Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 14,413
- Política y gobierno 12,205
- Historia 11,470
- Política i govern 4,441
- Història 4,274
- Política económica 3,895
- Filosofía 3,428
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,064
- Administración pública 2,033
- Política social 1,928
- Ciencias políticas 1,907
- Economía 1,844
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,425
- Hacienda pública 1,349
- Economics 1,339
- Derecho 1,308
- Crítica e interpretación 1,296
- Govern 1,278
- Política monetaria 1,271
- Business & Economics 1,262
- Democracia 1,237
- Política educativa 1,226
- Ciencia política 1,112
- History 1,096
-
200961Publicado 2016Tabla de Contenidos: “…Chapter 2: Setting Up and Managing Code RepositoriesIntroduction; Creating a Git repository in an existing TFVC Team Project; Enabling code analysis check-in policy; Performing a baseless merge between sibling branches in TFVC; Reparenting a branch in TFVC; Unlocking files checked out by someone else; Unshelving a shelveset created in one branch to another branch; Ignoring file types from check-in using .tfignore and .gitignore; Conducting code reviews in TFS; Setting up policies for branches in Git; Conducting Pull requests in TFS; Analyzing code churn with TFS analysis services cube…”
Libro electrónico -
200962Publicado 2016“…The official study guide helps you master all the topics on the VCP6-DCV (#2VO-621) exam, including: Securing vSphere environments Implementing advanced network virtualization policies, features, and Network I/O control (NIOC) Configuring and using VMware storage protocols, VSAN and VVOL software-defined storage, ESXi host interactions, and Storage I/O Control (SIOC) Upgrading vSphere deployments to 6.x, including vCenter Server and ESXi Hosts Planning and using Resource Pools Implementing backup/recovery with VMware Data Protection and vSphere Replication Troubleshooting performance, storage, networks, upgrades, clusters, and more Successfully conf..…”
Libro electrónico -
200963Publicado 2019“…This Learning Path includes content from the following Packt products: Google Cloud Platform for Developers Ted Hunter and Steven Porter Google Cloud Platform Cookbook by Legorie Rajan PS What you will learn Host an application using Google Cloud Functions Migrate a MySQL database to Cloud Spanner Configure a network for a highly available application on GCP Learn simple image processing using Storage and Cloud Functions Automate security checks using Policy Scanner Deploy and run services on App Engine and Container Engine Minimize downtime and mitigate issues with Stackdriver Monitoring and Debugger Integrate with big data solutions, including BigQuery, Dataflow, and Pub/Sub Who this book is for This Learning Path is for IT professionals, engineers, and developers who want to implement Google Cloud in their organizations. …”
Libro electrónico -
200964Publicado 2018“…What You'll Learn Install Apache Kudu, Impala, and Spark to modernize enterprise data warehouse and business intelligence environments, complete with real-world, easy-to-follow examples, and practical adviceIntegrate HBase, Solr, Oracle, SQL Server, MySQL, Flume, Kafka, HDFS, and Amazon S3 with Apache Kudu, Impala, and SparkUse StreamSets, Talend, Pentaho, and CDAP for real-time and batch data ingestion and processingUtilize Trifacta, Alteryx, and Datameer for data wrangling and interactive data processingTurbocharge Spark with Alluxio, a distributed in-memory storage platformDeploy big data in the cloud using Cloudera DirectorPerform real-time data visualization and time series analysis using Zoomdata, Apache Kudu, Impala, and SparkUnderstand enterprise big data topics such as big data governance, metadata management, data lineage, impact analysis, and policy enforcement, and how to use Cloudera Navigator to perform common data governance tasksImplement big data use cases such as big data warehousing, data warehouse optimization, Internet of Things, real-time data ingestion and analytics, complex event processing, and scalable predictive modelingStudy real-world big data case studies from innovative companies, including Navistar, Cerner, British Telecom, Shopzilla, Thomson Reuters, and MastercardWho This Book Is For BI and big data warehouse professionals interested in gaining practical and real-world insight into next-generation big data processing and analytics using Apache Kudu, Impala, and Spark; and those who want to learn more about other advanced enterprise topics…”
Libro electrónico -
200965Publicado 2020“…In addition, you will gain actionable insights into such topic areas as deep Q-networks, policy gradient methods, continuous control problems, and highly scalable, non-gradient methods. …”
Libro electrónico -
200966Publicado 2015“…Moving on, you will explore different methods to back up and restore your databases and perform advanced administration tasks such as working with Policies, Filetables, and SQL audits. The next part of the book covers more advanced HADR tasks such as log shipping and data mirroring, and then shows you how to develop your server to work with BLOB, XML, and JSON. …”
Libro electrónico -
200967Publicado 2016“…The material in this new section ranges from the Seychelles, Honduras, Ecuador, and Libya to Turkey, Western Europe, Vietnam, China, and, in perhaps the most unexpected and sinister development, the United States, where the new EHMs—bankers, lobbyists, corporate executives, and others—“con governments and the public into submitting to policies that make the rich richer and the poor poorer.” …”
Libro electrónico -
200968Publicado 2015Tabla de Contenidos: “…""How to protect data using server-side encryption""""How to protect data using client-side encryption""; ""Chapter 9: Enabling Cross-Origin Resource Sharing""; ""Introduction""; ""Walkthrough 1: Enabling CORS through the S3 console""; ""Walkthrough 2: Enabling CORS with AWS CLI""; ""Chapter 10: Managing Object Lifecycle to Lower the Cost""; ""Introduction""; ""How to apply the lifecycle policy through the S3 console""; ""How to apply the lifecycle policy with AWS CLI""; ""Chapter 11: S3 Performance Optimization""; ""Introduction""; ""How to optimize PUT requests""…”
Libro electrónico -
200969Publicado 2014“…Next, they introduce advanced routing with policies and redistribution, sophisticated BGP-based traffic engineering, and multicast. …”
Libro electrónico -
200970Publicado 2015“…The authorized study guide helps you master all the topics on the CompTIA CASP exam, including: Enterprise security: cryptography; storage; network/security components, concepts, and architectures; host controls; application vulnerabilities/controls Risk management and incident response: business influences/risks; risk mitigation; privacy policies / procedures; incident response/recovery Research, analysis, and assessment: industry trends; securing the enterprise; assessment tools / methods Integration of computing, communications, and business disciplines: business unit collabo..…”
Libro electrónico -
200971Publicado 2015Tabla de Contenidos: “…Configuring SELinux booleansConfiguring SELinux port definitions; Troubleshooting SELinux; Creating SELinux policies; Applying SELinux policies; Chapter 6: Orchestrating with Ansible; Introduction; Install Ansible; Configuring the Ansible inventory; Creating a template for a kickstart file; Creating a playbook to deploy a new VM with kickstart; Creating a playbook to perform system configuration tasks; Troubleshooting Ansible; Chapter 7: Puppet Configuration Management; Introduction; Installing and configuring Puppet Master; Installing and configuring the Puppet agent…”
Libro electrónico -
200972Publicado 2015“…Skill Level Intermediate Advanced What You Will Learn How to prepare for your Microsoft MCSA Exam 70-346 How to configure Office 365 for an efficient, reliable deployment How to establish secure Office 365 administrative roles How to set up authentication, including password policies and multi-factor authentication How to manage Office 365 user identities, both on-premise and in the cloud How to set up and use the Azure Active Directory Sync Tool How to install and configure Active Directory Federation Services (AD FS) How to monitor and troubleshoot Office 365 availability and usage Who Should Take This Course Any IT professional or student preparing for the Microsoft MCSA/MCP Certification Exam 70-346: Managing Office 365 Identities and Requirements IT professionals responsible for administeri..…”
-
200973Publicado 2015“…Sari’s first text was Tools and Techniques for Securing Microsoft Networks , commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices . …”
-
200974Publicado 2018“…Skill Level Beginner What You Will Learn Fundamental networking concepts, such as protocol reference models, network devices and theory, network topologies, and network services WAN technologies including ISDN, Frame Relay, PPP, MPLS, Metro-Ethernet, and more How to work with different network cables and connectors Network design considerations Switch and wireless LAN configuration IPv4 and IPv6 addressing Routing fundamentals including RIP, OSPF, IS-IS, and BGP routing protocols; HSRP and VRRP; route aggregation; and routing metrics Unified communications, Voice over IP (VoIP), video, and QoS Virtualized devices, storage area network technologies (SAN), and cloud technologies Network security attacks, vulnerabilities, policies, defenses, and counter-measures Network monitoring tools and analysis, configuration management, and best practices Network troubleshooting Who Should Take This Course? …”
-
200975Publicado 2007“…The Smart Way to StudyTM In This Book You’ll Learn How To: Approach the IS audit process from ISACA’s view of IS auditing best practices Relate and apply information security and systems audit best practices to the six CISA job practice areas Understand the IS audit process and learn how to apply best practices to secure an organization’s assets Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls Minimize risk within an IT/IS environment by using sound security techniques and practices Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity Streamline your exam preparations with our exam insights, tips, and study strategies WRITTEN BY A LEADING CISA EXAM EXPERT! …”
Libro electrónico -
200976Publicado 2024“…What you will learn Get to grips with network communications and routing to secure them best Understand the difference between encryption and hashing Know how and where certificates and digital signatures are used Study detailed incident and change management procedures Manage user identities and authentication principles tested in the exam Familiarize yourself with the CISSP security models covered in the exam Discover key personnel and travel policies to keep your staff secure Discover how to develop secure software from the start Who this book is for This book is for professionals seeking to obtain the ISC2 CISSP certification. …”
Libro electrónico -
200977Publicado 2024“…He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. …”
Video -
200978Publicado 2017“…Aimed at academics, researchers, and policy makers, this book';s goal is to make tangible the contributions of communication for thinking about contemporary social and organizational problems."…”
Libro electrónico -
200979Publicado 2015“…This year's program highlights a wide range of research topics, including block-based programming languages, cognitive and social aspects of learning computing, computing education policy matters, e-books, and novice compilation behaviors-just to name a few. …”
Libro electrónico -
200980Publicado 2005“…Cuatro cuentos insólitos de Chesterton, aunque en apariencia contengan las virtualidades literarias de la intriga, eso tan querido por nuestro autor, eso que lo ha convertido en uno de los grandes autores del relato policial de todos los tiempos. Así, en Los árboles del orgullo la broma y la sátira, paradójicamente, no hacen más que ahondar en el misterio que envuelve la desaparición de cierto e importante hombre, a través de todo lo cual se vale Chesterton de una imponente batería cómica para pasar su muy burlesca revista a los poetas, los políticos y, en fin, a los biempensantes en general. …”
991005150639706719