Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
301Publicado 2022Tabla de Contenidos: “…-- Trade Finance Ecosystem -- Trade Finance Functional Architecture -- Case Study: Collateral Management -- Collateral Management Functional Architecture -- Collateral Management Architecture -- Microservices and User Interface: Micro Front End -- Routing -- Composition -- Communication -- Pros and Cons of Micro Front Ends -- Microservice Architecture in Artificial Intelligence -- AI Subcategories -- Microservices Vertical Components: Speech AI -- Summary -- Chapter 6: Event-Driven Architecture -- Evolution of Event-Driven Architecture -- Tightly Coupled World to Loosely Coupled World -- Message Broker World to Event World -- Event -- Business Events -- Technical Events -- Processing an Event -- Event Handling in Domain Context -- Event Governance -- What Is Event-Driven Architecture? …”
Libro electrónico -
302Publicado 2022Tabla de Contenidos: “…Part IV Communication and Network Security -- Chapter 11 Networking Fundamentals -- Data Communications Foundations -- Network Reference Models -- Protocols -- Application Layer -- Presentation Layer -- Session Layer -- Transport Layer -- Network Layer -- Data Link Layer -- Physical Layer -- Functions and Protocols in the OSI Model -- Tying the Layers Together -- Local Area Networks -- Network Topology -- Medium Access Control Mechanisms -- Layer 2 Protocols -- Transmission Methods -- Layer 2 Security Standards -- Internet Protocol Networking -- TCP -- IP Addressing -- IPv6 -- Address Resolution Protocol -- Dynamic Host Configuration Protocol -- Internet Control Message Protocol -- Simple Network Management Protocol -- Domain Name Service -- Network Address Translation -- Routing Protocols -- Intranets and Extranets -- Metropolitan Area Networks -- Metro Ethernet -- Wide Area Networks -- Dedicated Links -- WAN Technologies -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 12 Wireless Networking -- Wireless Communications Techniques -- Spread Spectrum -- Orthogonal Frequency Division Multiplexing -- Wireless Networking Fundamentals -- WLAN Components -- WLAN Standards -- Other Wireless Network Standards -- Other Important Standards -- Evolution of WLAN Security -- 802.11 -- 802.11i -- 802.11w -- WPA3 -- 802.1X -- Best Practices for Securing WLANs -- Mobile Wireless Communication -- Multiple Access Technologies -- Generations of Mobile Wireless -- Satellites -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 13 Securing the Network -- Applying Secure Design Principles to Network Architectures -- Secure Networking -- Link Encryption vs. End-to-End Encryption -- TLS -- VPN -- Secure Protocols -- Web Services -- Domain Name System -- Electronic Mail -- Multilayer Protocols -- Distributed Network Protocol 3.…”
Libro electrónico -
303Publicado 2022Libro electrónico
-
304por Gatti, Giovanni“…Bessarion initially attempted to incorporate Gatti's 'Notata' whole cloth into the 'In calumniatorem Platonis', but in the end he exploited it as a storehouse of the scholastic references, quotations, and arguments that made up the new Book III of the 1469 'In calumniatorem Platonis'. …”
Publicado 2021
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca Central de Capuchinos de España, Biblioteca de la Universidad de Navarra, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz)Libro -
305Publicado 2017Libro electrónico
-
306
-
307Publicado 2021Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
Libro electrónico -
308por Vanhove, SanderTabla de Contenidos: “…-- Networking in Godot Engine -- Learning about IP addresses -- Using port numbers -- Setting up the base networking code -- Creating the client-server connection -- Adding UI -- Running multiple debug instances at the same time -- Synchronizing different clients -- Updating the player scene for multiplayer -- Synchronizing EntitySpawner -- Synchronizing the enemy and collectibles -- Synchronizing the projectile -- Fixing the timer and end game -- Synchronizing the timer…”
Publicado 2024
Libro electrónico -
309Publicado 2023Libro electrónico
-
310Publicado 2008“…This comprehensive suite of tools provides end-to-e…”
Libro electrónico -
311Publicado 2015Libro electrónico
-
312Publicado 1998Tabla de Contenidos: “…Automated Categorization -- Search Engines -- Thesaurus Management Tools -- Portal or Enterprise Knowledge Platform -- Content Management Systems -- Analytics -- Diagramming Software -- Prototyping Tools -- User Research -- Questions to Ask -- Part V -- Making the Case for Information Architecture -- You Must Sell -- The Two Kinds of People in the World -- Running the Numbers -- Debunking the ROI Case -- Talking to the Reactionaries -- Other Case-Making Techniques -- The Information Architecture Value Checklist -- A Final Note -- Business Strategy -- The Origins of Strategy -- Defining Business Strategy -- Alignment -- Strategic Fit -- Exposing Gaps in Business Strategy -- One Best Way -- Many Good Ways -- Understanding Our Elephant -- Competitive Advantage -- The End of the Beginning -- Information Architecture for the Enterprise -- Information Architecture, Meet the Enterprise -- Finding Your Way Through an Enterprise Information Architecture -- What's the Goal of EIA? …”
Libro electrónico -
313Publicado 2018Libro electrónico
-
314Publicado 2023Libro electrónico
-
315
-
316
-
317Publicado 2010Tabla de Contenidos: “…Getting connected -- Going worldwide -- Connection technologies -- Choosing equipment -- Ordering the service -- Installing a modem for dial-up service -- Configuring a dial-up Internet connection -- Making and ending a dial-up connection -- Installing a network adapter for broadband service -- Configuring a high-speed connection -- Changing the default connection -- Managing multiple Internet connections -- 14. …”
Libro electrónico -
318Publicado 2018Libro electrónico
-
319Publicado 2018Libro electrónico
-
320Publicado 2023Tabla de Contenidos: “…Chapter 40 India Is Fostering a Solarized Digital Future -- India's Blockchain-Based Mobile Payment Systems -- Smart, Solar Cities -- Electric Vehicles -- Drones, Solar Power Satellite Systems, and Solar Missions -- Environmental Tax Policy in India -- Nonfungible Tokens -- Notes -- Chapter 41 Russia Leads Multinational Stablecoin Initiative -- Digitalization Is a Priority -- Solar Digital Initiatives for Power Plants and Waterways -- Solar Power Satellite (SPS) Systems -- Nonfungible Tokens -- Tax Policy in Russia and Member States -- Russia's Cryptocurrency Laws -- Notes -- Chapter 42 Africa's Solarized Digitalization Agenda in the Time of Coronavirus -- UNECA's Digital Agenda -- Digital Currencies in Africa -- Nigeria Is the World's Second-Largest Bitcoin Market -- Nonfungible Tokens -- The Solar Energy Potential of Africa -- Notes -- Chapter 43 The Need to Report Carbon Emissions Amid the Coronavirus Pandemic -- Global Environmental Tax Policy -- Carbon Tax -- Tax Credits -- Paris Agreement Climate Change Advocates -- Corporate Internal Carbon Pricing -- Country-by-Country Reporting Scheme -- Notes -- Chapter 44 The Pandemic Year Ends with a Tokenized Carbon Cap-and-Trade Solution -- World's First Tradable Carbon Token -- Cap-and-Trade Programs of the Top Six CO2-Emitting Countries/Regions of the World -- China -- United States -- European Union -- India -- Russia -- Japan -- Notes -- Chapter 45 The UN's COP26 Climate Change Goals Include Emerging Tech and Carbon Taxes -- Carbon Tax -- Notes -- Index -- EULA…”
Libro electrónico