Mostrando 200,561 - 200,580 Resultados de 201,912 Para Buscar 'Pollica~', tiempo de consulta: 1.90s Limitar resultados
  1. 200561
    Publicado 2017
    “…He has brought together an unlikely coalition of technologists, business leaders, labor advocates, and policy makers to wrestle with these issues. In WTF he shares the evolution of his intellectual development, applying his approach to a number of challenging issues we will face as citizens, employees, business leaders, and a nation. …”
    Libro electrónico
  2. 200562
    Publicado 2020
    “…It provides world-class storage management with extreme scalability, flash accelerated performance, automatic policy-based storage that has tiers of flash through disk to tape. …”
    Libro electrónico
  3. 200563
    Publicado 2020
    “…. * Learn how Cisco SD-Access addresses key drivers for network change, including automation and security * Explore how Cisco DNA Center improves network planning, deployment, evolution, and agility * Master Cisco SD-Access essentials: design, components, best practices, and fabric construction * Integrate Cisco DNA Center and Cisco ISE, and smoothly onboard diverse endpoints * Efficiently operate Cisco SD-Access and troubleshoot common fabric problems, step by step * Master advanced topics, including multicast flows, Layer 2 flooding, and the integration of IoT devices * Extend campus network policies to WANs and data center networks * Choose the right deployment options for Cisco DNA Center in your environment * Master Cisco DNA Assurance analytics and tests for optimizing the health of clients, network devices, and applications…”
    Libro electrónico
  4. 200564
    Publicado 2018
    “…The exam tests your ability to install and configure secure applications, networks, and devices; analyze, respond to, and mitigate threats; and operate within applicable policies, laws, and regulations. This book provides the practice you need to pass with flying colors. …”
    Libro electrónico
  5. 200565
    por Callaghan, Brent
    Publicado 2000
    “…Specific topics of interest include: NFS version 4, highlighting performance improvements, security features, and cross-platform interoperability for Internet operation RPC authentication and security Differences between NFS versions 2 and 3 Implementation issues for clients and servers Read-ahead and write-behind Caching policies The Lock Manager protocol Automounting NFS variants, including Spritely NFS, NQNFS, Trusted NFS, and NASD NFS NFS competitors: RFS, AFS, DCE/DFS, and CIFS The PCNFS protocol for implementing NFS on PC operating systems SPEC SFS benchmarks, WebNFS, and firewalls Comprehensive and current, NFS Illustrated is an essential resource for network professionals who want to use this widespread and evolving technology to its fullest…”
    Libro electrónico
  6. 200566
    por Simmons, Andrea C.
    Publicado 2012
    “…As you walk through the year with Andrea, you will make significant inroads into improving your organisation's security as you: think creatively in order to provide solutions to ongoing issues create a workable information security policy make friends with the right people in order to facilitate critical changes pinpoint weaknesses and help your colleagues to see them through your eyes improve physical security by helping others to take personal responsibility learn strategies for the effective communication of key security messages in order to maximise use of the measures in place appreciate how all this helps you to address the human factors and reduce your cyber risks – which are ultimately security risks discover why it's essential to have a camera on you at all times! …”
    Libro electrónico
  7. 200567
    por McHale, Robert
    Publicado 2012
    “…You’ll Learn How To • Craft legally compliant social media promotions, contests, sweepstakes, and advertising campaigns • Write effective social media policies and implement best practices for governance • Ensure the security of sensitive company and customer information • Properly monitor and regulate the way your employees use social media • Avoid high-profile social media mishaps that can instantly damage reputation, brand equity, and goodwill, and create massive potential liability • Avoid unintentional employment and labor law violations in the use of social media in pre-employment screening • Manage legal issues associated with game-based marketing, “virtual currencies,” and hyper-targeting • Manage the legal risks of user-generated content (UGC) • Protect your trademarks online, and overcome brandjacking and cybersquatting • Understand the e-discovery implications of social media in lawsuits…”
    Libro electrónico
  8. 200568
    Publicado 2013
    “…It includes the following advanced functions: Policy management to control physical volume pooling Cache management Dual copy, including across a grid network Copy mode control The TS7700 Virtualization Engine offers enhanced statistical reporting. …”
    Libro electrónico
  9. 200569
    por Institute of Medicine (U.S.)
    Publicado 2016
    “…These experiences and lessons learned may be useful for stakeholders in moving the discussions, policies, and mechanisms forward to increase equitable access to quality health services without financial hardship for the informal workforce"--…”
    Libro electrónico
  10. 200570
    por Institute of Medicine (U.S.).
    Publicado 2010
    Tabla de Contenidos: “…""Front Matter""; ""Reviewers""; ""Charter And Vision Statement""; ""Foreword""; ""Preface""; ""Contents""; ""Summary""; ""1 Evidence Development for Healthcare Decisions: Improving Timeliness, Reliability, and Efficiency""; ""2 Cases in Point: Learning from Experience""; ""3 Taking Advantage of New Tools and Techniques""; ""4 Organizing and Improving Data Utility""; ""5 Moving to the Next Generation of Studies""; ""6 Aligning Policy with Research Opportunities""; ""7 Organizing the Research Community for Change""; ""Appendixes""; ""Appendix A: Workshop Agenda""…”
    Libro electrónico
  11. 200571
    Publicado 2006
    “…Readers will learn How the Configuration Application Block is designed and can be used at runtime to easily read and write configuration data How the Configuration Application Block works at design time for all blocks How to use the Data Access Block to create a portable data layer How to use the Exception Handling Application Block to implement a policy-driven, application-wide exception handling system How to use the Logging and Instrumentation Application Block to log and instrument messages independent of the message destination How to add authentication, authorization, role membership, security cache, and profile membership features to an application with the Security Application Block How to use the Cryptography Application Block to add functionality to encrypt and decrypt data and create and compare hashes How to build your own application block and providers that “snap” right into Enterprise Library Whether you plan to extend Enterprise Library for your organization, or just use the existing application blocks to add functionality to your architecture in a consistent, extensible, integrated way, this book will guide you through the complexities and help you find a clear path to success…”
    Libro electrónico
  12. 200572
    por Gai, Fréderic
    Publicado 2022
    “…Rénovant le récit fantastique et policier, le programme imaginé par Chris Carter ouvre une nouvelle ère en questionnant le mode d’existence du format sériel et en faisant interagir toutes les fins qu’elle ne cesse d’annoncer : de soi, d’une ère, du monde. …”
    Electrónico
  13. 200573
    por Gerner, Susanne
    Publicado 2020
    “…The publication is aimed at participants and contributors to the study, gender equality policy actors, academic experts, political decision-makers and representatives of practical institutions. …”
    Libro electrónico
  14. 200574
    por Roeder, Larry W.
    Publicado 2013
    Tabla de Contenidos: “….-6.6.10 Protocols -- 6.7 The Impact of Program Budget Implications (PBI) -- 6.8 Sovereignty, the New World Order and Implementing a Deal -- 6.9 Rights of Indigenous Peoples: -- 6.10 Non-ratification or Non implementation -- Chapter Seven: War and Peace – Roles for NGOs -- Extract -- 7.1 Law of War -- 7.2 At the Peace Table -- 7.3Neutrality and Working With or Avoiding the Military -- 7.4 An International Army and Peace Keeping -- 7.4.1 Operational Advantage -- 7.4.2 The Saarland and the First Multilateral Force -- 7.4.3 Misuse of a Force -- 7.4.4 The Veto As a Positive Tool -- 7.4.5 Conclusions -- 7.5 Working with Armed Non-State Actors (ANSAs) -- Chapter Eight: Failed and Weak Nation-states -- Highlights of Chapter Eight: -- 8.1 Introduction -- 8.1.1 Coalition Building with Local NGOs -- 8.2 A Common Political and Economic Vision: -- 8.3 A Framework that is Inclusive and Avoids Retribution: -- 8.4 Democracy can be a quality control tool for economic policies -- 8.5 The Case of Egyptian Economic Development -- 8.6 Inform the Public.- 8.7 Equality of Opportunity and Good Governance Create Stable Politics -- Chapter Nine: International Funding -- Extract: -- 9.1 Introduction -- 9.2 Who Receives Government Funding? …”
    Libro electrónico
  15. 200575
    Publicado 2022
    “…"When should a surveillance system that is used in preventive policing sacrifice the privacy of citizens to prevent criminality? …”
    Libro electrónico
  16. 200576
    por Dewey, Susan
    Publicado 2013
    Tabla de Contenidos: “…A Politically Charged Environment: Anti-Trafficking Campaigns, Abolitionism, and Police RaidsImpact on Researchers: Institutional Review Board Approval; Impact on Researchers: Access to the Sex Industry; Impact on Researchers: Danger, Risks, and Stigma; Ethical Practice of Reciprocity; Ethical Practice of Reflexivity; Conclusion; 4 Between Research and Activism: Identifying Pathways to Inclusive Research; Anchor 2; Envisioning Participatory Sex Work Research; Participatory Research Design; Participatory Methodologies; Participatory Dissemination; Conclusion; Susan Dewey; Works Cited…”
    Libro electrónico
  17. 200577
    Publicado 2014
    “…By illuminating his formative years, studying the patronage of the Duchess of Burgundy within the court system and a policy of distinction marked by the pregnance of several political clans, by questioning the efflorescence of funeral orations of where pierced the disappointed hopes and the collective imagination of the nation, the present volume intends to fill the gaps of contemporary historiography long remained silent on the brief destiny of Marie-Adélaïde of Savoy and the climate of the court of Versailles between 1696 and 1712.…”
    Libro electrónico
  18. 200578
    Publicado 2024
    “…The authors also provide: Easy-to-follow, non-technical explanations of what AI is and how it works Examples of the use of AI for scientists working on mitigating climate change, showing how AI can better analyze data without human bias, remedy pattern recognition deficits, and make use of satellite and other data on a scale never seen before so policy makers can make informed decisions Real applications of AI in humanitarian action, whether in speeding disaster relief with more accurate data for first responders or in helping address populations that have experienced adversity with examples of how analytics is being used to promote inclusivity A deep focus on AI in healthcare where it is improving provider productivity and patient experience, reducing per-capita healthcare costs, and increasing care access, equity, and outcomes Discussions of the future of AI in the realm of social benefit organizations and efforts Beyond the work of the authors, contributors, and researchers highlighted in the book, AI For Good begins with a foreword from Microsoft Vice Chair and President Brad Smith. …”
    Libro electrónico
  19. 200579
    por Kumar, Deepak
    Publicado 2023
    Tabla de Contenidos: “…8.5.1 Environmental Challenges -- 8.5.2 Technological Challenges -- 8.5.3 Social Challenges -- 8.5.4 Economic Challenges -- 8.6 Recommendations -- 8.7 Conclusions and Discussion -- Acknowledgements -- References -- Chapter 9 Energy from Urban Waste: A Mysterious Opportunity for Energy Generation Potential -- 9.1 Introduction -- 9.2 Scenario of Solid Waste Management of Various Countries Around the World -- 9.3 Waste-to-Energy Processes -- 9.4 Challenges to Waste-to-Energy Generation -- 9.5 Conclusion -- References -- Chapter 10 Sustainable Urban Planning and Sprawl Assessment Using Shannon's Entropy Model for Energy Management -- 10.1 Introduction -- 10.2 Study Area -- 10.3 Materials and Methodology -- 10.3.1 Satellite Data Used -- 10.3.2 Pre-Processing of Satellite Data -- 10.3.3 Accuracy Assessment -- 10.3.4 LULC Change Detection -- 10.3.5 Shannon Entropy Model -- 10.4 Results and Discussion -- 10.4.1 LULC Maps -- 10.4.2 Accuracy Assessment -- 10.4.3 LULC Change Detection -- 10.5 Conclusion -- Acknowledgements -- References -- Chapter 11 Sustainable Natural Spaces for Microclimate Mitigation to Meet Future Urban Energy Challenges -- 11.1 Introduction -- 11.2 Nature and Human Connection -- 11.3 Urban Gardening -- 11.4 Urban Greening and Energy Benefits -- 11.5 Nurturing a Connection to Nature in Early Years -- 11.6 Conclusion -- 11.7 Future Implication -- References -- Chapter 12 Synthesis and Future Perspective -- 12.1 Introduction -- 12.2 Synthesis of the Research -- 12.3 Future Urban Energy Policies, and Initiatives -- 12.4 The Challenge Ahead -- 12.5 Strategies for Improvement -- References -- About the Editor -- Index -- EULA…”
    Libro electrónico
  20. 200580
    por Urmeneta, Alex
    Publicado 2024
    “…It also delves into the ethical considerations, policy implications, and the central role educators play in harnessing the power of an AI informed educational experience. …”
    Libro electrónico