Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
8241Publicado 2004Tabla de Contenidos: “…Implications of transition -- 4.1 Items to check before and after the transition -- 4.1.1 Data saved by the transition tools -- 4.2 RRA (Restricted Root Access) -- 4.3 BIS (Boot Install Server) -- 4.4 Kerberos -- 4.5 Security on PSSP versus CSM -- 4.6 File collections -- 4.7 User management -- 4.8 Monitoring -- 4.8.1 Differences in monitoring between PSSP to CSM -- 4.8.2 Sample of monitoring item -- 4.9 Custom SDR classes -- 4.10 Customer scripts for specific tasks -- 4.11 Node-to-node access within CSM, RPD -- 4.12 sysctl -- 4.13 NTP -- 4.14 Automount…”
Libro electrónico -
8242Publicado 2024Tabla de Contenidos: “…The key aspects of cybersecurity architecture design -- Cybersecurity architecture design for cloud, enterprise application, and network -- Analysis -- Business goals -- Leveraging governance documents to understand organizational goals -- Applying documentation to the framework -- Risk tolerance -- Assessing risk tolerance -- Summary -- Chapter 5: Threat, Risk, and Governance Considerations as an Architect -- Threats -- Understanding the threat landscape -- The imperative for a proactive cybersecurity posture -- Elaborating on security objectives -- Identification and evaluation of security risks -- Continual monitoring and revision -- Imperative for architectural agility in contemporary digital environments -- Regulatory compliance as an intrinsic outcome -- Threat considerations - examples -- Summarizing threats -- Risks -- Risk cybersecurity architecture - an overview -- Implementing a risk cybersecurity architecture -- Managing risk with cybersecurity engineering -- Role of continuous monitoring in risk management -- Risk considerations - an in-depth analysis with practical exercises -- Summarizing risks -- Governance -- The imperative of cybersecurity governance -- The multifaceted components of a cybersecurity governance framework -- Best practices for implementing and augmenting cybersecurity governance -- Supplementary considerations -- Governance considerations - practical scenarios and exercises -- Summarizing governance -- How it all relates to the business -- Understanding the concepts - threats, risks, and governance -- The interplay of threats, risks, and governance -- Identifying and classifying risks -- Initial and residual risk assessment -- Risk mitigation strategies -- Monitoring and reviewing risks -- The role of enterprise architecture in risk management -- The role of governance in risk management…”
Libro electrónico -
8243Publicado 2023Tabla de Contenidos: “…-- Business risk appetite -- Organizational maturity -- Principles to guarantee the success of your information security program -- Business alignment -- Communication strategies -- Information security program plan elements -- Developing an information security program strategy -- Establishing key initiatives -- Defining roles and responsibilities -- Establishing enforcement areas -- Summary -- Chapter 6: Continuous Testing and Monitoring -- Types of technical testing -- SDLC considerations for testing -- Project initiation -- Requirements analysis -- System design -- System implementation -- System testing -- Operations and maintenance -- Disposition -- SDLC summary -- Continuous monitoring -- Information security assessment automation -- Effectively reporting information security metrics -- Alerting to information security weaknesses -- Vulnerability assessment -- Vulnerability scanning process -- Vulnerability resolution -- Penetration testing -- Phases of a penetration test -- Difference between vulnerability assessments and penetration testing -- Summary -- Chapter 7: Business Continuity/Disaster Recovery Planning -- Introduction to BCDR -- Integrating BC planning and DR planning -- Scope of a BCDR plan -- Focus areas for BCDR planning…”
Libro electrónico -
8244Publicado 2024Tabla de Contenidos: “…Overlooking Horizontal Pod Autoscaling opportunities -- Identifying anti-patterns in real-world scenarios -- Monitoring and metrics for resource overutilization -- Audit and compliance tools for Secrets and configurations -- Assessment strategies for containerization practices -- Visibility into resource limitation and quota management -- Health probe monitoring and alerting mechanisms -- Image optimization techniques for efficient containerization -- Audit tools for PV management…”
Libro electrónico -
8245por Higgs, Elizabeth S.Tabla de Contenidos: “…In Practice: Independent Monitoring of Emergency Response Clinical Trials -- 33.3. …”
Publicado 2024
Libro electrónico -
8246Publicado 2015Tabla de Contenidos: “…1.25 Fazit; Kapitel 2: Die passenden Räumlichkeiten; 2.1 Akustische Grundlagen - ohne Physik geht es nicht; 2.2 Der Regieraum; 2.2.1 Direktschall und Hallradius; 2.2.2 Akustikelemente; 2.3 Hi-Fi-Anlage als Abhöre; 2.4 Die Monitorlautsprecher; 2.4.1 Passive Monitore; 2.4.2 Aktive Monitore; 2.4.3 Was sind Nahfeldmonitore?…”
Libro electrónico -
8247Publicado 2021Tabla de Contenidos: “…Configuring Windows Splunk Forwarder -- Splunk Universal Forwarder Using Windows -- Splunk Universal Forwarder Using .msi -- Configuring Linux Splunk Forwarder -- Splunk's Light and Heavy Forwarders -- Splunk Heavyweight Forwarder -- Configuring Heavy Forwarder -- Configuring Heavy Forwarder to Index and Forwarding Data from a Universal Forwarder -- Splunk Light Forwarder -- Forwarder Management -- Configuring Forwarder Management -- Configuring the Forwarder Management Client -- Splunk Indexer Clusters -- Configuring Indexer Clusters -- Creating an Indexer Cluster Using Splunk Web -- Creating an Indexer Cluster Using a Splunk .conf File -- Creating an Indexer Cluster Using Splunk CLI -- Splunk Lightweight Directory Access Protocol (LDAP) -- Creating an LDAP Strategy -- Mapping LDAP Group to Splunk Roles -- Splunk Security Assertion Markup Language (SAML) -- Configuring Splunk SAML -- Map SAML to User Roles -- Summary -- Multiple-Choice Questions -- References -- Chapter 10: Advanced Data Input in Splunk -- Compress the Data Feed -- Indexer Acknowledgment -- Securing the Feed -- Queue Size -- Monitor Input -- Monitor Files -- Monitor Directories -- Monitor Files and Directory Using Splunk Web -- Monitor File and Directory Using inputs.conf -- Scripted Input -- Scripted Input Using Splunk Web -- Scripted Input Using inputs.conf file -- Network Input -- Add Network Input Using Splunk Web and Deploy It to the Forwarder -- Modify Network Input Using .conf Files -- Configure TCP Network Input Using .conf File -- Configure Network UDP Input Using .conf File -- Pulling Data Using Agentless Input -- HTTP Input Using Splunk Web -- Configure HTTP Event Collector in Splunk -- Configure HTTP Input Using .conf File -- Configure HTTP Event Collector in Splunk Using .conf File -- Parse Data in Splunk Using HTTP Event Collector -- Summary…”
Libro electrónico -
8248Publicado 2023Tabla de Contenidos: “…-- Data governance -- Model governance -- Enterprise scenarios that highlight the importance of MLOps governance -- Scenario 1 - limiting bias in AI solutions -- Scenario 2 - the need to constantly monitor shifts in feature distributions -- Scenario 3 - the need to monitor costs -- Scenario 4 - monitoring how the training data is sourced -- Tools in Vertex AI that can help with governance -- Model Registry -- Metadata Store -- Feature Store -- Vertex AI pipelines -- Model Monitoring -- Billing monitoring -- Summary -- References -- Part 3: Prebuilt/Turnkey ML Solutions Available in GCP -- Chapter 12: Vertex AI - Generative AI Tools…”
Libro electrónico -
8249Publicado 2004Tabla de Contenidos: “…Event management products and best practices -- 6.1 Filtering and forwarding events -- 6.1.1 Filtering and forwarding with NetView -- 6.1.2 Filtering and forwarding using IBM Tivoli Enterprise Console -- 6.1.3 Filtering and forwarding using IBM Tivoli Monitoring -- 6.2 Duplicate detection and throttling -- 6.2.1 IBM Tivoli NetView and Switch Analyzer for duplicate detection and throttling -- 6.2.2 IBM Tivoli Enterprise Console duplicate detection and throttling -- 6.2.3 IBM Tivoli Monitoring for duplicate detection and throttling -- 6.3 Correlation -- 6.3.1 Correlation with NetView and IBM Tivoli Switch Analyzer -- 6.3.2 IBM Tivoli Enterprise Console correlation -- 6.3.3 IBM Tivoli Monitoring correlation -- 6.4 Notification -- 6.4.1 NetView -- 6.4.2 IBM Tivoli Enterprise Console -- 6.4.3 Rules -- 6.4.4 IBM Tivoli Monitoring -- 6.5 Escalation -- 6.5.1 Severities -- 6.5.2 Escalating events with NetView -- 6.6 Event synchronization -- 6.6.1 NetView and IBM Tivoli Enterprise Console…”
Libro electrónico -
8250Publicado 2009Tabla de Contenidos: “…Configuration Management During Online Insertion and Removal Events -- Case 1: Insert or Remove a Node -- Case 2: Replace the Node with a Different Node -- Case 3: Replace the Node with a Higher Density Node -- Case 4: Replace the Node with a Lower Density Node -- Configuration Management During Package Activation and Deactivation -- Interface Preconfiguration -- Configuration Template -- Configuration Management During Router Startup -- Configuration Rollback -- Chapter 5 Cisco IOS XR Monitoring and Operations -- Using SNMP -- Configuring SNMP -- Cisco IOS XR Syslog -- SNMP in the Context of a VRF -- Logging Destination -- Local Archiving of Logging Messages -- Embedded Event Manager -- EEM Event Detectors and Events Processing -- Timer Services Event Detector -- Syslog Event Detector -- None Event Detector -- Watchdog System Monitor Event Detector -- Distributed Event Detectors -- Registering and Using Onboard EEM Policies -- User-Defined EEM Policy -- EEM Reliability Metrics -- Monitoring Processes -- WDSYSMON -- Monitoring Memory -- Using the show system verify Command -- Operations and Monitoring Best Practices -- Chapter 6 Cisco IOS XR Security -- Secure Operating System -- Securing Access to the Router -- Admin Plane -- SDR Plane -- User Groups and Task Groups -- User Group and Task Group Inheritance -- External AAA -- Configuring a TACACS+ Server -- Authentication Using RADIUS -- Configuring Secure Shell -- Management Plane Protection -- Securing the Forwarding Plane -- Access Control Lists -- Unicast RPF -- Local Packet Transport Service -- Mechanics Behind LPTS: A High-Level Overview -- Configuring LPTS -- Chapter 7 Routing IGP -- Routing Information Protocol -- Understanding RIP Fundamentals -- RIP Versions -- Configuring RIP in Cisco IOS XR -- Configuring Route Policy Language -- Configuring Passive Interface…”
Libro electrónico -
8251Publicado 2013Tabla de Contenidos: “…The New York times -- Interlude : on backpack journalism : from an interview with Bill Gentile, American University -- Finding a story and shaping the structure : starting with character in Jigar Mehta's The recession proof artist -- Interlude : becoming a documentary journalist : from an interview with the Renaud Brothers -- Shooting the image : composition and lighting in Travis Fox's Narcocorridos and Nightlife in Mexicali and Crisis in Darfur Expands -- Interlude : short video documentaries : from an interview with Ann Derry, video director, The New York Times -- Conducting interviews and writing a script : Icarus refried : a pro-creative process -- Interlude : the most important journalists : from an interview with Jimmy Orr, managing editor, online,The Los Angeles times -- Editing for rhythm : Travis Fox's redefining China's family : women -- Interlude: starting out as a multimedia journalist : from an interview with Angela Morris, freelance video journalist -- Getting clean audio and crafting a sound design : an audio workshop with Philip Bloom, Travis Fox, and Wes Pope -- Interlude : the importance of blogging and the watchdog reporter : from an interview with John Yemma, editor, The Christian Science monitor -- The blogging journalist : Travis Fox and the Mexican border stories -- Conclusion -- Afterword : "new voices" by Bob Sacha…”
Acceso restringido con credenciales, usuarios UPSA
Libro electrónico -
8252por Lancaster, Kurt, 1967-Tabla de Contenidos: “…The New York times -- Interlude : on backpack journalism : from an interview with Bill Gentile, American University -- Finding a story and shaping the structure : starting with character in Jigar Mehta's The recession proof artist -- Interlude : becoming a documentary journalist : from an interview with the Renaud Brothers -- Shooting the image : composition and lighting in Travis Fox's Narcocorridos and Nightlife in Mexicali and Crisis in Darfur Expands -- Interlude : short video documentaries : from an interview with Ann Derry, video director, The New York Times -- Conducting interviews and writing a script : Icarus refried : a pro-creative process -- Interlude : the most important journalists : from an interview with Jimmy Orr, managing editor, online,The Los Angeles times -- Editing for rhythm : Travis Fox's redefining China's family : women -- Interlude: starting out as a multimedia journalist : from an interview with Angela Morris, freelance video journalist -- Getting clean audio and crafting a sound design : an audio workshop with Philip Bloom, Travis Fox, and Wes Pope -- Interlude : the importance of blogging and the watchdog reporter : from an interview with John Yemma, editor, The Christian Science monitor -- The blogging journalist : Travis Fox and the Mexican border stories -- Conclusion -- Afterword : "new voices" by Bob Sacha…”
Publicado 2013
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
8253por Requena Peláez, José MiguelTabla de Contenidos: “…ALIMENTATION AND NUTRITION -- NUTRITIONAL NEEDS -- PREPARATION AND MONITORING OF A DIETETIC PRESCRIPTION -- METHODS FOR THE ELABORATION OF DIETS -- WHAT WE HAVE LEARNED -- TEST -- LESSON 4. …”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
8254Publicado 2013Tabla de Contenidos: “…Women and the Rabbinate : challenges and horizons / Dalia Marx -- Functional secularization and conversion : on the changed demands made on ministerial action in the Catholic Church / Johannes Först -- Islamic clerics : Tradition and transition / Reuven Firestone -- " ... …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
8255Publicado 2013Tabla de Contenidos: “…Chapter 10 - Advances in Packet Optical Transport in Optical Networking and Broadband TransmissionChapter 11 - Guided-Wave Fourier Optics; Chapter 12 - Fibre Bragg Gratings : Basic Theory; Chapter 13 - Photosensitivity, In-Fibre Grating Writing Techniques and Applications; Chapter 14 - Optical Solitons in Nonlinear Fibre Systems: Recent Developments; Chapter 15 - Photonic Crystal Fibre: Basic Principles of Light Guidance, Fabrication Process and Applications; Chapter 16 - Nonlinear Optics and Physics of Supercontinuum Generation in Optical Fibre; Chapter 17 - Guided Wave Plasmonics…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8256Publicado 2017Tabla de Contenidos: “…Conservation lessons from long-term studies of the bearded vulture -- 16. Monitoring global change in the high mountain -- 17. …”
Libro electrónico -
8257Publicado 2019Tabla de Contenidos: “…-- Education at the intersection: a practitioner's view of the effect of digital transformation on public education -- Citizen protection: a capabilities and intentions framework -- Societal security: how digitalization enables resilient, agile, and learning capabilities -- Digital identity -- beyond verification: to a transparent (decentralized) system for data and identity monitoring and control -- Cashless: a dead end for Sweden? …”
Libro electrónico -
8258Publicado 2017Tabla de Contenidos: “…On Human Cognition Principles for Man-Machine Interaction -- Design Considerations for Self-paced Interactive Notes on Video Lectures - A Learner's Perspective and Enhancements of Learning Outcome -- Using Psycholinguistic Features for the Classification of Comprehenders from Summary Speech Transcripts -- Lector: Towards Reengaging Students in the Educational Process Inside Smart Classrooms -- Predicting Driver's Work Performance in Driving Simulator Based on Physiological Indices -- Interpersonal Human-Human and Human-Robot Interactions -- Exploring the Dynamics of Relationships Between Expressed and Experienced Emotions -- Standard Co-training in Multiword Expression Detection -- Comparative Study on Normalization in Emotion Recognition from Speech -- Detecting Vigilance in People Performing Continual Monitoring Task…”
Libro electrónico -
8259Publicado 2021Tabla de Contenidos: “…Introduction -- Design of efficient, dependable SoCs based on cross-layer-reliability approach with emphasis on wireless communication as application and DRAM memories -- CRAU: Compositional System-Level Reliability Analysis in the Presence of Uncertainties -- Semantics-aware Soft Error Handling for Embedded Systems using Compiler-OS Interaction -- ARES: Self-Adaptive Coarse-Grained Reconfigurable Architectures as Reliability Enhancers in Embedded Systems -- Cross-Layer Techniques for Dependable Software Execution on Embedded Systems -- Ambrosia: Cross-layer Modeling and Mitigation of Aging Effects in Embedded Systems -- Cross-Layer Dependability for Embedded Hardware/Software Systems -- Fault-Tolerant Computing with Heterogeneous Hardware/Software Hardening Modes -- Robust Computing for Machine Learning-Based Systems -- Hardening embedded system software -- LIFT: Lifting Device-Level Characteristics for Error Resilient System Level Design: A Crosslayer Approach -- VirTherm-3D: Communication Virtualization Enabling System Management for Dependable 3D MPSoCs -- OTERA: Online Test Strategies for Reliable Reconfigurable Architectures -- Variability-Aware Software: Recent Results and Contributions -- EM Lifetime Constrained Optimization for Multi-Segment Power Grid Networks -- Lightweight Software-Assisted Memory Error Correction -- Reliability-Driven Resource Management for Multi-Core Systems-on-Chip -- Monitor Circuits for Device-Circuit Interaction -- PERCIES: Providing Efficient Reliability in Critical Embedded Systems…”
Libro electrónico -
8260Publicado 2010Tabla de Contenidos: “…Theorizing Legal Strategies -- From Legal Monitoring to Legal Core Competency: How to Integrate the Legal Dimension into Strategic Management -- The Origin of Legal Opportunities -- A Theory of Legal Strategy -- Alternative Conceptions of Legal Strategy and Strategic Legal Interpretation -- The Crucial Role of Legal Capability in the Realisation of Legal Strategies -- Litigation Cost Strategies from Economics -- A Cognitive Approach to Judicial Strategies: A Perspective from the French Business Environment -- Legal Strategies In Action -- Perspectives on Legal Strategy through Alternative Dispute Resolution -- Strategic Planning to Avoid Organizational Criminal Liability: A Canadian Perspective -- Corporate Risk Management and Legal Strategy -- A Legal Strategy Case Study: Trusts in Securitization -- Activist Hedge Funds and Legal Strategy Devices -- Patents and Trademarks: From Business Law to Legal Astuteness -- The Strategic Use of Legal Margins: How to Introduce an Extension of Someone Else’s Brand -- The Effect of Complexity of Law on Litigation Strategy -- Evidence Collection as a Legal Resource for Strategy: A French and European Perspective -- Transnational Transactions: Legal Work, Cross-Border Commerce and Global Regulation -- Responses To Legal Strategies -- Limits to Horizontal Strategies: Majority Shareholders Facing Minority Activism -- Innovation and Access: Legal Strategies at the Intellectual Property Rights and Competition Law Interface -- Conclusion: Enlarging The Potential For A “Law And Strategies” Approach -- Applied Advanced Legal Strategy in Court: The Example of the International Criminal Court…”
Libro electrónico