Mostrando 203,701 - 203,720 Resultados de 204,179 Para Buscar 'Pollica~', tiempo de consulta: 1.75s Limitar resultados
  1. 203701
    Publicado 1981
    “…These were crucial years in domestic politics, however, and Bryant's guidance of Evening Post policies was evident in editorials treating major issues such as the Compromise of 1850, the Fugitive Slave Law, the Kansas-Nebraska Bill, the rise of the Republican Party, and the Dred Scott Decision, as well as in his correspondence with such statesmen as Salmon P. …”
    Libro electrónico
  2. 203702
    Publicado 2020
    “…Over the last years, sophisticated policy making propositions for sustainable rural and urban development have been recorded. …”
    Libro electrónico
  3. 203703
    Publicado 2011
    “…For more specific information about z/OS Communications Server standard applications, high availability, and security, see the other volumes in the series: IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 1 Base Functions, Connectivity, and Routing, SG24-7996 IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 3 High Availability, Scalability, and Performance, SG24-7998 IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking, SG24-7999 z/OS Communications Server: IP Configuration Guide, SC31-8775 z/OS Communications Server: IP Configuration Reference, SC31-8776 z/OS Communications Server: IP User's Guide and Commands, SC31-8780…”
    Libro electrónico
  4. 203704
    Publicado 2015
    “…--Understand modern network topologies, protocols, and infrastructure --Implement networks based on specific requirements --Install and configure DNS and DHCP --Monitor and analyze network traffic --Understand IPv6 and IPv4 addressing, routing, and switching --Perform basic router/switch installation and configuration --Explain network device functions in cloud environments --Efficiently implement and troubleshoot WANs --Install, configure, secure, and troubleshoot wireless networks --Apply patches/updates, and support change/configuration management --Describe unified communication technologies --Segment and optimize networks --Identify risks/threats, enforce policies and physical security, configure firewalls, and control access --Understand essential network forensics concepts --Troubleshoot routers, switches, wiring, connectivity, and security Companion CD The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. …”
    Libro electrónico
  5. 203705
    Publicado 2023
    Tabla de Contenidos: “…Adding applications deployable from vSphere -- Adding an AWS EC2 AMI build -- Using HashiCorp Vault for credentials -- Adding an Azure build -- Adding a Google GCP build -- Parallel builds -- CI testing against multiple OS releases -- Pitfalls and things to avoid -- Summary -- Chapter 7: Building an Image Hierarchy -- Technical requirements -- Starting with LXC/LXD images -- Docker container image format -- Podman plugin for the OCI container image format -- Base image strategy -- Aggregation and branching out multiple pipelines -- Summary -- Chapter 8: Scaling Large Builds -- Technical requirements -- Speeding up your builds with parallel processes -- Preventing parallel processes from causing DoS -- Troubleshooting logs in a parallel world -- Using image compression -- Selecting a compression algorithm for Packer images -- Selecting the right storage type for the image lifecycle -- Building delta and patch strategies -- Summary -- Part 3: Advanced Customized Packer -- Chapter 9: Managing the Image Lifecycle -- Technical requirements -- Tracking image lifecycle -- Using the manifest post-processor -- Creating a retention policy -- Summary -- Chapter 10: Using HCP Packer -- Technical requirements -- Creating an HCP organization -- Configuring HCP Packer in your templates -- Using HCP ancestry -- Consuming HCP Packer from Terraform -- Exploring the HCP REST API -- Summary -- Chapter 11: Automating Packer Builds -- Technical requirements: -- Identifying common automation requirements -- Exploring basic GitHub Actions support -- Exploring GitLab CI pipeline support -- Using HashiCorp Vault integration for automation -- GitLab CI -- GitHub Actions -- Summary -- Chapter 12: Developing Packer Plugins -- Technical requirements -- Basics of Go -- Sample plugin source -- Building and testing your plugin -- Protecting Packer from bad plugins -- Summary…”
    Libro electrónico
  6. 203706
    Publicado 2024
    Tabla de Contenidos: “…Understanding high-level roles and responsibilities -- Day-to-day activities for data stewards -- RACI matrix for data governance -- Establishing data quality and lineage principles and practices -- Data quality -- The DQM cycle -- Data lineage -- Setting up data classification, access control, and security -- Data classification -- Data access control -- Data security and protection -- Monitoring and ensuring data privacy and compliance -- Summary -- Chapter 8: Effective Data Stewardship -- Establishing data stewardship principles and standardizing data incident management -- The data life cycle -- Principles and policies -- Data incident management -- Defining and implementing data ownership -- Defining and designing a data domain -- Assigning an owner to a data domain -- Day 2 for data ownership and domain -- Defining a target state - What does good data stewardship look like? …”
    Libro electrónico
  7. 203707
    Publicado 2022
    “…In addition, regulatory guidelines and standards are causing many businesses and organizations to implement zero trust policies and privacy enhancing techniques to restrict access to workloads as state of least privilege is established. …”
    Libro electrónico
  8. 203708
    Publicado 2012
    “…The study is based on a sample of 788 individuals (337 women, 451 men), who were affected by National Socialist proprietary measures, i.e. looting policy, in 1938. The sample was drawn for a study by the Austrian Historical Commission. …”
    Libro electrónico
  9. 203709
    Publicado 2021
    “…The publication is a contribution to the discussion of institutional and personnel tools of ideological use of ethnography and related scientific disciplines by Nazi Germany in the 1940s in the intentions of its foreign policy plans. It focuses on the efforts of the Third Reich and German researchers to influence the homeland and ethnographic research in Slovakia and follows it on the example of the activities of the Institute for homeland Research (Institut für Heimatforschung) in Kežmarok and those associated with its activities (Franz. …”
    Libro electrónico
  10. 203710
    Publicado 2024
    “…Written by a highly qualified professional with significant experience in the field, Stepping Through Cybersecurity Risk Management includes information on: Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards Cybersecurity measures and metrics, and corresponding key risk indicators The role of humans in security, including the "three lines of defense" approach, auditing, and overall human risk management Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, Stepping Through Cybersecurity Risk Management is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field. …”
    Libro electrónico
  11. 203711
    Publicado 2024
    “…How do you get CMVP certifications (cert houses, required documents, design information, security policy, etc.)?…”
    Libro electrónico
  12. 203712
    Publicado 2024
    “…In this easy-to-read introduction, you'll learn: How large language models (LLMs) work How to integrate generative AI into your personal and professional work Balancing innovation and responsibility The social, legal, and policy landscape around generative AI Societal impacts of generative AI Where AI is going Anyone who uses ChatGPT for even a few minutes can tell that it's truly different from other chatbots or question-and-answer tools. …”
    Libro
  13. 203713
    Publicado 2024
    “…The open access book aims to show the readers novel, relevant and reproducible power of synergistic collaborations between European research groups and stakeholders with the objective to synthesize the existing knowledge and expertise about fire management and hazard and defining a concerted research agenda that promotes an integrated approach to create fire-resilient landscapes, taking into account biological, biochemical and physical, but also socio-economic, historical, geographical, sociological, perception and policy constraints. This is an urgent societal need due to the expected further intensification and geographical spreading of wildfire regimes under Global Change. …”
    Libro electrónico
  14. 203714
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Start From the Basics -- Chapter 1: ISO27001 - Definitions and Security Concepts -- The 27k family of standards -- Confidentiality, integrity, and availability -- Information security concepts and definitions -- Governance, policies, and incident management -- Governance -- Policies and procedures -- Incident management -- Differences between ISO 27001 and NIST -- What's NIST? …”
    Libro electrónico
  15. 203715
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1 - Understanding Autonomous Database in OCI -- Chapter 1: Introduction to Oracle's Autonomous Database -- Technical requirements -- Learning what an Autonomous Database is -- Always Free ADB -- Technology building blocks - ADB -- Oracle DBEE -- Oracle Exadata Database Machine -- OCI -- Oracle best practices -- Oracle knowledge base -- ML -- Classification of ADB based on workload -- ADW -- ATP -- AJD -- ADB infrastructure deployment choices - shared and dedicated -- Shared -- Dedicated -- ADB on Exadata Cloud@Customer -- Understanding why to use an Autonomous Database -- Decades of innovation in the ML capabilities of Oracle Database -- Autonomous Database value proposition -- Reviewing use cases for ADB -- Understanding the business benefits of using ADB -- Improved business performance gains -- Improved DBA and system administrator productivity -- Reduced development cycle time -- Reduced non-compliance risks - data -- Reduced planned downtime -- Reduced unplanned downtime -- Reduced IT infrastructure acquisition -- Reduced IT infrastructure maintenance and support -- BOM and SKUs for autonomous databases -- Summary -- Questions -- Further reading -- Answers -- Chapter 2: Autonomous Database Deployment Options in OCI -- Technical requirements -- OCI's Free tier account -- OCI Free Trial -- Always Free resources on OCI -- Creating an Always Free ADB -- Networking, IAM, and security for shared and dedicated deployments -- Prerequisites - IAM considerations -- Policy requirements for your ADB -- Networking considerations -- Deploying a serverless shared ADB -- Deploying a dedicated Exadata infrastructure -- Summary -- Part 2 - Migration and High Availability with Autonomous Database -- Chapter 3: Migration to Autonomous Database…”
    Libro electrónico
  16. 203716
    Publicado 2024
    Tabla de Contenidos: “…-- Building security policies in Strata Cloud Manager -- Security rules -- Custom security profiles -- Decryption -- Objects -- Building security policies in Panorama -- Clientless VPN -- Summary -- Part 3: Advanced Configuration and Best Practices -- Chapter 9: User Identification and Cloud Identity Engine -- Technical requirements -- User identification and group mapping -- Cloud Identity Engine -- Setting up a directory sync in Azure -- Setting up a SCIM connector -- Adding CIE to Prisma Access -- User ID redistribution -- User ID collector in Strata Cloud Manager -- User ID collector in Panorama -- User ID agents on firewalls -- Summary -- Chapter 10: Advanced Configurations and Insights -- Licensing -- Cortex Data Lake -- Insights and ADEM -- Summary -- Chapter 11: ZTNA Connector -- Differences between the ZTNA connector and SC-CAN -- Preparing to deploy the ZTNA connector -- Setting up the ZTNA connector -- Setting up the connector VM -- Basic troubleshooting -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  17. 203717
    Publicado 2023
    “…In this easy-to-read introduction, you'll learn: How large language models (LLMs) work How to integrate generative AI into your personal and professional work Balancing innovation and responsibility The social, legal, and policy landscape around generative AI Societal impacts of generative AI Where AI is going Anyone who uses ChatGPT for even a few minutes can tell that it's truly different from other chatbots or question-and-answer tools. …”
    Grabación no musical
  18. 203718
    Publicado 2021
    “…La larga guerra 1914-1945 Marina ha creado doscientas impactantes imágenes, restaurando digitalmente el color a fotografías de época, lo que junto con los vívidos y agudos textos de Dan compone un conmovedor –y, a menudo, aterrador– relato coral con el que nos trasladan de las enfangadas trincheras del Somme a las barcazas del desembarco aliado del Día D, de las gélidas ruinas de Stalingrado a las abrasadoras escarpaduras del Rif, de la guerra submarina sin restricciones a los cielos cuajados de aviones de la batalla de Inglaterra, de las opresivas calles del gueto de Varsovia al júbilo de las celebraciones en la Europa liberada... y nos invita a mirar a los ojos a sus protagonistas, fuesen estos líderes como Churchill, Stalin, Mussolini o Hitler, fuesen anónimos como Czesława Kwoka, una niña polaca asesinada en Auschwitz, o como Ángeles González, una niña española de siete años, refugiada de Madrid, pero que podría ser una refugiada siria en 2021 o cualquier víctima de cualquier conflicto. …”
    Libro
  19. 203719
    Publicado 2017
    “…La lucha eficaz contra las distintas expresiones de la más moderna criminalidad, obliga a los Estados a abandonar las tradicionales fórmulas de cooperación basadas en el principio de reciprocidad para avanzar hacia el fortalecimiento de los instrumentos de cooperación policial y judicial en materia penal, cristalizando en un conjunto de medidas destinadas a facilitar la investigación, la obtención de pruebas y su posterior incorporación a los procesos penales nacionales, mediante la consolidación del principio de reconocimiento mutuo. …”
    Libro
  20. 203720
    Publicado 2017
    “…Las Jornadas han proporcionado una excelente ocasión de encuentro y de debate entre expertos, doctorandos, estudiantes, y exponentes del mundo académico, militar, policial y judicial, sobre temas de actualidad relacionados con la paz, la seguridad y la defensa. …”
    Libro