Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFC 5,514
- PFC 2,816
- TFM 2,694
- TFG 1,829
- Empreses 1,700
- Gestió de projectes 1,333
- Arquitectura 1,205
- Direcció i administració 1,202
- Treball 1,047
- Planificació estratègica 998
- Planificació 950
- Sistemes d'informació per a la gestió 805
- PFG 771
- TFMP 735
- Arquitectura domèstica 679
- Innovacions tecnològiques 555
- Història 549
- Habitatges 517
- Edificis 510
- Ensenyament 510
- Treball social 510
- Comerç electrònic 500
- Dret del treball 477
- Treball en equip 471
- Indústria i comerç 467
- Pàgines web 434
- Xarxes d'ordinadors 376
- Disseny 362
- Màrqueting digital 355
- Màrqueting 340
-
37801por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…The Ica River Integrated Basin -- Water security for economic growth -- Water resources: The state of play and challenges -- Institutional features -- Key governance challenges -- Ways forward to strengthen water governance -- Move from a traditional approach to water supply (infrastructure-intensive) to water demand management and alternative solutions -- Promote mechanisms for dialogue amongst the regional governments of Ica and Huancavelica in order to operationalise the River Basin Council and set up natural infrastructure projects, where appropriate -- Strengthen the capacity of water authorities in the departments of Ica and Huancavelica -- References -- Additional references -- The Olmos Irrigation Project -- Introduction -- The "old" and "new" Olmos Valley -- Institutional features -- Key water governance challenges -- Ways forward to strengthen water governance -- Encourage dialogue between stakeholders for more integrated and resilient water governance -- Invest in data collection and monitoring -- Build capacity -- Ensure policy coherence -- Annex B. …”
Publicado 2021
Libro electrónico -
37802Publicado 2018Tabla de Contenidos: “…From a standalone machine to a bunch of nodes -- Making sense of why we need a distributed framework -- The Hadoop ecosystem -- Hadoop architecture -- Hadoop Distributed File System -- MapReduce -- Introducing Apache Spark -- PySpark -- Starting with PySpark -- Setting up your local Spark instance -- Experimenting with Resilient Distributed Datasets -- Sharing variables across cluster nodes -- Read-only broadcast variables -- Write-only accumulator variables -- Broadcast and accumulator variables together-an example -- Data preprocessing in Spark -- CSV files and Spark DataFrames -- Dealing with missing data -- Grouping and creating tables in-memory -- Writing the preprocessed DataFrame or RDD to disk -- Working with Spark DataFrames -- Machine learning with Spark -- Spark on the KDD99 dataset -- Reading the dataset -- Feature engineering -- Training a learner -- Evaluating a learner's performance -- The power of the machine learning pipeline -- Manual tuning -- Cross-validation -- Final cleanup -- Summary -- Appendix: Strengthen Your Python Foundations -- Your learning list -- Lists -- Dictionaries -- Defining functions -- Classes, objects, and object-oriented programming -- Exceptions -- Iterators and generators -- Conditionals -- Comprehensions for lists and dictionaries -- Learn by watching, reading, and doing -- Massive open online courses (MOOCs) -- PyCon and PyData -- Interactive Jupyter -- Don't be shy, take a real challenge -- Other Books You May Enjoy -- Index…”
Libro electrónico -
37803Publicado 2017Tabla de Contenidos: “…Improvement of network resilience in the face of catastrophic climate events -- 8.2.2. …”
Libro electrónico -
37804Publicado 2022Tabla de Contenidos: “…. -- References -- Part 1 Theories and Approaches -- 2 Constitutional Frameworks of Territorial Autonomies: Global Legal Observations -- Introduction -- General Constitutional Structures -- Domestic Autonomy Arrangements -- Some Notes On the Powers of Territorial Autonomies -- A General Comparative Framework -- Implementation of International Autonomy Provisions in Domestic Law -- Entrenchment of Autonomy in the Legal Order -- Autonomy in Research Literature -- Future Research -- Summary -- Notes -- References -- 3 Territorial Autonomies as a Form of Self-Determination: The Legal Right to Internal Self-Determination -- Introduction -- Self-determination: the Context -- The Characteristics of Autonomy -- Peoples and Minorities -- Human Rights and Self-Determination -- United Nations Treaty Bodies -- African Commission and Court of Human and Peoples Rights -- Inter-American Commission and Court of Human Rights -- Indigenous Peoples -- International Labor Organization -- UN Declaration On the Rights of Indigenous Peoples -- Inter-American Commission and Court of Human Rights -- African Commission and Court of Human and Peoples' Rights -- Conclusion -- Notes -- References -- 4 Territorial Or Non-Territorial Autonomy: The Tools for Governing Diversity -- Introduction…”
Libro electrónico -
37805Publicado 2017Tabla de Contenidos: “…-- Motivation towards microservices -- Maintenance and debugging -- Scalability -- Technology diversity -- Resilience -- Replaceability -- Parallelization -- How it is different from SOA -- Team structure -- Challenges of micro-services -- Infrastructure maintenance -- Performance -- Debugging and fault-finding -- Logs should be centralized -- Logs should be searchable -- Track chain of requests -- Dynamic log levels -- Implementation -- Deployments -- Inter-services communication -- Synchronous communication -- Asynchronous communication -- Shared library or common code -- Summary -- What's next -- Index…”
Libro electrónico -
37806Publicado 2017Tabla de Contenidos: “…Continuous integration -- Context map -- Shared kernel -- Customer-supplier -- Conformist -- Anticorruption layer -- Separate ways -- Open Host Service -- Distillation -- Sample domain service -- Entity implementation -- Repository implementation -- Service implementation -- Summary -- Chapter 4: Implementing a Microservice -- OTRS overview -- Developing and implementing microservices -- Restaurant microservice -- OTRS implementation -- Controller class -- API versioning -- Service classes -- Repository classes -- Entity classes -- Registration and discovery service (Eureka service) -- Eureka client -- Booking and user services -- Execution -- Testing -- References -- Summary -- Chapter 5: Deployment and Testing -- Mandatory services for good microservices -- Service discovery and registration -- Edge servers -- Load balancing -- Circuit breakers -- Monitoring -- An overview of microservice architecture using Netflix OSS -- Load balancing -- Server-side load balancing -- Client-side load balancing -- Circuit breakers and monitoring -- Using Hystrix's fallback methods -- Monitoring -- Setting up the Hystrix dashboard -- Creating Turbine services -- Building and running the OTRS application -- Microservice deployment using containers -- Installation and configuration -- Docker machine with 4 GB -- Building Docker images with Maven -- Running Docker using Maven -- Integration testing with Docker -- Pushing the image to a registry -- Managing Docker containers -- References -- Summary -- Chapter 6: Reactive Microservices -- An overview of the reactive microservice architecture -- Responsive -- Resilient -- Elastic -- Message driven -- Implementing reactive microservices -- Producing an event -- Consuming the event -- References -- Summary -- Chapter 7: Securing Microservices -- Enabling Secure Socket Layer -- Authentication and authorization -- OAuth 2.0.…”
Libro electrónico -
37807Publicado 2024Tabla de Contenidos: “…Comeau: The Scope of Trade Between Provinces and s. 121 -- 7.9 Key Terms -- 8 Indigenous Law and the Judicial Process -- Introduction -- 8.1 Political Failure, Judicial Opportunity: The Supreme Court of Canada and Aboriginal and Treaty Rights -- 8.2 The Durability of Terra Nullius: Tsilhqot’in v. …”
Libro electrónico -
37808Publicado 2024Tabla de Contenidos: “…Data risk assessment and mitigation -- Optimizing your data journey with strategic technological integration -- Data stewardship tools and technologies -- Data catalog and metadata -- Blockchain and AI -- Valuing and protecting data as an asset -- Realizing short- and long-term business value via data -- Summary -- Chapter 11: Theory versus Real Life -- Understanding why there is a gap between theory and reality -- Discovering the gaps -- Identifying the gaps -- Bridging the gap between theory and reality -- Critical thinking in bridging theory and reality -- Integrating data stewardship into daily operations -- Gap #1 - Standard operating procedure is written but not followed -- Gap #2 - Insufficient commitment from stakeholders -- Gap #3 - Data governance operating model cannot keep up with ever-changing regulatory requirements -- Gap #4 - Technical debt -- Future-proofing your data stewardship program -- Benchmarking with DAMA and EDMC surveys -- Enhancing data stewards' skills with skillset matrix -- Cultivating resilience and adaptability in data stewardship -- Evolving theoretical models with real-life experiences -- Summary -- Chapter 12: Case Studies -- Nurturing a data culture with a data mindset - case study #1 -- A plan of action -- Data stewardship in action -- Outcome -- Streamlining fund performance and reporting - case study #2 -- A plan of action -- Data stewardship in action -- Outcome -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
37809Publicado 2018Tabla de Contenidos: “…Improving Asphalt Mixture Performance by Partially Replacing Bitumen with Waste Motor Oil and Elastomer Modifiers doi: 10.3390/app7080794 -- Cesare Oliviero Rossi, Saltanat Ashimova, Pietro Calandra, Maria Penelope De Santo and Ruggero Angelico Mechanical Resilience of Modified Bitumen at Different Cooling Rates: A Rheological and Atomic Force Microscopy Investigation doi: 10.3390/app7080779 -- Yue Hou, Linbing Wang, Dawei Wang, Xin Qu and Jiangfeng Wu Using a Molecular Dynamics Simulation to Investigate Asphalt Nano-Cracking under External Loading Conditions doi: 10.3390/app7080770 -- Farzaneh Tahmoorian, Bijan Samali, Vivian W.Y. …”
Libro electrónico -
37810Publicado 2024Tabla de Contenidos: “…3: From sustainable finance to finance for impact -- 4: Conclusions -- References -- Chapter 10: ESG performance and impact measurement in the banking industry -- 1: Introduction -- 2: ESG and banking: evidence from academic research -- 3: ESG data in the banking industry -- 4: Impact measurement in the banking sector -- 5: Conclusions -- References -- Chapter 11: Measuring, managing, and communicating impact: the case of ABN AMRO -- 1: Introduction -- 2: ABN AMRO's purpose and strategy -- 3: Impact measurement and management approach by ABN AMRO -- 4: Communicating impact: a story of success -- 5: Conclusions: lessons learnt -- References -- Chapter 12: Measuring and reporting organizations impact: the case of Capgemini's impact methodology -- 1: Introduction -- 2: Understanding and defining organisations' impact -- 3: The Theory of Change (ToC) -- 4: The main steps to design an impact management process -- 5: The Capgemini case as a relevant actor in the definition of new best practices for measuring carbon impacts -- 6: Measuring impact: a methodology to inform transformative project design -- 7: Conclusions -- References -- Chapter 13: Lessons on impact measurement from a Catholic church impact investor -- 1: Introduction -- 2: Early impact measurement efforts, processes, and lessons learned -- 3: Initial years of defining metrics and collecting data -- 4: Refining an impact measurement and management system that is practical for the impact investor and the social enterprise -- 5: Conclusion -- References -- Part 3: Impact Manangement to Innovate the Public Institutions -- Chapter 14: Public-Private Partnerships (PPP) in the Italian Recovery and Resilience Plan (NRRP) -- 1: Introduction -- 2: A new future for the Public-Private Partnership with NRRP -- 3: Public-Private Partnerships and Urban Regeneration Programs…”
Libro electrónico -
37811Publicado 2024Tabla de Contenidos: “…-- A supermarket analogy -- The shift from ETL to ELT -- The difference between analytics engineers, data analysts, and data engineers -- Summary -- Chapter 2: The Modern Data Stack -- Understanding a Modern Data Stack -- Explaining three key differentiators versus legacy stacks -- Lowering technical barriers with a SQL-first approach -- Improving infrastructure efficiency with cloud-native systems -- Simplifying implementation and maintenance with managed and modular solutions -- Discussing the advantages and disadvantages of the MDS -- Summary -- Part 2: Building Data Pipelines -- Chapter 3: Data Ingestion -- Digging into the problem of moving data between two systems -- The source of all problems -- Understanding the eight essential steps of a data ingestion pipeline -- Trigger -- Connection -- State management -- Data extraction -- Transformations -- Validation and data quality -- Loading -- Archiving and retention -- Managing the quality and scalability of data ingestion pipelines - the three key topics -- Scalability and resilience -- Monitoring, logging, and alerting -- Governance -- Working with data ingestion - an example pipeline -- Summary -- Chapter 4: Data Warehousing -- Uncovering the evolution of data warehousing -- The problem with transactional databases -- The history of data warehouses -- Moving to the cloud -- Benefits of cloud versus on-premises data warehouses -- Cloud data warehouse users - no one-size fits all -- Building blocks of a cloud data warehouse -- Compute…”
Libro electrónico -
37812por Hughes, ChrisTabla de Contenidos: “…Loosening Guides -- Recommendations for Customers -- Threat Modeling -- Secure Software Development -- SSDF Details -- Prepare the Organization (PO) -- Protect Software (PS) -- Produce Well-Secured Software (PW) -- Respond to Vulnerabilities (RV) -- Security Chaos Engineering and Resilience -- Summary -- Chapter 12 Vulnerability Management Maturity Model -- Step 1: Asset Management -- Step 2: Secure Configuration -- Step 3: Continuous Monitoring -- Step 4: Automated Vulnerability Management -- Step 5: Integrating Human Factors -- Step 6: Vulnerability Threat Intelligence -- Summary -- Acknowledgments -- About the Authors -- About the Technical Editor -- Index -- EULA…”
Publicado 2024
Libro electrónico -
37813Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to the NIST Risk Management Framework -- Chapter 1: Understanding Cybersecurity and Risk Management -- Introduction to cybersecurity fundamentals -- The digital revolution -- Defining cybersecurity -- The cybersecurity imperative -- The journey begins -- Overview of risk management concepts -- The nature of risk -- The risk management process -- Risk management in cybersecurity -- NIST and risk management -- Identifying common cyber threats -- Types of cyber threats -- Recognizing the signs -- Recognizing vulnerabilities -- Common vulnerabilities -- Vulnerability scanning tools -- NIST frameworks - compare and contrast -- NIST CSF -- NIST RMF -- Comparison and contrast -- Summary -- Chapter 2: NIST Risk Management Framework Overview -- The history and evolution of the NIST RMF -- Precursors to the RMF -- The emergence of the NIST RMF -- Why it matters -- The key components and stages of the RMF -- The core components of the NIST RMF -- The stages of the NIST RMF -- Roles and responsibilities in the RMF -- Authorizing Official -- Chief Information Officer -- Chief Information Security Officer -- Information System Owner -- Security Control Assessor -- Security Officer -- Summary -- Chapter 3: Benefits of Implementing the NIST Risk Management Framework -- Advantages of adopting NIST RMF -- Structured approach to risk management -- Alignment with industry standards -- A holistic approach to risk management -- Efficiency through standardization -- Enhanced security posture -- Compliance and regulatory alignment -- Risk reduction and resilience -- Cost efficiency -- Informed decision-making -- Flexibility and adaptability -- Compliance and regulatory considerations -- A common compliance challenge -- The role of the NIST RMF…”
Libro electrónico -
37814Publicado 2023Tabla de Contenidos: “…-- Understanding Azure at a high level -- Understanding Azure's approach to availability and resiliency -- Looking at redundancy in Azure -- Looking briefly at Azure SLAs and the nines of availability -- Looking at redundancy within a region -- Looking at redundancy across regions -- Looking at Azure's approach to IaaS -- Looking at IaaS for data -- Looking at IaaS for applications -- Discussing firewalls versus network security groups -- Using Azure PaaS features -- Looking at database PaaS -- Looking at PaaS for applications…”
Libro electrónico -
37815Publicado 2024Tabla de Contenidos: “…-- Enact a Zero-Tolerance Policy -- Dismantle Your Performance Review Process -- Address Conflicts of Interest -- Reimagine Your Investigation Process -- Treat Your Exit Interviews Like Customer Reviews -- When You See Something, Say Something -- Intervene in the Moment -- Intervene after the Incident Occurs -- Check-in with Your Colleague -- Support Your Colleague in Reporting the Incident -- Watch out for Retaliation -- Continue to Check-in on Your Colleague -- Myth 6 Why Are You Asking for a Raise? …”
Libro electrónico -
37816Publicado 2022Tabla de Contenidos: “…NetworkMiner -- Arkime -- Wireshark -- Summary -- Questions -- Further reading -- Chapter 10: Analyzing System Memory -- Memory analysis overview -- Memory analysis methodology -- SANS six-part methodology -- Network connections methodology -- Memory analysis tools -- Memory analysis with Volatility -- Volatility Workbench -- Memory analysis with Strings -- Installing Strings -- Common Strings searches -- Summary -- Questions -- Further reading -- Chapter 11: Analyzing System Storage -- Forensic platforms -- Autopsy -- Installing Autopsy -- Starting a case -- Adding evidence -- Navigating Autopsy -- Examining a case -- Master File Table analysis -- Prefetch analysis -- Registry analysis -- Summary -- Questions -- Further reading -- Chapter 12: Analyzing Log Files -- Logs and log management -- Working with SIEMs -- Splunk -- Elastic Stack -- Security Onion -- Windows Logs -- Windows Event Logs -- Analyzing Windows Event Logs -- Acquisition -- Triage -- Detailed Event Log analysis -- Summary -- Questions -- Further reading -- Chapter 13: Writing the Incident Report -- Documentation overview -- What to document -- Types of documentation -- Sources -- Audience -- Executive summary -- Incident investigation report -- Forensic report -- Preparing the incident and forensic report -- Note-taking -- Report language -- Summary -- Questions -- Further reading -- Part 4: Ransomware Incident Response -- Chapter 14: Ransomware Preparation and Response -- History of ransomware -- CryptoLocker -- CryptoWall -- CTB-Locker -- TeslaCrypt -- SamSam -- Locky -- WannaCry -- Ryuk -- Conti ransomware case study -- Background -- Operational disclosure -- Tactics and techniques -- Exfiltration -- Impact -- Proper ransomware preparation -- Ransomware resiliency -- Prepping the CSIRT -- Eradication and recovery -- Containment -- Eradication -- Recovery -- Summary -- Questions…”
Libro electrónico -
37817Publicado 2006Tabla de Contenidos: “…Regole tra arte e natura Natura sottomessa, natura libera - Mimésis e idee di terza natura - Bellezza della natura e critica del guardare - La Natura riprodotta: immagini ideali, luoghi reali - La Natura nell'Arte della prima metà dl Novecento: un repertorio - Nature immaginate, nature ricreate -- 155. …”
Electrónico -
37818por OECDTabla de Contenidos: “…Tasso di crescita medio annuo della spesa sanitaria in termini reali, 2000‐11, Italia e altri Paesi dell'OCSE -- Figura 1.5. …”
Publicado 2016
Libro electrónico -
37819por Eldred, Gary W.Tabla de Contenidos: “…8.2 Your "Fixer" Search 8.3 Improvement Possibilities 8.4 Required Repairs and Improvements 8.5 You Can Improve Everything about a Property--Including its Location 8.6 What Types of Improvements Pay the Greatest Returns? 8.7 Budgeting for Resale Profits 8.8 Comply with Laws and Regulations 8.9 Should You Buy a "Fixer"? …”
Publicado 2012
Libro electrónico -
37820