Mostrando 5,141 - 5,160 Resultados de 12,203 Para Buscar 'Waycross~', tiempo de consulta: 1.67s Limitar resultados
  1. 5141
    Publicado 2018
    “…Primarily as a response to the increasing flood impacts, the Chinese Central Government called for widespread uptake of the Sponge City approach across China in 2013 and provided financial support to foster implementation of this approach in a selection of pilot cities. …”
    Libro electrónico
  2. 5142
    Publicado 2017
    “…As the fields of organometallic and coordination chemistry of the transition metals has grown more mature, the under-explored chemistry of the rare-earths and actinides has drawn the attention of research groups from across the globe looking for new fundamental discoveries and access to compounds with unique properties. …”
    Libro electrónico
  3. 5143
    Publicado 2018
    “…The current anticancer armamentarium includes many active agents that are applied across tumor types. However, most of these broadly-active anticancer drugs have a small therapeutic index and barely discriminate between malignant and normal cells. …”
    Libro electrónico
  4. 5144
    Publicado 2021
    “…Rethinking Urban Risk and Resettlement in the Global South investigates urban resettlement programmes across the Global South from the perspective of risk reduction…”
    Libro electrónico
  5. 5145
    Publicado 2021
    “…At the heart of this study are the possibilities for transdisciplinary collaborations, the opportunity to use exhibitions as research devices, and the role of experimentation in the exhibition process.Francisco Martínez increases our understanding of the relationship between contemporary art, design and anthropology, imagining creative ways to engage with the contemporary world and developing research infrastructures across disciplines. He opens up a vast field of methodological explorations, providing a language to reconsider ethnography and objecthood while producing knowledge with people of different backgrounds…”
    Libro electrónico
  6. 5146
    Publicado 2021
    “…American Cities in Post-Apocalyptic Science Fiction explores the post-apocalyptic American city in literary and popular fiction, across print, visual, audio and digital media…”
    Libro electrónico
  7. 5147
    Publicado 2023
    “…Delve into industrial digital transformation and learn how to implement modern business strategies powered by digital technologies as well as organization and cultural optimization About This Audiobook Identify potential industry disruptors from various business domains and emerging technologies Leverage existing resources to identify new avenues for generating digital revenue Boost digital transformation with cloud computing, big data, artificial intelligence (AI), and the Internet of Things (IoT) In Detail Digital transformation requires the ability to identify opportunities across industries and apply the right technologies and tools to achieve results. …”
    Grabación no musical
  8. 5148
    Publicado 2013
    “…African American Females: Addressing Challenges and Nurturing the Future illustrates that across education, health, and other areas of social life, opportunities are stratified along gender as well as race lines. …”
    Libro electrónico
  9. 5149
    por International Energy Agency.
    Publicado 2023
    “…The scope of the report includes all sectors of the economy, industry and all the regions across the world, where we extract the main recommendations that are applicable to the case of Korea. …”
    Libro electrónico
  10. 5150
    Publicado 2023
    “…., 2022); the benefits of teleworking on the continuity of operations across various sectors (Santos et al., 2022); research of the tourism and recreational possibilities of Russia and Kazakhstan's cross-border regions and the threats these areas faced during the pandemic (Tanina et al., 2022), the impact of the new coronavirus infection on the Russian labor market (Rodionov et al., 2022); the factors driving young Vietnamese people's intention to use financial technology in the context of the COVID-19 outbreak (Khuong et al., 2022) or those influencing access to credit for informal labor sector (Vu and Ho, 2022); predicting and analyzing Jordanian insurance firms' performance (Altarawneh et al., 2022) or developing an early warning system for solvency risk in the banking industry (Hidayat et al., 2022) during the COVID-19 pandemic; the impact of the pandemic on European stock markets (Keliuotyte-Staniuleniene and Kviklis, 2022); the drivers of cross-border mergers and acquisitions during the pandemic (Lee et al., 2021); examining the financial and fiscal variables of Ecuadorian economic groups (Tulcanaza-Prieto and Morocho-Cayamcela, 2021)…”
    Libro electrónico
  11. 5151
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
    Video
  12. 5152
    Publicado 2004
    “…Creating beautifully coded HTML Web pages that perform predictably and consistently across all browsers and platforms can be a daunting task, but best-selling author Elizabeth Castro knows that most readers don't need an encyclopedic reference, just simple instructions for creating their first Web page. …”
    Libro electrónico
  13. 5153
    Publicado 2021
    “…Part three emphasizes ways in which dogs can influence student learning during classes and across aspects of their professional development. …”
    Libro electrónico
  14. 5154
    Publicado 2023
    “…Learn how to keep the pipeline full of qualified opportunities and avoid debilitating sales slumps by leveraging a balanced prospecting methodology across multiple prospecting channels. This book reveals the secrets, techniques, and tips of top earners. …”
    Grabación no musical
  15. 5155
    Publicado 2023
    “…How can you maximize data collaboration across your organization without having to build integrations between individual applications, systems, and other data sources? …”
    Libro electrónico
  16. 5156
    Publicado 2023
    “…You'll learn to: - Communicate clearly over a variety of media - Bond with colleagues across the wires - Keep others-and yourself-accountable - Avoid and mitigate tech glitches Don't have much time? …”
    Grabación no musical
  17. 5157
    Publicado 2023
    “…The technologies covered in Microsoft Exam AI-900, including machine learning, natural language processing, computer vision, and cognitive services, are widely used in real-world applications across various industries. In healthcare, AI is used for medical image analysis, drug discovery, and predicting patient outcomes. …”
    Video
  18. 5158
    Publicado 2023
    “…Frederic Godart and Jacques Neatby bring a wealth of practical experience and in-depth knowledge, with over eight hundred hours of direct observation with more than fifty leadership teams across the globe and thousands of hours working with executives. …”
    Grabación no musical
  19. 5159
    Publicado 2022
    “…Global competition drives fine-tuned and efficient systems, but time-proven local practices may show better resilience in such uncertain futures.The book reflects the sheer diversity of approaches and responses to these challenges, across a wide range of academic disciplines, provoking us to look at the issues in new ways. …”
    Libro electrónico
  20. 5160
    por Dunn, Nick
    Publicado 2023
    “…From atomic bomb fallouts to shampoo microplastics, the Earth's environmental woes are indelibly linked to modern societies overconsumption of resources and the mass-waste that this creates, particularly Global North countries across Europe and North America. In an effort to curb their impacts, many of these country's governments signed the Paris Agreement in 2015 with the collective goal of keeping global temperature increases to a maximum of 1.5 °C, as well as pledging to meet ambitious Net-Zero carbon emission reduction targets by the year 2050. …”
    Libro electrónico