Mostrando 200,801 - 200,820 Resultados de 201,912 Para Buscar 'Pollica~', tiempo de consulta: 1.73s Limitar resultados
  1. 200801
    “…In it, authors from a variety of countries who are scholars, policy makers, and business leaders, address applications of the Marshall Plan’s lessons learned to the 21st century for capacity building, human and sustainable development, and the role of public, private partnerships in emerging market economies and democratic societies. …”
    Libro electrónico
  2. 200802
    por Fabbri, Rosato
    Publicado 2013
    Tabla de Contenidos: “…Filters, Policies, and Endpoint Security -- Processing a data packet inside a FortiGate -- Firewall features -- Interfaces and zones -- Firewall objects -- Addresses -- Services -- Schedules -- UTM profiles -- Antivirus -- Intrusion protection -- Web filter -- Client reputation -- Traffic shaping -- Security policies -- FortiClient -- FortiClient management -- Bring Your Own Device (BYOD) -- Summary -- 3. …”
    Libro electrónico
  3. 200803
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Acknowledgments -- Introduction -- Chapter 1: Your Wake-Up Call -- Diversity at the Top: Correlates with Better Performance -- How We Came Together -- Barbara's Wake-Up Call -- When I Became a Real Manager of People -- The Diversity Money Pit -- Women's Networks -- Training for Women -- Focus on the Numbers -- Work-Life Flexibility Policies -- Women's Mentors -- Diversity Workshops -- What Makes the Difference -- Brushing Your Horse -- Lack of "Gender Success" Is Costly -- This Is Your Toolkit -- Endnotes -- Chapter 2: The Business Case for the Advancement of Women -- Let's Do It! …”
    Libro electrónico
  4. 200804
    Publicado 2017
    Tabla de Contenidos: “…. -- See also... -- Creating policies -- How to do it... -- How it works... -- There's more... -- See also... -- Chapter 7: Leveraging Extensibility -- Introduction -- Extending standard tables without customization footprint -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating data-event handler methods -- Getting ready -- How to do it... -- How it works... -- There's more... -- How to customize a document layout without an over-layer -- How to do it... -- How it works... -- There more... -- Creating event handler methods -- Getting ready -- How to do it... -- How it works... -- Extending standard forms without customization footprint -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using a form event handler to replace a lookup -- Getting ready -- How to do it... -- How it works... -- Creating your own query functions -- How to do it... -- How it works... -- Chapter 8: Data Management, OData, and Office -- Introduction -- Creating a data entity -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Extending standard data entities -- Getting ready -- How to do it... -- How it works... -- There's more... -- Importing data through Data Import/Export Framework -- Getting ready -- How to do it... -- How it works... -- See also…”
    Libro electrónico
  5. 200805
    Publicado 2016
    Tabla de Contenidos: “…Force relogin after Login-As-User -- Require HttpOnly attribute -- Use POST requests for cross-domain sessions -- Enforce login IP ranges on every request -- Caching -- Enable caching and autocomplete on login page -- Enable secure and persistent browser caching to improve performance -- Enable user switching -- Remember Me until logout -- Identity verification -- Enable the SMS method of identity verification -- Require security tokens for API logins from callouts (API version 31.0 and earlier) -- Allow location-based automated verifications with Salesforce Authenticator -- Allow only from trusted IP addresses -- Lightning Login -- Allow Lightning Login -- Clickjack protection -- Enable clickjack protection for setup pages -- Enable clickjack protection for non-setup Salesforce pages -- Enable clickjack protection for customer Visualforce pages with standard headers -- Enable clickjack protection for customer Visualforce pages with headers disabled -- Cross-Site Request Forgery (CSRF) protection -- Enable CSRF protection on GET requests on non-setup pages -- Enable CSRF protection on POST requests on non-setup pages -- Content Security Policy protection -- Session security levels -- Logout page settings -- Logging in as another user -- Creating a guide to help users grant login access to you -- Creating custom user fields -- Salesforce.com Health Check -- Health Check Score -- The Salesforce Baseline standard -- Questions to test your knowledge -- Questions -- Question 1 - standard profiles -- Question 2 - permission sets -- Question 3 - User records -- Question 4 - Password Policies -- Answers -- Answer 1 - standard profiles -- Answer 2 - permission sets -- Answer 3 - user records -- Answer 4 - password policies -- Summary -- Chapter 3: Configuring Objects and Apps -- The relationship between a profile and the features that it controls -- Objects…”
    Libro electrónico
  6. 200806
    Publicado 2017
    “…IBM Spectrum ArchiveTM EE enables the use of the LTFS for the policy management of tape as a storage tier in an IBM Spectrum ScaleTM (formerly IBM General Parallel File System (GPFSTM)) based environment and helps encourage the use of tape as a critical tier in the storage environment. …”
    Libro electrónico
  7. 200807
    Publicado 2019
    “…What you will learn Orchestrate on-demand deployments based on defined policies Automate away common problems and make life easier by reducing errors Deliver services to end users rather than to virtual machines Reduce rework in a multi-layered scalable manner in any cloud Explore the centralized life cycle management of hybrid clouds Use common code so you can run it across any cloud Who this book is for This book is intended for those planning, designing, and implementing the virtualization/cloud components of the Software-Defined Data Center foundational infrastructure. …”
    Libro electrónico
  8. 200808
    “…What You’ll Learn: Understand why you should deploy a centralized authentication and policy management infrastructure Use the SAML or Open ID Standards for web or single sign-on, and OAuth for API Access Management Synchronize data from existing identity repositories such as Active Directory Deploy two-factor authentication services…”
    Libro electrónico
  9. 200809
    Tabla de Contenidos: “…Part I: The Cybersecurity Challenge -- Chapter 1: Defining the Cybersecurity Challenge -- Chapter 2: Meeting the Cybersecurity Challenge -- Part II: A New Enterprise Cybersecurity Architecture -- Chapter 3: Enterprise Cybersecurity Architecture -- Chapter 4: Implementing Enterprise Cybersecurity -- Chapter 5: Operating Enterprise Cybersecurity -- Chapter 6: Enterprise Cybersecurity and the Cloud -- Chapter 7: Enterprise Cybersecurity for Mobile and BYOD -- Part III: The Art of Cyber Defense -- Chapter 8: Building an Effective Defense -- Chapter 9: Responding to Incidents -- Chapter 10: Managing a Cybersecurity Crisis -- Part IV: Enterprise Cyber Defense Assessment -- Chapter 11: Assessing Enterprise Cybersecurity -- Chapter 12: Measuring a Cybersecurity Program -- Chapter 13: Mapping Against Cybersecurity Frameworks -- Part V: Enterprise Cybersecurity Program -- Chapter 14: Managing an Enterprise Cybersecurity Program -- Chapter 15: Looking to the Future -- Part VI: Appendices -- Appendix A: Sample Cybersecurity Policy -- Appendix B: Cybersecurity Operational Processes -- Appendix C: Object Measurement -- Appendix D: Cybersecurity Sample Assessment -- Appendix E: Cybersecurity Capability Value Scales…”
    Libro electrónico
  10. 200810
    Publicado 2014
    “…In some cases, organization are concerned with the legal restrictions of deploying solutions on the cloud, whereas in other cases organizations have policies and strategies in force that limit solution deployment on the cloud. …”
    Libro electrónico
  11. 200811
    Publicado 2015
    “…Strategies to get the other person to the table and engage in creative problem solving, even when they are reluctant to do so Tips on how to recognize opportunities to negotiate, bolster your confidence prior to the negotiation, turn 'asks' into a negotiation, and advance negotiations that get "stuck" A rich examination of research on negotiation, conflict management, and gender Videos that walk you through difficult negotiation scenarios step-by-step By using these strategies, you can negotiate successfully for your job and your career; in a larger field, you can also alter organizational practices and policies that impact others"--…”
    Libro electrónico
  12. 200812
    Publicado 2015
    “…Despite international intervention and global policy changes, the financial system remains in a fragile state. …”
    Libro electrónico
  13. 200813
    Publicado 2015
    “…How to implement an ABMS An Introduction to Anti-Bribery Management Systems (BS 10500) explains how to implement an anti-bribery management system (ABMS), aligned to international best practice, from initial gap analysis to due diligence management: An introduction to BS 10500, a British Standard for ABMS An explanation of an ABMS Management processes within an ABMS Implementing an ABMS Risk assessment in due diligence Whistleblowing and bribery investigations Internal auditing and corrective action Registration to BS 10500 It provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organization ; controls for contractors; facilitation payments; charitable and political donations; risk assessment in due diligence; whistle-blowing and bribery investigations; and internal auditing and corrective action. …”
    Libro electrónico
  14. 200814
    Publicado 2005
    “…It is a pleasure to welcome you to 2005 National Digital Government Research Conference, dg.o2005. dg.o brings together computer and social science researchers, government professionals, representatives of industry, and members of the public to discuss how research in information strategies, policies, and technologies can improve government operations and public services.This year we were very pleased to host two keynote talks and one keynote panel. …”
    Libro electrónico
  15. 200815
    Publicado 2023
    “…There's a practical element to the book as well--you'll prepare policies and procedures to prevent your company from being breached. …”
    Grabación no musical
  16. 200816
    Publicado 2023
    “…Oxford Open Digital Health is an Open Access journal that publishes methodologically rigorous evaluations, evidence reviews, study protocols and other policy-relevant research on Digital Health Interventions (DHIs) with a particular focus on Low and Middle-Income Countries (LMICs). …”
    Revista digital
  17. 200817
    por Baltenneck, Nicolas
    Publicado 2020
    “…They aim to provide entangled approaches going from space related individual experiences to accessibility policies analysis. This appears necessary within a new model that defines disability as interactive outcome combining impairment, activity limitation and participation restrictions within a specific environment…”
    Electrónico
  18. 200818
    Publicado 2024
    “…He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. …”
    Video
  19. 200819
    Publicado 2024
    “…He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. …”
    Video
  20. 200820
    Publicado 2022
    “…Awarding of badges follows the ACM guidelines: https://www.acm.org/publications/policies/artifact-review-and-badging-current. Badges are published with the papers and highlighted in the program. …”
    Libro electrónico