Mostrando 24,621 - 24,640 Resultados de 27,198 Para Buscar 'Skreen~', tiempo de consulta: 1.23s Limitar resultados
  1. 24621
    por Institute of Medicine (U.S.).
    Publicado 1993
    Tabla de Contenidos: “…USE OF VOLUNTEERS IN CHEMICAL AGENT RESEARCH (1975) -- KEY ELEMENTS OF THE NUREMBERG CODE OF 1947 -- G Public Hearing Announcement -- PUBLIC HEARING ANNOUNCEMENT -- COMMITTEE TO SURVEY THE HEALTH EFFECTS OF MUSTARD GAS AND LEWISITE -- VETERANS WHO APPEARED AT THE PUBLIC HEARING -- SUMMARY OF HEALTH PROBLEMS REPORTED BY VETERANS -- H Yale Law School -- I Risk Assessment Considerations for Sulfur Mustard -- SULFUR MUSTARD -- NITROGEN MUSTARD -- CANCER RISKS FROM SIMILAR COMPOUNDS -- RAPID SCREENING OF HAZARD (RASH) APPROACH -- RELEVANCE OF EXPERIMENTAL RESULTS TO HUMAN RISKS -- HUMAN EXPOSURES -- REFERENCES -- J Examination of the Effects of Certain Acute Environmental Exposures on Future Respiratory Health Consequences -- REVIEW OF AGENTS CAUSING ACUTE AND CHRONIC RESPIRATORY EFFECTS -- Chlorine -- Sulfur Dioxide -- Miscellaneous Irritants -- Cotton Dust -- Isocyanates -- Notes on Selected Inorganic Agents -- THE FUNDAMENTAL QUESTION -- Narrowly Structured -- Alternative Broadly Structured -- THE RESPIRATORY END POINTS -- Simple Chronic Bronchitis -- Chronic Obstructive Bronchitis and Emphysema -- Allergic Bronchoconstriction -- Inflammatory Bronchoconstriction -- Pharmacologic Bronchoconstriction -- HOST FACTORS -- CONCLUSIONS -- LITERATURE CITED -- List of Acronyms and Abbreviations -- Index…”
    Libro electrónico
  2. 24622
    Tabla de Contenidos: “…. -- Data Needs -- Inferences -- Existing Data Sources for Use in Quasi-Experimental Designs -- The Neonatal Screening Survey. -- The National Health Interview Survey -- Natural Experiments -- Identifying Natural Experiments -- Assumptions of Natural Experiments -- Data Needs of Natural Experiments -- Matching Without Randomization -- Prospective Nonrandomized Matching -- Retrospective Nonrandomized Matching -- Assumptions -- Data Needs -- Inferences -- Existing Data Sources for Matching Without Randomization -- Cohorts of Gay Men -- Cohorts of Intravenous Drug Users -- MODELING AND STATISTICAL ADJUSTMENTS FOR BIAS -- Analysis of Covariance -- Assumptions -- Data Needs -- Inferences -- Structural Equation and Selection Models -- Structural Equation Models -- Selection Models -- Selection Models and Natural Experiments -- Selection Modeling and Historical Controls -- Assumptions of Modeling -- Data Needs of Models -- Inferences from Modeling -- The Role of Models…”
    Libro electrónico
  3. 24623
    Publicado 1990
    Tabla de Contenidos: “…Subchronic Intoxication During Senescence -- Time-Course Recovery of mAChRs Following Down-Regulation in Brain of Senescent Rats -- CONCLUSION -- References -- Animal Models of Dementia: Their Relevance to Neurobehavioral Toxicology Testing -- ANIMAL MODELS OF DEMENTIA -- ENVIRONMENTAL CHALLENGES -- PHARMACOLOGICAL CHALLENGES -- MEASURING BEHAVIORAL EFFECTS: SPECIFIC PARADIGMS -- Inhibitory (Passive) Avoidance -- Active Avoidance Tasks -- Operant Conditioning -- Maze Learning -- Other Measures -- CONCLUSION -- ACKNOWLEDGMENTS -- References -- Bridging Experimental Animal and Human Behavioral Toxicology Studies -- THE SCOPE AND AGENDA OF BEHAVIORAL TOXICOLOGY -- STATE OF DEVELOPMENT -- BARRIERS TO ADVANCEMENT -- ACCELERATING THE PACE -- References -- Methods and Issues in Evaluating the Neurotoxic Effects of Organic Solvents -- ACUTE SOLVENT EFFECTS -- APPLICATION OF ANIMAL BEHAVIORAL METHODS -- Acute Effects of Single Exposures -- Acute Effects in the Context of Chronic Exposures -- Reinforcing Properties of Organic Solvents -- CHRONIC SOLVENT EFFECTS ON THE PERIPHERAL NERVOUS SYSTEM -- The Role of Animal Studies -- Neurobehavioral Methods for Screening Sensory and Motor Effects -- Problems in the Interpretation of Human Studies -- Animal Models of Cognitive Effects -- REFERENCES -- Animal Models: What Has Worked and What Is Needed -- References -- PART III CHEMICAL TIME BOMBS: ENVIRONMENTAL CAUSES OF NEURODEGENERATIVE DISEASES -- On the Identification and Measurement of Chemical Time Bombs: A Behavior Development Perspective -- METHODOLOGICAL CONSIDERATIONS -- APPROACHES TO DETECTING BEHAVIORALLY TOXIC SUBSTANCES -- A POTENTIAL TIME BOMB? …”
    Libro electrónico
  4. 24624
    por Midgley, Mary, 1919-2018
    Publicado 2019
    Tabla de Contenidos: “…El problema de la validez privada. Dijo la sartén al cazo. Autoridad e independencia. ¿Pueden moralizar los subjetivistas?. …”
    Libro
  5. 24625
    por Subirana Mirete, Judit
    Publicado 2016
    “…Els objectius que dirigeixen l'avaluació neuropsicològica prenen una important rellevància en aquest punt ja que l'avaluació neuropsicològica i l'screening cognitiu són les principals eines que ajuden a conèixer i obtenir informació sobre els aspectes cognitius, conductuals i emocionals d'una persona. …”
    Accés lliure
    Tesis
  6. 24626
    Publicado 2017
    Tabla de Contenidos: “…-- 8.2.2 Das Ethernet-Frame-Format -- 8.2.3 Ethernet mit physischer Bustopologie - 10Base5 und 10Base2 -- 8.2.4 Twisted Pair und die Hubs -- 8.3 Bridges: Die Evolution schreitet fort -- 8.3.1 Funktionsweise einer Bridge -- 8.3.2 Das Verhalten der Bridge bei unbekannten Zielen -- 8.4 Der Switch - der entscheidende Schritt in der Evolution des Ethernets -- 8.4.1 Grundsätzliche Arbeitsweise der Switches -- 8.4.2 So verarbeitet der Switch die Frames intern -- 8.4.3 Half Duplex und Full Duplex -- 8.4.4 Kollisionsdomänen versus Broadcast-Domänen -- 8.4.5 Multilayer-Switches -- 8.5 Ethernet-Standards und -Typen -- 8.5.1 Die gängigsten Ethernet-Standards -- 8.5.2 Glasfaser als Medium -- 8.5.3 Neue Standards -- 8.6 Zusammenfassung -- 8.7 Prüfungstipps -- 8.8 Wiederholungsfragen, Übungen und Aufgaben -- 8.9 Lösungen -- Kapitel 9: LAN-Design - Topologie moderner Netzwerke -- 9.1 Grundsätzliche Infrastruktur-Anforderungen in Campus-LANs -- 9.1.1 Redundanz und Hochverfügbarkeit -- 9.1.2 Kabelgebunden versus kabellos -- 9.2 Hierarchische LAN-Infrastrukturen -- 9.2.1 2-stufige Hierarchie (2-Tier-Design) -- 9.2.2 3-stufige Hierarchie (3-Tier-Design) -- 9.2.3 Strukturierte Verkabelung -- 9.3 Wireless LAN integrieren -- 9.3.1 WLAN-Basics -- 9.3.2 WLAN-Infrastrukturen mit WLAN-Controllern -- 9.4 Routing im Campus-LAN -- 9.4.1 Virtuelle LANs -- 9.4.2 LAN-Routing mit Multilayer-Switches -- 9.5 Zusammenfassung -- 9.6 Prüfungstipps -- 9.7 Wiederholungsfragen, Übungen und Aufgaben -- 9.8 Lösungen -- Kapitel 10: Grundkonfiguration eines Cisco-Switches -- 10.1 Das Szenario -- 10.2 Die Laborumgebung -- 10.3 Einführung in Cisco-Catalyst-Switches -- 10.3.1 Die Catalyst-Serien -- 10.3.2 Andere Serien von Cisco -- 10.3.3 Ein erster Blick auf den Catalyst-Switch…”
    Libro electrónico
  7. 24627
    Publicado 2019
    “…Working with case histories of tulipmania, microcredit, Wall Street reporting and the role of ‘screens’, Bubbles and Machines argues that rather than calling financial crises human-made or inevitable they should be recognized as technological…”
    Libro electrónico
  8. 24628
    Publicado 2016
    Tabla de Contenidos: “…Managing Human Failure -- 6 Human factors in risk management -- List of Abbreviations -- Human Reliability Analysis -- Qualitative Approaches -- Identification of Safety-Critical Tasks -- Safety-Critical Task Screening -- Task Analysis -- Workshop-based Analysis -- Quantitative Approaches -- Comparing Qualitative and Quantitative Approaches -- Synergies with Safety Engineering -- Hazard and Operability Studies -- Failure Modes and Effects Analysis -- Bow Ties -- Other Forms of Risk Management -- Summary: Human Factors in Risk Management -- Key Points -- References -- 7 Reducing human failure -- List of Abbreviations -- Overview of Human Error…”
    Libro electrónico
  9. 24629
    Publicado 2017
    Tabla de Contenidos: “…Event-driven architecture and messaging -- Tactical patterns -- Patterns to model the domain -- Entities -- Value objects -- Domain services -- Modules -- Aggregates -- Factories -- Repositories -- Emerging patterns -- Domain events -- Event sourcing -- Other patterns -- Summary -- References and further reading materials -- Chapter 6: Enterprise Architecture Platforms and Tools -- Overview of enterprise architecture frameworks -- Getting started with TOGAF -- Architecture development method (ADM) -- Deliverables, artifacts, and building blocks -- Enterprise continuum -- Architecture repository -- Advantages of using TOGAF -- Limitations of TOGAF -- Zachman framework for enterprise architecture -- Advantages -- Restrictions -- Guidelines for choosing EAF -- Enterprise architecture platforms and tools -- Enterprise Architect from Sparx Systems -- Dragon1 -- ABACUS from avolution software -- Architecture of ABACUS -- Summary -- References -- Chapter 7: Service-Oriented Architecture (SOA) -- Web services and SOA -- Introduction to SOA -- Life cycle of SOA -- Primary characteristics of SOA -- Service interconnectivity with well-defined interfaces -- Standard interfaces and Service level agreements -- Event-driven and messaging -- Flexible -- Evolution -- Principles of SOA -- Standardized service contract -- Service interoperability -- Service abstraction -- Service autonomy -- Service composability -- Service discoverability -- Service loose coupling -- Service reusability -- Service statelessness -- SOA design patterns -- Service messaging -- Message screening -- Agnostic services -- Atomic service transaction -- Authentication broker -- Message origin authentication -- Service façade -- Multiple service contract -- Service callback -- Event-driven messaging -- Service refactoring -- Metadata centralization -- Principles and patterns cross reference…”
    Libro electrónico
  10. 24630
    Publicado 2016
    Tabla de Contenidos: “…Composing figures -- Arrow -- Star -- Assets mock-up -- Substituting the temporary assets -- Using labels -- Gizmos -- Getting basic core concepts into Unity -- Quick navigation -- Revisiting the prototype -- Testing with the closest people -- Testing with external people -- How to test -- Revisiting your prototype and iterating -- Summary -- Chapter 6: Breathing Life into Your First Creation - Creating and Importing Assets for Your Application -- Designing the application -- Creating the game elements -- Adobe Illustrator -- Vector graphics -- An introduction to Illustrator -- Creating badges in Illustrator -- Getting all rounded -- Using the Shape tool -- Using the effect -- Showing the best of you with badges -- Aiming above the bar -- Putting it all together with sprite sheets -- Importing and setting our assets in Unity -- Importing assets -- Import Settings -- The Sprite Editor -- Testing our settings -- Testing the packing tag -- Testing the dimensions of the sprites -- Summary -- Chapter 7: Get Your Motor Running -- Designing our application -- Getting started -- Creating the application interface -- The lateral menu -- The interface -- Opening and closing the menu -- Adding items to the menu -- The Home page -- The Tasks page -- Navigating through the different screens -- Defining tasks -- Object-oriented -- The Task class -- Dealing with tasks -- A prefab as Task panel -- The Task manager -- Allowing the user to create new Tasks -- Create Task button -- Delete task button -- Adding the icon -- Inserting the title -- Inserting the Due date -- Selecting the Task priority -- Setting up the Tasks page -- Summary -- Chapter 8: Break, Destroy, and Rebuild - the Art of Playtesting and Iteration -- Playtesting -- Methods of playtesting -- Going solo -- Group testing -- Open or controlled -- Getting the info - have a plan!…”
    Libro electrónico
  11. 24631
    Publicado 2016
    Tabla de Contenidos: “…Allowing roles assignments and overrides -- Assigning of default roles -- Moodle role assignment - best practice -- Summary -- Chapter 7: Moodle Look and Feel -- An overview of the look and feel -- Site versus Dashboard -- Customizing your front page -- The front page settings -- Arranging front page blocks -- Logging in from a different website -- Other front page items -- Front page users -- Front page filters -- Front page reports -- The front page backup and restore -- Front page questions -- The default Dashboard and Profile pages -- Customizing navigation -- Replacing the front page -- Moodle themes -- Fixed width versus fluid versus responsive themes -- Selecting a Moodle theme -- Theme types -- Theme settings -- Customizing themes -- Theme customization basics -- The Moodle editor -- Configuring the Atto editor -- Extending the functionality of tables -- Supporting mathematical equations -- Adding some awesomeness -- Accessibility -- Guaranteeing accessibility through Moodle themes -- Accessibility support through the Moodle editor -- Support for a screen reader -- Summary -- Chapter 8: Moodle Plugins -- Plugins - an overview -- Module plugins -- Activity modules -- Configuring blocks -- Configuring filters -- Moodle repositories -- Internal repository plugins -- External repository plugins -- Data storage repositories -- Application repositories -- Moodle portfolios -- Miscellaneous plugins -- Course formats -- Question types and behaviors -- Availability restrictions -- Licences -- Plagiarism prevention -- Installing third-party plugins -- Third-party software - an overview -- Good add-ons and bad add-ons -- Popular add-ons -- Organizational decisions around plugins -- Installing third-party add-ons -- Installing the Collapsed Topics format plugin via the web interface -- Installing the Configurable Reports plugin manually…”
    Libro electrónico
  12. 24632
    Publicado 2023
    Tabla de Contenidos: “…4.3.1 Prozesse beim Aufruf einer Webseite -- 4.3.2 Metriken zur Messung der Ladegeschwindigkeit‌ -- 4.3.3 Vorgehen zur Analyse der Ladezeit -- 4.3.4 Time to First Byte‌ -- 4.4 Schritte zur Optimierung der Ladegeschwindigkeit‌ -- 4.4.1 Anzahl der Requests‌ -- 4.4.2 Anzahl der Webfonts‌ reduzieren -- 4.4.3 PageSpeed‌-Experimente in Elementor -- 4.4.4 Bildgrößen‌ reduzieren -- 4.4.5 Content Delivery Network‌ -- 4.4.6 Dateikomprimierung‌ auf dem Server aktivieren -- 4.4.7 Minifizieren und Kombinieren von HTML‌-, CSS‌- und JavaScript‌-Dateien -- 4.4.8 Browser- und Server-Caching‌ -- 4.4.9 Lazy Loading‌ -- 4.4.10 Kritischer Rendering-Pfad‌ -- 4.4.11 Preconnect‌ - Zu Dritt-Domains vorverbinden -- 4.4.12 Preload‌ - Wichtige Dateien im Voraus laden -- 4.4.13 Optimierung der Datenbank -- 4.4.14 Messdaten -- 4.4.15 Funktionen einzelner PageSpeed‌-Plugins -- 4.5 Checkliste‌ -- Kapitel 5: Linkstrukturen‌ -- 5.1 Interne Verlinkung‌ -- 5.2 Externe Verlinkung‌ -- 5.3 Linkbuilding‌ in der Praxis -- 5.3.1 Linkwürdigen Content erstellen -- 5.3.2 Wettbewerber-Backlink-Screening‌ -- 5.3.3 Themenrelevante Foren -- 5.3.4 Themenrelevante Blogs -- 5.3.5 Webverzeichnisse und Blogverzeichnisse -- 5.3.6 Linkgeber‌ in eigenem Netzwerk kontaktieren -- 5.3.7 Social-Media-Umfragen -- 5.4 Checkliste‌ -- Kapitel 6: Conversion-Optimierung‌ -- 6.1 Grundlagen der Conversion-Optimierung -- 6.2 Optimierung von Landingpage‌ und Prozess -- 6.3 Gezielte Optimierungen an der Seite -- 6.3.1 Optimierung der Produktdarstellung -- 6.3.2 Optimierung der Usability‌ -- 6.4 Erfolgsmessung‌ bei der Conversion-Optimierung -- 6.5 Checkliste‌ -- Kapitel 7: Erfolgskontrolle‌ -- 7.1 Analyse mit der Search Console -- 7.2 Monitoring mit Google Analytics 4‌‌ -- 7.3 Amazon PartnerNet‌-Berichte‌ -- 7.4 Checkliste‌ -- Teil II: Mit Affiliate-Marketing Websites monetarisieren - Schritt für Schritt…”
    Libro electrónico
  13. 24633
    Publicado 2023
    Tabla de Contenidos: “…General Data Protection Regulation -- EU-US Safe Harbor -- US Privacy Act of 1974 -- International Cooperation -- Import/Export Restrictions -- Trans-border Data Flow -- Important Laws and Regulations -- US Computer Fraud and Abuse Act -- HIPAA -- United States Breach Notification Laws -- Ethics -- The (ISC)2 Code of Ethics -- The (ISC)2 Code of Ethics Canons in Detail -- Computer Ethics Institute -- IABs Ethics and the Internet -- Information Security Governance -- Security Policy and Related Documents -- Policy -- Components of Program Policy -- Policy Types -- Procedures -- Standards -- Guidelines -- Baselines -- Personnel Security -- Candidate Screening and Hiring -- Onboarding -- Employee Termination -- Security Awareness and Training -- Gamification -- Security Champions -- Access Control Defensive Categories and Types -- Preventive -- Detective -- Corrective -- Recovery -- Deterrent -- Compensating -- Comparing Access Controls -- Risk Analysis -- Assets -- Threats and Vulnerabilities -- Risk=Threat x Vulnerability -- Impact -- Risk Analysis Matrix -- Calculating Annualized Loss Expectancy -- Asset Value -- Exposure Factor -- Single Loss Expectancy -- Annual Rate of Occurrence -- Annualized Loss Expectancy -- Total Cost of Ownership -- Return on Investment -- Budget and Metrics -- Risk Response -- Accept the Risk -- Risk Acceptance Criteria -- Mitigate the Risk -- Transfer the Risk -- Risk Avoidance -- Quantitative and Qualitative Risk Analysis -- The Risk Management Process -- Risk Maturity Modeling -- Security and Third Parties -- Service Provider Contractual Security -- Minimum Security Requirements -- Service Level Agreements and Service Level Requirements -- Attestation -- Right to Penetration Test/Right to Audit -- Supply Chain Risk Management -- Risks Associated With Hardware, Software, and Services -- Vendor Governance -- Acquisitions…”
    Libro electrónico
  14. 24634
    por Lee, Thomas
    Publicado 2023
    Tabla de Contenidos: “…. -- Implementing FSRM Filestore Screening -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: Managing Printing -- Introduction -- The systems used in the chapter -- Installing and Sharing Printers -- Getting ready -- How to do it... -- How it works... -- There's more... -- Publishing a Printer to Active Directory -- Getting ready -- How to do it... -- How it works... -- There's more... -- Changing the Spooler Directory -- Getting ready -- How to do it... -- How it works... -- There's more... -- Changing Printer Drivers -- Getting ready -- How to do it... -- How it works... -- Printing a Test Page -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing Printer Security -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a Printer Pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 10: Exploring Windows Containers -- Introduction -- The systems used in the chapter -- Configuring a container host -- Getting ready -- How to do it... -- How it works... -- There's more... -- Deploying sample containers -- Getting ready -- How to do it... -- How it works... -- There's more... -- Deploying IIS in a container -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using a Dockerfile to create a custom container -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 11: Managing Hyper-V -- Introduction -- The systems used in the chapter -- Installing Hyper-V inside Windows Server -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating a Hyper-V VM -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using PowerShell Direct -- Getting ready…”
    Libro electrónico
  15. 24635
    Publicado 2022
    Tabla de Contenidos: “…Understand, Adhere to, and Promote Professional Ethics -- (ISC)2 Code of Professional Ethics -- Organizational code of ethics -- Understand and Apply Security Concepts -- Confidentiality -- Integrity -- Availability -- Authenticity -- Nonrepudiation -- Evaluate and Apply Security Governance Principles -- Alignment of security function to business strategy, goals, mission, and objectives -- Organizational processes -- Organizational roles and responsibilities -- Security control frameworks -- Due care and due diligence -- Determine Compliance and Other Requirements -- Contractual, legal, industry standards, and regulatory requirements -- Privacy requirements -- Understand Legal and Regulatory Issues That Pertain to Information Security -- Cybercrimes and data breaches -- Licensing and intellectual property requirements -- Import/export controls -- Transborder data flow -- Privacy -- Understand Requirements for Investigation Types -- Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines -- Policies -- Standards (and baselines) -- Procedures -- Guidelines -- Identify, Analyze, and Prioritize Business Continuity (BC) Requirements -- Business impact analysis -- Develop and document the scope and the plan -- Contribute to and Enforce Personnel Security Policies and Procedures -- Candidate screening and hiring -- Employment agreements and policies -- Onboarding, transfers, and termination processes -- Vendor, consultant, and contractor agreements and controls -- Compliance policy requirements -- Privacy policy requirements -- Understand and Apply Risk Management Concepts -- Identify threats and vulnerabilities -- Risk assessment/analysis -- Risk appetite and risk tolerance -- Risk treatment -- Countermeasure selection and implementation -- Applicable types of controls -- Control assessments (security and privacy)…”
    Libro electrónico
  16. 24636
    Publicado 2013
    Tabla de Contenidos: “…Inverse Square Law and Light -- Color Mixing and Temperature -- Ambient Light -- Image Capture -- Camera and Focus -- Video Signals -- Video Signal Decoding -- Digital Signals -- Producing an Image -- Display and Projection Technology -- Flat-Panel Display Technologies -- Positioning a Display Within a Room -- Aspect Ratio -- The Projected Image -- Projector Optics -- Front Projection and Rear Projection -- Screens -- Perceived Quality -- Viewer Placement -- Throw Distance -- Keystone Error and Correction -- Digital Display Alignment -- Projection System Brightness -- Brightness and Contrast Adjustments -- Chapter Review -- Review Questions -- Answers -- Chapter 6. …”
    Libro electrónico
  17. 24637
    Publicado 2017
    Tabla de Contenidos: “…Approach for automatic security updates installation -- Developing a process to update servers regularly -- Knowledge base -- Challenges on a larger scale -- Partitioning and LUKS -- Partitioning schemes -- A separate partition for /boot -- A separate partition for /tmp -- A separate partition for /home -- Conclusion -- LUKS -- Introduction to LUKS -- Solution -- Conclusion -- Access control list -- Use case -- Introduction to Access Control List -- Set ACL -- Show ACL -- Special permissions in Linux -- SUID -- Use case for SUID -- Understanding the permission associated with ping -- Setting a SUID bit for files -- Removing the SUID bit for files -- SETGID -- Associating the SGID for files -- SELinux -- Introduction to SELinux -- Permission sets in SELinux -- SELinux modes -- Confinement of Linux users to SELinux users -- Process confinement -- Conclusion -- Hardening system services and applications -- Hardening services -- Guide for hardening SSH -- Enable multi-factor authentication -- Associated configuration -- Changing the SSH default port -- Associate configuration -- Disabling the root login -- Associated configuration -- Conclusion -- Pluggable authentication modules -- Team Screen application -- File Sharing Application -- Understanding PAM -- The architecture of PAM -- The PAM configuration -- The PAM command structure -- Implementation scenario -- Forcing strong passwords -- Log all user commands -- Conclusion -- System auditing with auditd -- Introduction to auditd -- Use case 1 - tracking activity of important files -- Use case -- Solution -- First field -- Use case 2 - monitoring system calls -- Introduction to system calls -- Use case -- Solution -- Conclusion -- Conclusion -- Central identity server -- Use Case 1 -- Use case 2 -- The architecture of IPA -- Client-server architecture -- User access management…”
    Libro electrónico
  18. 24638
    Tabla de Contenidos: “…-- SharePoint Foundation versus SharePoint Server -- What You Will Learn in This Book -- Summary -- Chapter 2: What's New in PowerShell for SharePoint 2013 -- SharePoint 2013 Apps -- Service Applications -- User License Enforcements -- PowerShell Web Access -- Backups -- Bing Maps -- Search -- Tenants -- Office 365 -- Site Upgrade -- Summary -- Chapter 3: Configuring Your Environment for PowerShell -- Getting Started with the Integrated Scripting Environment (ISE) -- Windows Server 2008 R2 -- Windows Server 2012 -- Windows PowerShell ISE Essential Features -- IntelliSense -- Snippets -- Commands Explorer -- Execution Policy -- PowerShell Web Access (PWA) -- Requirements -- Installing PWA -- Configuring the Gateway -- Summary -- Chapter 4: PowerShell Basics -- Terminology -- Session -- Cmdlets -- Profile -- Snap-In -- Module -- PowerShell Operators and Common Operations -- Printing Values on Screen -- Console Colors -- Variables -- Comments -- Casting -- Conditional Logic -- Decisions -- Comparison -- Logical Operators -- Function -- Loops -- Piping -- Instance Referrer -- Error Handling -- Enumerations -- Arrays -- Environment Variables -- WhatIf Rollback -- Graphical User Interface -- Demo Project-Selective Deletion of Files in a Folder -- Customization -- My Profile -- Custom Modules -- Leaping Ahead -- Desired State Configuration -- Dynamic Method and Property Names -- Summary -- Chapter 5: Installing &amp -- Deploying SharePoint with PowerShell -- Requirements -- Hardware Requirements -- Software Requirements -- Roles and Features -- .NET Framework 3.5 -- Domain Controller -- Users and Groups -- Application Server Role…”
    Libro electrónico
  19. 24639
    Publicado 2021
    Tabla de Contenidos: “…NICOLASIN RODENGO SAIANO -- 4 THE MORTARED-RUBBLE-FRAME VAULTOF THE ANTI-REFECTORY -- 5 THE LEGACY OF FRAME VAULTS -- ACKNOWLEDGEMENTS -- REFERENCES -- Building a castle in Japan: Analysis of the masonry construction process through the folding screen Chikuj -- 1 INTRODUCTION…”
    Libro electrónico
  20. 24640
    Publicado 2022
    Tabla de Contenidos: “…-- Part I Security and Risk Management -- Chapter 1 Cybersecurity Governance -- Fundamental Cybersecurity Concepts and Terms -- Confidentiality -- Integrity -- Availability -- Authenticity -- Nonrepudiation -- Balanced Security -- Other Security Terms -- Security Governance Principles -- Aligning Security to Business Strategy -- Organizational Processes -- Organizational Roles and Responsibilities -- Security Policies, Standards, Procedures, and Guidelines -- Security Policy -- Standards -- Baselines -- Guidelines -- Procedures -- Implementation -- Personnel Security -- Candidate Screening and Hiring -- Employment Agreements and Policies -- Onboarding, Transfers, and Termination Processes -- Vendors, Consultants, and Contractors -- Compliance Policies -- Privacy Policies -- Security Awareness, Education, and Training Programs -- Degree or Certification? …”
    Libro electrónico