Mostrando 203,381 - 203,400 Resultados de 204,179 Para Buscar 'Pollica~', tiempo de consulta: 1.92s Limitar resultados
  1. 203381
    “…El tema central del libro es la aportación posible e incluso necesaria del cristianismo a la vida en sociedad europea de nuestros días. el autor está convencido de que, sin un vivio amor por la Tradición y sin un claro conocimiento de ella, ni siquiera sería posible la fe y, por tanto, tampoco ninguna aportación sustancia suya ala vida pública contemporánea. Es lo que ha pasado con las interpretaciones del cristianismo que han roto con el principio de Tradición y miran más a la adaptación a la mentalidad moderna que a lo original de la Revelación y de su transmisión en la Iglesia -- Mons. …”
    Libro
  2. 203382
    Publicado 2020
    “…De esta forma, junto con el análisis de las relaciones entre el Estado y las Confesiones religiosas, la regulación de la libertad religiosa en el ámbito internacional, los principios y fuentes del Derecho Eclesiástico español, el contenido y desarrollo legislativo del derecho fundamental de libertad religiosa y los Acuerdos de cooperación con las distintas Confesiones o la posición jurídica de las minorías; el tratamiento jurídico que recibe el aspecto religioso en el ámbito del deporte; la conexión entre la libertad religiosa y el ámbito de la seguridad pública; las prescripciones alimentarias por motivos religiosos; la relación de trabajo en las empresas con tendencia o ideológicas; bioderecho y religión; los delitos de odio por motivos religiosos; las protección penal de los sentimientos religiosos; extranjería e inmigración religiosa; o el impacto de la simbología religiosa en el espacio público, son algunos de los temas que se tratan en este libro. …”
    Libro
  3. 203383
    por Brague, Rémi, 1947-
    Publicado 2011
    “…Esta separación dará posteriormente forma a las instituciones políticas de la cristiandad medieval, tanto al Imperio como a la Iglesia. …”
    Libro
  4. 203384
    “…El tomo incluye también su primer libro, "Meditaciones del Quijote" (1914), un hito de la historia intelectual española, y una de sus conferencias más notables, "Vieja y nueva política", texto fundamental de la generación de 1914. …”
    Libro
  5. 203385
    Publicado 2017
    “…A partir de este siglo, las transformaciones políticas, sociales y económicas obligan a la Iglesia a us adaptación a los nuevos tiempos. …”
    Libro
  6. 203386
    Publicado 2018
    “…Todo se recogió con grabaciones y pruebas que en su día sirvieron a los servicios del Estado para terminar con la organización mafiosa que había crecido en una pequeña ciudad del sur de Andalucía gracias a cierta complicidad policial que los hizo inmunes a la justicia…”
    Libro
  7. 203387
    Publicado 2018
    “…Todo se recogió con grabaciones y pruebas que en su día sirvieron a los servicios del Estado para terminar con la organización mafiosa que había crecido en una pequeña ciudad del sur de Andalucía gracias a cierta complicidad policial que los hizo inmunes a la justicia…”
    Libro
  8. 203388
    Publicado 2023
    “…Organizations must implement robust security measures, establish clear data management and retention policies, conduct regular audits, and have data backup and contingency plans in place to ensure the confidentiality and integrity of financial information. …”
    Libro electrónico
  9. 203389
    Publicado 2007
    “…Poor climatic conditions in the Sahel region on the one hand, and the growth of national policies for organising development cooperation on the other, have brought...…”
    Electrónico
  10. 203390
    “…This open access monograph argues established democratic norms for freedom of expression should be implemented on the internet. Moderating policies of tech companies as Facebook, Twitter and Google have resulted in posts being removed on an industrial scale. …”
    Electrónico
  11. 203391
    “…--The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. …”
    Libro electrónico
  12. 203392
    “…How to Secure Your H‐1B Visa guides employees and employers alike through the maze of H-1B laws, policies, and procedures. This road map lays out the whole H-1B process from petition to visa to status maintenance to visa extension and, ultimately, to permanent residence in the US for you and your family. …”
    Libro electrónico
  13. 203393
    por Jacobson, Jessica
    Publicado 2020
    Tabla de Contenidos: “…Front Matter -- Contents -- List of Boxes, Figures and Tables -- Notes on Contributors -- Acknowledgements -- Foreword -- Introduction -- Policy and Practice Supporting Lay Participation -- Conceptualising Participation: Practitioner Accounts -- Observed Realities of Participation -- Looking Ahead: Towards a Principled Approach to Supporting Participation -- Index…”
    Libro electrónico
  14. 203394
    Publicado 2022
    “…Incentives' is another word for professionalisation policy instruments (PBIs) and these can be categorised as PBIs arising from legislation or regulations, PBIs of a financial nature and PBIs intended to entice professionalisation activities through communication. …”
    Libro electrónico
  15. 203395
    Publicado 2018
    Tabla de Contenidos: “…Azure Key Vault secrets in ARM templates -- Azure Storage Service Encryption -- Azure Disk Encryption -- Azure SQL Database Security -- Azure Active Directory Managed Service Identity -- Summary -- Questions -- Further reading -- Chapter 11: Governance and Policies -- Technical requirements -- Azure Role-Based Access Control -- Built-in Roles -- Custom Roles -- Creating a Custom Role -- Azure Resource Policies -- Azure AD Privileged Identity Management -- Azure AD Identity Protection -- Azure Security Center -- Advanced Threat Detection -- Azure Endpoint Protection -- Operations Management Suite - Security and Compliance -- Summary -- Questions -- Further reading -- Chapter 12: Artificial Intelligence, IoT, and Media Services -- Technical requirements -- Azure Cognitive Services -- Available services and APIs -- Using the Computer Vision API -- Azure Bot Service -- Creating a Bot from the Azure Portal -- Azure Machine Learning -- Azure IoT Hub -- Azure Event Hub -- Azure IoT Edge -- Azure Stream Analytics -- Azure Time Series Insights -- Azure Media Services -- Azure Media Analytics -- Using the Azure Media Analytics Indexer -- Summary -- Questions -- Further reading -- Chapter 13: Implementing Messaging Solutions -- Technical requirements -- Azure Queue Storage -- Azure Service Bus -- Azure Event Grid -- Routing Events with Azure Event Grid -- Notification Hubs -- Designing an effective messaging architecture -- Summary -- Questions -- Further reading -- Chapter 14: Application Monitoring and Alerting Strategies -- Azure Log Analytics -- Creating a Log Analytics Workspace -- Azure Monitor -- Application Insights -- Azure Service Health -- Azure Advisor -- Address Recommendation from Azure Advisor -- Azure Network Watcher -- Summary -- Questions -- Further reading -- Chapter 15: Exploring Operations Automation Strategies…”
    Libro electrónico
  16. 203396
    Publicado 2018
    Tabla de Contenidos: “…-- Why stochastic policy? -- Example 1 - rock, paper, scissors -- Example 2 - state aliased grid-world -- Policy objective functions -- Policy Gradient Theorem -- Temporal difference rule -- TD(1) rule -- TD(0) rule -- TD() rule -- Policy gradients -- The Monte Carlo policy gradient -- Actor-critic algorithms -- Using a baseline to reduce variance -- Vanilla policy gradient -- Agent learning pong using policy gradients -- Summary -- Chapter 5: Q-Learning and Deep Q-Networks -- Why reinforcement learning? …”
    Libro electrónico
  17. 203397
    Publicado 2018
    Tabla de Contenidos: “…Access token manipulation -- Exploiting accessibility features -- Application shimming -- Bypassing user account control -- DLL injection -- DLL search order hijacking -- Dylib hijacking -- Exploration of vulnerabilities -- Launch daemon -- Hands-on example of privilege escalation on a Windows 8 target -- Conclusion and lessons learned -- References -- Summary -- Chapter 9: Security Policy -- Reviewing your security policy -- Educating the end user -- Social media security guidelines for users -- Security awareness training -- Policy enforcement -- Application whitelisting -- Hardening -- Monitoring for compliance -- References -- Summary -- Chapter 10: Network Segmentation -- Defense in depth approach -- Infrastructure and services -- Documents in transit -- Endpoints -- Physical network segmentation -- Discovering your network -- Securing remote access to the network -- Site-to-site VPN -- Virtual network segmentation -- Hybrid cloud network security -- References -- Summary -- Chapter 11: Active Sensors -- Detection capabilities -- Indicators of compromise -- Intrusion detection systems -- Intrusion prevention system -- Rule-based detection -- Anomaly-based detection -- Behavior analytics on-premises -- Device placement -- Behavior analytics in a hybrid cloud -- Azure Security Center -- References -- Summary -- Chapter 12: Threat Intelligence -- Introduction to threat intelligence -- Open source tools for threat intelligence -- Microsoft threat intelligence -- Azure Security Center -- Leveraging threat intelligence to investigate suspicious activity -- References -- Summary -- Chapter 13: Investigating an Incident -- Scoping the issue -- Key artifacts -- Investigating a compromised system on-premises -- Investigating a compromised system in a hybrid cloud -- Search and you shall find it -- Lessons learned -- References -- Summary…”
    Libro electrónico
  18. 203398
    Publicado 2018
    “…What you will learn Understand file system hierarchy and essential command-line skills Use Vi editor, I/O redirections and how to work with common text manipulating tools Create, delete, modify user accounts and manage passwords and their aging policy Manage file ownership, permissions, and ACL Execute process management and monitoring on the command line Validate and manage network configuration using nmcli Manage remote logins using SSH and file transfer using SCP and Rsync Understand system logging, how to control system services with systemd and systemctl, and manage firewalId Who this book is for Any individual who wants to learn how to use Linux as server or desktop in his environment. …”
    Libro electrónico
  19. 203399
    Publicado 2021
    “…Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey FeaturesConvert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order to operationalize your organization's information security strategyLearn how to achieve security goals in your organization and reduce software riskBook DescriptionInformation security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats. …”
    Libro electrónico
  20. 203400
    Publicado 2021
    “…Whether you are talking about physical or cloud endpoints--its all covered.By the end of the book, you'll be able to set up MEM and use it to run Windows 10, Windows 11, and Windows 365 efficiently.What you will learn* Understand how Windows 365 Cloud PC makes the deployment of Windows in the cloud easy* Configure advanced policy management within MEM* Discover modern profile management and migration options for physical and cloud PCs* Harden security with baseline settings and other security best practices* Find troubleshooting tips and tricks for MEM, Windows 365 Cloud PC, and more* Discover deployment best practices for physical and cloud-managed endpoints* Keep up with the Microsoft community and discover a list of MVPs to followWho this book is forIf you are an IT professional, enterprise mobility administrator, architect, or consultant looking to learn about managing Windows on both physical and cloud endpoints using Microsoft Endpoint Manager, then this book is for you…”
    Libro electrónico