Mostrando 3,121 - 3,140 Resultados de 3,333 Para Buscar 'Hiyaz~', tiempo de consulta: 0.95s Limitar resultados
  1. 3121
    Publicado 2003
    Tabla de Contenidos: “…Migration examples -- 9.1 Migration of HIDAM database to PHIDAM -- 9.1.1 Image copy of non-HALDB database data sets -- 9.1.2 Running the Migration Aid utility -- 9.1.3 Unloading the HIDAM database -- 9.1.4 Saving database information -- 9.1.5 Deleting the database from the RECONs -- 9.1.6 Changing the DBD and running the DBDGEN -- 9.1.7 Defining partitions with PDU -- 9.1.8 Allocate HALDB data sets -- 9.1.9 Initializing HALDB partitions -- 9.1.10 Loading HALDB database -- 9.1.11 Image copy HALDB data sets -- 9.1.12 ACBGEN -- 9.2 Migration of a database with a secondary index -- 9.3 Migrating a PDB database -- Chapter 10. …”
    Libro electrónico
  2. 3122
    Publicado 2018
    Tabla de Contenidos: “…Chapter 9: DevOps in the Hybrid Cloud -- The development cycle and DevOps -- The traditional development stages -- Merging the different teams -- Creating the infrastructure -- Configuring the infrastructure -- Templatize -- DevOps or NoOps -- IaaC with Terraform -- Installing Terraform -- Configuring and using Terraform -- Configuration management using Ansible -- Installing Ansible -- Configuring Ansible and a sample playbook -- Summary -- Chapter 10: Monitoring the Hybrid Cloud -- The traditional concepts in monitoring -- Availability monitoring -- ICMP monitoring -- TCP/UDP monitoring -- Enhanced monitoring -- SNMP-based availability monitoring -- Performance monitoring -- SNMP monitoring -- WMI monitoring and custom agent monitoring -- Monitoring the hybrid cloud -- Prometheus -- The implementation architecture of Prometheus -- Installing Prometheus -- Downloading Prometheus -- Setting up directories -- Setting up startup script -- Setting up node exporter -- Configuring Prometheus -- Grafana -- Installing Grafana -- Configuring Grafana to use Prometheus -- Summary -- Chapter 11: Security in a Hybrid Cloud -- Components of security -- The CIA triad -- Confidentiality -- Integrity -- Availability -- Tools to protect against the breaches -- IAM systems -- Data encryption in rest and in motion -- Network perimeter security -- Firewalls -- IDS/IPS -- Proxies -- Host controls -- High availability and disaster recovery -- Detection and analytics mechanism -- Minimizing shared infrastructure -- Compliance standards and controls -- HIPAA compliance standards -- Administrative controls -- Physical controls -- Technical controls -- Security controls consideration in hybrid cloud -- Common controls -- Implementing the controls on AWS - public cloud -- Security - shared responsibility model -- Implementing the controls in private cloud…”
    Libro electrónico
  3. 3123
    Publicado 2022
    Tabla de Contenidos: “…Private Service Connect for Google APIs with Consumer HTTP(S) -- Private Google Access -- Private Google Access for On-Premises Hosts -- Private Service Connect for Published Services -- Private Service Access -- Serverless VPC Access -- Load Balancing -- Regional Load Balancing -- Global Load Balancing -- Additional Network Services -- Service Directory -- Cloud CDN -- Cloud DNS -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Designing for Security and Legal Compliance -- Identity and Access Management and Related Access Control Services -- Identities and Groups -- Resources -- Permissions -- Roles -- Policies -- Cloud IAM Conditions -- IAM Best Practices -- Identity-Aware Proxy -- Workload Identity Federation -- Organization Constraints -- Data Security -- Encryption -- Key Management -- Cloud Storage Data Access -- Security Evaluation -- Penetration Testing -- Auditing -- Security Design Principles -- Separation of Duties -- Least Privilege -- Defense in Depth -- Major Regulations -- HIPAA/HITECH -- General Data Protection Regulation -- Sarbanes-Oxley Act -- Children's Online Privacy Protection Act -- ITIL Framework -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Designing for Reliability -- Improving Reliability with Cloud Operations Suite -- Monitoring with Cloud Monitoring -- Alerting with Cloud Monitoring -- Logging with Cloud Logging -- Open Source Observability Tools -- Release Management -- Continuous Delivery -- Continuous Integration -- Systems Reliability Engineering -- Overload -- Cascading Failures -- Testing for Reliability -- Incident Management and Post-Mortem Analysis -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 Analyzing and Defining Technical Processes -- Software Development Lifecycle Plan -- Analysis -- Design -- Continuous Integration/Continuous Delivery…”
    Libro electrónico
  4. 3124
    Publicado 2012
    “…A partir de ahí procederemos a eliminar los resultados que se hayan podido producir entre ellas para obtener, finalmente, la información consolidada. …”
    Libro electrónico
  5. 3125
    Publicado 2021
    “…Este volumen reúne los ensayos de uno de los más grandes congresos científicos que se hayan realizado sobre el fútbol latinoamericano y el mayor en el continente europeo, organizado por miembros de la Asociación Alemana de Investigaciones sobre América Latina (ADLAF) en 2018. …”
    Libro electrónico
  6. 3126
    Publicado 2017
    Tabla de Contenidos: “…Overview -- Leaderboard -- Knowledge Base -- Community -- Search -- Net Promoter Score -- Satisfaction -- Insights -- Zendesk Insights/GoodData -- Creating a Dashboard and Tab -- Adding reports -- Adding filters -- Adding Widgets -- Adding some text and lines -- Creating custom reports -- Creating custom metrics -- Schedule dashboard E-mails -- Summary -- Chapter 8: Security Settings and SSO -- Security settings and best practice -- Access security -- Zendesk password authentication -- Two-factor authentication -- Zendesk's single sign-on options -- Social media SSO -- Enterprise SSO -- Secure Assertion Markup Language (SAML) -- IP restrictions -- Using custom roles to reduce unnecessary access -- Auditing your Zendesk account -- Secure coding practices -- Removing/Redacting Credit Card numbers -- Private attachments -- Advanced Security Enterprise Add-on -- Data at rest encryption -- Enhanced disaster recovery -- HIPAA compliance -- In case of a breach -- Summary -- Chapter 9 : Troubleshooting Zendesk -- Troubleshooting performance issues -- Zendesk status -- General browser issues -- Disabling extensions/plugins -- Clearing browsing data/cache -- Traceroute -- Troubleshooting business rules -- Triggers and automations -- Ticket events -- Trigger order -- SLAs -- Troubleshooting Zendesk apps -- Contacting Zendesk support -- Summary -- Chapter 10: Zendesk Tips and Tricks -- Business rules -- Notifying the team leader about a ticket with a high amount of replies -- Using tags to disable or enable business rules for tickets -- Closing a ticket via a tag -- Disabling the satisfaction survey via a tag -- Removing tags from follow-up tickets -- Using business rules to detect and fix user errors -- Adding comments to tickets via a URL target -- Logging ticket events via an e-mail target -- Roles and views -- Creating a vacation view…”
    Libro electrónico
  7. 3127
    Publicado 2022
    Tabla de Contenidos: “…The Employee Retirement Income Security Act (ERISA) -- Fair Labor Standards Act (FLSA) (1938), as Amended -- Health Insurance Portability and Accountability -- Act (HIPAA) -- Social Security Act -- The Uniformed Services Employment -- and Reemployment Rights Act (USERRA) -- Consolidated Omnibus Budget Reconciliation -- Act (COBRA) -- Family and Medical Leave Act (FMLA) -- Patient Protection and Affordable Care Act (PPACA) -- Total Rewards -- Secrecy or Transparency? …”
    Libro electrónico
  8. 3128
    por A. Osman, Mona
    Publicado 2018
    Electrónico
  9. 3129
    Publicado 2023
    Tabla de Contenidos: “…General Data Protection Regulation -- EU-US Safe Harbor -- US Privacy Act of 1974 -- International Cooperation -- Import/Export Restrictions -- Trans-border Data Flow -- Important Laws and Regulations -- US Computer Fraud and Abuse Act -- HIPAA -- United States Breach Notification Laws -- Ethics -- The (ISC)2 Code of Ethics -- The (ISC)2 Code of Ethics Canons in Detail -- Computer Ethics Institute -- IABs Ethics and the Internet -- Information Security Governance -- Security Policy and Related Documents -- Policy -- Components of Program Policy -- Policy Types -- Procedures -- Standards -- Guidelines -- Baselines -- Personnel Security -- Candidate Screening and Hiring -- Onboarding -- Employee Termination -- Security Awareness and Training -- Gamification -- Security Champions -- Access Control Defensive Categories and Types -- Preventive -- Detective -- Corrective -- Recovery -- Deterrent -- Compensating -- Comparing Access Controls -- Risk Analysis -- Assets -- Threats and Vulnerabilities -- Risk=Threat x Vulnerability -- Impact -- Risk Analysis Matrix -- Calculating Annualized Loss Expectancy -- Asset Value -- Exposure Factor -- Single Loss Expectancy -- Annual Rate of Occurrence -- Annualized Loss Expectancy -- Total Cost of Ownership -- Return on Investment -- Budget and Metrics -- Risk Response -- Accept the Risk -- Risk Acceptance Criteria -- Mitigate the Risk -- Transfer the Risk -- Risk Avoidance -- Quantitative and Qualitative Risk Analysis -- The Risk Management Process -- Risk Maturity Modeling -- Security and Third Parties -- Service Provider Contractual Security -- Minimum Security Requirements -- Service Level Agreements and Service Level Requirements -- Attestation -- Right to Penetration Test/Right to Audit -- Supply Chain Risk Management -- Risks Associated With Hardware, Software, and Services -- Vendor Governance -- Acquisitions…”
    Libro electrónico
  10. 3130
    por Nomani, Qamar
    Publicado 2024
    Tabla de Contenidos: “…-- Regulatory frameworks and compliance standards -- GDPR -- HIPAA -- SOC 2 -- Federal Risk and Authorization Management Program -- California Consumer Privacy Act -- California Privacy Rights Act -- Personal Data Protection Act -- Federal Information Security Management Act -- ISO 27001 -- PCI DSS -- NIST Cybersecurity Framework -- Cloud Security Alliance Cloud Controls Matrix -- Center for Internet Security benchmark controls -- Cloud governance frameworks -- AWS WAF -- MCSB -- Adapting cloud governance to the organization's need -- Global versus regional compliance considerations -- Use cases, scenarios, and examples -- Use case #1 - Data protection and privacy -- Use case #2 - Incident reporting and notification -- Use case #3 - Compliance audits -- Challenges, CSPM roles, and future trends -- Challenges in compliance and governance -- CSPM's role in effective compliance management and governance -- Future trends in compliance and governance -- Summary…”
    Libro electrónico
  11. 3131
    Publicado 2013
    Tabla de Contenidos: “…Technical Controls -- Summary -- References -- Chapter 2: Risk Analysis -- Threat Definition -- Threat Vectors -- Threat Sources and Targets -- Types of Attacks -- Malicious Mobile Code -- Advanced Persistent Threats (APTs) -- Manual Attacks -- Risk Analysis -- Summary -- References -- Chapter 3: Compliance with Standards, Regulations, and Laws -- Information Security Standards -- COBIT -- ISO 27000 Series -- NIST -- Regulations Affecting Information Security Professionals -- The Duty of Care -- Gramm-Leach-Bliley Act (GLBA) -- Sarbanes-Oxley Act -- HIPAA Privacy and Security Rules -- NERC CIP -- PCI DSS: Payment Card Industry Data Security Standard -- Laws Affecting Information Security Professionals -- Hacking Laws -- Electronic Communication Laws -- Other Substantive Laws -- Summary -- References -- Chapter 4: Secure Design Principles -- The CIA Triad and Other Models -- Confidentiality -- Integrity -- Availability -- Additional Concepts -- Defense Models -- The Lollipop Model -- The Onion Model -- Zones of Trust -- Best Practices for Network Defense -- Secure the Physical Environment -- Harden the Operating System -- Keep Patches Updated -- Use an Antivirus Scanner (with Real-Time Scanning)…”
    Libro electrónico
  12. 3132
    Publicado 2023
    Tabla de Contenidos: “…-- Evaluating Architectural Fit and Integration -- Evaluating Actual Operational Work Involved -- The Difference between Monitoring and Participation -- Finding the Right Guidance -- HIPAA/HITECH -- HITRUST -- PCI-DSS -- ISO Information Security Management Standards 27001, 27002, 27017, 27018 -- ISO/IEC 27018 - Public Cloud PII Protection -- ISO/IEC 27017 - Cloud Services Security Controls -- Certified Vendors ISO 17021, and Separation of Duties -- American Institute of Certified Public Accountants/Service Organizational Controls Reports -- NIST Cybersecurity Framework (NIST CSF) -- CSA CCM, CAIQ, and STAR Registry -- CURES Act and HITECH Certification Requirements -- What Does This All Mean?…”
    Libro electrónico
  13. 3133
    Publicado 2024
    Tabla de Contenidos: “…Federal Cybersecurity Regulations -- Gramm-Leach-Bliley Act (GLBA) -- The Health Insurance Portability and Accountability Act (HIPAA) -- Interagency Guidelines Establishing Information Security Standards (12 CFR 30 Part B) -- Payment Card Industry Data Security Standard (PCI DSS) -- Sarbanes-Oxley Act (SOX) -- The Cloud Act -- Internal Revenue Service Publication 1075 -- Criminal Justice Information Services (CJIS) Security Policy -- Defense Federal Acquisition Regulation Supplement (DFARS)…”
    Libro electrónico
  14. 3134
    Publicado 2022
    Tabla de Contenidos: “…-- Summary -- What is HIPAA? -- Summary -- Summary -- Chapter 10: Engaging with Cloud Providers -- Technical requirements -- Choosing a cloud provider -- What is the most suitable cloud service model for our needs? …”
    Libro electrónico
  15. 3135
    Publicado 2022
    Tabla de Contenidos: “…Backup Solutions Out of the Cloud -- Integration and Network -- Access via Internet -- Azure ExpressRoutes/AWS Direct Connect/Google Cloud Interconnect -- Hybrid Cloud via Cloud Connect Using the Example of Equinix Fabric -- Comparison of Connection Types -- Automation -- Automation Goals -- Automation with Hyperscalers -- Third-Party Vendors -- SAP's Own Automation -- SAP Intelligent Robotic Process Automation -- Implementation Effort -- Horizontal and Vertical Scalability -- Horizontal Scalability -- Vertical Scalability -- Consider Availabilities -- Summary -- Chapter 3: SAP S/4HANA Deployment and Migration -- Contractual Basis and Support -- Important Points to Be Considered -- Direct Use or Use via a Partner -- Needed Support -- DSVGO -- Support for Projects -- GxP Framework and Important Certificates -- GxP in General -- Split of Responsibilities -- Additional Certifications -- SOC 1 and 2 -- HIPAA/HITECH/HITRUST -- ISO Certificates -- Management of an SAP S/4HANA Landscape -- Important Features of SAP Solution Manager -- Application Operation Using SAP Solution Manager -- Using SAP Cloud ALM -- Choosing a Hyperscaler -- Quantitative Factors -- Qualitative Factors -- Deployment and Migration -- Transformation Is a Must -- New Approaches Using the Cloud -- Greenfield Deployment -- Brownfield Deployment -- Homogeneous Migrations -- Heterogeneous Migrations -- Sequence of Migration -- Migration Scenarios for SAP S/4HANA Transformations -- SAP S/4HANA As SaaS Services -- Overview -- Differences Between the Editions -- Infrastructure Level -- Implementation Level -- Process Level -- Configuration and Enhancement Level -- Security Level -- Overall Comparison -- Advantages and Disadvantages -- Use Cases -- Summary -- Chapter 4: SAP S/4HANA on AWS Elastic Compute Cloud - Concepts and Architecture -- History of Amazon AWS…”
    Libro electrónico
  16. 3136
    por Dance, Beverly
    Publicado 2023
    Tabla de Contenidos: “…The Health Insurance Portability and Accountability Act (HIPAA) (1996) -- 1.19. The Immigration and Nationality Act (INA) (1952) -- 1.20. …”
    Libro electrónico
  17. 3137
    por Choudhury, Tanupriya
    Publicado 2023
    Tabla de Contenidos: “…Regulatory compliance requirements -- 7.4.1. HIPAA, HITRUST, HITECH and GDPR -- 7.4.2. Blockchain as a savior -- 7.5. …”
    Libro electrónico
  18. 3138
    Publicado 1996
    Tabla de Contenidos: “…Exegesis of the Old Testament in the Antiochene school with its prevalent literal and historical method / Sten Hidal -- 15. Exegetical contacts between Christian and Jews in the Roman Empire / Günter Stemberger -- 16. …”
    991006573209706719
  19. 3139
    Publicado 2004
    “…Includes new historical studies about Germany and Afghanistan, the relations between Berlin and Riyad, German archeological research, Arab inmates in Nazi concentration camps, prominents like F. …”
    Libro electrónico
  20. 3140
    Publicado 2019
    “…This assessment was conducted between 2013 and 2017 as the first of a series of monitoring and assessment reports, under the guidance of the HIMAP Steering Committee: Eklabya Sharma (ICIMOD), Atiq Raman (Bangladesh), Yuba Raj Khatiwada (Nepal), Linxiu Zhang (China), Surendra Pratap Singh (India), Tandong Yao (China) and David Molden (ICIMOD and Chair of the HIMAP SC). …”
    Libro electrónico