Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 985
- Application software 893
- Engineering and Technology 701
- Physical Sciences 701
- Management 514
- Kierkegaard, Søren 505
- Medicine 480
- Design 419
- Data processing 405
- Health Sciences 381
- History 374
- Computer networks 352
- Life Sciences 326
- Programming 324
- Computer graphics 318
- Web site development 297
- Artificial intelligence 290
- Computer programs 289
- Web sites 288
- Cloud computing 279
- Engineering 277
- Digital techniques 273
- Machine learning 273
- Engineering & Applied Sciences 270
- Research 266
- Photography 260
- Computer software 256
- Operating systems (Computers) 252
- Périodiques 239
- Information technology 223
-
24621por Institute of Medicine (U.S.).Tabla de Contenidos: “…USE OF VOLUNTEERS IN CHEMICAL AGENT RESEARCH (1975) -- KEY ELEMENTS OF THE NUREMBERG CODE OF 1947 -- G Public Hearing Announcement -- PUBLIC HEARING ANNOUNCEMENT -- COMMITTEE TO SURVEY THE HEALTH EFFECTS OF MUSTARD GAS AND LEWISITE -- VETERANS WHO APPEARED AT THE PUBLIC HEARING -- SUMMARY OF HEALTH PROBLEMS REPORTED BY VETERANS -- H Yale Law School -- I Risk Assessment Considerations for Sulfur Mustard -- SULFUR MUSTARD -- NITROGEN MUSTARD -- CANCER RISKS FROM SIMILAR COMPOUNDS -- RAPID SCREENING OF HAZARD (RASH) APPROACH -- RELEVANCE OF EXPERIMENTAL RESULTS TO HUMAN RISKS -- HUMAN EXPOSURES -- REFERENCES -- J Examination of the Effects of Certain Acute Environmental Exposures on Future Respiratory Health Consequences -- REVIEW OF AGENTS CAUSING ACUTE AND CHRONIC RESPIRATORY EFFECTS -- Chlorine -- Sulfur Dioxide -- Miscellaneous Irritants -- Cotton Dust -- Isocyanates -- Notes on Selected Inorganic Agents -- THE FUNDAMENTAL QUESTION -- Narrowly Structured -- Alternative Broadly Structured -- THE RESPIRATORY END POINTS -- Simple Chronic Bronchitis -- Chronic Obstructive Bronchitis and Emphysema -- Allergic Bronchoconstriction -- Inflammatory Bronchoconstriction -- Pharmacologic Bronchoconstriction -- HOST FACTORS -- CONCLUSIONS -- LITERATURE CITED -- List of Acronyms and Abbreviations -- Index…”
Publicado 1993
Libro electrónico -
24622por National Research Council (U.S.).Tabla de Contenidos: “…. -- Data Needs -- Inferences -- Existing Data Sources for Use in Quasi-Experimental Designs -- The Neonatal Screening Survey. -- The National Health Interview Survey -- Natural Experiments -- Identifying Natural Experiments -- Assumptions of Natural Experiments -- Data Needs of Natural Experiments -- Matching Without Randomization -- Prospective Nonrandomized Matching -- Retrospective Nonrandomized Matching -- Assumptions -- Data Needs -- Inferences -- Existing Data Sources for Matching Without Randomization -- Cohorts of Gay Men -- Cohorts of Intravenous Drug Users -- MODELING AND STATISTICAL ADJUSTMENTS FOR BIAS -- Analysis of Covariance -- Assumptions -- Data Needs -- Inferences -- Structural Equation and Selection Models -- Structural Equation Models -- Selection Models -- Selection Models and Natural Experiments -- Selection Modeling and Historical Controls -- Assumptions of Modeling -- Data Needs of Models -- Inferences from Modeling -- The Role of Models…”
Publicado 1991
Libro electrónico -
24623Publicado 1990Tabla de Contenidos: “…Subchronic Intoxication During Senescence -- Time-Course Recovery of mAChRs Following Down-Regulation in Brain of Senescent Rats -- CONCLUSION -- References -- Animal Models of Dementia: Their Relevance to Neurobehavioral Toxicology Testing -- ANIMAL MODELS OF DEMENTIA -- ENVIRONMENTAL CHALLENGES -- PHARMACOLOGICAL CHALLENGES -- MEASURING BEHAVIORAL EFFECTS: SPECIFIC PARADIGMS -- Inhibitory (Passive) Avoidance -- Active Avoidance Tasks -- Operant Conditioning -- Maze Learning -- Other Measures -- CONCLUSION -- ACKNOWLEDGMENTS -- References -- Bridging Experimental Animal and Human Behavioral Toxicology Studies -- THE SCOPE AND AGENDA OF BEHAVIORAL TOXICOLOGY -- STATE OF DEVELOPMENT -- BARRIERS TO ADVANCEMENT -- ACCELERATING THE PACE -- References -- Methods and Issues in Evaluating the Neurotoxic Effects of Organic Solvents -- ACUTE SOLVENT EFFECTS -- APPLICATION OF ANIMAL BEHAVIORAL METHODS -- Acute Effects of Single Exposures -- Acute Effects in the Context of Chronic Exposures -- Reinforcing Properties of Organic Solvents -- CHRONIC SOLVENT EFFECTS ON THE PERIPHERAL NERVOUS SYSTEM -- The Role of Animal Studies -- Neurobehavioral Methods for Screening Sensory and Motor Effects -- Problems in the Interpretation of Human Studies -- Animal Models of Cognitive Effects -- REFERENCES -- Animal Models: What Has Worked and What Is Needed -- References -- PART III CHEMICAL TIME BOMBS: ENVIRONMENTAL CAUSES OF NEURODEGENERATIVE DISEASES -- On the Identification and Measurement of Chemical Time Bombs: A Behavior Development Perspective -- METHODOLOGICAL CONSIDERATIONS -- APPROACHES TO DETECTING BEHAVIORALLY TOXIC SUBSTANCES -- A POTENTIAL TIME BOMB? …”
Libro electrónico -
24624por Midgley, Mary, 1919-2018Tabla de Contenidos: “…El problema de la validez privada. Dijo la sartén al cazo. Autoridad e independencia. ¿Pueden moralizar los subjetivistas?. …”
Publicado 2019
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
24625por Subirana Mirete, Judit“…Els objectius que dirigeixen l'avaluació neuropsicològica prenen una important rellevància en aquest punt ja que l'avaluació neuropsicològica i l'screening cognitiu són les principals eines que ajuden a conèixer i obtenir informació sobre els aspectes cognitius, conductuals i emocionals d'una persona. …”
Publicado 2016
Accés lliure
Tesis -
24626Publicado 2017Tabla de Contenidos: “…-- 8.2.2 Das Ethernet-Frame-Format -- 8.2.3 Ethernet mit physischer Bustopologie - 10Base5 und 10Base2 -- 8.2.4 Twisted Pair und die Hubs -- 8.3 Bridges: Die Evolution schreitet fort -- 8.3.1 Funktionsweise einer Bridge -- 8.3.2 Das Verhalten der Bridge bei unbekannten Zielen -- 8.4 Der Switch - der entscheidende Schritt in der Evolution des Ethernets -- 8.4.1 Grundsätzliche Arbeitsweise der Switches -- 8.4.2 So verarbeitet der Switch die Frames intern -- 8.4.3 Half Duplex und Full Duplex -- 8.4.4 Kollisionsdomänen versus Broadcast-Domänen -- 8.4.5 Multilayer-Switches -- 8.5 Ethernet-Standards und -Typen -- 8.5.1 Die gängigsten Ethernet-Standards -- 8.5.2 Glasfaser als Medium -- 8.5.3 Neue Standards -- 8.6 Zusammenfassung -- 8.7 Prüfungstipps -- 8.8 Wiederholungsfragen, Übungen und Aufgaben -- 8.9 Lösungen -- Kapitel 9: LAN-Design - Topologie moderner Netzwerke -- 9.1 Grundsätzliche Infrastruktur-Anforderungen in Campus-LANs -- 9.1.1 Redundanz und Hochverfügbarkeit -- 9.1.2 Kabelgebunden versus kabellos -- 9.2 Hierarchische LAN-Infrastrukturen -- 9.2.1 2-stufige Hierarchie (2-Tier-Design) -- 9.2.2 3-stufige Hierarchie (3-Tier-Design) -- 9.2.3 Strukturierte Verkabelung -- 9.3 Wireless LAN integrieren -- 9.3.1 WLAN-Basics -- 9.3.2 WLAN-Infrastrukturen mit WLAN-Controllern -- 9.4 Routing im Campus-LAN -- 9.4.1 Virtuelle LANs -- 9.4.2 LAN-Routing mit Multilayer-Switches -- 9.5 Zusammenfassung -- 9.6 Prüfungstipps -- 9.7 Wiederholungsfragen, Übungen und Aufgaben -- 9.8 Lösungen -- Kapitel 10: Grundkonfiguration eines Cisco-Switches -- 10.1 Das Szenario -- 10.2 Die Laborumgebung -- 10.3 Einführung in Cisco-Catalyst-Switches -- 10.3.1 Die Catalyst-Serien -- 10.3.2 Andere Serien von Cisco -- 10.3.3 Ein erster Blick auf den Catalyst-Switch…”
Libro electrónico -
24627Publicado 2019“…Working with case histories of tulipmania, microcredit, Wall Street reporting and the role of ‘screens’, Bubbles and Machines argues that rather than calling financial crises human-made or inevitable they should be recognized as technological…”
Libro electrónico -
24628Publicado 2016Tabla de Contenidos: “…Managing Human Failure -- 6 Human factors in risk management -- List of Abbreviations -- Human Reliability Analysis -- Qualitative Approaches -- Identification of Safety-Critical Tasks -- Safety-Critical Task Screening -- Task Analysis -- Workshop-based Analysis -- Quantitative Approaches -- Comparing Qualitative and Quantitative Approaches -- Synergies with Safety Engineering -- Hazard and Operability Studies -- Failure Modes and Effects Analysis -- Bow Ties -- Other Forms of Risk Management -- Summary: Human Factors in Risk Management -- Key Points -- References -- 7 Reducing human failure -- List of Abbreviations -- Overview of Human Error…”
Libro electrónico -
24629Publicado 2017Tabla de Contenidos: “…Event-driven architecture and messaging -- Tactical patterns -- Patterns to model the domain -- Entities -- Value objects -- Domain services -- Modules -- Aggregates -- Factories -- Repositories -- Emerging patterns -- Domain events -- Event sourcing -- Other patterns -- Summary -- References and further reading materials -- Chapter 6: Enterprise Architecture Platforms and Tools -- Overview of enterprise architecture frameworks -- Getting started with TOGAF -- Architecture development method (ADM) -- Deliverables, artifacts, and building blocks -- Enterprise continuum -- Architecture repository -- Advantages of using TOGAF -- Limitations of TOGAF -- Zachman framework for enterprise architecture -- Advantages -- Restrictions -- Guidelines for choosing EAF -- Enterprise architecture platforms and tools -- Enterprise Architect from Sparx Systems -- Dragon1 -- ABACUS from avolution software -- Architecture of ABACUS -- Summary -- References -- Chapter 7: Service-Oriented Architecture (SOA) -- Web services and SOA -- Introduction to SOA -- Life cycle of SOA -- Primary characteristics of SOA -- Service interconnectivity with well-defined interfaces -- Standard interfaces and Service level agreements -- Event-driven and messaging -- Flexible -- Evolution -- Principles of SOA -- Standardized service contract -- Service interoperability -- Service abstraction -- Service autonomy -- Service composability -- Service discoverability -- Service loose coupling -- Service reusability -- Service statelessness -- SOA design patterns -- Service messaging -- Message screening -- Agnostic services -- Atomic service transaction -- Authentication broker -- Message origin authentication -- Service façade -- Multiple service contract -- Service callback -- Event-driven messaging -- Service refactoring -- Metadata centralization -- Principles and patterns cross reference…”
Libro electrónico -
24630Publicado 2016Tabla de Contenidos: “…Composing figures -- Arrow -- Star -- Assets mock-up -- Substituting the temporary assets -- Using labels -- Gizmos -- Getting basic core concepts into Unity -- Quick navigation -- Revisiting the prototype -- Testing with the closest people -- Testing with external people -- How to test -- Revisiting your prototype and iterating -- Summary -- Chapter 6: Breathing Life into Your First Creation - Creating and Importing Assets for Your Application -- Designing the application -- Creating the game elements -- Adobe Illustrator -- Vector graphics -- An introduction to Illustrator -- Creating badges in Illustrator -- Getting all rounded -- Using the Shape tool -- Using the effect -- Showing the best of you with badges -- Aiming above the bar -- Putting it all together with sprite sheets -- Importing and setting our assets in Unity -- Importing assets -- Import Settings -- The Sprite Editor -- Testing our settings -- Testing the packing tag -- Testing the dimensions of the sprites -- Summary -- Chapter 7: Get Your Motor Running -- Designing our application -- Getting started -- Creating the application interface -- The lateral menu -- The interface -- Opening and closing the menu -- Adding items to the menu -- The Home page -- The Tasks page -- Navigating through the different screens -- Defining tasks -- Object-oriented -- The Task class -- Dealing with tasks -- A prefab as Task panel -- The Task manager -- Allowing the user to create new Tasks -- Create Task button -- Delete task button -- Adding the icon -- Inserting the title -- Inserting the Due date -- Selecting the Task priority -- Setting up the Tasks page -- Summary -- Chapter 8: Break, Destroy, and Rebuild - the Art of Playtesting and Iteration -- Playtesting -- Methods of playtesting -- Going solo -- Group testing -- Open or controlled -- Getting the info - have a plan!…”
Libro electrónico -
24631Publicado 2016Tabla de Contenidos: “…Allowing roles assignments and overrides -- Assigning of default roles -- Moodle role assignment - best practice -- Summary -- Chapter 7: Moodle Look and Feel -- An overview of the look and feel -- Site versus Dashboard -- Customizing your front page -- The front page settings -- Arranging front page blocks -- Logging in from a different website -- Other front page items -- Front page users -- Front page filters -- Front page reports -- The front page backup and restore -- Front page questions -- The default Dashboard and Profile pages -- Customizing navigation -- Replacing the front page -- Moodle themes -- Fixed width versus fluid versus responsive themes -- Selecting a Moodle theme -- Theme types -- Theme settings -- Customizing themes -- Theme customization basics -- The Moodle editor -- Configuring the Atto editor -- Extending the functionality of tables -- Supporting mathematical equations -- Adding some awesomeness -- Accessibility -- Guaranteeing accessibility through Moodle themes -- Accessibility support through the Moodle editor -- Support for a screen reader -- Summary -- Chapter 8: Moodle Plugins -- Plugins - an overview -- Module plugins -- Activity modules -- Configuring blocks -- Configuring filters -- Moodle repositories -- Internal repository plugins -- External repository plugins -- Data storage repositories -- Application repositories -- Moodle portfolios -- Miscellaneous plugins -- Course formats -- Question types and behaviors -- Availability restrictions -- Licences -- Plagiarism prevention -- Installing third-party plugins -- Third-party software - an overview -- Good add-ons and bad add-ons -- Popular add-ons -- Organizational decisions around plugins -- Installing third-party add-ons -- Installing the Collapsed Topics format plugin via the web interface -- Installing the Configurable Reports plugin manually…”
Libro electrónico -
24632Publicado 2023Tabla de Contenidos: “…4.3.1 Prozesse beim Aufruf einer Webseite -- 4.3.2 Metriken zur Messung der Ladegeschwindigkeit -- 4.3.3 Vorgehen zur Analyse der Ladezeit -- 4.3.4 Time to First Byte -- 4.4 Schritte zur Optimierung der Ladegeschwindigkeit -- 4.4.1 Anzahl der Requests -- 4.4.2 Anzahl der Webfonts reduzieren -- 4.4.3 PageSpeed-Experimente in Elementor -- 4.4.4 Bildgrößen reduzieren -- 4.4.5 Content Delivery Network -- 4.4.6 Dateikomprimierung auf dem Server aktivieren -- 4.4.7 Minifizieren und Kombinieren von HTML-, CSS- und JavaScript-Dateien -- 4.4.8 Browser- und Server-Caching -- 4.4.9 Lazy Loading -- 4.4.10 Kritischer Rendering-Pfad -- 4.4.11 Preconnect - Zu Dritt-Domains vorverbinden -- 4.4.12 Preload - Wichtige Dateien im Voraus laden -- 4.4.13 Optimierung der Datenbank -- 4.4.14 Messdaten -- 4.4.15 Funktionen einzelner PageSpeed-Plugins -- 4.5 Checkliste -- Kapitel 5: Linkstrukturen -- 5.1 Interne Verlinkung -- 5.2 Externe Verlinkung -- 5.3 Linkbuilding in der Praxis -- 5.3.1 Linkwürdigen Content erstellen -- 5.3.2 Wettbewerber-Backlink-Screening -- 5.3.3 Themenrelevante Foren -- 5.3.4 Themenrelevante Blogs -- 5.3.5 Webverzeichnisse und Blogverzeichnisse -- 5.3.6 Linkgeber in eigenem Netzwerk kontaktieren -- 5.3.7 Social-Media-Umfragen -- 5.4 Checkliste -- Kapitel 6: Conversion-Optimierung -- 6.1 Grundlagen der Conversion-Optimierung -- 6.2 Optimierung von Landingpage und Prozess -- 6.3 Gezielte Optimierungen an der Seite -- 6.3.1 Optimierung der Produktdarstellung -- 6.3.2 Optimierung der Usability -- 6.4 Erfolgsmessung bei der Conversion-Optimierung -- 6.5 Checkliste -- Kapitel 7: Erfolgskontrolle -- 7.1 Analyse mit der Search Console -- 7.2 Monitoring mit Google Analytics 4 -- 7.3 Amazon PartnerNet-Berichte -- 7.4 Checkliste -- Teil II: Mit Affiliate-Marketing Websites monetarisieren - Schritt für Schritt…”
Libro electrónico -
24633Publicado 2023Tabla de Contenidos: “…General Data Protection Regulation -- EU-US Safe Harbor -- US Privacy Act of 1974 -- International Cooperation -- Import/Export Restrictions -- Trans-border Data Flow -- Important Laws and Regulations -- US Computer Fraud and Abuse Act -- HIPAA -- United States Breach Notification Laws -- Ethics -- The (ISC)2 Code of Ethics -- The (ISC)2 Code of Ethics Canons in Detail -- Computer Ethics Institute -- IABs Ethics and the Internet -- Information Security Governance -- Security Policy and Related Documents -- Policy -- Components of Program Policy -- Policy Types -- Procedures -- Standards -- Guidelines -- Baselines -- Personnel Security -- Candidate Screening and Hiring -- Onboarding -- Employee Termination -- Security Awareness and Training -- Gamification -- Security Champions -- Access Control Defensive Categories and Types -- Preventive -- Detective -- Corrective -- Recovery -- Deterrent -- Compensating -- Comparing Access Controls -- Risk Analysis -- Assets -- Threats and Vulnerabilities -- Risk=Threat x Vulnerability -- Impact -- Risk Analysis Matrix -- Calculating Annualized Loss Expectancy -- Asset Value -- Exposure Factor -- Single Loss Expectancy -- Annual Rate of Occurrence -- Annualized Loss Expectancy -- Total Cost of Ownership -- Return on Investment -- Budget and Metrics -- Risk Response -- Accept the Risk -- Risk Acceptance Criteria -- Mitigate the Risk -- Transfer the Risk -- Risk Avoidance -- Quantitative and Qualitative Risk Analysis -- The Risk Management Process -- Risk Maturity Modeling -- Security and Third Parties -- Service Provider Contractual Security -- Minimum Security Requirements -- Service Level Agreements and Service Level Requirements -- Attestation -- Right to Penetration Test/Right to Audit -- Supply Chain Risk Management -- Risks Associated With Hardware, Software, and Services -- Vendor Governance -- Acquisitions…”
Libro electrónico -
24634por Lee, ThomasTabla de Contenidos: “…. -- Implementing FSRM Filestore Screening -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: Managing Printing -- Introduction -- The systems used in the chapter -- Installing and Sharing Printers -- Getting ready -- How to do it... -- How it works... -- There's more... -- Publishing a Printer to Active Directory -- Getting ready -- How to do it... -- How it works... -- There's more... -- Changing the Spooler Directory -- Getting ready -- How to do it... -- How it works... -- There's more... -- Changing Printer Drivers -- Getting ready -- How to do it... -- How it works... -- Printing a Test Page -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing Printer Security -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a Printer Pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 10: Exploring Windows Containers -- Introduction -- The systems used in the chapter -- Configuring a container host -- Getting ready -- How to do it... -- How it works... -- There's more... -- Deploying sample containers -- Getting ready -- How to do it... -- How it works... -- There's more... -- Deploying IIS in a container -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using a Dockerfile to create a custom container -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 11: Managing Hyper-V -- Introduction -- The systems used in the chapter -- Installing Hyper-V inside Windows Server -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating a Hyper-V VM -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using PowerShell Direct -- Getting ready…”
Publicado 2023
Libro electrónico -
24635Publicado 2022Tabla de Contenidos: “…Understand, Adhere to, and Promote Professional Ethics -- (ISC)2 Code of Professional Ethics -- Organizational code of ethics -- Understand and Apply Security Concepts -- Confidentiality -- Integrity -- Availability -- Authenticity -- Nonrepudiation -- Evaluate and Apply Security Governance Principles -- Alignment of security function to business strategy, goals, mission, and objectives -- Organizational processes -- Organizational roles and responsibilities -- Security control frameworks -- Due care and due diligence -- Determine Compliance and Other Requirements -- Contractual, legal, industry standards, and regulatory requirements -- Privacy requirements -- Understand Legal and Regulatory Issues That Pertain to Information Security -- Cybercrimes and data breaches -- Licensing and intellectual property requirements -- Import/export controls -- Transborder data flow -- Privacy -- Understand Requirements for Investigation Types -- Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines -- Policies -- Standards (and baselines) -- Procedures -- Guidelines -- Identify, Analyze, and Prioritize Business Continuity (BC) Requirements -- Business impact analysis -- Develop and document the scope and the plan -- Contribute to and Enforce Personnel Security Policies and Procedures -- Candidate screening and hiring -- Employment agreements and policies -- Onboarding, transfers, and termination processes -- Vendor, consultant, and contractor agreements and controls -- Compliance policy requirements -- Privacy policy requirements -- Understand and Apply Risk Management Concepts -- Identify threats and vulnerabilities -- Risk assessment/analysis -- Risk appetite and risk tolerance -- Risk treatment -- Countermeasure selection and implementation -- Applicable types of controls -- Control assessments (security and privacy)…”
Libro electrónico -
24636Publicado 2013Tabla de Contenidos: “…Inverse Square Law and Light -- Color Mixing and Temperature -- Ambient Light -- Image Capture -- Camera and Focus -- Video Signals -- Video Signal Decoding -- Digital Signals -- Producing an Image -- Display and Projection Technology -- Flat-Panel Display Technologies -- Positioning a Display Within a Room -- Aspect Ratio -- The Projected Image -- Projector Optics -- Front Projection and Rear Projection -- Screens -- Perceived Quality -- Viewer Placement -- Throw Distance -- Keystone Error and Correction -- Digital Display Alignment -- Projection System Brightness -- Brightness and Contrast Adjustments -- Chapter Review -- Review Questions -- Answers -- Chapter 6. …”
Libro electrónico -
24637Publicado 2017Tabla de Contenidos: “…Approach for automatic security updates installation -- Developing a process to update servers regularly -- Knowledge base -- Challenges on a larger scale -- Partitioning and LUKS -- Partitioning schemes -- A separate partition for /boot -- A separate partition for /tmp -- A separate partition for /home -- Conclusion -- LUKS -- Introduction to LUKS -- Solution -- Conclusion -- Access control list -- Use case -- Introduction to Access Control List -- Set ACL -- Show ACL -- Special permissions in Linux -- SUID -- Use case for SUID -- Understanding the permission associated with ping -- Setting a SUID bit for files -- Removing the SUID bit for files -- SETGID -- Associating the SGID for files -- SELinux -- Introduction to SELinux -- Permission sets in SELinux -- SELinux modes -- Confinement of Linux users to SELinux users -- Process confinement -- Conclusion -- Hardening system services and applications -- Hardening services -- Guide for hardening SSH -- Enable multi-factor authentication -- Associated configuration -- Changing the SSH default port -- Associate configuration -- Disabling the root login -- Associated configuration -- Conclusion -- Pluggable authentication modules -- Team Screen application -- File Sharing Application -- Understanding PAM -- The architecture of PAM -- The PAM configuration -- The PAM command structure -- Implementation scenario -- Forcing strong passwords -- Log all user commands -- Conclusion -- System auditing with auditd -- Introduction to auditd -- Use case 1 - tracking activity of important files -- Use case -- Solution -- First field -- Use case 2 - monitoring system calls -- Introduction to system calls -- Use case -- Solution -- Conclusion -- Conclusion -- Central identity server -- Use Case 1 -- Use case 2 -- The architecture of IPA -- Client-server architecture -- User access management…”
Libro electrónico -
24638por Charlebois-Laprade, Nikolas. authorTabla de Contenidos: “…-- SharePoint Foundation versus SharePoint Server -- What You Will Learn in This Book -- Summary -- Chapter 2: What's New in PowerShell for SharePoint 2013 -- SharePoint 2013 Apps -- Service Applications -- User License Enforcements -- PowerShell Web Access -- Backups -- Bing Maps -- Search -- Tenants -- Office 365 -- Site Upgrade -- Summary -- Chapter 3: Configuring Your Environment for PowerShell -- Getting Started with the Integrated Scripting Environment (ISE) -- Windows Server 2008 R2 -- Windows Server 2012 -- Windows PowerShell ISE Essential Features -- IntelliSense -- Snippets -- Commands Explorer -- Execution Policy -- PowerShell Web Access (PWA) -- Requirements -- Installing PWA -- Configuring the Gateway -- Summary -- Chapter 4: PowerShell Basics -- Terminology -- Session -- Cmdlets -- Profile -- Snap-In -- Module -- PowerShell Operators and Common Operations -- Printing Values on Screen -- Console Colors -- Variables -- Comments -- Casting -- Conditional Logic -- Decisions -- Comparison -- Logical Operators -- Function -- Loops -- Piping -- Instance Referrer -- Error Handling -- Enumerations -- Arrays -- Environment Variables -- WhatIf Rollback -- Graphical User Interface -- Demo Project-Selective Deletion of Files in a Folder -- Customization -- My Profile -- Custom Modules -- Leaping Ahead -- Desired State Configuration -- Dynamic Method and Property Names -- Summary -- Chapter 5: Installing & -- Deploying SharePoint with PowerShell -- Requirements -- Hardware Requirements -- Software Requirements -- Roles and Features -- .NET Framework 3.5 -- Domain Controller -- Users and Groups -- Application Server Role…”
Publicado 2014
Libro electrónico -
24639Publicado 2021Tabla de Contenidos: “…NICOLASIN RODENGO SAIANO -- 4 THE MORTARED-RUBBLE-FRAME VAULTOF THE ANTI-REFECTORY -- 5 THE LEGACY OF FRAME VAULTS -- ACKNOWLEDGEMENTS -- REFERENCES -- Building a castle in Japan: Analysis of the masonry construction process through the folding screen Chikuj -- 1 INTRODUCTION…”
Libro electrónico -
24640Publicado 2022Tabla de Contenidos: “…-- Part I Security and Risk Management -- Chapter 1 Cybersecurity Governance -- Fundamental Cybersecurity Concepts and Terms -- Confidentiality -- Integrity -- Availability -- Authenticity -- Nonrepudiation -- Balanced Security -- Other Security Terms -- Security Governance Principles -- Aligning Security to Business Strategy -- Organizational Processes -- Organizational Roles and Responsibilities -- Security Policies, Standards, Procedures, and Guidelines -- Security Policy -- Standards -- Baselines -- Guidelines -- Procedures -- Implementation -- Personnel Security -- Candidate Screening and Hiring -- Employment Agreements and Policies -- Onboarding, Transfers, and Termination Processes -- Vendors, Consultants, and Contractors -- Compliance Policies -- Privacy Policies -- Security Awareness, Education, and Training Programs -- Degree or Certification? …”
Libro electrónico