Mostrando 200,941 - 200,960 Resultados de 201,492 Para Buscar 'Pollica~', tiempo de consulta: 1.73s Limitar resultados
  1. 200941
    Publicado 1997
    “…In this study including the thesis he defended in 1988, directed by Professor René Girault, and 12 additional chapters, Gérard Bossuat analyses the mechanisms of American aid to France, its domestic impacts and its influence on the European policy of...…”
    Libro electrónico
  2. 200942
    Publicado 1997
    “…In this study including the thesis he defended in 1988, directed by Professor René Girault, and 12 additional chapters, Gérard Bossuat analyses the mechanisms of American aid to France, its domestic impacts and its influence on the European policy of the...…”
    Libro electrónico
  3. 200943
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Microsoft Identity Platform Overview Azure AD Application Model Application Types and User Consent The Basics and Evolution of Authentication Securing Applications with OAuth 2.0, OpenID Connect, and MSAL Building Secure Services Using the Microsoft Graph API Introducing Azure Active Directory B2C Advanced Features of Azure AD B2C Azure AD B2C Custom Policies…”
    Libro electrónico
  4. 200944
    Publicado 2020
    “…By the end of this book, you’ll be able to create, implement, and manage multi-cloud architectures with confidenceWhat you will learnGet to grips with the core functions of multiple cloud platformsDeploy, automate, and secure different cloud solutionsDesign network strategy and get to grips with identity and access management for multi-cloudDesign a landing zone spanning multiple cloud platformsUse automation, monitoring, and management tools for multi-cloudUnderstand multi-cloud management with the principles of BaseOps, FinOps, SecOps, and DevOpsDefine multi-cloud security policies and use cloud security toolsTest, integrate, deploy, and release using multi-cloud CI/CD pipelinesWho this book is forThis book is for architects and lead engineers involved in architecting multi-cloud environments, with a focus on getting governance right to stay in control of developments in multi-cloud. …”
    Libro electrónico
  5. 200945
    Publicado 2016
    “…No, says the remarkable collection of entrepreneurs, business leaders, policy makers, and technologists who gathered at the October 2016 Next: Economy Summit in San Francisco. …”
    Video
  6. 200946
    Publicado 2020
    “…Throughout the course of this book, you'll also learn about specific tests such as exploiting applications, testing permissions flaws, and discovering weak policies. Moving on, you'll discover how to establish private-cloud access through backdoor Lambda functions. …”
    Libro electrónico
  7. 200947
    Publicado 2017
    “…5 Hours of Video Training on Application Centric Infrastructure (ACI) Video instruction on Application Centric Infrastructure concepts, policy, security, and infrastructure architecture Description Application Centric Infrastructure (ACI) LiveLessons is designed to get you up and running with ACI--Cisco’s Software Defined Networking (SDN) solution and the hottest topic in data center today. …”
    Video
  8. 200948
    Publicado 2017
    “…Understand IKEv2 improvements: anti-DDoS cookies, configuration payloads, acknowledged responses, and more Implement modern secure VPNs with Cisco IOS and IOS-XE Plan and deploy IKEv2 in diverse real-world environments Configure IKEv2 proposals, policies, profiles, keyrings, and authorization Use advanced IKEv2 features, including SGT transportation and IKEv2 fragmentation Understand FlexVPN, its tunnel interface types, and IOS AAA infrastructure Implement FlexVPN Server with EAP authentication, pre-shared keys, and digital signatures Deploy, configure, and customize FlexVPN clients Configure, manage, and troubleshoot the FlexVPN Load Balancer Improve FlexVPN resiliency with dynamic tunnel source, backup peers, and backup tunnels Monitor IPsec VPNs with AAA, SNMP, and Syslog Troubleshoot connectivity, tunnel creation, authentication, authorization, data encapsulation, data encryption, and overlay routing Calculate IPsec overhead and fragmentation Plan your IKEv2 migration: hardware, VPN technologies, routing, restrictions, capacity, PKI, authentication, availability, and more…”
    Libro electrónico
  9. 200949
    Publicado 2018
    “…What You Will Learn Host a Python application on Google Compute Engine Host an application using Google Cloud Functions Migrate a MySQL DB to Cloud Spanner Configure a network for a highly available application on GCP Learn simple image processing using Storage and Cloud Functions Automate security checks using Policy Scanner Understand tools for monitoring a production environment in GCP Learn to manage multiple projects using service accounts In Detail Google Cloud Platform is a cloud computing platform that offers products and services to host applications using state-of-the art infrastructure and technology. …”
    Libro electrónico
  10. 200950
    Publicado 2020
    “…Seven main categories are covered: AWS Certified DevOps Engineer Overview; SDLC Automation; Configuration Management and Infrastructure as Code; Monitoring and Logging; Policies and Standards Automation; Incident and Event Response; and High Availability, Fault Tolerance, and Disaster Recovery. …”
    Video
  11. 200951
    Publicado 2020
    “…You'll also learn to implement DRL such as Deep Q-Learning and Policy Gradient Methods, which are critical to many modern results in AI. …”
    Libro electrónico
  12. 200952
    Publicado 2018
    “…What You Will Learn Discover advanced vRealize Operations concepts and design your processes effectively for the underlying architecture Plan and install a new version or upgrade from a previous one Apply proven capacity management theories and techniques in practical, real-world environments Manipulate data and metrics to display them in the most effective way possible Create custom views and dashboards fit for any use case Explore how policies have evolved in vRealize Operations 6.6 and how to apply them in the most effective manner In Detail In the modern IT world, the criticality of managing the health, efficiency, and compliance of virtualized environments is more important than ever. …”
    Libro electrónico
  13. 200953
    Publicado 2020
    “…Topics Include: Module 1: ISE Fundamentals Module 2: Policies Module 3: Device Identification and Onboarding Module 4: Compliance and Network Device Control About the Instructors Joseph Muniz is an architect at Cisco Systems and a security researcher. …”
    Video
  14. 200954
    Publicado 2018
    Tabla de Contenidos: “…Generator outputs of StackedGAN -- Conclusion -- Reference -- Chapter 7: Cross-Domain GANs -- Principles of CycleGAN -- The CycleGAN Model -- Implementing CycleGAN using Keras -- Generator outputs of CycleGAN -- CycleGAN on MNIST and SVHN datasets -- Conclusion -- References -- Chapter 8: Variational Autoencoders (VAEs) -- Principles of VAEs -- Variational inference -- Core equation -- Optimization -- Reparameterization trick -- Decoder testing -- VAEs in Keras -- Using CNNs for VAEs -- Conditional VAE (CVAE) -- -VAE: VAE with disentangled latent representations -- Conclusion -- References -- Chapter 9: Deep Reinforcement Learning -- Principles of reinforcement learning (RL) -- The Q value -- Q-Learning example -- Q-Learning in Python -- Nondeterministic environment -- Temporal-difference learning -- Q-Learning on OpenAI gym -- Deep Q-Network (DQN) -- DQN on Keras -- Double Q-Learning (DDQN) -- Conclusion -- References -- Chapter 10: Policy Gradient Methods -- Policy gradient theorem -- Monte Carlo policy gradient (REINFORCE) method -- REINFORCE with baseline method -- Actor-Critic method -- Advantage Actor-Critic (A2C) method -- Policy Gradient methods with Keras -- Performance evaluation of policy gradient methods -- Conclusion -- References -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  15. 200955
    Publicado 2021
    “…By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems.What you will learn* Understand AWS IAM concepts, terminology, and services* Explore AWS IAM, Amazon Cognito, AWS SSO, and AWS Directory Service to solve customer and workforce identity problems* Apply the concepts you learn about to solve business, process, and compliance challenges when expanding into AWS* Navigate the AWS CLI to unlock the programmatic administration of AWS* Explore how AWS IAM, its policy objects, and notational language can be applied to solve security and access management use cases* Relate concepts easily to your own environment through IAM patterns and best practicesWho this book is forIdentity engineers and administrators, cloud administrators, security architects, or anyone who wants to explore and manage IAM solutions in AWS will find this book useful. …”
    Libro electrónico
  16. 200956
    Publicado 2021
    “…Learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environmentsKey Features:Develop practical skills to protect your organization from constantly evolving security threatsBecome well-versed with real-world Azure security strategies and AZ-500 exam objectivesEffectively manage security governance, policies, and operations in AzureBook Description:Security is a key part of any well-architected design. …”
    Libro electrónico
  17. 200957
    por Sangbin Park, Calvin, author
    Publicado 2021
    “…This book will guide you through the steps for setting up a Jenkins instance on AWS and inside a corporate firewall, while discussing design choices and configuration options, such as TLS termination points and security policies. You'll create CI/CD pipelines that are triggered through GitHub pull request events, and also understand the various Jenkinsfile syntax types to help you develop a build and release process unique to your requirements. …”
    Libro electrónico
  18. 200958
    Publicado 2019
    “…You're a leader who needs to present new visions, goals, ideas, or policies to employees and need to persuade them to act You're a professional who regularly provides instruction and workshops to customers or other employees You haven’t needed to make a presentation in a while, and you want to sharpen your skills You're part of a team who has opportunities to present or pitch new ideas, products, or processes to supervisors or institutional leaders Prerequisites: You should be familiar with Microsoft PowerPoint Materials or downloads needed in advance: None Further resource..…”
    Video
  19. 200959
    por Maddison, Angus
    Publicado 2007
    “…He held a number of senior posts at OEEC and OECD between 1953 and 1978, and has been a policy advisor to governments in Brazil, Ghana, Greece, Mexico and Pakistan. …”
    Libro electrónico
  20. 200960
    Publicado 2016
    “…What You Will Learn Automate your application’s decisions, such as promotion applying, discount policies, fraud detection, and more. Quickly get started with writing your first rules using the DRL full syntax. …”
    Libro electrónico