Mostrando 150,681 - 150,700 Resultados de 152,241 Para Buscar 'at*', tiempo de consulta: 0.49s Limitar resultados
  1. 150681
    por Susam, Nazan
    Publicado 2020
    “…A total of ten chapters in the book were prepared to draw attention to the risks and uncertainties experienced in the pandemic process from an economic, financial, social and political point of view…”
    Libro electrónico
  2. 150682
    por Mussard, Christine
    Publicado 2021
    “…Sa position frontalière avec la Tunisie contribue au façonnement de son histoire, celle d’un territoire de colonisation qui se développe et se rétracte au gré des mobilités de populations attirées par l’offre foncière du Protectorat. Dans le temps du conflit, c’est aussi la situation frontalière qui fait de cette marge de l’empire français aux confins du Constantinois un espace stratégique, une terre de repli et de ressources. …”
    Electrónico
  3. 150683
    por Albert Castanet, Pierre
    Publicado 2021
    “…Un deuxième temps est consacré à l’étude du rire musical, développé à travers toutes ses particularités. Sans être toujours attaché à l'humour, il engendre de nombreuses significations secondaires : la peur, la folie, le désespoir. …”
    Electrónico
  4. 150684
    por Faure, Olivier
    Publicado 2021
    “…Au-delà de la diversité des thèmes abordés, ce recueil ne se contente pas de réévaluer le rôle de certains acteurs méconnus mais il tente de démontrer que nos actuelles attitudes face à la maladie et à la santé, ne sont pas seulement le fruit d’une médicalisation imposée du haut mais aussi le reflet des aspirations populaires. …”
    Electrónico
  5. 150685
    por Romito, Patrizia
    Publicado 2022
    “…L’indagine ha permesso di approfondire alcuni aspetti del maltrattamento al di là del periodo specifico: l’impatto sulla salute, la pervasività della violenza, l’uso strategico delle tattiche di controllo da parte dell’uomo violento e il ruolo della paura, la necessità di considerare la violenza come un continuum e non come una serie di atti separati. In primo piano risaltano la forza e il coraggio delle donne coinvolte, e il ruolo centrale delle operatrici dei centri antiviolenza, vere protagoniste del lavoro collettivo che è confluito nel volume…”
    Electrónico
  6. 150686
    por Forey, Elsa
    Publicado 2019
    “…Néanmoins, cette contradiction peut être résolue en s'attachant à déterminer l'étendue et les limites de la reconnaissance des institutions religieuses par l'ordre étatique…”
    Electrónico
  7. 150687
    Publicado 2021
    “…This report illustrates the multifaceted meanings attached to the notion of aging, country, house, return, and future, and how coordinates such as generation, class, gender, and religion (Muslim/Copts) articulate with such concepts…”
    Libro electrónico
  8. 150688
    Publicado 2021
    “…Apresentamos a análise das relações luso-brasileiras na atual sociedade e a emergência da 'língua portuguesa global'. …”
    Libro electrónico
  9. 150689
    por Barberger, N.
    Publicado 2018
    “…Reprenant le débat ouvert par Hugo Friedrich et Käte Hamburger et s'appuyant sur les analyses critiques contemporaines de l'autobiographie et du sujet lyrique, le présent volume s'attache à tracer les perspectives théoriques et historiques d'une analyse de la poésie qui dit et voile le je, et de l'autobiographie qui dit l'instant vécu et s'en détache…”
    Electrónico
  10. 150690
    por Blaschke, Olaf
    Publicado 2019
    “…Ils se sont aussi intéressés à l’évolution des attitudes dans le temps, à la cristallisation sociale et culturelle des différences ou encore au rôle de la durée dans la constitution d’identités confessionnelles concurrentes. …”
    Electrónico
  11. 150691
    por Albert, Mechthild
    Publicado 2018
    “…Des chercheurs français et étrangers issus de plusieurs disciplines, des praticiens du théâtre, des romanciers se sont attachés à comprendre la pérennité du mystère jusqu'à nos jours, à en cerner les déclinaisons et réinvestissements, tout en faisant apparaître les enjeux que lui confère la modernité…”
    Electrónico
  12. 150692
    por Cupers, Jean-Louis
    Publicado 2021
    “…Le dessein avoué est d’attirer les chercheurs à ce monde nouveau et fascinant des recherches mélopoétiques…”
    Electrónico
  13. 150693
    Publicado 2022
    “…What You Will Learn Know how cryptography, Bitcoin, and other cryptos work Understand how crypto becomes money, and how crypto exchanges work Use crypto as a payment method Buy your first crypto and know what exchange you should use Be aware of the most dangerous crypto attacks and what to do about security and privacy Maintain anonymity and privacy while dealing with crypto Know how Monero (the most popular privacy-centric cryptocurrency) works Create and run your own crypto project Create your own token, both regular (fungible) and NFT (non-fungible), from selecting the platform to economics and finances…”
    Libro electrónico
  14. 150694
    Publicado 2023
    “…It allows readers to practice Janelle Barlow's updated, more efficient three-step formula and enables employees to handle complaints with increased emotional resilience rather than taking them as personal attacks.A Complaint Is a Gift Workbook is packed with the necessary tools to view and treat complaints as a source of innovative ideas that can transform your business…”
    Libro electrónico
  15. 150695
    Publicado 2022
    “…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
    Video
  16. 150696
    Publicado 2022
    “…Despite taking all that care, you might still fall prey to cyber attacks; this audiobook will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. …”
    Grabación no musical
  17. 150697
    Publicado 2010
    “…In these pages, Mark Murphy explains how success, and the satisfaction it brings, comes from knowing how to set goals that are: Heartfelt-have an emotional attachment, "scratch an existential itch." Animated-motivated by a vision, that movie that plays over and over in your mind. …”
    Grabación no musical
  18. 150698
    Publicado 2009
    “…You will learn the secrets behind: Confronting the blind spots that sabotage success Overcoming the success-strangling "need to be right" Eliminating silo mentality and building committed partnerships Ending compliance and gaining full support and alignment Talking straight and confronting difficult situations head on Building a culture of 100% accountability Too many people in leadership positions attempt to enact change through systemic means, such as restructuring or altering processes. …”
    Grabación no musical
  19. 150699
    Publicado 2011
    “…A complete regimen from a leading expert on developing the mindset for attaining goals, Executive Toughness is your workout for ultimate success in your career and in your life…”
    Grabación no musical
  20. 150700
    Publicado 2011
    “…Applying her years of expertise, Bates takes you deep below the surface to find the powerful leadership brand inside you, so you can: Connect with key audiences Elevate your leader profile Attract and retain the best talent Create business opportunities Shape a high-performance culture Drive long-term value within your company It's not about crafting a leadership style out of thin air in order to influence people and "get ahead." …”
    Grabación no musical