Mostrando 66,121 - 66,140 Resultados de 69,047 Para Buscar 'Réquista~', tiempo de consulta: 1.56s Limitar resultados
  1. 66121
    Publicado 2019
    Tabla de Contenidos: “…Opciones contra el neoliberalismo -- Los conflictos interétnicos frente a la globalización -- El "mandar obedeciendo" como sustento de la organización social -- El zapatismo de fin de siglo y sus retos actuales -- Tradición y posmodernidad en "los hombres verdaderos" -- El EZLN en el Desierto de la Soledad -- Bibliografía -- Documentos y grabaciones -- Documentos -- Grabaciones -- Hemerografía -- Artículos en revistas periodísticas -- Abreviaturas y siglas…”
    Libro electrónico
  2. 66122
    Publicado 2019
    Tabla de Contenidos: “…Fuentes documentales -- Revistas feministas -- PRÁCTICAS EDUCATIVAS DE LIBERTAD FEMENINA EN LAS EXPERIENCIAS DE EDUCACIÓN LIBRE EN CATALUÑA -- Valeria Vittoria Aurora Bosna -- 1. …”
    Libro electrónico
  3. 66123
    Publicado 2022
    Tabla de Contenidos: “…LIBROS SOBRE MACINTYRE EN ESPAÑOL -- V. ARTÍCULOS DE REVISTA SOBRE MACINTYRE EN ESPAÑOL -- VI. TESIS DOCTORALES -- VII. …”
    Libro electrónico
  4. 66124
    Tabla de Contenidos: “…The Two Sides of Permissions: Sites and Groups -- Permissions: Site Permissions -- Icon 2: Grant Permissions -- Icon 3: Create Group -- Icon 4: Edit User Permissions for Existing Group -- Icon 5: Remove User Permissions -- Icon 6: Check Permissions -- Link 7: Manage Permission Levels -- Link 8: Manage Access Request Settings -- Link 9: Manage Site Collection Administrators -- Permissions: People and Groups -- New: Add Users -- Actions: E-Mail Users -- Actions: Call/Message Selected Users -- Actions: Remove Users from Group -- Settings: Group Settings -- Settings: View Group Permissions -- Settings: Make Default Group -- Settings: List Settings -- Set Top Level Permissions to Read Only -- Set Document Library Permissions -- Set a Document's Permissions -- Setting Permissions for Your Company Example -- Stop Inheriting Permissions -- Check Company Permissions -- Site Editing -- Edit Your Site Page -- Add an App -- Edit Links: Edit the Top link Bar -- Edit Links: Edit the Quick Links Bar -- Create a Project Site -- Step 1: Sign On to Your SharePoint Site -- Step 2: Navigate to "Parent" of Where You Want to Create Your Project Site -- Step 3: Create a Project Subsite -- Step 4: Alter Your Site -- Step 5: Save Your Project Site Template -- Step 6: Clean Up Your Site and Add Apps as Appropriate -- Step 7: Set Permissions -- Step 8: Using Your Project Site -- Using Project E-mail -- Uploading and Creating Documents -- Add Tasks and Task Management -- Add Calendar Entries -- One Note Notebook -- Start a Newsfeed Conversation -- Share Your Project Site -- Sync Your Site with SkyDrive Pro -- SharePoint Admin Center -- SharePoint Admin Center -- SharePoint Admin Center Site Collections Ribbon -- Icon 1: New -- Icon 2: Delete -- Icon 3: Properties -- Icon 4: Owners -- Icon 5: Sharing (External Sharing) -- Icon 6: Storage Quota -- Icon 7: Server Resource Quota…”
    Libro electrónico
  5. 66125
    por Rodríguez, Milagros
    Publicado 2017
    Tabla de Contenidos: “…PROGRAMA EDICIÓN DE REVISTAS -- APÉNDICE N° 23. PROGRAMA TIPOGRAFÍA Y COLOR -- APÉNDICE N° 24. …”
    Libro electrónico
  6. 66126
    Publicado 2023
    Tabla de Contenidos: “…5.3 Evolution of Network Security Strategies -- 5.4 Different Evolving Security Approaches -- 5.4.1 Conventional Approaches -- 5.4.2 Confidentiality Approaches -- 5.4.3 Privacy Approaches -- 5.4.4 Availability Approaches -- 5.4.5 Modern Approaches -- 5.5 Discussion -- 5.6 Conclusion -- References -- Chapter 6 The State of CDNs Today and What AI-Assisted CDN Means for the Future -- 6.1 Introduction -- 6.2 CDN and Its Challenges -- 6.2.1 Replica Server Placement -- 6.2.2 Content Replication -- 6.2.3 Request Routing -- 6.2.4 Load Balancing -- 6.3 Importance of AI in CDN -- 6.4 Pandemic and CDN -- 6.5 Security Threats in CDN -- 6.6 Conclusion -- References -- Chapter 7 Challenges and Opportunities in Smart City Network Management Through Blockchain and Cloud Computing -- 7.1 Introduction -- 7.2 Literature Review -- 7.2.1 Smart City and Network Management -- 7.2.2 Blockchain and Network -- 7.3 Blockchain and Smart City -- 7.3.1 Smart Healthcare -- 7.3.2 Smart E-Voting -- 7.3.3 Smart Logistics and Supply Chains -- 7.4 Cloud Computing and Challenges -- 7.4.1 Cloud Computing -- 7.5 Research Methodology -- 7.6 Conclusion -- References -- Chapter 8 Role of IoT in Smart Homes and Offices -- 8.1 Introduction -- 8.2 Smart Building Constituents -- 8.3 Concept of Smart Office Service Devices -- 8.4 IoT in Smart Homes and Offices -- 8.4.1 Smart Environment Models -- 8.4.2 IoT Control Systems for Smart Home Devices -- 8.4.3 Prevailing Designs in Smart Homes -- 8.4.4 Smart Home Constituents -- 8.4.5 Cloud Topological Structure -- 8.4.6 Smart Home-Based Cloud Architectural Design -- 8.5 Future Research Directions and Limitations of Smart Home-Based Technology -- 8.6 Conclusion -- References -- Chapter 9 Role of IoT in the Prevention of COVID-19 -- 9.1 Introduction -- 9.2 A Modern Era Problem -- 9.2.1 Current Risk -- 9.2.2 Awareness by Social Media…”
    Libro electrónico
  7. 66127
    Publicado 2018
    Tabla de Contenidos: “…Intro -- Titlepage -- Copyright -- Dedication -- preface -- acknowledgments -- about this book -- How this book is organized -- Roadmap -- About the code -- Book forum -- about the author -- about the cover illustration -- Chapter 1: Securing DevOps -- 1.1 The DevOps approach -- 1.1.1 Continuous integration -- 1.1.2 Continuous delivery -- 1.1.3 Infrastructure as a service -- 1.1.4 Culture and trust -- 1.2 Security in DevOps -- 1.3 Continuous security -- 1.3.1 Test-driven security -- 1.3.2 Monitoring and responding to attacks -- 1.3.3 Assessing risks and maturing security -- Summary -- Part 1: Case study: applying layers of security to a simple DevOps pipeline -- Chapter 2: Building a barebones DevOps pipeline -- 2.1 Implementation roadmap -- 2.2 The code repository: GitHub -- 2.3 The CI platform: CircleCI -- 2.4 The container repository: Docker Hub -- 2.5 The production infrastructure: Amazon Web Services -- 2.5.1 Three-tier architecture -- 2.5.2 Configuring access to AWS -- 2.5.3 Virtual Private Cloud -- 2.5.4 Creating the database tier -- 2.5.5 Creating the first two tiers with Elastic Beanstalk -- 2.5.6 Deploying the container onto your systems -- 2.6 A rapid security audit -- Summary -- Chapter 3: Security layer 1: protecting web applications -- 3.1 Securing and testing web apps -- 3.2 Website attacks and content security -- 3.2.1 Cross-site scripting and Content Security Policy -- 3.2.2 Cross-site request forgery -- 3.2.3 Clickjacking and IFrames protection -- 3.3 Methods for authenticating users -- 3.3.1 HTTP basic authentication -- 3.3.2 Password management -- 3.3.3 Identity providers -- 3.3.4 Sessions and cookie security -- 3.3.5 Testing authentication -- 3.4 Managing dependencies -- 3.4.1 Golang vendoring -- 3.4.2 Node.js package management -- 3.4.3 Python requirements -- Summary…”
    Libro electrónico
  8. 66128
    Publicado 2022
    Tabla de Contenidos: “…System login and data request -- 4.3. OnTimeEvidence analytics workspace -- 5. …”
    Libro electrónico
  9. 66129
    Publicado 1999
    Libro
  10. 66130
  11. 66131
    Publicado 2008
    CDROM
  12. 66132
    Publicado 1996
    Video
  13. 66133
    Publicado 2005
    CDROM
  14. 66134
    Publicado 1854
    Manuscrito
  15. 66135
    Publicado 2008
    CDROM
  16. 66136
    Publicado 2004
    Electrónico
  17. 66137
    por Roblyer, M.D
    Publicado 2003
    Libro
  18. 66138
    Publicado 2011
    Electrónico
  19. 66139
    Publicado 2016
    “…A practical guide for anyone involved with the creation and development of efficient service request catalogues for consumer and business services. …”
    Libro electrónico
  20. 66140
    Publicado 2022
    Libro