Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
6501Publicado 2014“…You'll walk step-by-step through planning and performing your Exchange 2013 migration... efficiently managing policies, mailboxes, clients, and databases... working with key administration and troubleshooting tools... enforcing strict security and compliance... safely providing messaging services to diverse mobile/BYOD clients... delivering voicemail to Exchange mailboxes... troubleshooting problems, and more! …”
-
6502Publicado 2014“…Develop a 24-36 month roadmap reflecting initial requirements, longterm strategies, and key unknowns for organizations from 100 users to 100,000 users Establish governance that reduces risk and increases value, covering the system as well as information architecture components, security, compliance, OneDrive, SharePoint 2013, Office 365, SharePoint Online, Microsoft Azure, Amazon Web Services, and identity management Address unique considerations of large, global, and/or multilingual enterprises Plan for the hybrid cloud (private, public, hybrid, SaaS, PaaS, IaaS) Integrate SharePoint with external data sources: from Oracle and SQL Server to HR, ERP, or document management for business intelligence initiatives Optimize performance across multiple data centers or locations including US and EU compliance and regulatory considerations (PHI, PII, HIPAA, Safe Harbor, etc.) Plan for disaster recovery, business continuity, data replication, and archiving Enforce security via identity management and authentication Safely support mobile devices and apps, including BYOD Implement true recor..…”
Libro electrónico -
6503Publicado 2023Tabla de Contenidos: “…Part 3: Text Augmentation -- Chapter 5: Text Augmentation -- Character augmenting -- Word augmenting -- Sentence augmentation -- Text augmentation libraries -- Real-world text datasets -- The Python Notebook and Pluto -- Real-world NLP datasets -- Pandas -- Visualizing NLP data -- Reinforcing learning through Python Notebook -- Character augmentation -- Word augmenting -- Summary -- Chapter 6: Text Augmentation with Machine Learning -- Machine learning models -- Word augmenting -- Sentence augmenting -- Real-world NLP datasets -- Python Notebook and Pluto -- Verify -- Real-world NLP data -- Pandas -- Viewing the text -- Reinforcing your learning through the Python Notebook -- Word2Vec word augmenting -- BERT -- RoBERTa -- Back translation -- Sentence augmentation -- Summary -- Part 4: Audio Data Augmentation -- Chapter 7: Audio Data Augmentation -- Standard audio augmentation techniques -- Time stretching -- Time shifting -- Pitch shifting -- Polarity inversion -- Noise injection -- Filters -- Low-pass filter -- High-pass filter -- Band-pass filter -- Low-shelf filter -- High-shelf filter -- Band-stop filter -- Peak filter -- Audio augmentation libraries -- Real-world audio datasets -- Python Notebook and Pluto -- Real-world data and pandas -- Listening and viewing -- Reinforcing your learning -- Time shifting -- Time stretching -- Pitch scaling -- Noise injection -- Polarity inversion -- Low-pass filter -- Band-pass filter -- High-pass and other filters -- Summary -- Chapter 8: Audio Data Augmentation with Spectrogram -- Initializing and downloading -- Audio Spectrogram -- Various Spectrogram formats -- Mel-spectrogram and Chroma STFT plots -- Spectrogram augmentation -- Spectrogram images -- Summary -- Part 5: Tabular Data Augmentation -- Chapter 9: Tabular Data Augmentation -- Tabular augmentation libraries -- Augmentation categories…”
Libro electrónico -
6504Publicado 2023“…What You Will Learn Learn to identify legit apps and spot fake apps Get to know the four ways to work safely with mobile applications Learn to remove ransomware from your mobile device Understand about VPNs and why you need one Learn how to safely download and work with mobile applications Understand mobile malware and how they can affect your mobile device Audience This course is for students and aspiring cybersecurity professionals! …”
Video -
6505Publicado 2024“…Additionally, by mastering the art of brand development and soft skills, you'll grasp the interpersonal dynamics crucial for executive leadership. …”
Libro electrónico -
6506Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Profiling Cyber Adversaries and Their Tactics -- Types of threat actors -- Summary of threat actor categories -- Motivations and objectives of threat actors -- Tactics, Techniques, and Procedures (TTPs) -- Real-world examples of cyberattacks and consequences -- Nation-state actors: NotPetya attack (2017) -- Nation-state actors: SolarWinds supply chain attack -- Cybercriminals: WannaCry ransomware attack (2017) -- Cybercriminals: Colonial Pipeline ransomware attack -- Summary -- Chapter 2: Identifying and Assessing Organizational Weaknesses -- Understanding organizational weaknesses and vulnerabilities -- Types of organizational weaknesses -- Types of organizational vulnerabilities -- Real-world examples -- Techniques for identifying and assessing weaknesses -- Security audits -- Vulnerability assessments -- Threat modeling -- Penetration testing -- Social engineering tests -- Conducting risk assessments -- Risk assessment methodologies -- Identifying assets and establishing the scope -- Prioritizing risks and developing mitigation strategies -- Documentation and reporting -- Monitoring and reviewing -- Prioritizing and remediating weaknesses -- Understanding risk and impact levels -- Risk mitigation strategies -- Attack surface reduction -- Continuous monitoring and reassessment -- Summary -- Chapter 3: Staying Ahead: Monitoring Emerging Threats and Trends -- The importance of monitoring emerging threats and trends -- Understanding the cybersecurity landscape -- The risks of emerging threats -- The role of threat intelligence -- From awareness to action -- The attacker's mindset -- The significance of understanding the attacker's perspective -- Motivations and objectives of attackers -- Psychological and behavioral traits of attackers…”
Libro electrónico -
6507Publicado 1974Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca de la Universidad de Navarra, Biblioteca IEBA Jerusalén, Biblioteca Universidad de Deusto)Libro
-
6508Publicado 2024“…Suppose that we develop superintelligence safely, govern it well, and make good use of the cornucopian wealth and near magical technological powers that this technology can unlock. …”
Otros -
6509Publicado 2013“…"La Forja", "La Ruta" y "La Llama" han sido fiel y espectacularmente adaptadas en esta serie que muestra la España anterior a 1940 siguiendo la trayectoria vital de un chico de pueblo, hijo de una lavandera, que tras los intentos para lograr su primer trabajo en un banco, hace el servicio militar en Marruecos, participa en la guerra del Rif, conoce al futuro dictador Fraqnco y sufre en carne propia una guerra fraticida que lo lleva al exilo…”
Animación -
6510Publicado 2013“…Mientras es trasladado a la cárcel, el autobús donde viaja sufre un accidente que facilita la fuga de varios presos, entre ellos el propio Kimble. …”
Animación -
6511por El Tiby, Amr Mohamed, 1956-“…The book will try to give answers to questions such as: Is the existing regulatory framework sufficient enough to - Ensure safe and sound banking system? Face the inherent risk associated with Islamic banking? …”
Publicado 2011
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
6512Publicado 2021“…The essays included here address, inter alia, prophets as sites of memory, kings as sites memory, Jerusalem as a site of memory, a mnemonic system shaped by two interacting 'national' histories, matters of identity and othering as framed and explored via memories, mnemonic metanarratives making sense of the past and serving various didactic purposes and their problems, memories of past and futures events shared by the literati, issues of gender constructions and memory, memories understood by the group as 'counterfactual' and their importance, and, in multiple ways, how and why shared memories served as a (safe) playground for exploring multiple, central ideological issues within the group and of generative grammars governing systemic preferences and dis-preferences for particular memories…”
Libro -
6513Publicado 2022“…La violencia de género es uno de los principales problemas que sufre la sociedad, por ello, resulta necesario que los medios de comunicación, como configuradores de la opinión pública realicen un adecuado tratamiento a la hora de informar sobre dicho tema. …”
Acceso restringido UPSA
Tesis -
6514Publicado 2020“…A una muestra de 223 deportistas federados españoles se les han pasado dos cuestionarios: la Escala de Bienestar Psicológico de Ryff y la Escala de Afecto Positivo y Negativo (PANAS), además de seis preguntas abiertas relativas al objeto de estudio. …”
Acceso restringido
Tesis -
6515Publicado 2021“…El estudio comienza con el origen de las marcas y va profundizando en el concepto de marca y sus herramientas de gestión hasta llegar al concepto de marca personal y un listado de “soft skills” o habilidades blandas que actualmente se consideran de gran valor en el mercado laboral. …”
Clic para texto completo. Acceso restringido UPSA
Tesis -
6516Publicado 2019“…Europa sufre una crisis de identidad. ¿Cómo intentan el populismo y la extrema derecha manipular sus valores? …”
Libro -
6517Publicado 2023“…Yet this portrait of a safe and conventional figure at the origins of Christianity airbrushes out many strange things about him. …”
Otros -
6518por Harvard Business Review“…*Renueva tu energía *Reduce la carga *Logra el equilibrio ¿Sufres estrés por culpa del trabajo?. ¿Te sientes abrumado? …”
Publicado 2016
Texto completo en Odilo
Otros -
6519por Varini, Claudio“…n con el entorno: fachadas y cubiertas son vistos como un sistema donde todas sus partes co-accionan. El sufi- jo "eco" esta? por subrayar la vocacio?n de este sistema: el de reducir los consumos energe?…”
Publicado 2016
Texto completo en Odilo
Otros -
6520Publicado 2016“…Son una manifestación del denominado en la doctrina anglosajona soft law, es decir documentos que orientan y guían al intérprete…”
Acceso al texto completo en Aranzadi
Libro