Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 484
- Cloud computing 470
- Arquitectura 461
- Engineering & Applied Sciences 377
- Application software 363
- Management 259
- Computer Science 247
- Arquitectes 203
- Arquitectura moderna 196
- Computer networks 188
- Computer software 177
- Database management 162
- Software architecture 156
- Data processing 140
- Electrical & Computer Engineering 134
- Security measures 134
- Examinations 129
- Telecommunications 128
- Web services 124
- Amazon Web Services (Firm) 121
- Microsoft .NET Framework 116
- Information technology 115
- Java (Computer program language) 109
- Big data 93
- Computer security 93
- Arquitectos 90
- Certification 90
- Electronic data processing 90
- Obras 90
- Architecture 82
-
3841por Hucaby, David“…Master the CCNP(R) SWITCH 642-813 exam with this official study guide Assess your knowledge with chapter-opening quizzes Review key concepts with Exam Preparation Tasks CCNP SWITCH 642-813 Official Certification Guide is a best-of-breed Cisco(R) exam study guide that focuses specifically on the objectives for the CCNP(R) SWITCH exam. Network architect and best-selling author Dave Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. …”
Publicado 2010
Libro electrónico -
3842
-
3843Publicado 2020“…Author Mike Kavis ( Architecting the Cloud ) explores lessons learned from enterprises in the midst of cloud transformations. …”
Libro electrónico -
3844Publicado 2016“…Delegating this opportunity to a social media team is not enough—today’s leaders must personally grasp the tectonic changes arising from today’s social, always-connected customer, and must re-architect business practices and models accordingly. …”
Libro electrónico -
3845Publicado 2014“…Other topics that are included are implementing network load balancing, architecting a business continuity and disaster recovery solution, and active directory rights management services. …”
-
3846Publicado 2018“…12+ Hours of Video Instruction 13 hours of video instruction providing hands-on labs to teach and test your troubleshooting capabilities, which align with the Red Hat Certified Architect Troubleshooting certification (Exam 342). …”
-
3847Publicado 2016“…You're a manager of a technical team whose organization is adopting a microservices approach, and you need to learn more. You're a software architect, programmer, developer, or team leader who is interested in learning more about microservices. …”
Libro electrónico -
3848Publicado 2015“…Understanding progressive enhancement will make you a better web professional, whether you’re a content strategist, information architect, UX designer, visual designer, front-end developer, back-end developer, or project manager. …”
Libro electrónico -
3849Publicado 2008“…Size your OpsMgr databases Architect for redundancy and performance Install or migrate to OpsMgr 2007 Secure OpsMgr Back up OpsMgr components Understand how monitors and rules work Manage different aspects, including ACS, client monitoring, synthetic transactions, and distributed applications Extend OpsMgr Develop management packs and reports CD-ROM includes: Database sizing spreadsheet Utilities, management packs, and reports Microsoft’s best practices for rule and monitor targeting and PowerShell Cheat Sheet Live Links--more than 200 hypertext links and references to materials, connectors, sites, and newsgroups related to OpsMgr Contents Introduction 1 Part I Operations Management Overview and Concepts 1 Operations Management Basics 11 2 What’s New 63 3 Looking Inside OpsMgr 97 Part II Planning and Installation 4 Planning Your Operations Manager Deployment 137 5 Planning Complex Configurations 203 6 Installing Operations Manager 2007 233 7 Migrating to Operations Manager 2007 277 Part III Moving Toward Application-Centered Management 8 Configuring and Using Operations Manager 2007 303 9 Installing and Configuring Agents 369 10 Complex Configurations 425 11 Securing Operations Manager 2007 471 Part IV Administering Operations Manager 2007 12 Backup and Recovery 539 13 Administering Management Packs 593 14 Monitoring with Operations Manager 647 Part V Service-Oriented Monitoring 15 Monitoring Audit Collection Services 739 16 Client Monitoring 797 17 ..…”
Libro electrónico -
3850Publicado 2011“…What do Apple CEO Steve Jobs, comedian Chris Rock, prizewinning architect Frank Gehry, the story developers at Pixar films, and the Army Chief of Strategic Plans all have in common? …”
Grabación no musical -
3851Publicado 2022“…About the Author Ben Wilson is Principal Resident Solutions Architect at Databricks, where he developed the Databricks Labs AutoML project. …”
Libro electrónico -
3852Publicado 2024“…Led by experts Maxime Labonne, Dennis Rothman, and Abi Aryan, this video delivers the advanced skills needed to architect performant LLMs that deliver real business impact. …”
Video -
3853Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
Video -
3854Publicado 2023“…Developed from the Urban Maestro project, a joint initiative of the United Nations Human Settlement programme (UN-Habitat), UCL and the Brussels Bouwmeester Maître Architecte (BMA), Urban Design Governance offers the first panorama of informal urban design governance tools from across Europe, and places the tools within a theoretical and analytical framework with the potential to be applied locally and internationally. …”
Libro electrónico -
3855Publicado 2023“…Paul Papanek Stork, principal architect at Don't Pa..Panic Consulting, provides a concise yet comprehensive overview of the foundational skills required to understand and work with Power Automate. …”
Libro electrónico -
3856Publicado 2024“…This book starts with an introduction to Azure Virtual Desktop before delving into the intricacies of planning and architecting its infrastructure. As you progress, you’ll learn about the implementation process, with an emphasis on best practices and effective strategies. …”
Libro electrónico -
3857Publicado 2018“…Should we, as designers, follow Silicon Valley in its quest for products that engage everyone on the planet, or the architect Glenn Murcutt's conviction that he can only build in places he knows so well that his designs can be outstanding? …”
Libro electrónico -
3858Publicado 2021“…In this edition of Meet the Expert, DevOps specialist Gee Chow and cloud architect Roy Muermann explain how banks and financial services organizations are currently approaching the migration of legacy applications (by optimizing container management and automating app delivery, for instance). …”
Video -
3859Publicado 2023“…You're a data scientist, data/machine learning engineer, machine learning architect, or software engineer who is building systems on top of AI models. …”
Video -
3860Publicado 2023“…What's Inside Building productive relationships with other C-level executives Negotiating salaries and managing promotions Architecting future-proof systems Handling security breaches and ransomware attacks About the Reader For technology leaders working in or aspiring towards a CTO role. …”
Video