Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 15,269
- Política y gobierno 12,213
- Historia 11,520
- Política i govern 4,438
- Història 4,266
- Política económica 3,896
- Filosofía 3,472
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,061
- Administración pública 2,029
- Política social 1,959
- Ciencias políticas 1,907
- Economía 1,878
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,412
- Hacienda pública 1,353
- Economics 1,339
- Derecho 1,318
- Crítica e interpretación 1,312
- Govern 1,275
- Política monetaria 1,271
- Democracia 1,266
- Business & Economics 1,262
- Política educativa 1,230
- Ciencia política 1,112
- History 1,096
-
203421Publicado 2020“…The book also aims to be a useful reference for government donor agencies, their implementing partners, and other high-level decision makers, and can be used as a course text in schools of public health, public policy, medicine, and development. ACKNOWLEDGMENT: This work was conducted under the USAID Applying Science to Strengthen and Improve Systems (ASSIST) Project, USAID Award No. …”
Libro electrónico -
203422Publicado 2003“…End-to-end QoS deployment techniques for Cisco Catalyst series switches Examine various QoS components, including congestion management, congestion avoidance, shaping, policing/admission control, signaling, link efficiency mechanisms, and classification and marking Map specified class of service (CoS) values to various queues and maintain CoS values through the use of 802.1q tagging on the Cisco Catalyst 2900XL, 3500XL and Catalyst 4000 and 2948G/2980G CatOS Family of Switches Learn about classification and rewrite capabilities and queue scheduling on the Cisco Catalyst 5000 Implement ACLs, ACPs, ACEs, and low-latency queuing on the Cisco Catalyst 2950 and 3550 Family of Switches Understand classification, policying, and scheduling capabilities of the Catalyst 4000 and 4500 IOS Family of Switches Configure QoS in both Hybrid and Native mode on the Catalyst 6500 Family of Switches Utilize Layer 3 QoS to classify varying levels of service with the Catalyst 6500 MSFC and Flexwan Understand how to apply QoS in campus network designs by examining end-to-end case studies Quality of service (QoS) is the set of techniques designed to manage network resources. …”
Libro electrónico -
203423por Hucaby, Dave“…Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with th..…”
Publicado 2008
Libro electrónico -
203424Publicado 2008Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Introduction -- Part I: Introduction to Network Security Solutions -- Chapter 1 Overview of Network Security Technologies -- Firewalls -- Virtual Private Networks (VPN) -- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) -- Anomaly Detection Systems -- Authentication, Authorization, and Accounting (AAA) and Identity Management -- Network Admission Control -- Routing Mechanisms as Security Tools -- Summary -- Part II: Security Lifestyle: Frameworks and Methodologies -- Chapter 2 Preparation Phase -- Risk Analysis -- Social Engineering -- Security Intelligence -- Creating a Computer Security Incident Response Team (CSIRT) -- Building Strong Security Policies -- Infrastructure Protection -- Endpoint Security -- Network Admission Control -- Summary -- Chapter 3 Identifying and Classifying Security Threats -- Network Visibility -- Telemetry and Anomaly Detection -- Intrusion Detection and Intrusion Prevention Systems (IDS/IPS) -- Summary -- Chapter 4 Traceback -- Traceback in the Service Provider Environment -- Traceback in the Enterprise -- Summary -- Chapter 5 Reacting to Security Incidents -- Adequate Incident-Handling Policies and Procedures -- Laws and Computer Crimes -- Security Incident Mitigation Tools -- Forensics -- Summary -- Chapter 6 Postmortem and Improvement -- Collected Incident Data -- Root-Cause Analysis and Lessons Learned -- Building an Action Plan -- Summary -- Chapter 7 Proactive Security Framework -- SAVE Versus ITU-T X.805 -- Identity and Trust -- Visibility -- Correlation -- Instrumentation and Management -- Isolation and Virtualization -- Policy Enforcement -- Visualization Techniques -- Summary -- Part III: Defense-In-Depth Applied -- Chapter 8 Wireless Security -- Overview of Cisco Unified Wireless Network Architecture…”
Libro electrónico -
203425por Logan, Syd“…Build Cross-Platform Applications without Compromise Throughout the book, Logan illuminates his techniques with realistic scenarios and extensive, downloadable code examples, including a complete cross-platform GUI toolkit based on Mozilla’s XUL that you can download, modify, and learn from. Coverage includes Policies and procedures used by Netscape, enabling them to ship Web browsers to millions of users on Windows, Mac OS, and Linux Delivering functionality and interfaces that are consistent on all platforms Understanding key similarities and differences among leading platform-specific GUI APIs, including Win32/.NET, Cocoa, and Gtk+ Determining when and when not to use native IDEs and how to limit their impact on portability Leveraging standards-based APIs, including POSIX and STL Avoiding hidden portability pitfalls associated with floating point, char types, data serialization, and types in C++ Utilizing platform abstraction libraries such as the Netscape Portable Runtime (NSPR) Establishing an effective cross-platform bug reporting and tracking system Creating builds for multiple platforms and detecting build failures across platforms when they occur Understanding the native runtime environment and its impact on installation Utilizing wxWidgets to create multi-platform GUI applications from a single code base Thoroughly testing application portability Understanding cross-platform GUI toolkit design with Trixul…”
Publicado 2008
Libro electrónico -
203426por Gupta, Ajay“…Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio..…”
Publicado 2004
Libro electrónico -
203427por Potter, Neil S.“…You will learn how to: Scope and develop an improvement plan Identify and prioritize risks and mitigate anticipated difficulties Derive metrics that accurately measure progress toward business goals Sell your improvement program in-house Initially target practitioners and projects most-open to new approaches and techniques Stay focused on goals and problems Align the actions of managers and practitioners Delay major policy documents and edicts until solutions have been practiced and tested Use existing resources to sp..…”
Publicado 2002
Libro electrónico -
203428por Bhaiji, Fahim Hussain Yusuf“…Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. …”
Publicado 2008
Libro electrónico -
203429por Abelson, Harold“…Miller , Senior Director for Technology Policy and Strategy, Microsoft Corporation “Most writing about the digital world comes from techies writing about technical matter for other tech..…”
Publicado 2008
Libro electrónico -
203430Publicado 2009“…Coverage includes • Choosing the right edition of Google Apps for you • Setting up Google Apps so it will be easier to use and manage • Migrating your email, contacts, and calendars to Google Apps • Administering and securing Google Apps • Integrating Google Apps with other software and services • Leveraging Google Sites to collaborate across teams, organizations, or the entire world • Making the most of Google Talk voice calls and instant messaging • Implementing Google’s office productivity tools, including Docs, Spreadsheets, and Presentations • Using policy management and message recovery to control and secure your messaging • Customizing efficient Google Apps Start Pages for you and your colleagues • Sharing important and useful videos with your colleagues • Maximizing the innovative features of Google’s new web browser, Chrome SCOTT GRANNEMAN is an author, teacher, and entrepreneur with extensive experience in Google Apps migration, setup, and training. …”
Libro electrónico -
203431Publicado 2009“…Implement high availability–and leverage SQL Server 2008’s major improvements to failover clustering and database mirroring Save time with SQL Server 2008’s new policy-based management tools Performance tune and troubleshoot a SQL Server 2008 environment. …”
Libro electrónico -
203432Publicado 2011“…This book Introduces GEF application components such as shapes, flow, logic, and text Explains Draw2D architecture, drawing features, and event processing Shows how to create and customize figures, use painting and borders, and work with each Draw2D Layout Manager Thoroughly explains GEF models, including domain and presentation information, populating diagrams, and more Shows how to use Zest’s content providers, filters, and layout algorithms Covers EditParts, EditPolicies, Tools, Commands, Actions, and much more The Eclipse Graphical Editing Framework (GEF) is the best resource for all Java tool developers who want to construct sophisticated graphical editing products that integrate with Eclipse, for experienced Eclipse users who want to start creating their own graphical tools, and for anyone who wants to see what makes GEF tick…”
Libro electrónico -
203433Publicado 2010Tabla de Contenidos: “…21 SQL Server Clustering -- What's New in SQL Server Clustering -- How Microsoft SQL Server Clustering Works -- Installing SQL Server Clustering -- Summary -- 22 Administering Policy-Based Management -- Introduction to Policy-Based Management -- Policy-Based Management Concepts -- Implementing Policy-Based Management -- Sample Templates and Real-World Examples -- Policy-Based Management Best Practices -- Summary -- Part IV: Database Administration -- 23 Creating and Managing Databases -- What's New in Creating and Managing Databases -- Data Storage in SQL Server -- Database Files -- Creating Databases -- Setting Database Options -- Managing Databases -- Summary -- 24 Creating and Managing Tables -- What's New in SQL Server 2008 -- Creating Tables -- Defining Columns -- Defining Table Location -- Defining Table Constraints -- Modifying Tables -- Dropping Tables -- Using Partitioned Tables -- Creating Temporary Tables -- Summary -- 25 Creating and Managing Indexes -- What's New in Creating and Managing Indexes -- Types of Indexes -- Creating Indexes -- Managing Indexes -- Dropping Indexes -- Online Indexing Operations -- Indexes on Views -- Summary -- 26 Implementing Data Integrity -- What's New in Data Integrity -- Types of Data Integrity -- Enforcing Data Integrity -- Using Constraints -- Rules -- Defaults -- Summary -- 27 Creating and Managing Views in SQL Server -- What's New in Creating and Managing Views -- Definition of Views -- Using Views -- Creating Views -- Managing Views -- Data Modifications and Views -- Partitioned Views -- Indexed Views -- Summary -- 28 Creating and Managing Stored Procedures -- What's New in Creating and Managing Stored Procedures -- Advantages of Stored Procedures -- Creating Stored Procedures -- Executing Stored Procedures -- Deferred Name Resolution -- Viewing Stored Procedures -- Modifying Stored Procedures…”
Libro electrónico -
203434Publicado 2010Tabla de Contenidos: “…TFO Blacklist Operation -- Directed Mode -- Adaptive and Static TCP Buffering -- Replication Acceleration -- Application Traffic Policy -- Application Groups -- Traffic Classifiers -- Policy Maps -- Negotiating Policies -- EndPoint Mapper Classification -- Monitoring and Reporting -- Automatic Discovery Statistics -- Connection Statistics and Details -- WAN Optimization Statistics -- Network Profiling -- Understanding WAAS Performance Improvement -- Understanding Device and System Performance and Scalability Metrics -- Executive Reports -- Integration with Third-Party Visibility Systems -- WAN Optimization Monitoring with XML-API -- Application Response Time Monitoring -- Summary -- Chapter 9 Configuring Application Acceleration -- Application Acceleration Overview -- CIFS Acceleration -- Windows Print Acceleration -- NFS Acceleration -- MAPI Acceleration -- HTTP Acceleration -- SSL Acceleration -- Video Acceleration -- Enabling Acceleration Features -- Additional Video Settings -- Configuring SSL Acceleration -- Configuring Disk Encryption -- Managing the Secure Store -- Configuring SSL Accelerated Services -- Using the CM GUI to Configure SSL -- Using the CLI to Configure SSL -- Configuring Preposition -- Acceleration Monitoring and Reporting -- Acceleration Monitoring Using Device CLI -- Acceleration Monitoring Using CM GUI -- Acceleration Monitoring with XML-API -- CIFSStats -- SSLStats -- VideoStats -- HttpStats -- MapiStats -- NfsStats -- Summary -- Chapter 10 Branch Office Virtualization -- Branch Office Virtualization Overview -- Overview of Virtual Blades -- Management of Virtual Blades -- Virtual Blade Hardware Emulation -- Virtualization Capable WAAS Platforms -- Creating Virtual Blades -- Guest OS Boot Image -- Configuring Virtual Blade Resources -- Virtual Blade Interface Bridging Considerations -- Starting Virtual Blades…”
Libro electrónico -
203435por Mellyn, KevinTabla de Contenidos: “…Banking, Regulation, and Financial Crises; The Postwar Financial Order Undone; The Basel Process Is Born; The Birth of Consumer Banking; Safe As Houses; Risky Business; The Triumph of the Market; How Government Policy and Central Banks Shaped the Market Meltdown; The Classic Cure for Financial Panics; Why Things Might Get Worse; The Lessons of the Great Depression Unlearned; Three Years On: Why So Little Has Changed; Political Missteps…”
Publicado 2012
Libro electrónico -
203436Publicado 2017Tabla de Contenidos: “…-- Our security posture -- Virtualization - cloud's best friend -- Understanding the ring architecture -- Hardware virtualization -- Full virtualization with binary translation -- Paravirtualization -- Hardware-assisted virtualization -- Distributed architecture in virtualization -- Enterprise virtualization with oVirt -- Encapsulation -- Point in time snapshots -- Isolation -- Risk assessment in cloud -- Service Level Agreement -- Business Continuity Planning - Disaster Recovery (BCP/DR) -- Business Continuity Planning -- Disaster Recovery -- Recovery Time Objective -- Recovery Point Objective -- Relation between RTO and RPO -- Real world use case of Disaster Recovery -- Use case to understand BCP/DR -- Policies and governance in cloud -- Audit challenges in the cloud -- Implementation challenges for controls on CSP side -- Vulnerability assessment and penetration testing in the cloud -- Use case of a hacked server -- Summary -- Chapter 2: Defense in Depth Approach -- The CIA triad -- Confidentiality -- Integrity -- Availability -- A use case -- Understanding all three aspects -- The use case -- Introducing Defense in Depth -- First layer - network layer -- Second layer - platform layer -- Third layer - application layer -- Fourth layer - data layer -- Fifth layer - response layer -- Summary -- Chapter 3: Designing Defensive Network Infrastructure -- Why do we need cryptography? …”
Libro electrónico -
203437Publicado 2017“…We will then move on to AD schemas, global catalogs, LDAP, RODC, RMS, certificate authorities, group policies, and security best practices, which will help you gain a better understanding of objects and components and how they can be used effectively. …”
Libro electrónico -
203438Publicado 2017“…Addressing the documentation challenges you’ll face as you create business policies, procedures, work instructions, and records – includin..…”
Libro electrónico -
203439Publicado 2020“…As you advance, you'll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you'll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments. …”
Libro electrónico -
203440Publicado 2020“…You'll then learn how to compose an optimal Group Policy and perform task automation with PowerShell scripting. …”
Libro electrónico