Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 14,413
- Política y gobierno 12,205
- Historia 11,470
- Política i govern 4,441
- Història 4,274
- Política económica 3,895
- Filosofía 3,428
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,064
- Administración pública 2,033
- Política social 1,928
- Ciencias políticas 1,907
- Economía 1,844
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,425
- Hacienda pública 1,349
- Economics 1,339
- Derecho 1,308
- Crítica e interpretación 1,296
- Govern 1,278
- Política monetaria 1,271
- Business & Economics 1,262
- Democracia 1,237
- Política educativa 1,226
- Ciencia política 1,112
- History 1,096
-
200981por Mathers, Todd W.“…Along the way, Mathers presents proven examples and best practices for virtually every challenge, from server security to group policies, patch management to automated client deployment. …”
Publicado 2004
Libro electrónico -
200982Publicado 2017“…In Detail Big data analytics are driving innovations in scientific research, digital marketing, policy-making and much more. Matplotlib offers simple but powerful plotting interface, versatile plot types and robust customization. …”
Libro electrónico -
200983por Deal, Richard A.“…Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. …”
Publicado 2005
Libro electrónico -
200984Publicado 2013“…Learn how to treat employees as customers... clarify their needs and motivations ... leverage the same strategies and tools your company uses to sell products and services... package information for faster, better decision-making... clearly explain benefits, pay, and policies... improve recruiting, orientation, outplacement, and much more. …”
Libro electrónico -
200985Publicado 2015Tabla de Contenidos: “…SummaryChapter 4: Overcoming VDA Registration Problems; Getting familiar with the VDA registration process; Starting with the basics - the event viewer; Firewall configuration; Troubleshooting DNS resolution issues; Scenario - VDA is not able to reach the Delivery Controller; Overcoming time synchronization issues; Conquering domain membership problems; Multiple network adapters; Service principal name; Surpassing DDC FQDN issues; Local group policies and VDA communication; Solving .NET framework exceptions; A basic troubleshooting flowchart…”
Libro electrónico -
200986Publicado 2022“…Todos los d̕as leemos noticias de empresas y entidades p︢blicas que han sufrido p̌rdidas importantes, incluso devastadoras, por la acci̤n de ciberdelincuentes. …”
Libro electrónico -
200987Publicado 2020“…By the end of this book, you'll have learned the concepts and techniques you need to know to prepare for the AZ-303 exam and design effective solutions on Microsoft Azure.What you will learnManage Azure subscriptions and resourcesEnsure governance and compliance with policies, roles, and blueprintsBuild, migrate, and protect servers in AzureConfigure, monitor, and troubleshoot virtual networksManage Azure AD and implement multi-factor authenticationConfigure hybrid integration with Azure AD ConnectFind out how you can monitor costs, performance, and securityDevelop solutions that use Cosmos DB and Azure SQL DatabaseWho this book is forThis book is for solution architects and experienced developers who advise stakeholders and translate business requirements into secure, scalable, and reliable solutions. …”
Libro electrónico -
200988Publicado 2002“…Marine fisheries are an important activity in Martinique and Guadeloupe islands (French West Indies), but are facing increasing challenges dealing with the management of marine resources and the modernization of the sector, as well as with its intégration into the Caribbean and Européen fishery policies. This book is a comprehensive survey of the fishing sector in the two islands; combining the scholarship and research of twenty contributors, it summarizes available information and invesvgates pending problems. …”
Libro electrónico -
200989por Benjamin, Henry“…Practice for the CCNP BSCI exam with hands-on, networking lab scenarios> Ramp up your routing know-how with more than 40 practical lab scenarios Reinforce your CCNP exam preparation with step-by-step, hands-on router configuration Get up to speed with advanced OSPF and IS-IS configuration, summarization, and redistribution Gain proficiency in an advanced BGP environment with synchronization, communities and peer groups, and static and policy-based routing Perfect your EIGRP configuration and summarization skills Apply proficiency gained throughout the book with RIP to OSPF migration Use VLSMs to extend the use of IP addresses Test routing connectivity using accepted troubleshooting techniques Take your preparation to the next level with a bonus CCIE lab, written by a prominent member of the CCIE team at Cisco Systems Indispensable as both a router configuration guide and a preparation tool for the CCNP BSCI exam, CCNP Practical Studies: Routing will prepare you for the exam and give you the hands-on experience to apply your knowledge on the job. …”
Publicado 2002
Libro electrónico -
200990Publicado 2004“…Coverage includes: Overcoming obstacles to successful network and system management Planning for deployment: a best-practices checklist Running NNM: discovery, symbols, objects, alarms, and queries Customizing NNM: submaps, application integration, custom symbols/fields, and more CV: providing a logical view of devices based on customer ownership SIP: making management information Web-accessible, step-by-step Managing data collection and event configuration Scalability and distribution: remote consoles, filters, and Distributed Internet Monitoring Roles, service levels, installation, configuration, agents, policies, and day-to-day administration Taking full advantage of Smart Plug-Ins (SPI) Improving flexibility by adding Multiple Management Servers Includes OpenView Command Quick Reference Guide If you're a network/system administrator running OpenView under HP-UX, Unix, or Windows, OpenView System Administration Handbook will make you more productive, more effective, and more valuable. …”
Libro electrónico -
200991Publicado 2006“…A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS® Router, Cisco® ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding Learn how to deploy scalable and secure IPsec and L2TP remote access VPN designs, including consideration of authentication, encryption, split-tunneling, high availability, load-balancing, and NAT transparency Master scalable IPsec site-to-site VPN design and implementation including configuration of security protocols and policies, multiprotocol/ multicast traffic transport, NAT/PAT traversal, quality of service (QoS), Dynamic Multipoint VPNs (DMVPNs), and public key infrastructure (PKI) Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. …”
Libro electrónico -
200992Publicado 2008“…Professor of Computer Science and Public Affairs Director, Center for Information Technology Policy Princeton University "Historically, games have been used by warfighters to develop new capabilities and to hone existing skills--especially in the Air Force. …”
Libro electrónico -
200993por Carter, Earl“…Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. …”
Publicado 2004
Libro electrónico -
200994por Alexandrescu, AndreiTabla de Contenidos: “…Foreword / Foreword / Techniques -- Policy-Based Class Design -- Techniques -- Typelists -- Small-Object Allocation -- Components -- Generalized Functors -- Implementing Singletons -- Smart Pointers -- Object Factories -- Abstract Factory -- Visitor -- Multimethods. …”
Publicado 2001
Libro electrónico -
200995Publicado 2008“…The FWSM defines the security parameter and enables the enforcement of security policies through authentication, access control lists, and protocol inspection. …”
Libro electrónico -
200996Publicado 2007“…Plan your implementation and migration to Exchange 2007 Confirm that your architecture of Exchange 2007 meets best practices Build a lab environment to test that your migration, implementation, and support processes are valid Implement Cluster Continuous Replication for effective disaster recovery of a failed Exchange server or site Integrate Exchange 2007 Unified Messaging into an existing telephony environment Optimize Exchange 2007 for a scalable enterprise environment Administer and support Exchange on an ongoing basis Introduction Part I Microsoft Exchange Server 2007 Overview 1 Exchange Server 2007 Technology Primer 2 Best Practices at Planning, Prototyping, Migrating, and Deploying Exchange Server 2007 Part II Planning and Designing an Exchange Server 2007 Environment 3 Understanding Core Exchange Server 2007 Design Plans 4 Architecting an Enterprise-Level Exchange Environment 5 Integrating Exchange Server 2007 in a Non-Windows Environment 6 Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2007 Part III Implementing Exchange Server 2007 Services 7 Installing Exchange Server 2007 8 Implementing Edge Services for an Exchange Server 2007 Environment 9 Using the Windows PowerShell in an Exchange Server 2007 Environment Part IV Securing an Exchange Server 2007 Environment 10 Client-Level Secured Messaging 11 Server and Transport-Level Security 12 Encrypting Email Communications with Exchange Server 2007 13 Securing Exchange Server 2007 with ISA Server 14 Understanding Enterprise Policy Enforcement Security Part V Migrations and Coexistence with Exchange Server 2007 15 Migrating from Windows 2000 Server to Windows Server 2003 16 Migrating to Exchange Server 2007 17 Implementing Client Access and Hub Transport Servers 18 Administering ..…”
Libro electrónico -
200997Publicado 2008“…Install, configure, and customize PowerShell 2.0 and master its command line interface Discover proven best practices for PowerShell scripting Make the most of PowerShell cmdlets–especially the new cmdlets included in PowerShell 2.0 Leverage PowerShell’s deep .NET Framework integration Secure your scripts using code signing, execution policies, and PowerShell’s built-in security Use custom script functions to manage permissions more efficiently Control the registry locally and remotely and use PowerShell’s powerful new registry transactions Use PowerShell as a management interface Automate Exchange Server 2007 administrative tasks Automate the management of Microsoft’s new System Center Operations Manager 2007 Preview the forthcoming Graphical PowerShell scripting environment Understand how to manage Active Directory using PowerShell Master using PowerShell with WMI Learn PowerShell 2.0 remoting Download all examples and source code presented in this book from informit.com/title/9780672329883…”
Libro electrónico -
200998por Thomas, Craig, 1969-“…· Discover the immutable laws of nature that govern all your financial decisions–and put them to work for you · Ten ways to maximize wealth and happiness for everyone · How not to fix a broken economy: stupid policy tricks and why they just make things worse We all live inside the Econosphere: a living, breathing, global organism that choreographs billions of performers with breathtaking precision and can make life better for everyone. …”
Publicado 2010
Libro electrónico -
200999Publicado 2014“…Business challenges solved by virtualization Core components of vSphere: the virtual machine, ESXI, high availability vSphere storage, including physical versus virtual, storage types, thin provisioning, and more vSphere networking fundamentals, physical versus virtual switches, components, policies, I/O Mapping business challenges to vSphere solutions The Official VCA-DCV Certification Guide is part of a recommended learning path from VMware that includes simulation and hands-on training from authorized VMware instructors and self-study products from VMware Press. …”
Libro electrónico -
201000por Vachon, Bob“…Topics covered include *; Networking security fundamentals: concepts, policies, strategies, and more *; Securing network infrastructure: network foundations, CCP, management plane and access, and data planes (IPv6/IPv4) *; Secure connectivity: VPNs, cryptography, IPsec, and more *; Threat control and containment: strategies, ACL threat mitigation, zone-based firewalls, and Cisco IOS IPS *; Securing networks with ASA: ASDM, basic and advanced settings, and ASA SSL VPNs Bob Vachon is a professor at Cambrian College. …”
Publicado 2012
Libro electrónico