Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 14,394
- Política y gobierno 12,202
- Historia 11,499
- Política i govern 4,441
- Història 4,273
- Política económica 3,895
- Filosofía 3,424
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,063
- Administración pública 2,032
- Política social 1,928
- Ciencias políticas 1,907
- Economía 1,844
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,414
- Hacienda pública 1,349
- Economics 1,339
- Derecho 1,306
- Crítica e interpretación 1,296
- Govern 1,278
- Política monetaria 1,271
- Business & Economics 1,262
- Democracia 1,237
- Política educativa 1,226
- Ciencia política 1,112
- History 1,096
-
200541Publicado 2018“…This book addresses important aspects of an Azure SQL Database instance such as migration, backup restorations, pricing policies, security, scalability, monitoring, performance optimization, high availability, and disaster recovery. …”
Libro electrónico -
200542Publicado 2020“…What you will learn Perform large-scale automation of Linux environments in an enterprise Overcome the common challenges and pitfalls of extensive automation Define the business processes needed to support a large-scale Linux environment Get well-versed with the most effective and reliable patch management strategies Automate a range of tasks from simple user account changes to complex security policy enforcement Learn best practices and procedures to make your Linux environment automatable Who this book is for This book is for anyone who has a Linux environment to design, implement, and maintain. …”
Libro electrónico -
200543Publicado 2014“…You will review topics on planning routing services, EIGRP, OSPF, BGP, IPv4 redistribution, IPv6, path control, policy based routing, and basic teleworker and branch services. …”
Libro electrónico -
200544Publicado 2024“…Instead, it is a checklist of features that can be reviewed by a user security team to aid in the definition of a policy to be followed when implementing IBM FlashSystem℗ʼ, IBM SAN Volume Controller, and IBM Storage Virtualize for Public Cloud. …”
Libro electrónico -
200545por Garcilazo, Enrique“…In sum this paper finds stark difference between rural and urban regions and between rural regions close to cities and remote rural regions which suggests the need for a differentiated policy approach capable of addressing the different types of challenge…”
Publicado 2013
Capítulo de libro electrónico -
200546Publicado 2005“…Microsoft security veteran Mike Danseglio uses real-world examples to show you how various security concepts relate to your own system, including: File System Security Group Policy and security templates Running secure code Authentication IP security Public Key Certificates and Public Key Infrastructure Smart Card technology DHCP and DNS security Internet Information Services security Active Directory security Remote access security Security audits Sending secure email, and more Many chapters include a debate, in which fictional protagonists discuss the pros and cons of a particular strategy or solution. …”
Libro electrónico -
200547Publicado 2011Tabla de Contenidos: “…Introduction to computer security -- Networks and the internet -- Cyber stalking, fraud, and abuse -- Denial of service attacks -- Malware -- Techniques used by hackers -- Industrial espionage in cyberspace -- Encryption -- Computer security software -- Security policies -- Network scanning and vulnerability scanning -- Cyber terrorism and information warfare -- Cyber detective -- Introduction to forensics…”
Libro electrónico -
200548Publicado 2010“…Edward Ferris, Assistant Professor, The New School for Management and Urban Policy "In my over 20 years of running companies and corporate divisions I have seen a direct correlation between the quality of communication of my managers and their success in the business world. …”
Libro electrónico -
200549Publicado 2008“…Coverage includes Understanding the problems SOA governance needs to solve Establishing and governing service production lines that automate SOA development activities Identifying reusable elements of your existing IT governance model and prioritizing improvements Establishing SOA authority chains, roles, responsibilities, policies, standards, mechanisms, procedures, and metrics Implementing service versioning and granularity Refining SOA governance frameworks to maintain their vitality as business and IT strategies change Introduction: A Services Approach Chapter 1: Introduction to Governance Chapter 2: SOA Governance Assessment and Planning Chapter 3: Building the Service Factory Chapter 4: Governing the Service Factory Chapter 5: Implementing the SOA Governance Model Chapter 6: Managing the Service Lifecycle Chapter 7: Governance Vitality Chapter 8: SOA Governance Case Study Appendix A: Glossary Appendix B: References Index…”
Libro electrónico -
200550Les paradoxes de l'écriture Sociologie des écrits professionnels dans les institutions d'encadrementpor Caisne, Léonore Le“…La montée en puissance de la logique gestionnaire dans les administrations publiques confronte les professionnels à la multiplication des procédures d'évaluation et au renforcement de la codification des écrits liés à l'exercice quotidien de leur travail. Militaires, policiers, magistrats, greffières, surveillants pénitentiaires, observateurs européens des lieux d'enfermement, travailleurs sociaux et médecins étudiés ici, tous déplorent cet accroissement des écrits standardisés qui réduit considérablement le temps consacré aux fonctions « nobles » du métier. …”
Publicado 2018
Electrónico -
200551por Biscarrat, Laetitia“…Quelle place tiennent dans les séries télévisées les duos mixtes de policiers et consultants scientifiques ? La publicité ou la parodie permettent-elles de proposer de nouvelles normes corporelles ou sexuelles ? …”
Publicado 2018
Electrónico -
200552Publicado 2013“…Understand SQL Server 2012’s newest features, licensing changes, and capabilities of each edition Manage SQL Server 2012 more effectively with SQL Server Management Studio, the SQLCMD command-line query tool, and Powershell Use Policy-Based Management to centrally configure and operate SQL Server Utilize the new Extended Events trace capabilities within SSMS Maximize performance by optimizing design, queries, analysis, and workload management Implement new best practices for SQL Server high availability Deploy AlwaysOn Availability Groups and Failover Cluster Instances to achieve enterprise-class availability and disaster recovery Leverage new business intelligence improvements, including Master Data Services, Data Quality Services and Parallel Data Warehouse Deliver better full-text search with SQL Server 2012’s new Semantic Search Improve reporting with new SQL Server 2012 Reporting Services features Download the following from informit.com/title/9780672336928: Sample databases and code examples ¿ ¿…”
Libro electrónico -
200553Publicado 2017“…The book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; and charitable and political donations. …”
Libro electrónico -
200554Publicado 2023Tabla de Contenidos: “…Planning a sensitivity label solution for your organization -- Creating and managing SITs -- Setting up sensitivity labels and policies -- Setting up labels -- Setting up label policies -- Using sensitivity labels -- Configuring and using Activity explorer -- Using sensitivity labels with Teams, SharePoint, OneDrive, and Office apps -- Summary -- Questions -- Further reading -- Chapter 12: Managing Microsoft Purview Data Loss Prevention -- Planning and implementing DLP -- Managing DLP policies for Microsoft 365 workloads -- Creating a DLP policy -- Testing your DLP policy -- Editing your DLP policy -- DLP reporting and alerting capabilities -- Using PowerShell with DLP reporting -- Required permissions for DLP reports -- Further alerting capabilities -- Implementing Endpoint DLP -- Summary -- Questions -- Further reading -- Chapter 13: Managing Microsoft Purview Data Lifecycle Management -- Planning for data lifecycle management -- Records management -- Analyzing reports and dashboards -- Content explorer -- Activity explorer -- Configuring retention labels and policies -- Creating a retention label -- Creating a retention label policy -- Applying retention labels -- Creating a retention policy -- Planning and implementing adaptive scopes -- Finding and recovering deleted Microsoft 365 data -- User mailboxes -- OneDrive -- Summary -- Questions -- Further reading -- Part 4: Managing Compliance Features in Microsoft 365 -- Chapter 14: Monitoring and Analyzing Audit Logs and Reports in Microsoft Purview -- Planning for auditing and reporting -- Investigating compliance activities by using audit logs -- Performing an audit log search -- Reviewing and interpreting compliance reports and dashboards -- Configuring alert policies -- Configuring audit log retention policies -- Summary -- Questions -- Further reading…”
Libro electrónico -
200555por Borchert, Heiko“…Joonsoo Park Director, Defense Acquisition and Industries Division, Korea Institute for Defense Analyses The Very Long Game is a must read for policy makers, practitioners as well as academia, who are interested in technologies and future warfare. …”
Publicado 2024
Libro electrónico -
200556por Lobato, Ramon“…In this unfamiliar environment, new global giants of television distribution are emerging-including Netflix, the world's largest subscription video-on-demand service.Combining media industry analysis with cultural theory, Ramon Lobato explores the political and policy tensions at the heart of the digital distribution revolution, tracing their longer history through our evolving understanding of media globalization. …”
Publicado 2019
Libro electrónico -
200557Publicado 2003“…After reading the book you will be familiar with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, and the Active Directory Schema, among many other topics. …”
Libro electrónico -
200558Publicado 2010“…This renewed interested in optical wireless communications is driven by several advantages such as no licensing requirements policy, no RF radiation hazards, and no need to dig up roads besides its large bandwidth and low power consumption. …”
Libro electrónico -
200559Publicado 2012“…This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. …”
Libro electrónico -
200560Publicado 2020Tabla de Contenidos: “…-- Key pain points and bottlenecks -- The components of the fiscal close -- Governing the fiscal close process -- The transaction accumulation, reconciliation and sub-ledger close -- Introduction to the standards of internal control -- Roles and responsibilities during the fiscal close -- The general ledger and trial balance -- The common chart of accounts -- Cost centers -- The journal entry process -- Spreadsheet controls -- Checklists for the transaction accumulation and sob-ledger close -- Sample policies for the transaction accumulation, reconciliation and subledger close -- Process narratives for the transaction accumulation, reconciliation and sub-ledger close process -- Standards of internal control for the transaction, accumulation, reconciliation and sub-ledger close process -- Corporate close and consolidation -- The number of consolidation points -- The number of closing cycles -- Post-closing entries -- Communication and accountability -- Financial statement assertions -- Checklists for the corporate close and consolidation process -- Sample policies for the corporate close and consolidation process -- Process narratives for the corporate close and consolidation process -- Standards of internal control for the corporate close and consolidation process -- Analysis and reporting (the final mile) -- Internal reporting and external reporting -- Budgeting and forecasting -- Reduce fiscal close cycle times by moving your finance function to "dynamic" budgeting and planning -- Fixed assets and the capital budget -- The forecast process -- The fiscal close and strategic planning -- Analytics to detect financial statement fraud -- Checklists for the analysis and reporting process -- Sample policies for the analysis and reporting process -- Process narratives for the analysis and reporting process -- Standards of internal control for the analysis and reporting process -- The virtual close : myth or reality? …”
Libro electrónico