Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 15,269
- Política y gobierno 12,213
- Historia 11,520
- Política i govern 4,438
- Història 4,266
- Política económica 3,896
- Filosofía 3,472
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,061
- Administración pública 2,029
- Política social 1,959
- Ciencias políticas 1,907
- Economía 1,878
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,412
- Hacienda pública 1,353
- Economics 1,339
- Derecho 1,318
- Crítica e interpretación 1,312
- Govern 1,275
- Política monetaria 1,271
- Democracia 1,266
- Business & Economics 1,262
- Política educativa 1,230
- Ciencia política 1,112
- History 1,096
-
203641por Sangbin Park, Calvin, author“…This book will guide you through the steps for setting up a Jenkins instance on AWS and inside a corporate firewall, while discussing design choices and configuration options, such as TLS termination points and security policies. You'll create CI/CD pipelines that are triggered through GitHub pull request events, and also understand the various Jenkinsfile syntax types to help you develop a build and release process unique to your requirements. …”
Publicado 2021
Libro electrónico -
203642Publicado 2019“…You're a leader who needs to present new visions, goals, ideas, or policies to employees and need to persuade them to act You're a professional who regularly provides instruction and workshops to customers or other employees You haven’t needed to make a presentation in a while, and you want to sharpen your skills You're part of a team who has opportunities to present or pitch new ideas, products, or processes to supervisors or institutional leaders Prerequisites: You should be familiar with Microsoft PowerPoint Materials or downloads needed in advance: None Further resource..…”
-
203643por Maddison, Angus“…He held a number of senior posts at OEEC and OECD between 1953 and 1978, and has been a policy advisor to governments in Brazil, Ghana, Greece, Mexico and Pakistan. …”
Publicado 2007
Libro electrónico -
203644Publicado 2016“…What You Will Learn Automate your application’s decisions, such as promotion applying, discount policies, fraud detection, and more. Quickly get started with writing your first rules using the DRL full syntax. …”
Libro electrónico -
203645Publicado 2016Tabla de Contenidos: “…Chapter 2: Setting Up and Managing Code RepositoriesIntroduction; Creating a Git repository in an existing TFVC Team Project; Enabling code analysis check-in policy; Performing a baseless merge between sibling branches in TFVC; Reparenting a branch in TFVC; Unlocking files checked out by someone else; Unshelving a shelveset created in one branch to another branch; Ignoring file types from check-in using .tfignore and .gitignore; Conducting code reviews in TFS; Setting up policies for branches in Git; Conducting Pull requests in TFS; Analyzing code churn with TFS analysis services cube…”
Libro electrónico -
203646Publicado 2016“…The official study guide helps you master all the topics on the VCP6-DCV (#2VO-621) exam, including: Securing vSphere environments Implementing advanced network virtualization policies, features, and Network I/O control (NIOC) Configuring and using VMware storage protocols, VSAN and VVOL software-defined storage, ESXi host interactions, and Storage I/O Control (SIOC) Upgrading vSphere deployments to 6.x, including vCenter Server and ESXi Hosts Planning and using Resource Pools Implementing backup/recovery with VMware Data Protection and vSphere Replication Troubleshooting performance, storage, networks, upgrades, clusters, and more Successfully conf..…”
Libro electrónico -
203647Publicado 2019“…This Learning Path includes content from the following Packt products: Google Cloud Platform for Developers Ted Hunter and Steven Porter Google Cloud Platform Cookbook by Legorie Rajan PS What you will learn Host an application using Google Cloud Functions Migrate a MySQL database to Cloud Spanner Configure a network for a highly available application on GCP Learn simple image processing using Storage and Cloud Functions Automate security checks using Policy Scanner Deploy and run services on App Engine and Container Engine Minimize downtime and mitigate issues with Stackdriver Monitoring and Debugger Integrate with big data solutions, including BigQuery, Dataflow, and Pub/Sub Who this book is for This Learning Path is for IT professionals, engineers, and developers who want to implement Google Cloud in their organizations. …”
Libro electrónico -
203648Publicado 2018“…What You'll Learn Install Apache Kudu, Impala, and Spark to modernize enterprise data warehouse and business intelligence environments, complete with real-world, easy-to-follow examples, and practical adviceIntegrate HBase, Solr, Oracle, SQL Server, MySQL, Flume, Kafka, HDFS, and Amazon S3 with Apache Kudu, Impala, and SparkUse StreamSets, Talend, Pentaho, and CDAP for real-time and batch data ingestion and processingUtilize Trifacta, Alteryx, and Datameer for data wrangling and interactive data processingTurbocharge Spark with Alluxio, a distributed in-memory storage platformDeploy big data in the cloud using Cloudera DirectorPerform real-time data visualization and time series analysis using Zoomdata, Apache Kudu, Impala, and SparkUnderstand enterprise big data topics such as big data governance, metadata management, data lineage, impact analysis, and policy enforcement, and how to use Cloudera Navigator to perform common data governance tasksImplement big data use cases such as big data warehousing, data warehouse optimization, Internet of Things, real-time data ingestion and analytics, complex event processing, and scalable predictive modelingStudy real-world big data case studies from innovative companies, including Navistar, Cerner, British Telecom, Shopzilla, Thomson Reuters, and MastercardWho This Book Is For BI and big data warehouse professionals interested in gaining practical and real-world insight into next-generation big data processing and analytics using Apache Kudu, Impala, and Spark; and those who want to learn more about other advanced enterprise topics…”
Libro electrónico -
203649Publicado 2020“…In addition, you will gain actionable insights into such topic areas as deep Q-networks, policy gradient methods, continuous control problems, and highly scalable, non-gradient methods. …”
Libro electrónico -
203650Publicado 2015“…Moving on, you will explore different methods to back up and restore your databases and perform advanced administration tasks such as working with Policies, Filetables, and SQL audits. The next part of the book covers more advanced HADR tasks such as log shipping and data mirroring, and then shows you how to develop your server to work with BLOB, XML, and JSON. …”
Libro electrónico -
203651Publicado 2016“…The material in this new section ranges from the Seychelles, Honduras, Ecuador, and Libya to Turkey, Western Europe, Vietnam, China, and, in perhaps the most unexpected and sinister development, the United States, where the new EHMs—bankers, lobbyists, corporate executives, and others—“con governments and the public into submitting to policies that make the rich richer and the poor poorer.” …”
Libro electrónico -
203652Publicado 2015Tabla de Contenidos: “…""How to protect data using server-side encryption""""How to protect data using client-side encryption""; ""Chapter 9: Enabling Cross-Origin Resource Sharing""; ""Introduction""; ""Walkthrough 1: Enabling CORS through the S3 console""; ""Walkthrough 2: Enabling CORS with AWS CLI""; ""Chapter 10: Managing Object Lifecycle to Lower the Cost""; ""Introduction""; ""How to apply the lifecycle policy through the S3 console""; ""How to apply the lifecycle policy with AWS CLI""; ""Chapter 11: S3 Performance Optimization""; ""Introduction""; ""How to optimize PUT requests""…”
Libro electrónico -
203653Publicado 2014“…Next, they introduce advanced routing with policies and redistribution, sophisticated BGP-based traffic engineering, and multicast. …”
Libro electrónico -
203654Publicado 2015“…The authorized study guide helps you master all the topics on the CompTIA CASP exam, including: Enterprise security: cryptography; storage; network/security components, concepts, and architectures; host controls; application vulnerabilities/controls Risk management and incident response: business influences/risks; risk mitigation; privacy policies / procedures; incident response/recovery Research, analysis, and assessment: industry trends; securing the enterprise; assessment tools / methods Integration of computing, communications, and business disciplines: business unit collabo..…”
Libro electrónico -
203655Publicado 2015Tabla de Contenidos: “…Configuring SELinux booleansConfiguring SELinux port definitions; Troubleshooting SELinux; Creating SELinux policies; Applying SELinux policies; Chapter 6: Orchestrating with Ansible; Introduction; Install Ansible; Configuring the Ansible inventory; Creating a template for a kickstart file; Creating a playbook to deploy a new VM with kickstart; Creating a playbook to perform system configuration tasks; Troubleshooting Ansible; Chapter 7: Puppet Configuration Management; Introduction; Installing and configuring Puppet Master; Installing and configuring the Puppet agent…”
Libro electrónico -
203656Publicado 2015“…Skill Level Intermediate Advanced What You Will Learn How to prepare for your Microsoft MCSA Exam 70-346 How to configure Office 365 for an efficient, reliable deployment How to establish secure Office 365 administrative roles How to set up authentication, including password policies and multi-factor authentication How to manage Office 365 user identities, both on-premise and in the cloud How to set up and use the Azure Active Directory Sync Tool How to install and configure Active Directory Federation Services (AD FS) How to monitor and troubleshoot Office 365 availability and usage Who Should Take This Course Any IT professional or student preparing for the Microsoft MCSA/MCP Certification Exam 70-346: Managing Office 365 Identities and Requirements IT professionals responsible for administeri..…”
-
203657Publicado 2015“…Sari’s first text was Tools and Techniques for Securing Microsoft Networks , commissioned by Microsoft to train its partner channel, followed soon after by the first edition of Security Policies and Procedures: Principles and Practices . …”
-
203658Publicado 2018“…Skill Level Beginner What You Will Learn Fundamental networking concepts, such as protocol reference models, network devices and theory, network topologies, and network services WAN technologies including ISDN, Frame Relay, PPP, MPLS, Metro-Ethernet, and more How to work with different network cables and connectors Network design considerations Switch and wireless LAN configuration IPv4 and IPv6 addressing Routing fundamentals including RIP, OSPF, IS-IS, and BGP routing protocols; HSRP and VRRP; route aggregation; and routing metrics Unified communications, Voice over IP (VoIP), video, and QoS Virtualized devices, storage area network technologies (SAN), and cloud technologies Network security attacks, vulnerabilities, policies, defenses, and counter-measures Network monitoring tools and analysis, configuration management, and best practices Network troubleshooting Who Should Take This Course? …”
-
203659Publicado 2007“…The Smart Way to StudyTM In This Book You’ll Learn How To: Approach the IS audit process from ISACA’s view of IS auditing best practices Relate and apply information security and systems audit best practices to the six CISA job practice areas Understand the IS audit process and learn how to apply best practices to secure an organization’s assets Evaluate IT governance to ensure that the organization has the structure, policies, and mechanisms in place to provide sufficient IS controls Minimize risk within an IT/IS environment by using sound security techniques and practices Assess systems and infrastructure lifecycle practices to determine their effectiveness in meeting security requirements and meeting organizational objectives Gain a deeper understanding of the business continuity and disaster recovery process to help minimize risk Protect key informational assets by examining the security architecture and evaluating controls designed for the protection of confidentiality, availability, and integrity Streamline your exam preparations with our exam insights, tips, and study strategies WRITTEN BY A LEADING CISA EXAM EXPERT! …”
Libro electrónico -
203660Publicado 2024“…What you will learn Get to grips with network communications and routing to secure them best Understand the difference between encryption and hashing Know how and where certificates and digital signatures are used Study detailed incident and change management procedures Manage user identities and authentication principles tested in the exam Familiarize yourself with the CISSP security models covered in the exam Discover key personnel and travel policies to keep your staff secure Discover how to develop secure software from the start Who this book is for This book is for professionals seeking to obtain the ISC2 CISSP certification. …”
Libro electrónico