Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 15,269
- Política y gobierno 12,213
- Historia 11,520
- Política i govern 4,438
- Història 4,266
- Política económica 3,896
- Filosofía 3,472
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,061
- Administración pública 2,029
- Política social 1,959
- Ciencias políticas 1,907
- Economía 1,878
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,412
- Hacienda pública 1,353
- Economics 1,339
- Derecho 1,318
- Crítica e interpretación 1,312
- Govern 1,275
- Política monetaria 1,271
- Democracia 1,266
- Business & Economics 1,262
- Política educativa 1,230
- Ciencia política 1,112
- History 1,096
-
203821por Bouyssy, Maïté“…Sous diverses formes, cet ouvrage traite donc du citoyen et du genre, des foules et de Bailleurs, du juste et de l’injuste ou de l’ordinaire ordre policier. Quand se trame un ordre prédémocratique s’accroît l’inquiétude de la « montée du cadavre » qu’ont notée d’autres historiens. …”
Publicado 2020
Electrónico -
203822Publicado 2016“…Coverage includes: Troubleshooting BGP Peering Issues Troubleshooting Platform Issues Caused by BGP Troubleshooting BGP Routing Policies Troubleshooting BGP Convergence BGP Multi-Homing and Multipath Scaling BGP Securing BGP BGP High Availability Skill Level Intermediate What You Will Learn Topical, up to date information for BGP Troubleshooting The ins and outs of troubleshooting on Cisco IOS, IOS XR, and NxOS Who Should Take This Course Network Engineers, Network Operations, Technical Support Engineers, Consultants, IP Infrastructure Engineers, Cisco Channel Partners The target audience is for intermediate to advanced network engineers that support BGP IOS, IOS XR, or NxOS-based platforms and have to troubleshoot complex BGP-related routing issues in their network. …”
-
203823por Diogenes, YuriTabla de Contenidos: “…Security posture -- Incident response process -- What is a cyber strategy -- Understanding the cybersecurity kill chain -- Reconnaissance -- Compromising the system -- Changing a user's identity -- Lateral movement -- Privilege escalation -- Security policy -- Network segmentation -- Active sensors -- Threat intelligence -- Investigating an incident -- Recovery process -- Vulnerability management -- Log analysis…”
Publicado 2019
Libro electrónico -
203824Publicado 2022“…Topics include: Data Privacy and Protection Risk Mitigation Importance of Policies, Procedures, and Controls Analyzing Logs and Impact Analysis SIEMs and Query Writing E-Mail Analysis Automation About the Instructor Aamir Lakhani is a leading senior security strategist. …”
Video -
203825Publicado 2022“…What you will learn Develop a comprehensive understanding of SASE from a market and technical perspective Understand SASE services and components included in SASE solutions Move logically from prescriptive design to policy-based design and orchestration Understand standard SASE use cases and how to integrate future components Convert from a legacy network design model to a secure DevOps model for future projects Use a functional design overlay to eliminate inter-service competition for the control plane of the SASE service Who this book is for This book is for technology and security leaders and specifically for any CTO, CSO, CISO, or CIO looking for an executive approach to SASE for their organization. …”
Libro electrónico -
203826por Organisation for Economic Co-operation and Development.“…OECD 더 나은 삶 이니셔티브는 OECD 의 가장 중요한 임무와 맥을 함께 하는 “더 나은 삶을 위한 더 나은 정책(Better Policies for Better Lives)”을 권장하는 것이 목적이다. OECD 더 나은 삶 이니셔티브의 또 다른 주요 내용은 시민들을 사회적 진보에 관한 토론에 참여시키는 것을 목적으로 하는 쌍방향 웰빙 종합 지표인 더 나은 삶 지표 ( www.oecdbetterlifeindex.org ), 이다…”
Publicado 2014
Libro electrónico -
203827Publicado 2017“…The next chapter will not only teach you how to create datastore and datastore clusters, but you'll also work with profile-driven and policy-based storage to manage your storage. To create a disaster recovery solution and retrieve information from vRealize Operations, you will learn how to use Site Recovery Manager and vRealize Operations respectively. …”
Libro electrónico -
203828por Lacoste, Raymond“…The official study guide helps you master topics on the CCNP Routing and Switching TSHOOT 300-135 exam, including how to troubleshoot: Device performance VLANs, Trunks, and VTP STP and Layer 2 Etherchannel Inter-VLAN routing and Layer 3 Etherchannel Switch security HSRP, VRRP, GLBP IPv4 and IPv6 addressing IPv4/IPv6 routing and GRE tunnels RIPv2, RIPng, EIGRP, and OSPF Route maps, policy-based routing, and route redistribution BGP Management protocols, tools, and access Companion CD-ROM The CD-ROM contains more than 200 practice questions for the exam, memory ..…”
Publicado 2015
Libro electrónico -
203829Publicado 2014“…Skill Level Beginner Intermediate What You Will Learn How to install and update Windows Server, and establish server roles How to manage Windows Server hardware, services, and storage How to efficiently monitor and troubleshoot Windows Server How to ensure maximum server performance and prepare for business continuity How to provide efficient file, print, and remote access services How to set up Active Directory users, groups, OUs, and Group Policy How to take advantage of Windows Server's powerful virtualization capabilities The best ways to prepare for your MTA 98-365 certification exam Who Should Take This Course Everyone who wants to use or manage Windows Server, especially those preparing for Microsoft's MTA 98-365 Windows Server Administration Fundamentals certification exam Course Requirements Basic experience with any version of Windows Table of Contents Course Intro 0.1. …”
-
203830Publicado 2015“…This essential reading persuasively extends the discourse on the subject and addresses critical shari'ah issues that have policy implications for decision makers in jurisdictions aiming to attract the fast-growing Islamic finance industry or increase their market share"-- "Discusses current Sharia governance practices in Islamic banking, outlines the challenges it presents, and supplies a practical Sharia governance model"--…”
Libro electrónico -
203831Publicado 2023“…Next, we will cover custom routes, controllers, services, policies, and middleware. Later in the course, we will cover the Admin Panel and learn how to customize it. …”
Video -
203832por Theisens, Henno“…Such issues suggest that policy makers and education providers alike need to address questions about what education is and how it should be delivered. …”
Publicado 2008
Capítulo de libro electrónico -
203833Publicado 2023“…He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. …”
Video -
203834Publicado 2023“…He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. …”
Video -
203835Publicado 2023“…Begin by comprehending its architecture and proceeding to installation techniques for different RAC types--administrator-managed, policy-managed, CDB, and RAC One node. Delve into performing core administrative tasks, backup and recovery strategies, and the art of effectively monitoring and fine-tuning Oracle RAC databases. …”
Video -
203836Publicado 2023Tabla de Contenidos: “…Copyleft licenses (GPL, LGPL) -- Proprietary licenses -- The impact of software licenses on the DevSecOps pipeline -- How to perform license reviews -- Tools and techniques -- Engaging legal and security teams -- Documentation and continuous improvement -- Fine-tuning policies associated with licenses -- Establishing an organizational standard -- Exception handling -- Continuous review and improvement -- Case studies -- Case study 1 - the Redis licensing change -- Case study 2 - Elastic versus AWS licensing drama -- Summary -- Chapter 14: Setting Up a Security Champions Program -- The Security Champions program -- Structuring your Security Champions program -- Things to remember before setting up the program -- Who should be a Security Champion? …”
Libro electrónico -
203837Publicado 2019“…Finally, in his talk titled The Value of Trustworthy AI, David Danks (Carnegie Mellon) explored the philosophical and psychological conditions for 'trustworthy' AI systems, and the importance of this complex notion of 'trustworthiness' for informed AI policy and public action. The program of the conference included peer-reviewed paper presentations, with 35 papers presented as posters with an associated brief spotlight presentation, and another 34 as longer oral presentations. …”
Libro electrónico -
203838Publicado 2017“…Wie neue Plattform-Geschäftsmodelle von airbnb und Co. den Markt verändern Methoden und Strategien für Unternehmensgründer und Start-ups Von bekannten Branchenführern wie airbnb, Uber, PayPal und Co. lernen Strategie, Design, Launch, Monetarisierung, Governance, Metriken und Policy Geschrieben von renommierten Wirtschaftsexperten und Unternehmensberatern Uber. …”
Libro electrónico -
203839Publicado 2020“…After that, you will learn about deep Q-learning, policy gradient algorithms, actor-critic methods, model-based methods, and multi-agent reinforcement learning. …”
Libro electrónico -
203840Publicado 2020“…The final section of the book looks at the ways experiments can test policy interventions designed to improve educational, health, and financial outcomes"--…”
Libro electrónico