Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 14,413
- Política y gobierno 12,205
- Historia 11,470
- Política i govern 4,441
- Història 4,274
- Política económica 3,895
- Filosofía 3,428
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,064
- Administración pública 2,033
- Política social 1,928
- Ciencias políticas 1,907
- Economía 1,844
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,425
- Hacienda pública 1,349
- Economics 1,339
- Derecho 1,308
- Crítica e interpretación 1,296
- Govern 1,278
- Política monetaria 1,271
- Business & Economics 1,262
- Democracia 1,237
- Política educativa 1,226
- Ciencia política 1,112
- History 1,096
-
200941Publicado 1997“…In this study including the thesis he defended in 1988, directed by Professor René Girault, and 12 additional chapters, Gérard Bossuat analyses the mechanisms of American aid to France, its domestic impacts and its influence on the European policy of...…”
Libro electrónico -
200942Publicado 1997“…In this study including the thesis he defended in 1988, directed by Professor René Girault, and 12 additional chapters, Gérard Bossuat analyses the mechanisms of American aid to France, its domestic impacts and its influence on the European policy of the...…”
Libro electrónico -
200943Publicado 2022Tabla de Contenidos: “…Table of Contents Microsoft Identity Platform Overview Azure AD Application Model Application Types and User Consent The Basics and Evolution of Authentication Securing Applications with OAuth 2.0, OpenID Connect, and MSAL Building Secure Services Using the Microsoft Graph API Introducing Azure Active Directory B2C Advanced Features of Azure AD B2C Azure AD B2C Custom Policies…”
Libro electrónico -
200944Publicado 2020“…By the end of this book, you’ll be able to create, implement, and manage multi-cloud architectures with confidenceWhat you will learnGet to grips with the core functions of multiple cloud platformsDeploy, automate, and secure different cloud solutionsDesign network strategy and get to grips with identity and access management for multi-cloudDesign a landing zone spanning multiple cloud platformsUse automation, monitoring, and management tools for multi-cloudUnderstand multi-cloud management with the principles of BaseOps, FinOps, SecOps, and DevOpsDefine multi-cloud security policies and use cloud security toolsTest, integrate, deploy, and release using multi-cloud CI/CD pipelinesWho this book is forThis book is for architects and lead engineers involved in architecting multi-cloud environments, with a focus on getting governance right to stay in control of developments in multi-cloud. …”
Libro electrónico -
200945Publicado 2016“…No, says the remarkable collection of entrepreneurs, business leaders, policy makers, and technologists who gathered at the October 2016 Next: Economy Summit in San Francisco. …”
-
200946Publicado 2020“…Throughout the course of this book, you'll also learn about specific tests such as exploiting applications, testing permissions flaws, and discovering weak policies. Moving on, you'll discover how to establish private-cloud access through backdoor Lambda functions. …”
Libro electrónico -
200947Publicado 2017“…5 Hours of Video Training on Application Centric Infrastructure (ACI) Video instruction on Application Centric Infrastructure concepts, policy, security, and infrastructure architecture Description Application Centric Infrastructure (ACI) LiveLessons is designed to get you up and running with ACI--Cisco’s Software Defined Networking (SDN) solution and the hottest topic in data center today. …”
-
200948Publicado 2017“…Understand IKEv2 improvements: anti-DDoS cookies, configuration payloads, acknowledged responses, and more Implement modern secure VPNs with Cisco IOS and IOS-XE Plan and deploy IKEv2 in diverse real-world environments Configure IKEv2 proposals, policies, profiles, keyrings, and authorization Use advanced IKEv2 features, including SGT transportation and IKEv2 fragmentation Understand FlexVPN, its tunnel interface types, and IOS AAA infrastructure Implement FlexVPN Server with EAP authentication, pre-shared keys, and digital signatures Deploy, configure, and customize FlexVPN clients Configure, manage, and troubleshoot the FlexVPN Load Balancer Improve FlexVPN resiliency with dynamic tunnel source, backup peers, and backup tunnels Monitor IPsec VPNs with AAA, SNMP, and Syslog Troubleshoot connectivity, tunnel creation, authentication, authorization, data encapsulation, data encryption, and overlay routing Calculate IPsec overhead and fragmentation Plan your IKEv2 migration: hardware, VPN technologies, routing, restrictions, capacity, PKI, authentication, availability, and more…”
Libro electrónico -
200949Publicado 2018“…What You Will Learn Host a Python application on Google Compute Engine Host an application using Google Cloud Functions Migrate a MySQL DB to Cloud Spanner Configure a network for a highly available application on GCP Learn simple image processing using Storage and Cloud Functions Automate security checks using Policy Scanner Understand tools for monitoring a production environment in GCP Learn to manage multiple projects using service accounts In Detail Google Cloud Platform is a cloud computing platform that offers products and services to host applications using state-of-the art infrastructure and technology. …”
Libro electrónico -
200950Publicado 2020“…Seven main categories are covered: AWS Certified DevOps Engineer Overview; SDLC Automation; Configuration Management and Infrastructure as Code; Monitoring and Logging; Policies and Standards Automation; Incident and Event Response; and High Availability, Fault Tolerance, and Disaster Recovery. …”
-
200951Publicado 2020“…You'll also learn to implement DRL such as Deep Q-Learning and Policy Gradient Methods, which are critical to many modern results in AI. …”
Libro electrónico -
200952Publicado 2018“…What You Will Learn Discover advanced vRealize Operations concepts and design your processes effectively for the underlying architecture Plan and install a new version or upgrade from a previous one Apply proven capacity management theories and techniques in practical, real-world environments Manipulate data and metrics to display them in the most effective way possible Create custom views and dashboards fit for any use case Explore how policies have evolved in vRealize Operations 6.6 and how to apply them in the most effective manner In Detail In the modern IT world, the criticality of managing the health, efficiency, and compliance of virtualized environments is more important than ever. …”
Libro electrónico -
200953Publicado 2020“…Topics Include: Module 1: ISE Fundamentals Module 2: Policies Module 3: Device Identification and Onboarding Module 4: Compliance and Network Device Control About the Instructors Joseph Muniz is an architect at Cisco Systems and a security researcher. …”
-
200954Publicado 2018Tabla de Contenidos: “…Generator outputs of StackedGAN -- Conclusion -- Reference -- Chapter 7: Cross-Domain GANs -- Principles of CycleGAN -- The CycleGAN Model -- Implementing CycleGAN using Keras -- Generator outputs of CycleGAN -- CycleGAN on MNIST and SVHN datasets -- Conclusion -- References -- Chapter 8: Variational Autoencoders (VAEs) -- Principles of VAEs -- Variational inference -- Core equation -- Optimization -- Reparameterization trick -- Decoder testing -- VAEs in Keras -- Using CNNs for VAEs -- Conditional VAE (CVAE) -- -VAE: VAE with disentangled latent representations -- Conclusion -- References -- Chapter 9: Deep Reinforcement Learning -- Principles of reinforcement learning (RL) -- The Q value -- Q-Learning example -- Q-Learning in Python -- Nondeterministic environment -- Temporal-difference learning -- Q-Learning on OpenAI gym -- Deep Q-Network (DQN) -- DQN on Keras -- Double Q-Learning (DDQN) -- Conclusion -- References -- Chapter 10: Policy Gradient Methods -- Policy gradient theorem -- Monte Carlo policy gradient (REINFORCE) method -- REINFORCE with baseline method -- Actor-Critic method -- Advantage Actor-Critic (A2C) method -- Policy Gradient methods with Keras -- Performance evaluation of policy gradient methods -- Conclusion -- References -- Other Books You May Enjoy -- Index…”
Libro electrónico -
200955Publicado 2021“…By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems.What you will learn* Understand AWS IAM concepts, terminology, and services* Explore AWS IAM, Amazon Cognito, AWS SSO, and AWS Directory Service to solve customer and workforce identity problems* Apply the concepts you learn about to solve business, process, and compliance challenges when expanding into AWS* Navigate the AWS CLI to unlock the programmatic administration of AWS* Explore how AWS IAM, its policy objects, and notational language can be applied to solve security and access management use cases* Relate concepts easily to your own environment through IAM patterns and best practicesWho this book is forIdentity engineers and administrators, cloud administrators, security architects, or anyone who wants to explore and manage IAM solutions in AWS will find this book useful. …”
Libro electrónico -
200956Publicado 2021“…Learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environmentsKey Features:Develop practical skills to protect your organization from constantly evolving security threatsBecome well-versed with real-world Azure security strategies and AZ-500 exam objectivesEffectively manage security governance, policies, and operations in AzureBook Description:Security is a key part of any well-architected design. …”
Libro electrónico -
200957por Sangbin Park, Calvin, author“…This book will guide you through the steps for setting up a Jenkins instance on AWS and inside a corporate firewall, while discussing design choices and configuration options, such as TLS termination points and security policies. You'll create CI/CD pipelines that are triggered through GitHub pull request events, and also understand the various Jenkinsfile syntax types to help you develop a build and release process unique to your requirements. …”
Publicado 2021
Libro electrónico -
200958Publicado 2019“…You're a leader who needs to present new visions, goals, ideas, or policies to employees and need to persuade them to act You're a professional who regularly provides instruction and workshops to customers or other employees You haven’t needed to make a presentation in a while, and you want to sharpen your skills You're part of a team who has opportunities to present or pitch new ideas, products, or processes to supervisors or institutional leaders Prerequisites: You should be familiar with Microsoft PowerPoint Materials or downloads needed in advance: None Further resource..…”
-
200959por Maddison, Angus“…He held a number of senior posts at OEEC and OECD between 1953 and 1978, and has been a policy advisor to governments in Brazil, Ghana, Greece, Mexico and Pakistan. …”
Publicado 2007
Libro electrónico -
200960Publicado 2016“…What You Will Learn Automate your application’s decisions, such as promotion applying, discount policies, fraud detection, and more. Quickly get started with writing your first rules using the DRL full syntax. …”
Libro electrónico