Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 14,413
- Política y gobierno 12,205
- Historia 11,470
- Política i govern 4,441
- Història 4,274
- Política económica 3,895
- Filosofía 3,428
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,064
- Administración pública 2,033
- Política social 1,928
- Ciencias políticas 1,907
- Economía 1,844
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,425
- Hacienda pública 1,349
- Economics 1,339
- Derecho 1,308
- Crítica e interpretación 1,296
- Govern 1,278
- Política monetaria 1,271
- Business & Economics 1,262
- Democracia 1,237
- Política educativa 1,226
- Ciencia política 1,112
- History 1,096
-
201001Publicado 2020“…The work concludes with a legal classification of the findings as well as with criminal policy considerations and proposals for a more precise reformulation of Art. 86 SCC. …”
Libro electrónico -
201002Publicado 2020“…You'll then handle the identity and security for users with the help of Azure Active Directory, and manage access from a single place using policies and defined roles. As you advance, you'll get to grips with receipts to manage a virtual machine. …”
Libro electrónico -
201003Publicado 2020“…Each chapter will assist you in implementing different reinforcement learning techniques, such as Markov decision processes (MDPs), Q-learning, actor-critic methods, SARSA, and deterministic policy gradient algorithms, to build logical self-learning agents. …”
Libro electrónico -
201004Publicado 2020“…This study guide helps you master the topics on the Implementing Cisco SD-WAN Solutions (ENSDWI 300-415) exam, including Architecture Controller Deployment Router Deployment Policies Security and Quality of Service Management and Operations Companion Website: The companion website contains the Pearson Test Prep practice test software with two full exams for the CCNP Enterprise SD-WAN exam ENSDWI 300-415 and Key Terms flash cards. …”
Libro electrónico -
201005Publicado 2019“…It includes the following advanced functions: Improved reliability and resiliency Reduction in the time that is needed for the backup and restore process Reduction of services downtime that is caused by physical tape drive and library outages Reduction in cost, time, and complexity by moving primary workloads to virtual tape More efficient procedures for managing daily backup and restore processing Infrastructure simplification through reduction of the number of physical tape libraries, drives, and media TS7700 delivers the following new capabilities: TS7760C supports the ability to off load to IBM Cloud Object Storage as well as Amazon S3 8-way Grid Cloud consisting of any generation of TS7700 Synchronous and asynchronous replication Tight integration with IBM Z and DFSMS policy management Optional Transparent Cloud Tiering Optional integration with physical tape Cumulative 16Gb FICON throughput up to 4.8GB/s 8 IBM Z hosts view up..…”
Libro electrónico -
201006Publicado 2020“…Enforcing data governance policies in WKC in IBM CP4D based on insights from IBM Spectrum Discover, and using assets in IBM CP4D. …”
Libro electrónico -
201007Publicado 2020“…You'll also get to grips with security policies for limiting access to certain functions inside the cluster. …”
Libro electrónico -
201008Publicado 2018“…He completed his master’s degree in public health at Columbia University Mailman School of Public Health in Epidemiology, and currently works at the Social and Decision Analytics Laboratory under the Biocomplexity Institute of Virginia Tech where he is working with data to inform policy decision-making. He is the author of Pandas for Everyone and Pandas Data Analysis with Python Fundamentals LiveLessons . …”
-
201009Publicado 2020“…You will learn how to configure the main architectural components of a permissioned blockchain network including Peers, Orderers, Certificate Authorities, Channels, and Policies. You'll then learn how to design, develop, package, and deploy smart contracts, and how they are subsequently used by applications. …”
Libro electrónico -
201010Publicado 2017“…The final step is to secure your PowerShell, so you will land in the last module, Securing and Debugging PowerShell, which covers PowerShell execution policies, error handling techniques, and testing. By the end of the book, you will be an expert in using the PowerShell language. …”
Libro electrónico -
201011Publicado 2018“…You learn methods and technologies that help you develop device management policies, mitigate data loss, manage applications, and improve security of Windows 10 and integrated Azure features. …”
-
201012Publicado 2012“…·Understand how the Cisco IronPort ESA addresses the key challenges of email security ·Select the best network deployment model for your environment, and walk through successful installation and configuration ·Configure and optimize Cisco IronPort ESA’s powerful security, message, and content filtering ·Understand the email pipeline so you can take full advantage of it–and troubleshoot problems if they occur ·Efficiently control Cisco IronPort ESA through its Web User Interface (WUI) and command-line interface (CLI) ·Implement reporting, monitoring, logging, and file management ·Integrate Cisco IronPort ESA and your mail policies with LDAP directories such as Microsoft Active Directory ·Automate and simplify email security administration ·Deploy multiple Cisco IronPort ESAs and advanced network configurations ·Prepare for emerging shifts in enterprise email usage and new security challenges This security book is part of the Cisco Press..…”
Libro electrónico -
201013Publicado 2012“…The official study guide helps you master all the topics on the CCNA Security IINS exam, including: Network security concepts Security policies and strategies Network foundation protection (NFP) Cisco Configuration Professional (CCP) Management plane security AAA security Layer 2 security threats IPv6 security Threat mitigation and containment Access Control Lists (ACLs) Network Address Translation (NAT) Cisco IOS zone-based firewalls and ASA firewalls Intrusion prevention and detection systems Public Key Infrastructure (PKI) and cryptography Site-to-site IPsec VPNs and SSL VPNs CCNA Security 640-554 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. …”
Libro electrónico -
201014Publicado 2012“…. -- Develop a comprehensive network security policy to counter threats against information security -- Secure borderless networks -- Learn how to use Cisco IOS Network Foundation Protection (NFP) and Cisco Configuration Professional (CCP) -- Securely implement the management and reporting features of Cisco IOS devices -- Deploy Cisco Catalyst Switch security features -- Understand IPv6 security features -- Plan threat control strategies -- Filter traffic with access control lists -- Configure ASA and Cisco IOS zone-based firewalls -- Implement intrusion prevention systems (IPS) and network address translat..…”
Libro electrónico -
201015Publicado 2013“…Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco’s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system…”
Libro electrónico -
201016por Workshop on Gender and Ageing in Southeast Asia: Contexts, Concerns, and Contradictions“…Derived from quantitative or qualitative methods of data collection and analysis, the chapters reveal how ageing has become tempered by globalization, cultural values, family structures, women's emancipation and empowerment, social networks, government policies, and religion. The chapters are concerned primarily with the following questions related to gender and ageing: (a) how do women and men experience old age? …”
Publicado 2014
Libro electrónico -
201017Publicado 1981“…These were crucial years in domestic politics, however, and Bryant's guidance of Evening Post policies was evident in editorials treating major issues such as the Compromise of 1850, the Fugitive Slave Law, the Kansas-Nebraska Bill, the rise of the Republican Party, and the Dred Scott Decision, as well as in his correspondence with such statesmen as Salmon P. …”
Libro electrónico -
201018Publicado 2020“…Over the last years, sophisticated policy making propositions for sustainable rural and urban development have been recorded. …”
Libro electrónico -
201019Publicado 2011“…For more specific information about z/OS Communications Server standard applications, high availability, and security, see the other volumes in the series: IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 1 Base Functions, Connectivity, and Routing, SG24-7996 IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 3 High Availability, Scalability, and Performance, SG24-7998 IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking, SG24-7999 z/OS Communications Server: IP Configuration Guide, SC31-8775 z/OS Communications Server: IP Configuration Reference, SC31-8776 z/OS Communications Server: IP User's Guide and Commands, SC31-8780…”
Libro electrónico -
201020Publicado 2015“…--Understand modern network topologies, protocols, and infrastructure --Implement networks based on specific requirements --Install and configure DNS and DHCP --Monitor and analyze network traffic --Understand IPv6 and IPv4 addressing, routing, and switching --Perform basic router/switch installation and configuration --Explain network device functions in cloud environments --Efficiently implement and troubleshoot WANs --Install, configure, secure, and troubleshoot wireless networks --Apply patches/updates, and support change/configuration management --Describe unified communication technologies --Segment and optimize networks --Identify risks/threats, enforce policies and physical security, configure firewalls, and control access --Understand essential network forensics concepts --Troubleshoot routers, switches, wiring, connectivity, and security Companion CD The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. …”
Libro electrónico