Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
8121Publicado 2014Tabla de Contenidos: “…Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. …”
Libro electrónico -
8122por Mosby, Chris, 1971-Tabla de Contenidos: “…Installing and Configuring System Center Configuration Manager 2007 Release 2 (R2)The Bottom Line; Chapter 5: Client Installation; Client Software Features; Using Client Push Installation; Other Automatic Installation Methods; Manually Installing the Client; Verifying Client Installation; The Bottom Line; Chapter 6: Software Distribution; What's New in Software Distribution; Prerequisites for Software Distribution; Elements of Software Distribution; Preparing for Software Distribution; The Software Distribution Process; Monitoring Software Distribution Status; Virtual Application Packages…”
Publicado 2009
Libro electrónico -
8123Publicado 2009Tabla de Contenidos: “…4.3 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.4.4 Use monitoring tools on systems and networks and detect security-related anomalies.; 4.5 Compare and contrast various types of monitoring methodologies.; 4.6 Execute proper logging procedures and evaluate the results.; 4.7 Conduct periodic audits of system security settings.; Review Questions; Answers to Review Questions; Chapter 5: Cryptography; 5.1 Explain general cryptography concepts…”
Libro electrónico -
8124Publicado 2002Tabla de Contenidos: “…The Studio: Acoustics and Monitoring; Facility Goals; Acoustics; Monitoring…”
Libro electrónico -
8125por Iverson, DaveTabla de Contenidos: “…; Governance Risk; Asset Allocation Risk; Timing Risk; Structural Risks; Manager Risk; Implementation Risk; Monitoring Risk; Summary; Putting the Ideas into Action; Background; Plan; Chapter 2 Governance Risk; Why Governance Matters; Good Governance; Mission Clarity; Separate Governance and Management; Structure of Governing Body; Good Processes; Investment Beliefs…”
Publicado 2013
Libro electrónico -
8126
-
8127por Jackman, JohnTabla de Contenidos: “…Videotaping Church ServicesLive Theatre Taping; Summary; Chapter 13 Imagination and Invention; Appendix A: Using a Light Meter with Video; Light Meter Basics; Appendix B: Basic Primer in Signal Monitoring; Waveform Monitor; Vectorscope; Appendix C: Manufacturer Addresses; Glossary; Index; Color Plate Section…”
Publicado 2004
Libro electrónico -
8128por Havewala, Porus HomiTabla de Contenidos: “…Preface; Chaos at Data Centers; Team Effort; Common solutions used in data centers; Summary; Enter Oracle Cloud Control; The Grid - where the cloud came from; Overview of version 12c; Striking new features in 12c; Bonus sections; Ease the Chaos with Performance Management; Laying the foundation; Top Activity; Testing infrastructure changes; SQL Monitoring; Doctor in the database; Real-Time ADDM; Compare Period ADDM; Active Session History (ASH) analytics; Summary; Ease the Chaos with Configuration Management and Security Compliance; Lifecycle management; Auto discovery; Inventory…”
Publicado 2012
Libro electrónico -
8129Publicado 2013Tabla de Contenidos: “…Chapter 3: Thinking About RiskChapter 4: Thinking About Systems; Chapter 5: Success Factors; Chapter 6: Risk Management Framework Planning and Initiation; Chapter 7: Risk Management Framework Steps 1 & 2; Chapter 8: Risk Management Framework Steps 3 & 4; Chapter 9: Risk Management Framework Steps 5 & 6; Chapter 10: System Security Plan; Chapter 11: Security Assessment Report; Chapter 12: Plan of Action and Milestones; Chapter 13: Risk Management; Chapter 14: Continuous Monitoring; Chapter 15: Contingency Planning; Chapter 16: Privacy; Chapter 17: Federal Initiatives; Relevant Source Material…”
Libro electrónico -
8130Publicado 2012Tabla de Contenidos:Libro electrónico
-
8131Publicado 2014Tabla de Contenidos: “…Connecting MariaDB through Secure Socket LayerAuthentication plugins; Activating the pool of threads; Monitoring the pool of threads; Configuring the threadpool implementation; Configuring the pool of threads on Unix; Configuring the pool of threads on Windows; Tuning the configuration variables; Unblocking a blocked pool of threads; Monitoring connections; States of the process; Aborting connections; Summary; Chapter 6: Caches; InnoDB caches; InnoDB pages; The InnoDB buffer pool; Old and new pages; Buffer pool instances; Dirty pages; The read ahead optimization…”
Libro electrónico -
8132Publicado 2013Tabla de Contenidos: “…Obtaining Laboratory SuppliesChoosing and Ordering Expendables; Preparation of Camera Equipment; Preparation of Camera Truck; Preparation of Darkroom; Production; Start-of-the-Day Procedures; Setting Up the Camera; Organizing Equipment; Film Stocks; Film Stock Packaging Sizes; Camera Reports; Recording Shot Information; Magazines; Loading Magazines; Using a Changing Bag or Changing Tent; Marking Actors and Camera Positions; Slates; Slating Procedures; Changing Lenses, Filters, and Magazines; Using a Video Tap and Monitor; Preparing Exposed Film for Delivery to the Lab…”
Libro electrónico -
8133Publicado 2014Tabla de Contenidos:Libro electrónico
-
8134Publicado 2013Tabla de Contenidos: “…Chapter 32 - Example DSN Control HierarchyChapter 33 - SenSoft: Development of a Collaborative Sensor Network; Chapter 34 - Statistical Approaches to Cleaning Sensor Data; Chapter 35 - Plant Monitoring with Special Reference to Endangered Species; Chapter 36 - Designing Distributed Sensor Applications for Wireless Mesh Networks; Chapter 37 - Wireless Sensor Network Test Bed for Target Tracking; Chapter 38 - Lightweight Key Management in Multi-Hop Wireless Sensor Networks; Chapter 39 - Maritime Domain Awareness; Chapter 40 - Environmental Monitoring Application; Back Cover…”
Libro electrónico -
8135por Goldner, Paul S.Tabla de Contenidos: “…Planning: The Best Closing Strategy -- 7. Monitoring Your Progress -- 8. Managing Customer Perceptions -- 9. …”
Publicado 2010
Libro electrónico -
8136Publicado 2015Tabla de Contenidos: “…Implementation of ZooKeeper transactionsPhase 1 - leader election; Phase 2 - atomic broadcast; Local storage and snapshots; Summary; Chapter 3: Programming with Apache ZooKeeper; Using the Java client library; Preparing your development environment; The first ZooKeeper program; Implementing a Watcher interface; Example - a cluster monitor; The C client library; Getting started with the C API; Example - the znode data watcher; Python client bindings; A watcher implementation; Summary; Chapter 4: Performing Common Distributed System Tasks; ZooKeeper recipes; Barrier; Queue; Lock…”
Libro electrónico -
8137Publicado 2015Tabla de Contenidos: “…Planning for Skill and Resource RequirementsCreating a High-Performance Culture; Establishing and Integrating Areas of Practice; Orchestrating an Effective Performance; Final Thoughts; Chapter 3: Managing the Consulting Practice to Deliver Value; Maintaining a Professional Management System; Positioning Business Partner Role; Executing Effective Marketing and Business Development; Managing for Results; Final Thoughts; Chapter 4: Controlling Costs and Enhancing Value; The Planning and Budgeting Process; Monitoring and Controlling Costs; Managing Suppliers for Value…”
Libro electrónico -
8138Publicado 2014Tabla de Contenidos: “…Intangible Assets Frequently Fall Under Conventional MBA/CPA RadarIntangible Assets Routinely Comprise More than 80% of Most Companies' Value and Revenue; Management Teams' Self-deprecating Perspectives about Intangible Assets; Paradigm Shift to Intangible Assets Is Not a "Bubble" That Will Burst; There's No Better Time to Engage Your Company's Intangible Assets; Intangible Assets Require Regular Management and Monitoring; Intangible Assets Are Not Theoretical Musings Only to be Embraced in University Lecture Halls; Relevant and Forward-Looking Model; Global Business Perspective…”
Libro electrónico -
8139por Institute of Medicine (U.S.).Tabla de Contenidos: “…-- The Centrality of Informed Consent -- The Rise of Clinical Trials and Privately Funded Research -- Nonbiomedical Research -- Independent IRBs -- Sponsors -- The Role of the Research Participant -- Research Monitoring -- Accreditation Versus Certification -- 2 Models of Accreditation -- MODELS OF ACCREDITATION -- ELEMENTS OF AN ACCREDITATION PROCESS -- Accreditation Bodies -- PRIM& -- R and the Formation of AAHRPP -- The VA and NCQA Accreditation Process -- Eligibility Criteria and an Application Process -- Self-Evaluation -- External Evaluation -- Appeals Process -- Repeat Accreditation -- APPLYING THE MODELS TO HUMAN RESEARCH OVERSIGHT -- SOME ISSUES THAT ACCREDITATION ALONE CANNOT ADDRESS -- Identifying, Investigating, and Sanctioning Violations -- Educating Investigators -- Improving Research Monitoring -- WILL ACCREDITATION ENHANCE PERFORMANCE? …”
Publicado 2001
Libro electrónico -
8140por Institute of Laboratory Animal Resources (U.S.)Tabla de Contenidos: “…Guide for the Care and Use of Laboratory Animals -- Copyright -- Note -- Preface -- Contents -- Introduction -- REGULATIONS, POLICIES, AND PRINCIPLES -- EVALUATION CRITERIA -- FARM ANIMALS -- NONTRADITIONAL SPECIES -- FIELD INVESTIGATIONS -- OVERVIEW -- REFERENCES -- 1 Institutional Policies and Responsibilities -- MONITORING THE CARE AND USE OF ANIMALS -- Institutional Animal Care and Use Committee -- Animal Care and Use Protocols -- Physical Restraint -- Multiple Major Surgical Procedures -- Food or Fluid Restriction -- VETERINARY CARE -- PERSONNEL QUALIFICATIONS AND TRAINING -- OCCUPATIONAL HEALTH AND SAFETY OF PERSONNEL -- Hazard Identification and Risk Assessment -- Personnel Training -- Personal Hygiene -- Facilities, Procedures, and Monitoring -- Animal Experimentation Involving Hazards -- Personal Protection -- Medical Evaluation and Preventive Medicine for Personnel -- REFERENCES -- 2 Animal Environment, Housing, and Management -- PHYSICAL ENVIRONMENT -- Microenvironment and Macroenvironment -- Housing -- Primary Enclosures -- Sheltered or Outdoor Housing -- Naturalistic Environments -- Space Recommendations -- Temperature and Humidity -- Ventilation -- Illumination -- Noise -- BEHAVIORAL MANAGEMENT -- Structural Environment -- Social Environment -- Activity -- HUSBANDRY -- Food -- Water -- Bedding -- Sanitation -- Bedding Change -- Cleaning and Disinfection of Primary Enclosures -- Cleaning and Disinfection of Secondary Enclosures -- Assessing the Effectiveness of Sanitation -- Waste Disposal -- Pest Control -- Emergency, Weekend, and Holiday Care -- POPULATION MANAGEMENT -- Identification and Records -- Genetics and Nomenclature -- REFERENCES -- 3 Veterinary Medical Care -- ANIMAL PROCUREMENT AND TRANSPORTATION -- PREVENTIVE MEDICINE -- Quarantine, Stabilization, and Separation…”
Publicado 1996
Libro electrónico