -- Authorization to Operate -- Understand Security Capabilities of Information Systems -- Memory Protection -- Virtualization -- Trusted Platform Module (TPM) -- Interfaces -- Fault Tolerance -- Encryption/Decryption -- Manage the Information System Life Cycle -- Summary -- Study Essentials…”
    Libro electrónico
  8. 642488
    por Meyer, Eric A.
    Publicado 2000
    “…Cascading Style Sheets (CSS) is poised to make its mark on the Web. With good implementations in Internet Explorer 5.0 and Opera 3.6, and 100% support expected in Netscape's "Mozilla" browser, signs are that CSS is rapidly becoming a useful, reliable, and powerful tool for web authors. …”
    Libro electrónico
  9. 642489
    por Carroll, Brandon
    Publicado 2004
    “…CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. …”
    Libro electrónico
  10. 642490
    por Bainbridge, William Sims
    Publicado 2007
    “…Bainbridge is a Renaissance man who is helping to both create and elucidate the potential future worlds that confront us. …”
    Libro electrónico
  11. 642491
    Publicado 2007
    “…Short cut…”
    Libro electrónico
  12. 642492
    Publicado 2007
    “…What This Short Cut Covers 3 Introduction 4 Section 1: Typing and Running Your First Program in Phrogram 9 Section 2: How Your First Program Works 19 Section 3: Moving Your UFO on the Screen 30 Section 4: Bouncing Your UFO Around the Screen 44 Section 5: Keyboard Control of Your UFO 60 Section 6: Organize Your Program as It Grows 67 Section 7: UFO Escape! …”
    Libro electrónico
  13. 642493
    Publicado 2007
    “…His clients include the Walt Disney Co., the BBC, Kellogg’s, and Coca-Cola. Dawes’ work has been featured in numerous journals, including idN, Creative Review, MacUser, Computer Arts, Create, The Guardian, and Communications Arts. …”
    Libro electrónico
  14. 642494
    Publicado 2006
    “…Guide to using and defining MPLS VPN services…”
    Libro electrónico
  15. 642495
    Publicado 2002
    “…Additionally, the tutorial example programs are downloadable from the Sun Web site, so that you can adapt them to implementations of the JMS API and the J2EE platform. …”
    Libro electrónico
  16. 642496
    por Goleniewski, Lillian
    Publicado 2002
    “…The author’s extensive international experience in communicating to an audience drawn from diverse cultures and differing levels of familiarity with technical concepts and the English language enables her to enliven subject matter that otherwise can be dauntingly unapproachable. I commend this book to anyone seeking to develop their understanding of developing communications technologies, regardless of their technical background.” — Peter Leonard , Managing Partner, Technology and Communications, Gilbert & Tobin Lawyers “ Telecommunications Essentials provides a thorough overview of all aspects of the telecommunications network. …”
    Libro electrónico
  17. 642497
    Publicado 2007
    “…Praise for Project Management Accounting: Budgeting, Tracking, and Reporting Costs and Profitability "You don't need to be a Six Sigma Black Belt or a CPA to understand the principles and the practical tools presented by Callahan, Stetz, and Brooks in Project Management Accounting . …”
    Libro electrónico
  18. 642498
    Publicado 1999
    “…For intermediate and advanced developers, its treatment of database design and queries provides a handy treatment that otherwise has to be gleaned from relatively uninteresting textbooks, while its programming chapters constitute a handy reference to some basic operations that can be perform..…”
    Libro electrónico
  19. 642499
    Publicado 2008
    “…Advice on how specific language features affect security has been missing. The CERT ® C Secure Coding Standard fills this need.” –Randy Meyers, Chairman of ANSI C “For years we have relied upon the CERT/CC to publish advisories documenting an endless stream of security problems. …”
    Libro electrónico
  20. 642500
    por Horlin, Francois
    Publicado 2008
    Tabla de Contenidos: “…Coarse timing estimation -- 5.5 Coarse CFO estimation -- 5.6. Fine timing estimation -- 5.7. …”
    Libro electrónico