Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
5201
-
5202Publicado 2013Tabla de Contenidos: “…Integrating scholarship and practice -- pt. VII. Over the horizon : reflective essays from the pioneers…”
Libro electrónico -
5203Publicado 2020“…You'll learn how to make payments with a flick of your wrist using Apple Pay, keep track of your activity and sleep, monitor your heart health in real time, and even turn your watch into a digital walkie-talkie. …”
Libro electrónico -
5204por Organisation de coopération et de développement économiques.“…Quelles technologies énergétiques se profilent à l'horizon ? Quelles sont les implications du rôle grandissant joué par les pays en développement en tant que producteurs et consommateurs d'énergie ? …”
Publicado 1999
Libro electrónico -
5205Publicado 2002Tabla de Contenidos: “…1931836574.pdf; 1931836574.pdf; Cover; Table of Contents; Foreword; Chapter 1 Introduction to Sniffer Pro; Chapter 2 Installing Sniffer Pro; Chapter 3 Exploring the Sniffer Pro Interface; Chapter 4 Configuring Sniffer Pro to Monitor Network Applications; Chapter 5 Using Sniffer Pro to Monitor the Performance of a Network; Chapter 6 Capturing Network Data for Analysis; Chapter 7 Analyzing Network Issues; Chapter 8 Using Filters; Chapter 9 Understanding and Using Triggers and Alarms; Chapter 10 Reporting; Chapter 11 Detecting and Performing Security Breaches with Sniffer Pro…”
Libro electrónico -
5206Publicado 2015“…Both IBM Business Process Manager and Business Monitor build on the core capabilities of the IBM WebSphere® Application Server infrastructure. …”
Libro electrónico -
5207por Carter, Earl“…Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. …”
Publicado 2004
Libro electrónico -
5208por Roland, John F.“…Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. …”
Publicado 2004
Libro electrónico -
5209Publicado 2019“…Proven, actionable ways to install, manage, secure and monitor your vSphere 6.7 environments Key Features Get up to speed with the installation and life cycle management of a vSphere 6.7 environment, using a task-based approach Secure your vSphere environment using SSL Certificates Get introduced to the tools that are used to monitor the performance of the vSphere Environment Book Description VMware vSphere is the most comprehensive core suite of SDDC solutions on the market. …”
Libro electrónico -
5210Publicado 2016“…This course provides a detailed look at how to use Microsoft Project 2016 software to build, resource, cost out, monitor, and report on project plans for any size or type of project. …”
-
5211Publicado 2020“…Build, monitor, and manage real-time data pipelines to create data engineering infrastructure efficiently using open-source Apache projects Key Features Become well-versed in data architectures, data preparation, and data optimization skills with the help of practical examples Design data models and learn how to extract, transform, and load (ETL) data using Python Schedule, automate, and monitor complex data pipelines in production Book Description Data engineering provides the foundation for data science and analytics, and forms an important part of all businesses. …”
Libro electrónico -
5212
-
5213por Våge, LarsTabla de Contenidos: “…The meaning of news monitoring servicesEvaluating your monitoring service; Irrelevance in news monitoring services; Sample list of news monitoring and related services; Notes; 5 Evaluating news search tools; Introduction; Frequency of spidering; Sources; Searching; Results; 6 Keeping track of the blogosphere; Introduction; What exactly is a blog?…”
Publicado 2010
Libro electrónico -
5214Publicado 2004Tabla de Contenidos: “…Planning the CallManager implementation -- Planning centralized call processing deployments -- Installing CallManager -- Backing up and restoring the environment -- Upgrading and patching CallManager -- Securing the environment -- Configuring CallManager and IP telephony components -- Managing services and parameters -- Using multilevel administration -- Mastering directory integration -- Administering call detail records -- Managing and monitoring the system -- Using real-time monitoring tool -- CallManager 4.0 new feature description…”
Libro electrónico -
5215por Morgera, ElisaTabla de Contenidos: “…-- A contribution of human rights monitoring bodies? -- Standard-setting by international financial institutions -- Emerging standards on corporate accountability in IEL -- Tools for compliance -- The tools of international financial institutions : conditions in loan agreements and complaints mechanisms -- Sharpening the monitoring role of other international organizations -- Integrating international standards in UN-business partnerships…”
Publicado 2009
Libro -
5216por Goldsmith, BenTabla de Contenidos: “…-- Getting Started in the Project Panel -- Creating a New Project -- Switching Workspaces -- The Project Panel -- Importing Footage -- Organizing the Project Panel -- Viewing Metadata -- The Source Monitor -- Previewing Footage -- Some Notable Features -- In and Out points -- Creating a Sequence -- Creating a Sequence based off the Source Monitor -- The Timeline -- Navigating the Timeline -- Changing Your Clip Size -- The Program Monitor -- Calibrating Playback -- Adding More Clips to the Timeline -- Drag and Drop -- Preview the Timeline -- Toggle Track Output -- Disable Clip -- Basic Trimming and Rearranging -- Trimming a Clip -- Moving a Clip -- Extending a Clip -- Selecting Multiple Clips -- Move with Insert -- Move with Overwrite -- 2 Edit a Scene -- Other Ways of Adding Shots to a Timeline -- Mentally Plan the Edit -- Adding with the Source Monitor -- Adding an Insert -- The Tools -- The Tools Panel -- Track Select Forward Tool (A) -- Deleting Gaps -- Ripple Edit Tool (B) -- Rolling Edit Tool (N) -- Editing Just Video or Audio -- Rate Stretch Tool (R) -- Razor Tool (C) -- Slip Tool (Y) -- Slide Tool (U) -- The Trim Tool -- Let's Clean It Up a Little -- Pulling In Audio from Another Take -- Final Audio Touch-Ups -- Music -- Add the Music Track to the Timeline -- Adjusting Volume -- Mute and Solo -- Trim the Track -- Locking Audio -- Exporting -- The Export Dialog -- Ready to Export? …”
Publicado 2021
Libro electrónico -
5217Publicado 2002Tabla de Contenidos: “…ETI : aa multi-stakeholder approach / Mick Blowfield. Monitoring the monitors : a critique of third-party labour monitoring / Dara O'rourke. …”
Libro -
5218por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Bosnie-Herzégovine -- Bulgarie -- Avant propos -- Albanie -- Tour d'horizon régional -- Kosovo -- Croatie -- Liste des examinateurs…”
Publicado 2003
Libro electrónico -
5219
-
5220Publicado 2023Tabla de Contenidos: “…-- Monitoring Tools -- Monitoring Kubernetes Using Prometheus -- Logging Overview -- Tools for Logging -- Logging by Using a Loki-Stack -- Alerting -- Best Practices for Monitoring, Logging, and Alerting -- Monitoring -- Logging -- Alerting -- Summary…”
Libro electrónico