Mostrando 361 - 380 Resultados de 487 Para Buscar 'Op. 19.nº 2', tiempo de consulta: 0.13s Limitar resultados
  1. 361
  2. 362
    Tabla de Contenidos: “…Prelude to Act. I (1:23) ; 2. Aragonaise (2:19) ; 3. Intermezzo (2:34) ; 4. …”
    CDROM
  3. 363
    Publicado 1983
    Grabación musical
  4. 364
    por Voronezh Art College
    Publicado 1991
    Tabla de Contenidos: “…Io tacero, ma nel silenzio mio (2:58) ; Tu m'uccidi, o crudele (4:04) ; Già piansi nel dolore (3:19) ; Deh, come invan sospiro (3:19) ; Tu piangi, o figlio mio (3:14) / C. …”
    CDROM
  5. 365
  6. 366
    por Molina,Antonio de
    Publicado 1961
    Libro
  7. 367
  8. 368
    Publicado 2006
    Libro
  9. 369
    Publicado 2006
    991000919799706719
  10. 370
    por Charum, Jorge
    Publicado 2001
    Enlace del recurso
    Artículo digital
  11. 371
    Publicado 2001
    Enlace del recurso
    Artículo digital
  12. 372
    Publicado 2023
    Tabla de Contenidos: “…About the Editor vii -- Editorial for the Special Issue on "Software Engineering and Data Science" 1 -- A Bayesian Analysis of the Inversion of the SARS-COV-2 Case Rate in the Countries of the 2020 European Football Championship 3 -- How Schools Affected the COVID-19 Pandemic in Italy: Data Analysis for Lombardy Region, Campania Region, and Emilia Region 19 -- Multi-Attribute Decision Making for Energy-Efficient Public Transport Network Selection in Smart Cities 31 -- Exploring the Benefits of Combining DevOps and Agile 61 -- Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks 75 -- Ontology-Based Feature Selection: A Survey 95.…”
    Libro electrónico
  13. 373
  14. 374
    Disco musical
  15. 375
  16. 376
    Tabla de Contenidos: “…Chapter 1: Privileges -- Chapter 2: Shared Credentials -- Chapter 3: Password Hacking -- Chapter 4: Privilege Escalation -- Chapter 5: Insider Threats -- Chapter 6: Insider Threats -- Chapter 7: Threat Hunting -- Chapter 8: Data Centric Audit and Protection -- Chapter 9: Privileged Monitoring -- Chapter 10: Privilege Access Management -- Chapter 11: PAM Architecture -- Chapter 12: Break Glass -- Chapter 13: Industrial Control Systems (ICS) -- Chapter 14: Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19: Regulatory Compliance -- Chapter 20: Sample PAM Use Cases -- Chapter 21: Deployment Considerations -- Chapter 22: Privileged Account Management Implementation -- Chapter 23: Key Takeaways -- Chapter 24: Conclusion -- …”
    Libro electrónico
  17. 377
    por Haber, Morey J. author
    Publicado 2020
    Tabla de Contenidos: “…Chapter 1: Privileged Attack Vectors -- Chapter 2: Privileges -- Chapter 3: Credentials -- Chapter 4: Attack Vectors -- Chapter 5: Passwordless Authentication -- Chapter 6: Privilege Escalation -- Chapter 7: Insider and External Threats -- Chapter 8: Threat Hunting -- Chapter 9: Unstructured Data -- Chapter 10: Privileged Monitoring -- Chapter 11: Privileged Access Management -- Chapter 12: PAM Architecture -- Chapter 13: Break Glass -- Chapter 14: Industrial Control Systems (ICS) and Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware and Privileges -- Chapter 18: Remote Access -- Chapter 19: Secured DevOps (SecDevOps) -- Chapter 20: Regulatory Compliance -- Chapter 21: Just in Time -- Chapter 22: Zero Trust -- Chapter 23: Sample Privileged Access Management Use Cases -- Chapter 24: Deployment Considerations -- Chapter 25: Privileged Account Management Implementation -- Chapter 26: Machine Learning -- Chapter 27: Conclusion -- …”
    Libro electrónico
  18. 378
    Publicado 2022
    Tabla de Contenidos: “…Reflectie en aanbevelingen.21 -- 3.3.1. Zet in op breed gedragen beroepsbeelden.22 -- 3.3.2. Werk toe naar een professionele cultuur.22 -- 3.3.3. …”
    Libro electrónico
  19. 379
    por Brown, Mercy
    Publicado 2001
    Enlace del recurso
    Artículo digital
  20. 380
    Publicado 2021
    Tabla de Contenidos: “…-- 3.1.1 DevOps in data engineering -- 3.2 Introducing Azure DevOps -- 3.2.1 Using the az azure-devops extension -- 3.3 Deploying infrastructure -- 3.3.1 Exporting an Azure Resource Manager template -- 3.3.2 Creating Azure DevOps service connections -- 3.3.3 Deploying Azure Resource Manager templates -- 3.3.4 Understanding Azure Pipelines -- 3.4 Deploying analytics -- 3.4.1 Using Azure DevOps marketplace extensions -- 3.4.2 Storing everything in Git -- deploying everything automatically -- Summary -- 4 Orchestration…”
    Libro electrónico