Mostrando 65,081 - 65,100 Resultados de 71,908 Para Buscar 'SCTV~', tiempo de consulta: 0.92s Limitar resultados
  1. 65081
    Publicado 2022
    “…L@S investigates large-scale, technology-mediated learning environments that typically have many active learners and few experts on hand to guide their progress or respond to individual needs. …”
    Libro electrónico
  2. 65082
    Publicado 2014
    “…Las personas ejercen su derecho poniendo actos jurídicos en el tiempo establecido y dentro de los límites de su competencia o potestad. …”
    Libro
  3. 65083
    Publicado 2015
    “…The emergent picture is that PTM sites on a single protein are not independent; modification of one residue often affects (positively or negatively) modification of other sites on the same protein. …”
    Libro electrónico
  4. 65084
    Publicado 2015
    “…Additionally, Charles is an active blog contributor at The New Stack, a site featuring news about and analysis of an ever-changing software development ecosystem. …”
    Video
  5. 65085
    Publicado 2007
    “…Many tough problems traditionally faced by application authors, such as state management in the presence of long-running activities (think weeks or months!), can be addressed systematically by adopting a workflow approach. …”
    Libro electrónico
  6. 65086
    Publicado 2008
    “…Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. …”
    Libro electrónico
  7. 65087
    por Hucaby, Dave
    Publicado 2004
    “…The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. …”
    Libro electrónico
  8. 65088
    Publicado 2007
    “…You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. …”
    Libro electrónico
  9. 65089
    Publicado 2008
    “…Prepare for deployment with the right hardware, software, server roles, and storage architecture Upgrade, transition, or migrate from previous versions of Exchange–or from Novell or Lotus Install roles, Edge Transport Servers, Active/Passive mailboxes, and more Work with Exchange Management Console and Exchange Management Shell Discover best practices for managing Exchange disk storage Efficiently manage users, distribution groups, and mailboxes Create and use Administrative Roles, Address Lists, Offline Address Books, and Managed Content Settings Configure Client Access Servers, including Outlook Web Access, ActiveSync, and Outlook Anywhere Fight spam with Exchange Server 2007’s powerful antispam features Design and deploy disaster recovery plans you can trust Plan and implement the best high availability options for your environment Configure Unified Messaging to deliver voicemail and fax services Monitor and troubleshoot Exchange J. …”
    Libro electrónico
  10. 65090
    Publicado 2006
    “…Too many of us live our lives trying to shoehorn our many activities and responsibilities into too few time slots available. …”
    Libro electrónico
  11. 65091
    Publicado 2017
    “…Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. …”
    Libro electrónico
  12. 65092
    Publicado 2017
    “…Embracing the cloud - a Serverless architecture to solve problems at scale About This Book Learn to develop, manage, deploy, and monitor Azure functions in any language. …”
    Libro electrónico
  13. 65093
    Publicado 2020
    “…You'll start by learning how to create activities, manage leads, and develop your prospects and sales pipeline using opportunities and accounts, and then understand how you can enhance marketing activities using campaigns. …”
    Libro electrónico
  14. 65094
    Publicado 2020
    “…Cisco Certified Network Professional and Cisco Certified Internetwork Expert security core SCOR 350-701…”
    Video
  15. 65095
    Publicado 2020
    “…Later, you'll learn how to improve enterprise operational efficiency across value creation and value delivery activities, before discovering how to align product portfolio investments with corporate strategies. …”
    Libro electrónico
  16. 65096
    por Clark, Dan. author
    Publicado 2020
    “…Beginning Power BI is a hands-on, activity-based guide that takes you through the process of analyzing your data using the tools that that encompass the core of Microsoft’s self-service BI offering. …”
    Libro electrónico
  17. 65097
    Publicado 2020
    “…Explore the potential of deep learning techniques in computer vision applications using the Python ecosystem, and build real-time systems for detecting human behavior Key Features Understand OpenCV and select the right algorithm to solve real-world problems Discover techniques for image and video processing Learn how to apply face recognition in videos to automatically extract key information Book Description Computer Vision (CV) has become an important aspect of AI technology. …”
    Libro electrónico
  18. 65098
    Publicado 2014
    “…Finally we finish up with some practical advice for practicing architects such as: how to blend architect activities with agile methodologies, and how to be an agent for change in an organization. …”
    Video
  19. 65099
    Publicado 2019
    “…Skill Level Beginner/Intermediate Learn How To Determine the best monitoring services for your situation Determine the difference between passive and active response Use CloudWatch Dashboard Navigate a Route 53 Failover and Route 53 health checks Use logs and metrics to determine what is happening to your system Use thresholds and alarms Use CloudTrail, GuardDuty, AWS Config, and AWS Systems Manager Who Should Take This Course AWS architects AWS SysOps professionals AWS security professionals Beginner to intermediate AWS users Course Requirements Basic understanding of the AWS ecosystem and infrastructure architecture Working knowledge of traditional monitoring techniques Experience with automation strategies, including scripting languages Lesson descriptions Lesson 1, “Foundations of Monitoring,” covers the elements of a 360-degree view of infrastructure and the differences between passive and active responses to alarms. …”
    Video
  20. 65100
    Publicado 2012
    “…Chapter 2 summarises the 27 processes and activities of the ISO 19770-1 framework for addressing the management of your software assets. …”
    Libro electrónico