Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 14,394
- Política y gobierno 12,202
- Historia 11,499
- Política i govern 4,441
- Història 4,273
- Política económica 3,895
- Filosofía 3,424
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,063
- Administración pública 2,032
- Política social 1,928
- Ciencias políticas 1,907
- Economía 1,844
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,414
- Hacienda pública 1,349
- Economics 1,339
- Derecho 1,306
- Crítica e interpretación 1,296
- Govern 1,278
- Política monetaria 1,271
- Business & Economics 1,262
- Democracia 1,237
- Política educativa 1,226
- Ciencia política 1,112
- History 1,096
-
200561Publicado 2017“…He has brought together an unlikely coalition of technologists, business leaders, labor advocates, and policy makers to wrestle with these issues. In WTF he shares the evolution of his intellectual development, applying his approach to a number of challenging issues we will face as citizens, employees, business leaders, and a nation. …”
Libro electrónico -
200562Publicado 2020“…It provides world-class storage management with extreme scalability, flash accelerated performance, automatic policy-based storage that has tiers of flash through disk to tape. …”
Libro electrónico -
200563Publicado 2020“…. * Learn how Cisco SD-Access addresses key drivers for network change, including automation and security * Explore how Cisco DNA Center improves network planning, deployment, evolution, and agility * Master Cisco SD-Access essentials: design, components, best practices, and fabric construction * Integrate Cisco DNA Center and Cisco ISE, and smoothly onboard diverse endpoints * Efficiently operate Cisco SD-Access and troubleshoot common fabric problems, step by step * Master advanced topics, including multicast flows, Layer 2 flooding, and the integration of IoT devices * Extend campus network policies to WANs and data center networks * Choose the right deployment options for Cisco DNA Center in your environment * Master Cisco DNA Assurance analytics and tests for optimizing the health of clients, network devices, and applications…”
Libro electrónico -
200564Publicado 2018“…The exam tests your ability to install and configure secure applications, networks, and devices; analyze, respond to, and mitigate threats; and operate within applicable policies, laws, and regulations. This book provides the practice you need to pass with flying colors. …”
Libro electrónico -
200565por Callaghan, Brent“…Specific topics of interest include: NFS version 4, highlighting performance improvements, security features, and cross-platform interoperability for Internet operation RPC authentication and security Differences between NFS versions 2 and 3 Implementation issues for clients and servers Read-ahead and write-behind Caching policies The Lock Manager protocol Automounting NFS variants, including Spritely NFS, NQNFS, Trusted NFS, and NASD NFS NFS competitors: RFS, AFS, DCE/DFS, and CIFS The PCNFS protocol for implementing NFS on PC operating systems SPEC SFS benchmarks, WebNFS, and firewalls Comprehensive and current, NFS Illustrated is an essential resource for network professionals who want to use this widespread and evolving technology to its fullest…”
Publicado 2000
Libro electrónico -
200566por Simmons, Andrea C.“…As you walk through the year with Andrea, you will make significant inroads into improving your organisation's security as you: think creatively in order to provide solutions to ongoing issues create a workable information security policy make friends with the right people in order to facilitate critical changes pinpoint weaknesses and help your colleagues to see them through your eyes improve physical security by helping others to take personal responsibility learn strategies for the effective communication of key security messages in order to maximise use of the measures in place appreciate how all this helps you to address the human factors and reduce your cyber risks – which are ultimately security risks discover why it's essential to have a camera on you at all times! …”
Publicado 2012
Libro electrónico -
200567por McHale, Robert“…You’ll Learn How To • Craft legally compliant social media promotions, contests, sweepstakes, and advertising campaigns • Write effective social media policies and implement best practices for governance • Ensure the security of sensitive company and customer information • Properly monitor and regulate the way your employees use social media • Avoid high-profile social media mishaps that can instantly damage reputation, brand equity, and goodwill, and create massive potential liability • Avoid unintentional employment and labor law violations in the use of social media in pre-employment screening • Manage legal issues associated with game-based marketing, “virtual currencies,” and hyper-targeting • Manage the legal risks of user-generated content (UGC) • Protect your trademarks online, and overcome brandjacking and cybersquatting • Understand the e-discovery implications of social media in lawsuits…”
Publicado 2012
Libro electrónico -
200568Publicado 2013“…It includes the following advanced functions: Policy management to control physical volume pooling Cache management Dual copy, including across a grid network Copy mode control The TS7700 Virtualization Engine offers enhanced statistical reporting. …”
Libro electrónico -
200569por Institute of Medicine (U.S.)“…These experiences and lessons learned may be useful for stakeholders in moving the discussions, policies, and mechanisms forward to increase equitable access to quality health services without financial hardship for the informal workforce"--…”
Publicado 2016
Libro electrónico -
200570por Institute of Medicine (U.S.).Tabla de Contenidos: “…""Front Matter""; ""Reviewers""; ""Charter And Vision Statement""; ""Foreword""; ""Preface""; ""Contents""; ""Summary""; ""1 Evidence Development for Healthcare Decisions: Improving Timeliness, Reliability, and Efficiency""; ""2 Cases in Point: Learning from Experience""; ""3 Taking Advantage of New Tools and Techniques""; ""4 Organizing and Improving Data Utility""; ""5 Moving to the Next Generation of Studies""; ""6 Aligning Policy with Research Opportunities""; ""7 Organizing the Research Community for Change""; ""Appendixes""; ""Appendix A: Workshop Agenda""…”
Publicado 2010
Libro electrónico -
200571Publicado 2006“…Readers will learn How the Configuration Application Block is designed and can be used at runtime to easily read and write configuration data How the Configuration Application Block works at design time for all blocks How to use the Data Access Block to create a portable data layer How to use the Exception Handling Application Block to implement a policy-driven, application-wide exception handling system How to use the Logging and Instrumentation Application Block to log and instrument messages independent of the message destination How to add authentication, authorization, role membership, security cache, and profile membership features to an application with the Security Application Block How to use the Cryptography Application Block to add functionality to encrypt and decrypt data and create and compare hashes How to build your own application block and providers that “snap” right into Enterprise Library Whether you plan to extend Enterprise Library for your organization, or just use the existing application blocks to add functionality to your architecture in a consistent, extensible, integrated way, this book will guide you through the complexities and help you find a clear path to success…”
Libro electrónico -
200572por Gai, Fréderic“…Rénovant le récit fantastique et policier, le programme imaginé par Chris Carter ouvre une nouvelle ère en questionnant le mode d’existence du format sériel et en faisant interagir toutes les fins qu’elle ne cesse d’annoncer : de soi, d’une ère, du monde. …”
Publicado 2022
Electrónico -
200573por Gerner, Susanne“…The publication is aimed at participants and contributors to the study, gender equality policy actors, academic experts, political decision-makers and representatives of practical institutions. …”
Publicado 2020
Libro electrónico -
200574por Roeder, Larry W.Tabla de Contenidos: “….-6.6.10 Protocols -- 6.7 The Impact of Program Budget Implications (PBI) -- 6.8 Sovereignty, the New World Order and Implementing a Deal -- 6.9 Rights of Indigenous Peoples: -- 6.10 Non-ratification or Non implementation -- Chapter Seven: War and Peace – Roles for NGOs -- Extract -- 7.1 Law of War -- 7.2 At the Peace Table -- 7.3Neutrality and Working With or Avoiding the Military -- 7.4 An International Army and Peace Keeping -- 7.4.1 Operational Advantage -- 7.4.2 The Saarland and the First Multilateral Force -- 7.4.3 Misuse of a Force -- 7.4.4 The Veto As a Positive Tool -- 7.4.5 Conclusions -- 7.5 Working with Armed Non-State Actors (ANSAs) -- Chapter Eight: Failed and Weak Nation-states -- Highlights of Chapter Eight: -- 8.1 Introduction -- 8.1.1 Coalition Building with Local NGOs -- 8.2 A Common Political and Economic Vision: -- 8.3 A Framework that is Inclusive and Avoids Retribution: -- 8.4 Democracy can be a quality control tool for economic policies -- 8.5 The Case of Egyptian Economic Development -- 8.6 Inform the Public.- 8.7 Equality of Opportunity and Good Governance Create Stable Politics -- Chapter Nine: International Funding -- Extract: -- 9.1 Introduction -- 9.2 Who Receives Government Funding? …”
Publicado 2013
Libro electrónico -
200575Publicado 2022“…"When should a surveillance system that is used in preventive policing sacrifice the privacy of citizens to prevent criminality? …”
Libro electrónico -
200576por Dewey, SusanTabla de Contenidos: “…A Politically Charged Environment: Anti-Trafficking Campaigns, Abolitionism, and Police RaidsImpact on Researchers: Institutional Review Board Approval; Impact on Researchers: Access to the Sex Industry; Impact on Researchers: Danger, Risks, and Stigma; Ethical Practice of Reciprocity; Ethical Practice of Reflexivity; Conclusion; 4 Between Research and Activism: Identifying Pathways to Inclusive Research; Anchor 2; Envisioning Participatory Sex Work Research; Participatory Research Design; Participatory Methodologies; Participatory Dissemination; Conclusion; Susan Dewey; Works Cited…”
Publicado 2013
Libro electrónico -
200577Publicado 2014“…By illuminating his formative years, studying the patronage of the Duchess of Burgundy within the court system and a policy of distinction marked by the pregnance of several political clans, by questioning the efflorescence of funeral orations of where pierced the disappointed hopes and the collective imagination of the nation, the present volume intends to fill the gaps of contemporary historiography long remained silent on the brief destiny of Marie-Adélaïde of Savoy and the climate of the court of Versailles between 1696 and 1712.…”
Libro electrónico -
200578Publicado 2024“…The authors also provide: Easy-to-follow, non-technical explanations of what AI is and how it works Examples of the use of AI for scientists working on mitigating climate change, showing how AI can better analyze data without human bias, remedy pattern recognition deficits, and make use of satellite and other data on a scale never seen before so policy makers can make informed decisions Real applications of AI in humanitarian action, whether in speeding disaster relief with more accurate data for first responders or in helping address populations that have experienced adversity with examples of how analytics is being used to promote inclusivity A deep focus on AI in healthcare where it is improving provider productivity and patient experience, reducing per-capita healthcare costs, and increasing care access, equity, and outcomes Discussions of the future of AI in the realm of social benefit organizations and efforts Beyond the work of the authors, contributors, and researchers highlighted in the book, AI For Good begins with a foreword from Microsoft Vice Chair and President Brad Smith. …”
Libro electrónico -
200579por Kumar, DeepakTabla de Contenidos: “…8.5.1 Environmental Challenges -- 8.5.2 Technological Challenges -- 8.5.3 Social Challenges -- 8.5.4 Economic Challenges -- 8.6 Recommendations -- 8.7 Conclusions and Discussion -- Acknowledgements -- References -- Chapter 9 Energy from Urban Waste: A Mysterious Opportunity for Energy Generation Potential -- 9.1 Introduction -- 9.2 Scenario of Solid Waste Management of Various Countries Around the World -- 9.3 Waste-to-Energy Processes -- 9.4 Challenges to Waste-to-Energy Generation -- 9.5 Conclusion -- References -- Chapter 10 Sustainable Urban Planning and Sprawl Assessment Using Shannon's Entropy Model for Energy Management -- 10.1 Introduction -- 10.2 Study Area -- 10.3 Materials and Methodology -- 10.3.1 Satellite Data Used -- 10.3.2 Pre-Processing of Satellite Data -- 10.3.3 Accuracy Assessment -- 10.3.4 LULC Change Detection -- 10.3.5 Shannon Entropy Model -- 10.4 Results and Discussion -- 10.4.1 LULC Maps -- 10.4.2 Accuracy Assessment -- 10.4.3 LULC Change Detection -- 10.5 Conclusion -- Acknowledgements -- References -- Chapter 11 Sustainable Natural Spaces for Microclimate Mitigation to Meet Future Urban Energy Challenges -- 11.1 Introduction -- 11.2 Nature and Human Connection -- 11.3 Urban Gardening -- 11.4 Urban Greening and Energy Benefits -- 11.5 Nurturing a Connection to Nature in Early Years -- 11.6 Conclusion -- 11.7 Future Implication -- References -- Chapter 12 Synthesis and Future Perspective -- 12.1 Introduction -- 12.2 Synthesis of the Research -- 12.3 Future Urban Energy Policies, and Initiatives -- 12.4 The Challenge Ahead -- 12.5 Strategies for Improvement -- References -- About the Editor -- Index -- EULA…”
Publicado 2023
Libro electrónico -
200580por Urmeneta, Alex“…It also delves into the ethical considerations, policy implications, and the central role educators play in harnessing the power of an AI informed educational experience. …”
Publicado 2024
Libro electrónico