Mostrando 200,541 - 200,560 Resultados de 201,912 Para Buscar 'Pollica~', tiempo de consulta: 1.77s Limitar resultados
  1. 200541
    Publicado 2018
    “…This book addresses important aspects of an Azure SQL Database instance such as migration, backup restorations, pricing policies, security, scalability, monitoring, performance optimization, high availability, and disaster recovery. …”
    Libro electrónico
  2. 200542
    Publicado 2020
    “…What you will learn Perform large-scale automation of Linux environments in an enterprise Overcome the common challenges and pitfalls of extensive automation Define the business processes needed to support a large-scale Linux environment Get well-versed with the most effective and reliable patch management strategies Automate a range of tasks from simple user account changes to complex security policy enforcement Learn best practices and procedures to make your Linux environment automatable Who this book is for This book is for anyone who has a Linux environment to design, implement, and maintain. …”
    Libro electrónico
  3. 200543
    Publicado 2014
    “…You will review topics on planning routing services, EIGRP, OSPF, BGP, IPv4 redistribution, IPv6, path control, policy based routing, and basic teleworker and branch services. …”
    Libro electrónico
  4. 200544
    Publicado 2024
    “…Instead, it is a checklist of features that can be reviewed by a user security team to aid in the definition of a policy to be followed when implementing IBM FlashSystem℗ʼ, IBM SAN Volume Controller, and IBM Storage Virtualize for Public Cloud. …”
    Libro electrónico
  5. 200545
    por Garcilazo, Enrique
    Publicado 2013
    “…In sum this paper finds stark difference between rural and urban regions and between rural regions close to cities and remote rural regions which suggests the need for a differentiated policy approach capable of addressing the different types of challenge…”
    Capítulo de libro electrónico
  6. 200546
    Publicado 2005
    “…Microsoft security veteran Mike Danseglio uses real-world examples to show you how various security concepts relate to your own system, including: File System Security Group Policy and security templates Running secure code Authentication IP security Public Key Certificates and Public Key Infrastructure Smart Card technology DHCP and DNS security Internet Information Services security Active Directory security Remote access security Security audits Sending secure email, and more Many chapters include a debate, in which fictional protagonists discuss the pros and cons of a particular strategy or solution. …”
    Libro electrónico
  7. 200547
    Publicado 2011
    Tabla de Contenidos: “…Introduction to computer security -- Networks and the internet -- Cyber stalking, fraud, and abuse -- Denial of service attacks -- Malware -- Techniques used by hackers -- Industrial espionage in cyberspace -- Encryption -- Computer security software -- Security policies -- Network scanning and vulnerability scanning -- Cyber terrorism and information warfare -- Cyber detective -- Introduction to forensics…”
    Libro electrónico
  8. 200548
    Publicado 2010
    “…Edward Ferris, Assistant Professor, The New School for Management and Urban Policy "In my over 20 years of running companies and corporate divisions I have seen a direct correlation between the quality of communication of my managers and their success in the business world. …”
    Libro electrónico
  9. 200549
    Publicado 2008
    “…Coverage includes Understanding the problems SOA governance needs to solve Establishing and governing service production lines that automate SOA development activities Identifying reusable elements of your existing IT governance model and prioritizing improvements Establishing SOA authority chains, roles, responsibilities, policies, standards, mechanisms, procedures, and metrics Implementing service versioning and granularity Refining SOA governance frameworks to maintain their vitality as business and IT strategies change Introduction: A Services Approach Chapter 1: Introduction to Governance Chapter 2: SOA Governance Assessment and Planning Chapter 3: Building the Service Factory Chapter 4: Governing the Service Factory Chapter 5: Implementing the SOA Governance Model Chapter 6: Managing the Service Lifecycle Chapter 7: Governance Vitality Chapter 8: SOA Governance Case Study Appendix A: Glossary Appendix B: References Index…”
    Libro electrónico
  10. 200550
    por Caisne, Léonore Le
    Publicado 2018
    “…La montée en puissance de la logique gestionnaire dans les administrations publiques confronte les professionnels à la multiplication des procédures d'évaluation et au renforcement de la codification des écrits liés à l'exercice quotidien de leur travail. Militaires, policiers, magistrats, greffières, surveillants pénitentiaires, observateurs européens des lieux d'enfermement, travailleurs sociaux et médecins étudiés ici, tous déplorent cet accroissement des écrits standardisés qui réduit considérablement le temps consacré aux fonctions « nobles » du métier. …”
    Electrónico
  11. 200551
    por Biscarrat, Laetitia
    Publicado 2018
    “…Quelle place tiennent dans les séries télévisées les duos mixtes de policiers et consultants scientifiques ? La publicité ou la parodie permettent-elles de proposer de nouvelles normes corporelles ou sexuelles ? …”
    Electrónico
  12. 200552
    Publicado 2013
    “…Understand SQL Server 2012’s newest features, licensing changes, and capabilities of each edition Manage SQL Server 2012 more effectively with SQL Server Management Studio, the SQLCMD command-line query tool, and Powershell Use Policy-Based Management to centrally configure and operate SQL Server Utilize the new Extended Events trace capabilities within SSMS Maximize performance by optimizing design, queries, analysis, and workload management Implement new best practices for SQL Server high availability Deploy AlwaysOn Availability Groups and Failover Cluster Instances to achieve enterprise-class availability and disaster recovery Leverage new business intelligence improvements, including Master Data Services, Data Quality Services and Parallel Data Warehouse Deliver better full-text search with SQL Server 2012’s new Semantic Search Improve reporting with new SQL Server 2012 Reporting Services features Download the following from informit.com/title/9780672336928: Sample databases and code examples ¿ ¿…”
    Libro electrónico
  13. 200553
    Publicado 2017
    “…The book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; and charitable and political donations. …”
    Libro electrónico
  14. 200554
    Publicado 2023
    Tabla de Contenidos: “…Planning a sensitivity label solution for your organization -- Creating and managing SITs -- Setting up sensitivity labels and policies -- Setting up labels -- Setting up label policies -- Using sensitivity labels -- Configuring and using Activity explorer -- Using sensitivity labels with Teams, SharePoint, OneDrive, and Office apps -- Summary -- Questions -- Further reading -- Chapter 12: Managing Microsoft Purview Data Loss Prevention -- Planning and implementing DLP -- Managing DLP policies for Microsoft 365 workloads -- Creating a DLP policy -- Testing your DLP policy -- Editing your DLP policy -- DLP reporting and alerting capabilities -- Using PowerShell with DLP reporting -- Required permissions for DLP reports -- Further alerting capabilities -- Implementing Endpoint DLP -- Summary -- Questions -- Further reading -- Chapter 13: Managing Microsoft Purview Data Lifecycle Management -- Planning for data lifecycle management -- Records management -- Analyzing reports and dashboards -- Content explorer -- Activity explorer -- Configuring retention labels and policies -- Creating a retention label -- Creating a retention label policy -- Applying retention labels -- Creating a retention policy -- Planning and implementing adaptive scopes -- Finding and recovering deleted Microsoft 365 data -- User mailboxes -- OneDrive -- Summary -- Questions -- Further reading -- Part 4: Managing Compliance Features in Microsoft 365 -- Chapter 14: Monitoring and Analyzing Audit Logs and Reports in Microsoft Purview -- Planning for auditing and reporting -- Investigating compliance activities by using audit logs -- Performing an audit log search -- Reviewing and interpreting compliance reports and dashboards -- Configuring alert policies -- Configuring audit log retention policies -- Summary -- Questions -- Further reading…”
    Libro electrónico
  15. 200555
    por Borchert, Heiko
    Publicado 2024
    “…Joonsoo Park Director, Defense Acquisition and Industries Division, Korea Institute for Defense Analyses The Very Long Game is a must read for policy makers, practitioners as well as academia, who are interested in technologies and future warfare. …”
    Libro electrónico
  16. 200556
    por Lobato, Ramon
    Publicado 2019
    “…In this unfamiliar environment, new global giants of television distribution are emerging-including Netflix, the world's largest subscription video-on-demand service.Combining media industry analysis with cultural theory, Ramon Lobato explores the political and policy tensions at the heart of the digital distribution revolution, tracing their longer history through our evolving understanding of media globalization. …”
    Libro electrónico
  17. 200557
    Publicado 2003
    “…After reading the book you will be familiar with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, and the Active Directory Schema, among many other topics. …”
    Libro electrónico
  18. 200558
    Publicado 2010
    “…This renewed interested in optical wireless communications is driven by several advantages such as no licensing requirements policy, no RF radiation hazards, and no need to dig up roads besides its large bandwidth and low power consumption. …”
    Libro electrónico
  19. 200559
    Publicado 2012
    “…This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. …”
    Libro electrónico
  20. 200560
    Publicado 2020
    Tabla de Contenidos: “…-- Key pain points and bottlenecks -- The components of the fiscal close -- Governing the fiscal close process -- The transaction accumulation, reconciliation and sub-ledger close -- Introduction to the standards of internal control -- Roles and responsibilities during the fiscal close -- The general ledger and trial balance -- The common chart of accounts -- Cost centers -- The journal entry process -- Spreadsheet controls -- Checklists for the transaction accumulation and sob-ledger close -- Sample policies for the transaction accumulation, reconciliation and subledger close -- Process narratives for the transaction accumulation, reconciliation and sub-ledger close process -- Standards of internal control for the transaction, accumulation, reconciliation and sub-ledger close process -- Corporate close and consolidation -- The number of consolidation points -- The number of closing cycles -- Post-closing entries -- Communication and accountability -- Financial statement assertions -- Checklists for the corporate close and consolidation process -- Sample policies for the corporate close and consolidation process -- Process narratives for the corporate close and consolidation process -- Standards of internal control for the corporate close and consolidation process -- Analysis and reporting (the final mile) -- Internal reporting and external reporting -- Budgeting and forecasting -- Reduce fiscal close cycle times by moving your finance function to "dynamic" budgeting and planning -- Fixed assets and the capital budget -- The forecast process -- The fiscal close and strategic planning -- Analytics to detect financial statement fraud -- Checklists for the analysis and reporting process -- Sample policies for the analysis and reporting process -- Process narratives for the analysis and reporting process -- Standards of internal control for the analysis and reporting process -- The virtual close : myth or reality? …”
    Libro electrónico