Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
6901por Botta, Enrico“…While a simplification of the multidimensional reality of environmental policies, the EPS indicators are a first tangible effort to measure environmental policy stringency internationally over a relatively long time horizon. They show relatively high and significant correlations with alternative proxies of EPS used in the literature, such as measures of perceived stringency based on surveys, measures based on environmental outcomes and a composite policy-based measure with no time series. …”
Publicado 2014
Capítulo de libro electrónico -
6902Publicado 2007“…Creating a great layout on your monitor is only half the battle; how do you make it work on paper? …”
Libro electrónico -
6903por Hucaby, Dave“…The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. …”
Publicado 2004
Libro electrónico -
6904Publicado 2008“…MCTS Microsoft® Windows VistaTM, Configuring Exam 70-620 Don Poulton In This Book You Learn How To Prepare your computer for installation of Windows Vista Automate and troubleshoot your Windows Vista installation Configure and troubleshoot new Windows Vista features, including the Aero desktop interface, Parental Controls, User Account Control, Windows Defender, Internet Explorer 7, and Windows Firewall Configure and troubleshoot network connectivity, including IPv6 and remote access Work with media applications including Windows Media Center, Windows Media Player, Windows Photo Gallery, and Windows Movie Maker Improve your business productivity by using Windows Vista features such as Windows Mail, Windows Meeting Space, Windows Calendar, and Windows Fax and Scan Monitor and optimize system performance and reliability Make the most of your portable computer by using Windows Vista features such as the Windows Mobility Center, power options, the Tablet PC Input Panel, Handwriting Recognizer, and more WRITTEN BY a LEADING EXPERT! …”
Libro electrónico -
6905Publicado 2001“…Determine when the display resolution has beenchanged. Monitor the system for a low system resourcecondition. …”
Libro electrónico -
6906Publicado 2008“…Here you'll find what's new in the latest version; how to choose and install the right variation for your needs; how to monitor, maintain, and protect your data; and what it takes to keep your database healthy. …”
Libro electrónico -
6907“…You'll learn how to recover critical data and monitor processes for Exchange Server, SQL Server, SharePoint Server, Microsoft Virtual Server virtual machines, and Windows file servers and workstations…”
Libro electrónico -
6908por Daly, Tim, 1964-“…Sick of seeing the bright, saturated tones of photos on your monitor turn into washed-out, drab prints? Frustrated by the lack of resources on this essential process?…”
Publicado 2009
Libro electrónico -
6909por Hampton, John J., 1942-Tabla de Contenidos: “…Modern risk management -- Scope of ERM -- Contributions of ERM -- Challenge of the Black Swan -- Challenge of the 2008 financial crisis -- Implementing ERM -- Visual risk clusters -- Visual risk : a hypothetical case -- Tagging risk : an example -- Airbus A380 jumbo jet -- Product launch application -- Strategic risk -- Subculture risk -- Leadership risk -- Life cycle risk -- Horizon risk -- Aligning risk categories with the business model -- Avoiding business disruption -- ERM and Sarbanes-Oxley -- Coffee mug, candy, exotic jams, and Toyota -- ERM and swarm theory -- Cerberus and Chrysler -- Risk management and the history of ERM -- Evolving ERM since 2004 -- Risk management and the future of ERM -- Modern risk managers -- Chief risk and strategy officers -- Risk managers in person -- Central risk management committee…”
Publicado 2009
Libro electrónico -
6910por Michael, Randal K.“…UNIX programmers and system administrators can tailor these to build tools that monitor for specific system events and situations, building solid UNIX shell scripting skills to solve real-world sy…”
Publicado 2008
Libro electrónico -
6911Publicado 2008“…Featuring real-world insight and expert tips, this is a must-have guide for IBM Cognos 8 Business Intelligence users of all levels, from administrators to end users. Measure and monitor performance using dashboards and scorecards Assign user roles and privileges Provide complete and consistent access to a broad range of data sources via Cognos Connection Use Cognos 8 Go! …”
Libro electrónico -
6912Publicado 2012“…Discover how to: Use SSIS to extract, transform, and load data from multiple data sources Apply best practices to optimize package and project configuration and deployment Manage security settings in the SSISDB catalog and control package access Work with SSIS data quality features to profile, cleanse, and increase reliability Monitor, troubleshoot, and tune SSIS solutions with advanced features such as detailed views and data taps Load data incrementally to capture an easily consumable stream of insert, update, and delete activity…”
Libro electrónico -
6913Publicado 2012“…Assess your global social media presence and identify vulnerabilities Establish solid security policies at every level of your organization Allocate resources for planning, administration, and corrective action Monitor usage by employees, clients, competitors, and the public Block cyberstalking. phishing, malware, and identity theft exploits Guard intellectual property rights, trademarks, copyrights, and logos Preserve your brand image using online reputation management tools Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. …”
Libro electrónico -
6914Publicado 1988“…The book deals with the Control Program Monitor (CP/M) operating system and gives background information on file handling. …”
Libro electrónico -
6915por Lloyd, Darren“…Here’s WHAT you’ll learn: Set up your personal communication environment Communicate by voice, video, IM, and the web Add, monitor, categorize, and search for contacts Share content and set up conference calls on the fly Discover tabbed conversations and persistent chat Use Lync with other Microsoft Office programs Here’s HOW you’ll learn it: Jump in wherever you need answers Follow easy STEPS and SCREENSHOTS to see exactly what to do Get handy TIPS for new techniques and shortcuts Use TRY THIS! …”
Publicado 2013
Libro electrónico -
6916Publicado 2013“…Based on the best-selling book, Java Performance LiveLessons covers the latest Oracle and third-party tools for monitoring and measuring performance on a wide variety of hardware architectures and operating systems. …”
-
6917Publicado 2011“…Maximize your performance on the exam by learning to: Deploy or upgrade domain controllers, domains, and forests for Windows Server 2008 R2 Manage user accounts and groups with Windows PowerShell Implement Group Policy; configure software and security settings Configure DNS settings and zones Manage authentication Plan and manage Active Directory replication Monitor and ensure availability of directory services PRACTICE TESTS Assess your skills with practice tests. …”
Libro electrónico -
6918Publicado 2011“…Maximize your performance on the exam by learning to: Configure IPv4 and IPv6 addressing Deploy and configure DHCP servers, DNS servers, and DNS zones Implement Ipsec, Windows Firewall, and Network Access Protection (NAP) Plan and manage Windows Server Update Services Manage file and print services in Windows Server 2008 R2 Enable remote and wireless access, including DirectAccess Monitor and troubleshoot network performance PRACTICE TESTS Assess your skills with practice tests. …”
Libro electrónico -
6919Publicado 2011“…It then shows you the entire lifecycle and goes in depth on how to test, deal with errors, scale, deploy, and even monitor your app— details you can find only in the Camel code itself. …”
Libro electrónico -
6920Publicado 2017“…You will also learn how JMeter can help monitor tests in real-time. Further, you will go in depth into distributed testing and see how to leverage the capabilities of JMeter to accomplish this. …”
Libro electrónico