Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 13,641
- History 5,765
- Biblia 5,721
- Crítica e interpretación 3,870
- Filosofía 3,824
- Iglesia Católica 3,255
- Biografías 2,457
- Teología 2,329
- Colecciones 1,675
- Philosophy 1,675
- Management 1,554
- Education 1,439
- Development 1,437
- Engineering & Applied Sciences 1,316
- Descripción y viajes 1,305
- Història 1,258
- Historia y crítica 1,213
- Jesucristo 1,210
- Social aspects 1,183
- Application software 1,180
- Teología dogmática 1,108
- Derecho canónico 1,103
- Derecho 1,049
- Política y gobierno 1,042
- Catequesis 1,016
- Cristianismo 1,012
- Liturgia 990
- History and criticism 973
- Moral cristiana 970
- Business & Economics 952
-
343681Publicado 2023“…Byron helped found and lead as many as 10 simultaneous projects. He has gathered a great deal of valuable knowledge in product ownership and agile engineering. …”
Video -
343682Publicado 2018“…His talk focuses on his experiences in the commercial art field and developing three-dimensional, interactive spaces. The 10-Year Impact Award recognizes influential research published at our previous conferences. …”
Libro electrónico -
343683Publicado 2023“…Depression screening interventions, many of which included additional intervention components, were associated with a lower prevalence of depression or clinically important depressive symptomatology after six to twelve months (OR, 0.60 [95% CI, 0.50 to 0.73]; 8 RCTs [n=10,244]; I2=0%). Several instruments demonstrated adequate test accuracy (e.g., sensitivity 0.82 [95% CI, 0.76 to 0.86], specificity 0.87 [95 % CI, 0.84 to 0.89] for the patient health questionnaire (PHQ)-2 followed by the full PHQ-9 if the PHQ-2 is positive), and a large body of evidence supported benefits of psychological and pharmacologic treatment of depression. …”
Libro electrónico -
343684por Merzthal Toranzo, Jorge Baltazar“…La labor de recerca comprèn, en la primera etapa, un estudi quantitatiu, amb una mostra representativa de 1.000 individus, que constitueix aproximadament el 10 % de la població en el sector industrial de la soldadura. …”
Publicado 2014
Accés lliure
Tesis -
343685
-
343686por Baena Garcia, Antoni“…Després del període d'inclusió de fumadors a l'estudi, van ser seleccionats 600 fumadors majors de 18 anys; amb un consum de 10 o més cigarretes; amb intenció de deixar de fumar en els següents 30 dies; disponibilitat de l'ús de telèfon; sense altres addiccions ni història actual de trastorn mental sever o depressió major. …”
Publicado 2015
Accés lliure
Tesis -
343687Una intervención domiciliaria en pacientes con psicosis que presentan baja adherencia al tratamientoPublicado 2019“…Juntament amb aquests pacients, han participat en l'estudi 22 dels seus familiars, 12 familiars del grup PSICODOM i 10 del grup CONTROL. Els instruments utilitzats han estat: PANSS (Positive and Negative Syndrome Scale), EEAG (Escala de Evaluación de la Actividad Global); BDI-II (Beck Depression Inventory-II); QOLI (Quality of Life Interview); SFS (Social Functioning Scale); SUMD (Scale of Unawareness of Mental Disorder); Test Morisky-Green; FCS (Familiar Communication Scale); SCID-I/P; PBI (Parental Bonding Instrument). …”
Accés lliure
Tesis -
343688Publicado 2020“…The main program starts on Monday, February 10th at the University of Technology Sydney with an opening keynote on Soma Design - Intertwining Aesthetics, Ethics and Movement by Professor Kristina Höök from KTH Stockholm, who will talk about soma design: a process that allows designers to examine and improve on connections between sensation, feeling, emotion, subjective understanding and values. …”
Libro electrónico -
343689Publicado 2005“…None of the four following studies have found an increased risk for myocardial infarction or stroke among users of snuff in Sweden.10. A newly published population based study from the north of Sweden did not find an increased risk for diabetes among users of snuff. …”
Libro electrónico -
343690Publicado 2010“…La mayoría (64 por ciento) de los triatominos (incluyendo 10 T. infestans) fueron colectados de huecos en troncos de quebrachos que albergaban nidos de loros. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales UPSA
Tesis -
343691Publicado 1984Libro electrónico
-
343692por Diasio, Stephen Ray“…El tercer estudi, article#3, presenta un estudi longitudinal durant un període de 10 anys que utilitza IBM "Innovation Jams" como un context per a la col·laboració a gran escala dins de la tipologia anomenada "plataforma". …”
Publicado 2012
Accés lliure
Tesis -
343693por Statens beredning för medicinsk utvärdering (Sweden)“…Capsaicin reduces (NNT 8 for at least 50%) neuropathic pain and osteoarthritis pain in small joint pain (strong scientific evidence).10. The research results are contradictory when it comes to the effectiveness of glucosamine in relieving osteoarthritis pain. …”
Publicado 2006
Libro electrónico -
343694Publicado 2020“…Invitations were sent to 13 834 (94.9%) mail group members and 10 205 (70.0%) email group members. A significantly larger proportion of the mail group (n = 78; 0.54%; 95% CI, 0.42%-0.67%) registered in PPRNs relative to the email group (n = 24; 0.16%; 95% CI, 0.11%-0.25%; P < 0.001). …”
Libro electrónico -
343695Publicado 2022“…D'altra banda, durant 1910—1937, només s'observen clarament dues senyals periòdiques de 4,10±0,04 anys i 7,57±0,03 anys. De la mateixa manera, les dues senyals presenten períodes lleugerament més llargs a l'asimetria N-S associada als grups de platges en comparació amb l'associada als grups de taques…”
Accés lliure
Tesis -
343696Publicado 2023“…It covers how to create advanced charts that require additional formatting and calculations, including timelines, Likert scale charts, lollipop charts, and more. Lesson 10: Closing Thoughts You have covered a lot of ground in this series. …”
Video -
343697Publicado 2022“…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
Video -
343698Publicado 2019“…Es van estudiar 135 subjectes (78 homes i 57 dones), mitjana d’ edat 44,2 anys (DE=10,3), majoritàriament vivien en ciutats, la meitat eren solters, el 41,5% tenien estudis universitaris i el 60% no treballaven. …”
Accés lliure
Tesis -
343699Publicado 2017“…Els participants de l'estudi són 10 casos enregistrats de teràpia de parella; 5 casos amb baix ajustament diàdic previ al tractament i que no van millorar la simptomatologia depressiva al final de la teràpia i 5 casos amb alt ajustament diàdic previ al tractament i que van millorar la simptomatologia depressiva al final de la teràpia. …”
Accés lliure
Tesis -
343700por Figes, Orlando“…En estos apenas 33 años Rusia ganó poco, más bien nada, su pueblo sufrió lo indecible: las cifras de muertos por las revoluciones de 1917, la guerra civil, el terror, las hambrunas y las epidemias rondaron alrededor de los 10 millones de muertos, sin contar las emigraciones y exilios (2 millones) y los efectos demográficos en la tasa de natalidad de los años posteriores. …”
Publicado 2000
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro