Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 14,413
- Política y gobierno 12,205
- Historia 11,470
- Política i govern 4,441
- Història 4,274
- Política económica 3,895
- Filosofía 3,428
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,064
- Administración pública 2,033
- Política social 1,928
- Ciencias políticas 1,907
- Economía 1,844
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,425
- Hacienda pública 1,349
- Economics 1,339
- Derecho 1,308
- Crítica e interpretación 1,296
- Govern 1,278
- Política monetaria 1,271
- Business & Economics 1,262
- Democracia 1,237
- Política educativa 1,226
- Ciencia política 1,112
- History 1,096
-
201021Publicado 2023Tabla de Contenidos: “…Adding applications deployable from vSphere -- Adding an AWS EC2 AMI build -- Using HashiCorp Vault for credentials -- Adding an Azure build -- Adding a Google GCP build -- Parallel builds -- CI testing against multiple OS releases -- Pitfalls and things to avoid -- Summary -- Chapter 7: Building an Image Hierarchy -- Technical requirements -- Starting with LXC/LXD images -- Docker container image format -- Podman plugin for the OCI container image format -- Base image strategy -- Aggregation and branching out multiple pipelines -- Summary -- Chapter 8: Scaling Large Builds -- Technical requirements -- Speeding up your builds with parallel processes -- Preventing parallel processes from causing DoS -- Troubleshooting logs in a parallel world -- Using image compression -- Selecting a compression algorithm for Packer images -- Selecting the right storage type for the image lifecycle -- Building delta and patch strategies -- Summary -- Part 3: Advanced Customized Packer -- Chapter 9: Managing the Image Lifecycle -- Technical requirements -- Tracking image lifecycle -- Using the manifest post-processor -- Creating a retention policy -- Summary -- Chapter 10: Using HCP Packer -- Technical requirements -- Creating an HCP organization -- Configuring HCP Packer in your templates -- Using HCP ancestry -- Consuming HCP Packer from Terraform -- Exploring the HCP REST API -- Summary -- Chapter 11: Automating Packer Builds -- Technical requirements: -- Identifying common automation requirements -- Exploring basic GitHub Actions support -- Exploring GitLab CI pipeline support -- Using HashiCorp Vault integration for automation -- GitLab CI -- GitHub Actions -- Summary -- Chapter 12: Developing Packer Plugins -- Technical requirements -- Basics of Go -- Sample plugin source -- Building and testing your plugin -- Protecting Packer from bad plugins -- Summary…”
Libro electrónico -
201022Publicado 2024Tabla de Contenidos: “…Understanding high-level roles and responsibilities -- Day-to-day activities for data stewards -- RACI matrix for data governance -- Establishing data quality and lineage principles and practices -- Data quality -- The DQM cycle -- Data lineage -- Setting up data classification, access control, and security -- Data classification -- Data access control -- Data security and protection -- Monitoring and ensuring data privacy and compliance -- Summary -- Chapter 8: Effective Data Stewardship -- Establishing data stewardship principles and standardizing data incident management -- The data life cycle -- Principles and policies -- Data incident management -- Defining and implementing data ownership -- Defining and designing a data domain -- Assigning an owner to a data domain -- Day 2 for data ownership and domain -- Defining a target state - What does good data stewardship look like? …”
Libro electrónico -
201023Publicado 2022“…In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust policies and privacy enhancing techniques to restrict access to workloads as state of least privilege is established. …”
Libro electrónico -
201024Publicado 2012“…The study is based on a sample of 788 individuals (337 women, 451 men), who were affected by National Socialist proprietary measures, i.e. looting policy, in 1938. The sample was drawn for a study by the Austrian Historical Commission. …”
Libro electrónico -
201025Publicado 2021“…The publication is a contribution to the discussion of institutional and personnel tools of ideological use of ethnography and related scientific disciplines by Nazi Germany in the 1940s in the intentions of its foreign policy plans. It focuses on the efforts of the Third Reich and German researchers to influence the homeland and ethnographic research in Slovakia and follows it on the example of the activities of the Institute for homeland Research (Institut für Heimatforschung) in Kežmarok and those associated with its activities (Franz. …”
Libro electrónico -
201026Publicado 2024“…Written by a highly qualified professional with significant experience in the field, Stepping Through Cybersecurity Risk Management includes information on: Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards Cybersecurity measures and metrics, and corresponding key risk indicators The role of humans in security, including the "three lines of defense" approach, auditing, and overall human risk management Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, Stepping Through Cybersecurity Risk Management is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field. …”
Libro electrónico -
201027Publicado 2024“…How do you get CMVP certifications (cert houses, required documents, design information, security policy, etc.)?…”
Libro electrónico -
201028Publicado 2024“…In this easy-to-read introduction, you'll learn: How large language models (LLMs) work How to integrate generative AI into your personal and professional work Balancing innovation and responsibility The social, legal, and policy landscape around generative AI Societal impacts of generative AI Where AI is going Anyone who uses ChatGPT for even a few minutes can tell that it's truly different from other chatbots or question-and-answer tools. …”
Libro -
201029Publicado 2024“…The open access book aims to show the readers novel, relevant and reproducible power of synergistic collaborations between European research groups and stakeholders with the objective to synthesize the existing knowledge and expertise about fire management and hazard and defining a concerted research agenda that promotes an integrated approach to create fire-resilient landscapes, taking into account biological, biochemical and physical, but also socio-economic, historical, geographical, sociological, perception and policy constraints. This is an urgent societal need due to the expected further intensification and geographical spreading of wildfire regimes under Global Change. …”
Libro electrónico -
201030Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Start From the Basics -- Chapter 1: ISO27001 - Definitions and Security Concepts -- The 27k family of standards -- Confidentiality, integrity, and availability -- Information security concepts and definitions -- Governance, policies, and incident management -- Governance -- Policies and procedures -- Incident management -- Differences between ISO 27001 and NIST -- What's NIST? …”
Libro electrónico -
201031Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1 - Understanding Autonomous Database in OCI -- Chapter 1: Introduction to Oracle's Autonomous Database -- Technical requirements -- Learning what an Autonomous Database is -- Always Free ADB -- Technology building blocks - ADB -- Oracle DBEE -- Oracle Exadata Database Machine -- OCI -- Oracle best practices -- Oracle knowledge base -- ML -- Classification of ADB based on workload -- ADW -- ATP -- AJD -- ADB infrastructure deployment choices - shared and dedicated -- Shared -- Dedicated -- ADB on Exadata Cloud@Customer -- Understanding why to use an Autonomous Database -- Decades of innovation in the ML capabilities of Oracle Database -- Autonomous Database value proposition -- Reviewing use cases for ADB -- Understanding the business benefits of using ADB -- Improved business performance gains -- Improved DBA and system administrator productivity -- Reduced development cycle time -- Reduced non-compliance risks - data -- Reduced planned downtime -- Reduced unplanned downtime -- Reduced IT infrastructure acquisition -- Reduced IT infrastructure maintenance and support -- BOM and SKUs for autonomous databases -- Summary -- Questions -- Further reading -- Answers -- Chapter 2: Autonomous Database Deployment Options in OCI -- Technical requirements -- OCI's Free tier account -- OCI Free Trial -- Always Free resources on OCI -- Creating an Always Free ADB -- Networking, IAM, and security for shared and dedicated deployments -- Prerequisites - IAM considerations -- Policy requirements for your ADB -- Networking considerations -- Deploying a serverless shared ADB -- Deploying a dedicated Exadata infrastructure -- Summary -- Part 2 - Migration and High Availability with Autonomous Database -- Chapter 3: Migration to Autonomous Database…”
Libro electrónico -
201032Publicado 2024Tabla de Contenidos: “…-- Building security policies in Strata Cloud Manager -- Security rules -- Custom security profiles -- Decryption -- Objects -- Building security policies in Panorama -- Clientless VPN -- Summary -- Part 3: Advanced Configuration and Best Practices -- Chapter 9: User Identification and Cloud Identity Engine -- Technical requirements -- User identification and group mapping -- Cloud Identity Engine -- Setting up a directory sync in Azure -- Setting up a SCIM connector -- Adding CIE to Prisma Access -- User ID redistribution -- User ID collector in Strata Cloud Manager -- User ID collector in Panorama -- User ID agents on firewalls -- Summary -- Chapter 10: Advanced Configurations and Insights -- Licensing -- Cortex Data Lake -- Insights and ADEM -- Summary -- Chapter 11: ZTNA Connector -- Differences between the ZTNA connector and SC-CAN -- Preparing to deploy the ZTNA connector -- Setting up the ZTNA connector -- Setting up the connector VM -- Basic troubleshooting -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
201033Publicado 2023“…In this easy-to-read introduction, you'll learn: How large language models (LLMs) work How to integrate generative AI into your personal and professional work Balancing innovation and responsibility The social, legal, and policy landscape around generative AI Societal impacts of generative AI Where AI is going Anyone who uses ChatGPT for even a few minutes can tell that it's truly different from other chatbots or question-and-answer tools. …”
Grabación no musical -
201034Publicado 2021“…La larga guerra 1914-1945 Marina ha creado doscientas impactantes imágenes, restaurando digitalmente el color a fotografías de época, lo que junto con los vívidos y agudos textos de Dan compone un conmovedor –y, a menudo, aterrador– relato coral con el que nos trasladan de las enfangadas trincheras del Somme a las barcazas del desembarco aliado del Día D, de las gélidas ruinas de Stalingrado a las abrasadoras escarpaduras del Rif, de la guerra submarina sin restricciones a los cielos cuajados de aviones de la batalla de Inglaterra, de las opresivas calles del gueto de Varsovia al júbilo de las celebraciones en la Europa liberada... y nos invita a mirar a los ojos a sus protagonistas, fuesen estos líderes como Churchill, Stalin, Mussolini o Hitler, fuesen anónimos como Czesława Kwoka, una niña polaca asesinada en Auschwitz, o como Ángeles González, una niña española de siete años, refugiada de Madrid, pero que podría ser una refugiada siria en 2021 o cualquier víctima de cualquier conflicto. …”
Libro -
201035Publicado 2017“…La lucha eficaz contra las distintas expresiones de la más moderna criminalidad, obliga a los Estados a abandonar las tradicionales fórmulas de cooperación basadas en el principio de reciprocidad para avanzar hacia el fortalecimiento de los instrumentos de cooperación policial y judicial en materia penal, cristalizando en un conjunto de medidas destinadas a facilitar la investigación, la obtención de pruebas y su posterior incorporación a los procesos penales nacionales, mediante la consolidación del principio de reconocimiento mutuo. …”
Libro -
201036Publicado 2017“…Las Jornadas han proporcionado una excelente ocasión de encuentro y de debate entre expertos, doctorandos, estudiantes, y exponentes del mundo académico, militar, policial y judicial, sobre temas de actualidad relacionados con la paz, la seguridad y la defensa. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad de Deusto)Libro -
201037por Zuckerman, Phil“…Instead of being bastions of sin and corruption, however, as the Christian Right has suggested a godless society would be, these countries are filled with residents who score at the very top of the “happiness index” and enjoy their healthy societies, which boast some of the lowest rates of violent crime in the world (along with some of the lowest levels of corruption), excellent educational systems, strong economies, well-supported arts, free health care, egalitarian social policies, outstanding bike paths, and great beer. …”
Publicado 2008
Libro -
201038por Robbins, Harold, 1916-1997“…Atrás quedó su verdadero nombre, Marja, como atrás quedaron los años 30, posteriores a la gran depresión, tiempos difíciles en los que el hambre, la pobreza y el desempleo vieron crecer a la exuberante adolescente de ascendencia polaca. Una joven que perdió su inocencia demasiado pronto, a la que no le está permitido amar, una mujer que no puede cambiar su vida y se ve obligada a empezar de nuevo una y otra vez valiéndose siempre de las mismas armas: su cuerpo y el deseo que suscita en los hombres. …”
Publicado 1983
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Bibliotecas de la Diócesis de Teruel y Albarracín)Libro -
201039Publicado 2023“…Il s’agit de sauver le malade (l’URSS) de la « syphilis » stalinienne par « l’ablation d’une excroissance pernicieuse » que l’« on ne peut faire que par la force », en recourant « non pas à des mesures de guerre civile, mais plutôt à des mesures d’ordre policier ». La fin justifie les moyens. De nouveau mis en échec, il fait le choix de la défaite en préparant un nouveau « Brest-Litovsk ». …”
Libro -
201040Publicado 2018“…Son voces escuchadas en una consulta de psicoterapia (tanto pública como privada) o voces cazadas al vuelo en los espacios públicos (calle, trenes...). …”
Otros