Mostrando 203,401 - 203,420 Resultados de 204,179 Para Buscar 'Pollica~', tiempo de consulta: 1.94s Limitar resultados
  1. 203401
    Publicado 2022
    “…In addition, the book shows how optimize the Docker images for production servers by using multi-stage builds and improve the reliability of your services by using health checks and restart policies. Practical Docker with Python will break down terminologies like Dockerfile and Docker volumes, and take you on a guided tour of building a telegram bot using Python. …”
    Libro electrónico
  2. 203402
    Publicado 2021
    “…You'll begin by exploring key topics such as Microsoft security and compliance policies, pricing and support, and cloud concepts. …”
    Libro electrónico
  3. 203403
    por Farchy, Emily
    Publicado 2016
    “…This paper is part of the joint project between the Directorate General for Migration and Home Affairs of the European Commission and the OECD’s Directorate for Employment, Labour and Social Affairs on “Review of Labour Migration Policy in Europe”. This document has been produced with the financial assistance of the European Union. …”
    Capítulo de libro electrónico
  4. 203404
    por Barnes, Sebastian
    Publicado 2010
    “…In some countries, fiscal policy in the past decade failed to counter and sometimes aggravated these pressures. …”
    Capítulo de libro electrónico
  5. 203405
    por Choi, Jongkyun
    Publicado 2006
    “…Taking into account that poverty among older women living alone has been on the rise in many OECD countries, old age income security of widows and divorcees will remain a challenge for policy makers. 2. The analysis of income sources shows that survivors’ pensions and divorcees’ benefits form the largest share of the incomes of elderly women living alone. …”
    Capítulo de libro electrónico
  6. 203406
    por Stewart, Fiona
    Publicado 2007
    “…One of the key conclusions from the OECD’s report is that, to work effectively, these schemes must have suitable independence and powers to set and collect appropriately risk-adjusted premiums – but they also need to be considered along with other benefit protection policies (notably effective funding rules)…”
    Capítulo de libro electrónico
  7. 203407
    Publicado 2016
    “…What You Will Learn Install, configure, and optimize Orchestrator installations (Windows, Appliance, and vRA integrated) Explore all the visual programming elements without needing additional infrastructure Work with plugins such as SSH, mail, SQL, PowerShell, AD, SOAP, SNMP, AMQP, and REST Discover how to create VMware automation Get to know about user management, import/export, and synchronization as well as the packaging application Understand policies, resources, and web views Troubleshoot vRO Appliance In Detail VMware vRealize Orchestrator is a powerful automation tool designed for system administrators and IT operations staff who are planning to streamline their tasks and are waiting to integrate the functions with third-party operations software. …”
    Libro electrónico
  8. 203408
    Publicado 2015
    “…They describe new methods and approaches in the decision sciences, with a special focus on translating theoretical impact into practical relevance to improve decision making within business, public policy, non-profit organizations, and beyond. Assess willingness to learn ERP systems based on knowledge update and other factors Exploit application integration to improve ERP’s value after implementation Discover how mobile users decide whether to search for and adopt a new app Quantify links between absenteeism and hostile environment/sexual harassment Assess correlations between employee development and worker outcomes Explore perceptions of change, intentions to leave, and the role of cynicism Promote lean transformation by evolving HR performance management systems Understand how links between corporate ethical values and firm performance are mediated Bring a global sourcing perspective to issues of e..…”
    Libro electrónico
  9. 203409
    Publicado 2018
    Tabla de Contenidos: “…Experience replay -- Target network -- Clipping rewards -- Understanding the algorithm -- Building an agent to play Atari games -- Double DQN -- Prioritized experience replay -- Dueling network architecture -- Summary -- Questions -- Further reading -- Chapter 9: Playing Doom with a Deep Recurrent Q Network -- DRQN -- Architecture of DRQN -- Training an agent to play Doom -- Basic Doom game -- Doom with DRQN -- DARQN -- Architecture of DARQN -- Summary -- Questions -- Further reading -- Chapter 10: The Asynchronous Advantage Actor Critic Network -- The Asynchronous Advantage Actor Critic -- The three As -- The architecture of A3C -- How A3C works -- Driving up a mountain with A3C -- Visualization in TensorBoard -- Summary -- Questions -- Further reading -- Chapter 11: Policy Gradients and Optimization -- Policy gradient -- Lunar Lander using policy gradients -- Deep deterministic policy gradient -- Swinging a pendulum -- Trust Region Policy Optimization -- Proximal Policy Optimization -- Summary -- Questions -- Further reading -- Chapter 12: Capstone Project - Car Racing Using DQN -- Environment wrapper functions -- Dueling network -- Replay memory -- Training the network -- Car racing -- Summary -- Questions -- Further reading -- Chapter 13: Recent Advancements and Next Steps -- Imagination augmented agents -- Learning from human preference -- Deep Q learning from demonstrations -- Hindsight experience replay -- Hierarchical reinforcement learning -- MAXQ Value Function Decomposition -- Inverse reinforcement learning -- Summary -- Questions -- Further reading -- Assessments -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  10. 203410
    Publicado 2016
    “…It discusses the government policies, strategies and tactics driving enforcement activity and outlines the most effective approaches for preventing, detecting, and responding to the risks presented. …”
    Libro electrónico
  11. 203411
    Publicado 2015
    “…Topics covered include: How to understand the security culture of the organization Getting to know the organization and building relationships with key personnel How to identify gaps in the organization’s security set-up The impact of compromise on the organization Identifying, categorising and prioritising risks The five levels of risk appetite and how to apply risk treatments via security controls Understanding the threats facing your organization and how to communicate them How to raise security awareness and engage with specific peer groups System mapping and documentation (including control boundaries and where risks exist) The importance of conducting regular penetration testing and what to do with the results Information security policies and processes A standards-based approach to information security If you’re starting a new job as an information security professional, Information Security: A Practical Guide contains all you need to know. …”
    Libro electrónico
  12. 203412
    Publicado 2015
    “…These approaches will have to be complemented with “leading with science”—that is, using evidence-based management to inform strategy and policy decisions. In The Science of Successful Organizational Change , you'll learn: How the VUCA (Volatile, Uncertain, Complex, and Ambiguous) world affects the scale and pace of change in today’s businesses How understanding of flaws in human decision-making can help leaders guide their teams toward wiser strategic decisions when the stakes are largest—including “when to trust your guy and when to trust a model” and “when all of us are smarter than one of us” How new advances in neuroscience have altered best practices in influencing colleagues; negotiating with partners; engaging followers' hearts, minds, and behaviors; and managing resistance How leading organizations are making use of the science of mindfulness to create agile learners..…”
    Libro electrónico
  13. 203413
    Publicado 2015
    “…Serves as the official book for the newest version of the Cisco Networking Academy CCNP ROUTE course Includes all the content from the newest Learning@Cisco ROUTE course and information on each of the ROUTE exam topics Compares basic routing protocol features and limitations Examines RIPv2 and RIPng Covers EIGRP operation and implementation for both IPv4 and IPv6 Explores OSPFv2 implementation, and OSPFv3 for both IPv4 and IPv6 Discusses network performance optimization via routing updates Introduces path control with Cisco Express Forwarding (CEF) switching, policy-based routing (PBR), and service level agreements (SLAs) Addresses enterprise Internet connectivity via single or redundant ISP connections Explains BGP terminology, concepts, operation, configuration, verification, and troubleshooting Covers securing the management plane of Cisco routers using authentication and other recommended practices Presents self-assessment review questions, chapter objectives, and summaries to facilitate effective studying…”
    Libro electrónico
  14. 203414
    Publicado 2023
    “…As you explore the vital role an IT auditor plays in any company's network, you'll learn how to successfully build cloud IT auditing programs, including using standard tools such as Terraform, Azure Automation, AWS Policy Sentry, and many more. You'll also get plenty of tips and tricks for preparing an effective and advanced audit and understanding how to monitor and assess cloud environments using standard tools. …”
    Grabación no musical
  15. 203415
    por Eleonorasdotter, Emma
    Publicado 2024
    “…Well-researched and written, the book engages with gendered, classed and stigmatising constructions of women who use drugs represented in policy and practice. We are encouraged to think about what it means to be a woman who uses drugs living and working in Sweden today. …”
    Libro electrónico
  16. 203416
    por Cooperman, Jessica
    Publicado 2018
    “…By introducing young soldiers to what it saw as appropriately Americanized forms of Judaism and Jewish identity, the JWB hoped to prepare a generation of American Jewish men to assume positions of Jewish leadership while fitting comfortably into American society.This volume shows how, at this crucial turning point in world history, the JWB managed to use the policies and power of the U.S. government to advance its own agenda: to shape the future of American Judaism and to assert its place as a truly American religion…”
    Libro electrónico
  17. 203417
    por Egan, Mark
    Publicado 2010
    “…Yet, it also stresses that a strategic approach to cyber security is essential, and that "tone at the top" will determine the effectiveness of any corporate cyber security policy." – Eric Benhamou, chairman of the board of directors, 3Com Corporation, palmOne, and PalmSource, Inc "This book is not about cyber security; it's about managing one's company and the role that cyber security plays in that scenario. …”
    Libro electrónico
  18. 203418
    por Evan, William M.
    Publicado 2002
    Tabla de Contenidos: “…Technological disasters: an overview -- Natural and human-made disasters -- The year 2000 (Y2K) debacle: an ironic failure of information technology -- Theories of technological disasters -- The root causes of technological disasters -- Three industrial revolutions and beyond -- A matrix of technological disasters -- Twelve exemplary case studies of technological disasters -- Lessons learned from the case studies of technological disasters -- The responsibilities of engineers and scientists -- The role of corporations in the management of technological disasters -- The role of the legal system in technology policy decisions -- Assessing the risks of technology -- Technology decisions and the democratic process…”
    Libro electrónico
  19. 203419
    Publicado 2007
    “…Inside, you'll find advice on topics such as The key elements your networks and systems need in order to make all other services run better Building and running reliable, scalable services, including web, storage, email, printing, and remote access Creating and enforcing security policies Upgrading multiple hosts at one time without creating havoc Planning for and performing flawless scheduled maintenance windows Managing superior helpdesks and customer care Avoiding the "temporary fix" trap Building data centers that improve server uptime Designing networks for speed and reliability Web scaling and security issues Why building a backup system isn't about backups Monitoring what you have and predicting what you will need How technically oriented workers can maintain their job's technical focus (and avoid an unwanted management role) Technical management issues, including morale, organization building, coaching, and maintaining positive visibility Personal skill techniques, including secrets for getting more done each day, ethical dilemmas, managing your boss, and loving your job System administration salary negotiation It's no wonder the first edition received Usenix SAGE's 2005 Outstanding Achievement Award! …”
    Libro electrónico
  20. 203420
    Publicado 2005
    “…Coverage includes • Best practices and diverse real-world scenarios for applying BGPv4 • Understanding the impact of BGP design on local networks and the global Internet backbone • Building effective BGP policies: aggregation, propagation, accounting, and more • Maximizing scalability and performance in BGPv4 networks • BGP and network security, including Secure Origin BGP • Deploying BGP/MPLS Layer 3 VPNs • Extensive troubleshooting guidance unavailable in any other book If you’re a network engineer or administrator looking to drive maximum reliability and performance from BGP-based networks, Practical BGP will help you get the job done–from start to finish. …”
    Libro electrónico