Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Teatro español 2,723
- Historia 2,297
- Història 930
- History 796
- Biblia 605
- Comedia española 595
- Filosofía 574
- Management 569
- Development 507
- Engineering & Applied Sciences 490
- Crítica e interpretación 479
- Economic conditions 474
- Congressos 442
- Óperas 442
- Politics and government 395
- Application software 390
- Computer networks 365
- Iglesia Católica 362
- Economic policy 331
- Business & Economics 328
- Computer Science 316
- Education 310
- Derecho 300
- Security measures 295
- Economics 290
- Research & information: general 290
- Zarzuelas 285
- Research 282
- Zarzuela española 282
- Technology: general issues 274
-
65081Publicado 2022“…L@S investigates large-scale, technology-mediated learning environments that typically have many active learners and few experts on hand to guide their progress or respond to individual needs. …”
Libro electrónico -
65082Publicado 2014“…Las personas ejercen su derecho poniendo actos jurídicos en el tiempo establecido y dentro de los límites de su competencia o potestad. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
65083Publicado 2015“…The emergent picture is that PTM sites on a single protein are not independent; modification of one residue often affects (positively or negatively) modification of other sites on the same protein. …”
Libro electrónico -
65084Publicado 2015“…Additionally, Charles is an active blog contributor at The New Stack, a site featuring news about and analysis of an ever-changing software development ecosystem. …”
-
65085Publicado 2007“…Many tough problems traditionally faced by application authors, such as state management in the presence of long-running activities (think weeks or months!), can be addressed systematically by adopting a workflow approach. …”
Libro electrónico -
65086Publicado 2008“…Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. …”
Libro electrónico -
65087por Hucaby, Dave“…The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. …”
Publicado 2004
Libro electrónico -
65088Publicado 2007“…You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. …”
Libro electrónico -
65089Publicado 2008“…Prepare for deployment with the right hardware, software, server roles, and storage architecture Upgrade, transition, or migrate from previous versions of Exchange–or from Novell or Lotus Install roles, Edge Transport Servers, Active/Passive mailboxes, and more Work with Exchange Management Console and Exchange Management Shell Discover best practices for managing Exchange disk storage Efficiently manage users, distribution groups, and mailboxes Create and use Administrative Roles, Address Lists, Offline Address Books, and Managed Content Settings Configure Client Access Servers, including Outlook Web Access, ActiveSync, and Outlook Anywhere Fight spam with Exchange Server 2007’s powerful antispam features Design and deploy disaster recovery plans you can trust Plan and implement the best high availability options for your environment Configure Unified Messaging to deliver voicemail and fax services Monitor and troubleshoot Exchange J. …”
Libro electrónico -
65090Publicado 2006“…Too many of us live our lives trying to shoehorn our many activities and responsibilities into too few time slots available. …”
Libro electrónico -
65091Publicado 2017“…Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. …”
Libro electrónico -
65092Publicado 2017“…Embracing the cloud - a Serverless architecture to solve problems at scale About This Book Learn to develop, manage, deploy, and monitor Azure functions in any language. …”
Libro electrónico -
65093Publicado 2020“…You'll start by learning how to create activities, manage leads, and develop your prospects and sales pipeline using opportunities and accounts, and then understand how you can enhance marketing activities using campaigns. …”
Libro electrónico -
65094Publicado 2020“…Cisco Certified Network Professional and Cisco Certified Internetwork Expert security core SCOR 350-701…”
-
65095Publicado 2020“…Later, you'll learn how to improve enterprise operational efficiency across value creation and value delivery activities, before discovering how to align product portfolio investments with corporate strategies. …”
Libro electrónico -
65096por Clark, Dan. author“…Beginning Power BI is a hands-on, activity-based guide that takes you through the process of analyzing your data using the tools that that encompass the core of Microsoft’s self-service BI offering. …”
Publicado 2020
Libro electrónico -
65097Publicado 2020“…Explore the potential of deep learning techniques in computer vision applications using the Python ecosystem, and build real-time systems for detecting human behavior Key Features Understand OpenCV and select the right algorithm to solve real-world problems Discover techniques for image and video processing Learn how to apply face recognition in videos to automatically extract key information Book Description Computer Vision (CV) has become an important aspect of AI technology. …”
Libro electrónico -
65098Publicado 2014“…Finally we finish up with some practical advice for practicing architects such as: how to blend architect activities with agile methodologies, and how to be an agent for change in an organization. …”
-
65099Publicado 2019“…Skill Level Beginner/Intermediate Learn How To Determine the best monitoring services for your situation Determine the difference between passive and active response Use CloudWatch Dashboard Navigate a Route 53 Failover and Route 53 health checks Use logs and metrics to determine what is happening to your system Use thresholds and alarms Use CloudTrail, GuardDuty, AWS Config, and AWS Systems Manager Who Should Take This Course AWS architects AWS SysOps professionals AWS security professionals Beginner to intermediate AWS users Course Requirements Basic understanding of the AWS ecosystem and infrastructure architecture Working knowledge of traditional monitoring techniques Experience with automation strategies, including scripting languages Lesson descriptions Lesson 1, “Foundations of Monitoring,” covers the elements of a 360-degree view of infrastructure and the differences between passive and active responses to alarms. …”
-
65100Publicado 2012“…Chapter 2 summarises the 27 processes and activities of the ISO 19770-1 framework for addressing the management of your software assets. …”
Libro electrónico