Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 15,269
- Política y gobierno 12,213
- Historia 11,520
- Política i govern 4,438
- Història 4,266
- Política económica 3,896
- Filosofía 3,472
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,061
- Administración pública 2,029
- Política social 1,959
- Ciencias políticas 1,907
- Economía 1,878
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,412
- Hacienda pública 1,353
- Economics 1,339
- Derecho 1,318
- Crítica e interpretación 1,312
- Govern 1,275
- Política monetaria 1,271
- Democracia 1,266
- Business & Economics 1,262
- Política educativa 1,230
- Ciencia política 1,112
- History 1,096
-
203681Publicado 2008“…Install, configure, and customize PowerShell 2.0 and master its command line interface Discover proven best practices for PowerShell scripting Make the most of PowerShell cmdlets–especially the new cmdlets included in PowerShell 2.0 Leverage PowerShell’s deep .NET Framework integration Secure your scripts using code signing, execution policies, and PowerShell’s built-in security Use custom script functions to manage permissions more efficiently Control the registry locally and remotely and use PowerShell’s powerful new registry transactions Use PowerShell as a management interface Automate Exchange Server 2007 administrative tasks Automate the management of Microsoft’s new System Center Operations Manager 2007 Preview the forthcoming Graphical PowerShell scripting environment Understand how to manage Active Directory using PowerShell Master using PowerShell with WMI Learn PowerShell 2.0 remoting Download all examples and source code presented in this book from informit.com/title/9780672329883…”
Libro electrónico -
203682por Thomas, Craig, 1969-“…· Discover the immutable laws of nature that govern all your financial decisions–and put them to work for you · Ten ways to maximize wealth and happiness for everyone · How not to fix a broken economy: stupid policy tricks and why they just make things worse We all live inside the Econosphere: a living, breathing, global organism that choreographs billions of performers with breathtaking precision and can make life better for everyone. …”
Publicado 2010
Libro electrónico -
203683Publicado 2014“…Business challenges solved by virtualization Core components of vSphere: the virtual machine, ESXI, high availability vSphere storage, including physical versus virtual, storage types, thin provisioning, and more vSphere networking fundamentals, physical versus virtual switches, components, policies, I/O Mapping business challenges to vSphere solutions The Official VCA-DCV Certification Guide is part of a recommended learning path from VMware that includes simulation and hands-on training from authorized VMware instructors and self-study products from VMware Press. …”
Libro electrónico -
203684por Vachon, Bob“…Topics covered include *; Networking security fundamentals: concepts, policies, strategies, and more *; Securing network infrastructure: network foundations, CCP, management plane and access, and data planes (IPv6/IPv4) *; Secure connectivity: VPNs, cryptography, IPsec, and more *; Threat control and containment: strategies, ACL threat mitigation, zone-based firewalls, and Cisco IOS IPS *; Securing networks with ASA: ASDM, basic and advanced settings, and ASA SSL VPNs Bob Vachon is a professor at Cambrian College. …”
Publicado 2012
Libro electrónico -
203685Publicado 2020“…The work concludes with a legal classification of the findings as well as with criminal policy considerations and proposals for a more precise reformulation of Art. 86 SCC. …”
Libro electrónico -
203686Publicado 2020“…You'll then handle the identity and security for users with the help of Azure Active Directory, and manage access from a single place using policies and defined roles. As you advance, you'll get to grips with receipts to manage a virtual machine. …”
Libro electrónico -
203687Publicado 2020“…Each chapter will assist you in implementing different reinforcement learning techniques, such as Markov decision processes (MDPs), Q-learning, actor-critic methods, SARSA, and deterministic policy gradient algorithms, to build logical self-learning agents. …”
Libro electrónico -
203688Publicado 2020“…This study guide helps you master the topics on the Implementing Cisco SD-WAN Solutions (ENSDWI 300-415) exam, including Architecture Controller Deployment Router Deployment Policies Security and Quality of Service Management and Operations Companion Website: The companion website contains the Pearson Test Prep practice test software with two full exams for the CCNP Enterprise SD-WAN exam ENSDWI 300-415 and Key Terms flash cards. …”
Libro electrónico -
203689Publicado 2019“…It includes the following advanced functions: Improved reliability and resiliency Reduction in the time that is needed for the backup and restore process Reduction of services downtime that is caused by physical tape drive and library outages Reduction in cost, time, and complexity by moving primary workloads to virtual tape More efficient procedures for managing daily backup and restore processing Infrastructure simplification through reduction of the number of physical tape libraries, drives, and media TS7700 delivers the following new capabilities: TS7760C supports the ability to off load to IBM Cloud Object Storage as well as Amazon S3 8-way Grid Cloud consisting of any generation of TS7700 Synchronous and asynchronous replication Tight integration with IBM Z and DFSMS policy management Optional Transparent Cloud Tiering Optional integration with physical tape Cumulative 16Gb FICON throughput up to 4.8GB/s 8 IBM Z hosts view up..…”
Libro electrónico -
203690Publicado 2020“…Enforcing data governance policies in WKC in IBM CP4D based on insights from IBM Spectrum Discover, and using assets in IBM CP4D. …”
Libro electrónico -
203691Publicado 2020“…You'll also get to grips with security policies for limiting access to certain functions inside the cluster. …”
Libro electrónico -
203692Publicado 2018“…He completed his master’s degree in public health at Columbia University Mailman School of Public Health in Epidemiology, and currently works at the Social and Decision Analytics Laboratory under the Biocomplexity Institute of Virginia Tech where he is working with data to inform policy decision-making. He is the author of Pandas for Everyone and Pandas Data Analysis with Python Fundamentals LiveLessons . …”
-
203693Publicado 2020“…You will learn how to configure the main architectural components of a permissioned blockchain network including Peers, Orderers, Certificate Authorities, Channels, and Policies. You'll then learn how to design, develop, package, and deploy smart contracts, and how they are subsequently used by applications. …”
Libro electrónico -
203694Publicado 2017“…The final step is to secure your PowerShell, so you will land in the last module, Securing and Debugging PowerShell, which covers PowerShell execution policies, error handling techniques, and testing. By the end of the book, you will be an expert in using the PowerShell language. …”
Libro electrónico -
203695Publicado 2018“…You learn methods and technologies that help you develop device management policies, mitigate data loss, manage applications, and improve security of Windows 10 and integrated Azure features. …”
-
203696Publicado 2012“…·Understand how the Cisco IronPort ESA addresses the key challenges of email security ·Select the best network deployment model for your environment, and walk through successful installation and configuration ·Configure and optimize Cisco IronPort ESA’s powerful security, message, and content filtering ·Understand the email pipeline so you can take full advantage of it–and troubleshoot problems if they occur ·Efficiently control Cisco IronPort ESA through its Web User Interface (WUI) and command-line interface (CLI) ·Implement reporting, monitoring, logging, and file management ·Integrate Cisco IronPort ESA and your mail policies with LDAP directories such as Microsoft Active Directory ·Automate and simplify email security administration ·Deploy multiple Cisco IronPort ESAs and advanced network configurations ·Prepare for emerging shifts in enterprise email usage and new security challenges This security book is part of the Cisco Press..…”
Libro electrónico -
203697Publicado 2012“…The official study guide helps you master all the topics on the CCNA Security IINS exam, including: Network security concepts Security policies and strategies Network foundation protection (NFP) Cisco Configuration Professional (CCP) Management plane security AAA security Layer 2 security threats IPv6 security Threat mitigation and containment Access Control Lists (ACLs) Network Address Translation (NAT) Cisco IOS zone-based firewalls and ASA firewalls Intrusion prevention and detection systems Public Key Infrastructure (PKI) and cryptography Site-to-site IPsec VPNs and SSL VPNs CCNA Security 640-554 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. …”
Libro electrónico -
203698Publicado 2012“…. -- Develop a comprehensive network security policy to counter threats against information security -- Secure borderless networks -- Learn how to use Cisco IOS Network Foundation Protection (NFP) and Cisco Configuration Professional (CCP) -- Securely implement the management and reporting features of Cisco IOS devices -- Deploy Cisco Catalyst Switch security features -- Understand IPv6 security features -- Plan threat control strategies -- Filter traffic with access control lists -- Configure ASA and Cisco IOS zone-based firewalls -- Implement intrusion prevention systems (IPS) and network address translat..…”
Libro electrónico -
203699Publicado 2013“…Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco’s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system…”
Libro electrónico -
203700por Workshop on Gender and Ageing in Southeast Asia: Contexts, Concerns, and Contradictions“…Derived from quantitative or qualitative methods of data collection and analysis, the chapters reveal how ageing has become tempered by globalization, cultural values, family structures, women's emancipation and empowerment, social networks, government policies, and religion. The chapters are concerned primarily with the following questions related to gender and ageing: (a) how do women and men experience old age? …”
Publicado 2014
Libro electrónico