Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 725
- Biblia 426
- Moral cristiana 299
- Teología dogmática 281
- Derecho canónico 264
- Teología 220
- Obras anteriores a 1800 200
- Iglesia Católica 197
- Documentales 187
- Sermones 170
- Data processing 165
- obras anteriores a 1800 161
- Management 154
- Computer networks 149
- Development 135
- Crítica e interpretación 116
- Tomás de Aquino 112
- Application software 109
- Computer programs 100
- Derecho civil 100
- Mathematical models 98
- Design and construction 96
- Engineering & Applied Sciences 95
- Derecho 93
- Historia eclesiástica 91
- Artificial intelligence 86
- Películas cinematográficas 83
- Security measures 83
- Filosofía 82
- WebSphere 81
-
22021
-
22022
-
22023
-
22024
-
22025
-
22026por Mondéjar, Gaspar Ibáñez de Segovia y Mendoza, Marqués de, 1628-1708
Publicado 1783Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Episcopal de Plasencia)Libro -
22027
-
22028
-
22029Publicado 2022“…Domain 1: Data Engineering 1.0 course intro 1.1 technology prerequisite 1.2 sagemaker studio lab 1.3 learn aws cloudshell 1.4 cloud developer workspace advantage 1.5 prototyping ai apis aws cloudshell bash 1.6 cloud9 with codewhisperer 1.7 domain one intro 1.8 data storage 1.9 determine storage medium 1.10 using s3 demo 1.11 job styles batch vs streaming 1.12 data ingestion pipelines 1.13 aws batch demo 1.14 step function demo Domain 2: Exploratory Data Analysis 2.0 domain intro Sanitize and prepare data for modeling 2.1 cleanup data 2.2 scaling data 2.3 labeling data 2.4 mechanical turk labeling Perform feature engineering 2.5 identify extract features 2.6 feature engineering concepts Analyze and visualize data for machine learning 2.7 graphing data 2.9 clustering Conclusion 2.10 conclusion Domain 3: Modeling 3.0 domain intro Frame business problems as machine learning problems 3.1 when to use ml 3.2 supervised vs unsupervized 3.3 selection right ml solution Select the appropriate model(s) for a given machine learning problem 3.4 select models 3.5 sagemaker canvas demo Train machine learning models 3.6 train test split 3.7 optimization 3.8 compute choice Perform hyperparameter optimization 3.14 neural network architecture Evaluate machine learning models 3.18 overfitting vs underfitting 3.19 selecting metrics 3.22 compare models experiment tracking Conclusion 3.23 Conclusion Domain 4: Machine Learning Implementation and Operations 4.0 course intro Build machine learning solutions for performance, availability, scalability, resiliency, and fault 4.1 logging monitoring 4.2 multiple regions 4.3 reproducible workflow 4.4 aws flavored devops Recommend and implement the appropriate machine learning services and features for a given 4.5 provisioning ec2 4.5 compute choices 4.6 provisioning ebs 4.7 aws ai ml services Apply basic AWS security practices to machine learning solutions. 4.9 plp aws lambda 4.10 integrated security Deploy and operationalize machine learning solutions 4.13 sagemaker workflow 4.14 doing predictions with sagemaker canvas 4.16 retrain models Conclusion 5.0 course conclusion Topics Covered Include: Domain 1: Data Engineering Domain 2: Exploratory Data Analysis Domain 3: Modeling Domain 4: Machine Learning Implementation and Operations Additional Popular Resources Pytest Master Class AWS Solutions Architect Professional Course Github Actions and GitOps in One Hour Video Course Jenkins CI/CD and Github in One Hour Video Course AWS Certified Cloud Practitioner Video Course Advanced Testing with Pytest Video Course AWS Solutions Architect Certification In ONE HOUR Python for DevOps Master Class 2022: CI/CD, Github Actions, Containers, and Microservices MLOPs Foundations: Chapter 2 Walkthrough of Practical MLOps Learn Docker containers in One Hour Video Course Introduction to MLOps Walkthrough AZ 900 (Azure Fundamentals) Quick reference guide 52 Weeks of AWS Episode 8: Infrastructure as Code with CDK and AWS Lambda Learn GCP Cloud Functions in One Hour Video Course Python Devops in TWO HOURS! …”
Video -
22030
-
22031por Leinsle, Ulrich G.Click para texto completo desde fuera UPSA
Publicado 2010
Click para texto completo desde UPSA
Libro electrónico -
22032
-
22033
-
22034por Lamberto, de Zaragoza, Fray
Publicado 1780Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro -
22035
-
22036
-
22037por Echeverz, Francisco Miguel, 1672-1745
Publicado 1735Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca Central de Capuchinos de España, Biblioteca Diocesana Bilbao, Bibliotecas de la Diócesis de Teruel y Albarracín)Libro -
22038Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
22039Publicado 2009“…INSTALACIONES TÉRMICAS EN EDIFICIOS: DESCRIPCIÓN BÁSICA Y CRITERIOS DE EFICIENCIA ENERGÉTICA: 4.1.Elementos típicos de una instalación de calefacción 4.2.Sistemas de refrigeración y climatización 4.3. Optimización energética de una instalación residencial en Zaragoza (España)--5. …”
Libro -
22040por Senault, Jean François (CO), 1601-1672
Publicado 1784Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Diocesana Bilbao)Libro