Mostrando 6,501 - 6,520 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.72s Limitar resultados
  1. 6501
    Publicado 2014
    “…You'll walk step-by-step through planning and performing your Exchange 2013 migration... efficiently managing policies, mailboxes, clients, and databases... working with key administration and troubleshooting tools... enforcing strict security and compliance... safely providing messaging services to diverse mobile/BYOD clients... delivering voicemail to Exchange mailboxes... troubleshooting problems, and more! …”
    Video
  2. 6502
    Publicado 2014
    “…Develop a 24-36 month roadmap reflecting initial requirements, longterm strategies, and key unknowns for organizations from 100 users to 100,000 users Establish governance that reduces risk and increases value, covering the system as well as information architecture components, security, compliance, OneDrive, SharePoint 2013, Office 365, SharePoint Online, Microsoft Azure, Amazon Web Services, and identity management Address unique considerations of large, global, and/or multilingual enterprises Plan for the hybrid cloud (private, public, hybrid, SaaS, PaaS, IaaS) Integrate SharePoint with external data sources: from Oracle and SQL Server to HR, ERP, or document management for business intelligence initiatives Optimize performance across multiple data centers or locations including US and EU compliance and regulatory considerations (PHI, PII, HIPAA, Safe Harbor, etc.) Plan for disaster recovery, business continuity, data replication, and archiving Enforce security via identity management and authentication Safely support mobile devices and apps, including BYOD Implement true recor..…”
    Libro electrónico
  3. 6503
    Publicado 2023
    Tabla de Contenidos: “…Part 3: Text Augmentation -- Chapter 5: Text Augmentation -- Character augmenting -- Word augmenting -- Sentence augmentation -- Text augmentation libraries -- Real-world text datasets -- The Python Notebook and Pluto -- Real-world NLP datasets -- Pandas -- Visualizing NLP data -- Reinforcing learning through Python Notebook -- Character augmentation -- Word augmenting -- Summary -- Chapter 6: Text Augmentation with Machine Learning -- Machine learning models -- Word augmenting -- Sentence augmenting -- Real-world NLP datasets -- Python Notebook and Pluto -- Verify -- Real-world NLP data -- Pandas -- Viewing the text -- Reinforcing your learning through the Python Notebook -- Word2Vec word augmenting -- BERT -- RoBERTa -- Back translation -- Sentence augmentation -- Summary -- Part 4: Audio Data Augmentation -- Chapter 7: Audio Data Augmentation -- Standard audio augmentation techniques -- Time stretching -- Time shifting -- Pitch shifting -- Polarity inversion -- Noise injection -- Filters -- Low-pass filter -- High-pass filter -- Band-pass filter -- Low-shelf filter -- High-shelf filter -- Band-stop filter -- Peak filter -- Audio augmentation libraries -- Real-world audio datasets -- Python Notebook and Pluto -- Real-world data and pandas -- Listening and viewing -- Reinforcing your learning -- Time shifting -- Time stretching -- Pitch scaling -- Noise injection -- Polarity inversion -- Low-pass filter -- Band-pass filter -- High-pass and other filters -- Summary -- Chapter 8: Audio Data Augmentation with Spectrogram -- Initializing and downloading -- Audio Spectrogram -- Various Spectrogram formats -- Mel-spectrogram and Chroma STFT plots -- Spectrogram augmentation -- Spectrogram images -- Summary -- Part 5: Tabular Data Augmentation -- Chapter 9: Tabular Data Augmentation -- Tabular augmentation libraries -- Augmentation categories…”
    Libro electrónico
  4. 6504
    Publicado 2023
    “…What You Will Learn Learn to identify legit apps and spot fake apps Get to know the four ways to work safely with mobile applications Learn to remove ransomware from your mobile device Understand about VPNs and why you need one Learn how to safely download and work with mobile applications Understand mobile malware and how they can affect your mobile device Audience This course is for students and aspiring cybersecurity professionals! …”
    Video
  5. 6505
    Publicado 2024
    “…Additionally, by mastering the art of brand development and soft skills, you'll grasp the interpersonal dynamics crucial for executive leadership. …”
    Libro electrónico
  6. 6506
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Profiling Cyber Adversaries and Their Tactics -- Types of threat actors -- Summary of threat actor categories -- Motivations and objectives of threat actors -- Tactics, Techniques, and Procedures (TTPs) -- Real-world examples of cyberattacks and consequences -- Nation-state actors: NotPetya attack (2017) -- Nation-state actors: SolarWinds supply chain attack -- Cybercriminals: WannaCry ransomware attack (2017) -- Cybercriminals: Colonial Pipeline ransomware attack -- Summary -- Chapter 2: Identifying and Assessing Organizational Weaknesses -- Understanding organizational weaknesses and vulnerabilities -- Types of organizational weaknesses -- Types of organizational vulnerabilities -- Real-world examples -- Techniques for identifying and assessing weaknesses -- Security audits -- Vulnerability assessments -- Threat modeling -- Penetration testing -- Social engineering tests -- Conducting risk assessments -- Risk assessment methodologies -- Identifying assets and establishing the scope -- Prioritizing risks and developing mitigation strategies -- Documentation and reporting -- Monitoring and reviewing -- Prioritizing and remediating weaknesses -- Understanding risk and impact levels -- Risk mitigation strategies -- Attack surface reduction -- Continuous monitoring and reassessment -- Summary -- Chapter 3: Staying Ahead: Monitoring Emerging Threats and Trends -- The importance of monitoring emerging threats and trends -- Understanding the cybersecurity landscape -- The risks of emerging threats -- The role of threat intelligence -- From awareness to action -- The attacker's mindset -- The significance of understanding the attacker's perspective -- Motivations and objectives of attackers -- Psychological and behavioral traits of attackers…”
    Libro electrónico
  7. 6507
  8. 6508
    Publicado 2024
    “…Suppose that we develop superintelligence safely, govern it well, and make good use of the cornucopian wealth and near magical technological powers that this technology can unlock. …”
    Otros
  9. 6509
    Publicado 2013
    “…"La Forja", "La Ruta" y "La Llama" han sido fiel y espectacularmente adaptadas en esta serie que muestra la España anterior a 1940 siguiendo la trayectoria vital de un chico de pueblo, hijo de una lavandera, que tras los intentos para lograr su primer trabajo en un banco, hace el servicio militar en Marruecos, participa en la guerra del Rif, conoce al futuro dictador Fraqnco y sufre en carne propia una guerra fraticida que lo lleva al exilo…”
    Animación
  10. 6510
    Publicado 2013
    “…Mientras es trasladado a la cárcel, el autobús donde viaja sufre un accidente que facilita la fuga de varios presos, entre ellos el propio Kimble. …”
    Animación
  11. 6511
    por El Tiby, Amr Mohamed, 1956-
    Publicado 2011
    “…The book will try to give answers to questions such as: Is the existing regulatory framework sufficient enough to - Ensure safe and sound banking system? Face the inherent risk associated with Islamic banking? …”
    Enlace del recurso
    Libro electrónico
  12. 6512
    Publicado 2021
    “…The essays included here address, inter alia, prophets as sites of memory, kings as sites memory, Jerusalem as a site of memory, a mnemonic system shaped by two interacting 'national' histories, matters of identity and othering as framed and explored via memories, mnemonic metanarratives making sense of the past and serving various didactic purposes and their problems, memories of past and futures events shared by the literati, issues of gender constructions and memory, memories understood by the group as 'counterfactual' and their importance, and, in multiple ways, how and why shared memories served as a (safe) playground for exploring multiple, central ideological issues within the group and of generative grammars governing systemic preferences and dis-preferences for particular memories…”
    Libro
  13. 6513
    Publicado 2022
    “…La violencia de género es uno de los principales problemas que sufre la sociedad, por ello, resulta necesario que los medios de comunicación, como configuradores de la opinión pública realicen un adecuado tratamiento a la hora de informar sobre dicho tema. …”
    Acceso restringido UPSA
    Tesis
  14. 6514
    Publicado 2020
    “…A una muestra de 223 deportistas federados españoles se les han pasado dos cuestionarios: la Escala de Bienestar Psicológico de Ryff y la Escala de Afecto Positivo y Negativo (PANAS), además de seis preguntas abiertas relativas al objeto de estudio. …”
    Acceso restringido
    Tesis
  15. 6515
    Publicado 2021
    “…El estudio comienza con el origen de las marcas y va profundizando en el concepto de marca y sus herramientas de gestión hasta llegar al concepto de marca personal y un listado de “soft skills” o habilidades blandas que actualmente se consideran de gran valor en el mercado laboral. …”
    Clic para texto completo. Acceso restringido UPSA
    Tesis
  16. 6516
    Publicado 2019
    “…Europa sufre una crisis de identidad. ¿Cómo intentan el populismo y la extrema derecha manipular sus valores? …”
    Libro
  17. 6517
    Publicado 2023
    “…Yet this portrait of a safe and conventional figure at the origins of Christianity airbrushes out many strange things about him. …”
    Otros
  18. 6518
    por Harvard Business Review
    Publicado 2016
    “…*Renueva tu energía *Reduce la carga *Logra el equilibrio ¿Sufres estrés por culpa del trabajo?. ¿Te sientes abrumado? …”
    Texto completo en Odilo
    Otros
  19. 6519
    por Varini, Claudio
    Publicado 2016
    “…n con el entorno: fachadas y cubiertas son vistos como un sistema donde todas sus partes co-accionan. El sufi- jo "eco" esta? por subrayar la vocacio?n de este sistema: el de reducir los consumos energe?…”
    Texto completo en Odilo
    Otros
  20. 6520
    Publicado 2016
    “…Son una manifestación del denominado en la doctrina anglosajona soft law, es decir documentos que orientan y guían al intérprete…”
    Acceso al texto completo en Aranzadi
    Libro