Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Política 15,269
- Política y gobierno 12,213
- Historia 11,520
- Política i govern 4,438
- Història 4,266
- Política económica 3,896
- Filosofía 3,472
- Economic policy 3,338
- Economic conditions 2,873
- Política exterior 2,061
- Administración pública 2,029
- Política social 1,959
- Ciencias políticas 1,907
- Economía 1,878
- Salud pública 1,772
- Política mundial 1,739
- Political Science 1,488
- Government policy 1,438
- teoría 1,412
- Hacienda pública 1,353
- Economics 1,339
- Derecho 1,318
- Crítica e interpretación 1,312
- Govern 1,275
- Política monetaria 1,271
- Democracia 1,266
- Business & Economics 1,262
- Política educativa 1,230
- Ciencia política 1,112
- History 1,096
-
203841por Chowdhary, AnkushTabla de Contenidos: “…Deleting a service account -- Undeleting a service account -- Service account keys -- Key rotation -- Service account impersonation -- Cross-project service account access -- Configuring Workload Identity Federation with Okta -- Best practices for monitoring service account activity -- Service agents -- IAM policy bindings -- Policy structure -- Policy inheritance and resource hierarchy -- IAM Conditions -- Policy best practices -- Policy Intelligence for better permission management -- Tag-based access control -- Tag structure -- Best practices for tags -- Cloud Storage ACLs…”
Publicado 2023
Libro electrónico -
203842VBScript, WMI and ADSI unleashed : using VBSscript, WMI, and ADSI to automate Windows administrationPublicado 2007“…Decide what you can script: a framework for getting started fast Understand how scripts are designed, assembled, and run Master VBScript from start to finish: functions, I/O, data manipulation, program flow, and much more Use scripting objects for tasks ranging from retrieving network information to mapping drives Utilize FileSystemObject to manipulate the Windows filesystem Write ADSI scripts to manipulate any directory service your company uses, from Active Directory to Novell NDS Modify domain information, users, groups, and policies Query WMI information–from basic to advanced Plan for errors, and test and debug your scripts Build your own “resource kit” of reusable script components ON THE WEB: Download all examples and source code presented in this book from ScriptingAnswers.com, where you’ll also be able to post follow-up questions directly to the author in a moderated, active community. …”
Libro electrónico -
203843Publicado 2007“…Set up and maintain Windows Server Update Services (WSUS) Use the Group Policy Management Console (GPMC) Intelligently select the appropriate disk storage technology when deciding between basic versus dynamic disks and between MBR versus GPT disks Take advantage of command-line tools such as DSADD, DSGET, DSMOD, DSMOVE, DSQUERY, and DSRM Discover the enhanced functionality of Microsoft Management Console (MMC) 3.0 under the R2 edition of Windows Server 2003 Harness the power of the increased security that Service Pack 1 (SP1) offers, such as the Security Configuration Wizard (SCW) and Access-based Enumeration filtering of network files and folders Perform bulk imports and exports of Active Directory user accounts using the CSVDE and LDIFDE command-line utilities Manage Windows Firewall settings under SP1 and R2 Configure shadow copies of shared folders so that users can easily retrieve previous versions of data files on their own WRITTEN BY LEADING 70-290 EXPERTs: Dan Balter is the chief technology officer for InfoTechnology Partners, Inc., a Microsoft Certified Partner company. …”
Libro electrónico -
203844por Lamm, JacobTabla de Contenidos: “…The Rise of Governance -- Governance Today -- Policy Management -- Risk Management -- Risk Governance and the Board of Directors -- Governance of Risk and Compliance -- IT Governance, Risk, and Compliance -- Governance and Portfolio Management -- The Regulatory Environment -- Governance and Finance -- Information Governance -- Governance and Sustainability…”
Publicado 2010
Libro electrónico -
203845Publicado 2020“…By the end of this book, you’ll have become proficient in packaging and deploying end-to-end scalable solutions with Microsoft Dynamics 365 Finance and Supply Chain Management.What you will learnUnderstand the importance of using patterns and frameworks for creating unique solutionsWrite code that can make your solution extendableLeverage new frameworks that allow your solution to adapt as your business growsDesign the UI and business logic to fit standard patternsUnderstand how to not only write unit tests, but also perform efficient unit testing to automate the testing processDesign your security model and policies to provide code access privilegesWho this book is forThis Dynamics 365 book is for anyone who wants to learn Dynamics 365 Finance and Supply Chain Management development or migrate from C# or Microsoft Dynamics AX 2012 (or prior) development. …”
Libro electrónico -
203846por Stockholm University Press“…Another aim is to provide teachers, teacher educators and policy-makers with input from research within the interconnected disciplines of Applied Linguistics, Language Education and Second Language Acquisition.The volume includes five examples of topical research on language education and the authors are internationally renowned scholars. …”
Publicado 2022
Libro electrónico -
203847Publicado 2022“…The Pearson Complete Course for CISM Certification will enable you to learn the skills to design, deploy and manage security policies. The course starts with a basic introduction of the exam modules and topic domains before diving deeper into the main modules which incorporate real-world scenarios and practical applications. …”
Video -
203848Publicado 2022“…What you will learn Use AWS Codestar to design and implement a full branching strategy Enforce Policy as Code using CloudFormation Guard and HashiCorp Sentinel Master app and infrastructure deployment at scale using AWS Proton and review app code using CodeGuru Deploy and manage production-grade clusters using AWS EKS, App Mesh, and X-Ray Harness AWS Fault Injection Simulator to test the resiliency of your app Wield the full arsenal of AWS Security Hub and Systems Manager for infrastructure security automation Enhance CI/CD pipelines with the AI-powered DevOps Guru service Who this book is for This book is for DevOps engineers, engineering managers, cloud developers, and cloud architects. …”
Libro electrónico -
203849Publicado 2024“…He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. …”
Video -
203850por Baudry, Jérôme“…Through this synthesis, an incarnate history of technical policies is proposed. Claude-Pierre Molard es una figura clave de la tecnología en el cambio de los siglos XVIII y XIX. …”
Publicado 2022
Electrónico -
203851Publicado 2023“…You will learn how to implement encryption, access controls, data classification, and data retention policies to safeguard data from unauthorized access and prevent data breaches. …”
Video -
203852por Ahmadi, Milad“…It is of keen interest to academic scholars, students, civil society practitioners, and policy makers in the field of international development research and civil society action. …”
Publicado 2021
Libro electrónico -
203853por McFedries, PaulTabla de Contenidos: “…Unleashing day-to-day Windows Vista -- An overview of Windows Vista -- Customizing and troubleshooting the Windows Vista startup -- Exploring expert file and folder techniques -- Mastering file types -- Installing and running applications -- Getting the most out of user accounts -- Working with digital media -- Vista's tools for business : contacts, calendar, and faxing -- Mobile computing in Windows Vista -- Unleashing essential Windows Vista power tools -- Using control panel and group policies -- Getting to know the Windows Vista registry -- Programming the Windows scripting host -- Unleashing Windows Vista customization and optimization -- Customizing the Windows Vista interface -- Tuning Windows Vista's performance -- Maintaining your Windows Vista system -- Troubleshooting and recovering from problems -- Getting the most out of device manager -- Unleashing Windows Vista for the Internet -- Exploring the Web with Internet Explorer -- Communicating with Windows Mail -- Participating in Internet newsgroups…”
Publicado 2008
Libro electrónico -
203854Publicado 2024“…Navigating through networking basics, Microsoft Windows history, and security tools, the course emphasizes account management, security policies, and tools. A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. …”
Video -
203855Publicado 2006“…The visual strategies of the Habsburg rulers in the 19th century and the inseparable question of the legitimation of the Austrian Empire in the years after 1848 steer attention back to the quest for "origins" and to the Habsburg "insurance policy" of evoking the figure of founding father Rudolf I. …”
Libro electrónico -
203856Publicado 2020Tabla de Contenidos: “…Le corpus documentaire des douanes égyptiennes -- Le renouvellement de la recherche -- L'administration des douanes : pratiques et acteurs -- Les pratiques du contrôle douanier : une approche documentaire -- Le vocabulaire fiscal -- Laissez-passer, quittances, registres : formes et fonctions des écrits douaniers -- La validation des écrits douaniers -- Personnels douaniers et production documentaire -- Les pratiques d'énonciation de l'identité -- La hiérarchie douanière à la lumière des pratiques documentaires -- Les milieux de recrutement des personnels douaniers -- La supervision publique des contrôles douaniers -- Les superviseurs fiscaux -- Entre police et armée -- Le maillage territorial du contrôle -- Conclusions générales -- Bibliographie générale -- Tableaux récapitulatifs des typologies des écrits douaniers et cartes…”
Libro electrónico -
203857Publicado 2024Tabla de Contenidos: “…Implementing a Cloud Security Policy -- Regular Security Audits and Assessments -- Employee Training and Awareness -- Regular Data Backups and Recovery Planning -- Best Practices for Data Retention, Archival, and Deletion -- Understanding Data Lifecycle Management -- Implementing Data Retention Policies -- Secure Data Deletion Techniques -- Effective Data Archiving Solutions -- Compliance with Data Protection Regulations -- Lessons from Cloud Data Security Breaches -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 7: Data Governance Essentials -- Data Governance -- Data Dispersion in the Cloud -- The Importance of Data Governance for Cloud Security -- Leveraging Cloud-Specific Tools and Services -- IRM -- The Role of IRM in Data Governance -- Key Components of an Effective IRM System -- IRM and Cloud Computing -- Implementing IRM -- Implementing IRM in a Cloud Environment -- Best Practices for IRM Implementation -- Case Studies of Successful IRM Implementation -- Auditability in Cloud Data Governance -- Implementing Auditability in the Cloud -- Traceability in Cloud Data Governance -- Implementing Traceability in the Cloud -- Tools and Technologies for Enhancing Traceability -- Accountability in Cloud Data Governance -- Key Components of Accountability -- Implementing Accountability in Cloud Data Governance -- Tools and Technologies for Enhancing Accountability -- Cloud Data Life Cycle -- The Role of IRM, Auditability, Traceability, and Accountability in Each Phase of the Cloud Data Life Cycle -- Challenges and Solutions in Implementing IRM and Data Governance in the Cloud -- Emerging Trends and Technologies in Cloud Data Governance and IRM -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 8: Essential Infrastructure and Platform Components for a Secure Data Center…”
Libro electrónico -
203858Publicado 2022“…Finally, you will learn about information and cybersecurity topics, such as the BYOD policy and cyber warfare. Upon completion, you will have gained comprehensive knowledge and insights into cyber security and can become cyber/information security professionals. …”
Video -
203859Publicado 2021“…No porque partamos de una visión temerosa, sino porque la realidad apunta a que tanto la IA judicial como la IA policial nos van a acompañar y debemos ser capaces de marcar cómo lo harán no solo a partir de las posibilidades de su alcance, también deberemos identificar los peligros que su uso descontrolado puede traer consigo. …”
Datos de acceso al recurso electrónico
Acceso a la plataforma Legalteca, busque el título una vez dentro.
Libro -
203860por Altar, Sylvie, 1965-“…Il utilise sans réserve les mêmes méthodes bestiales et les mêmes moyens policiers que Klaus Barbie à l'encontre des résistants, des communistes, des francs-maçons et des juifs. …”
Publicado 2020
Libro