Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Arquitectura 2,869
- Development 1,164
- Application software 993
- Engineering & Applied Sciences 988
- Arquitectura moderna 850
- Architecture 835
- Cloud computing 697
- Computer networks 609
- Computer Science 592
- Art, Architecture & Applied Arts 519
- Management 506
- Visual Arts 476
- Historia 475
- Data processing 430
- Photography 430
- Computer architecture 406
- Software architecture 397
- Computer software 395
- Database management 384
- Security measures 376
- Electrical & Computer Engineering 362
- History 335
- Obras 328
- Java (Computer program language) 326
- Telecommunications 317
- Arquitectes 313
- Diseños y planos 299
- Artificial intelligence 296
- Computer programs 296
- Computer security 295
-
20481Publicado 2022“…AWS Solutions Architect Professional (SAP-C02) 2023 Learn from AWS Certification Author, Five Time O'Reilly Author and AWS ML Hero Noah Gift Getting certified by AWS can be a big boost for your career in cloud application development and hybrid architectural design. In this course, a four-part certification prep series--instructor Noah Gift, an AWS ML Hero, shows you the skills you need to know to prepare for and tackle the AWS Certified Solutions Architect Professional exam (SAP-C02). …”
Video -
20482Publicado 2023“…The dynamic nature of modern applications and architectures is producing an explosion of siloed data and telemetry from multiple sources. …”
Video -
20483Publicado 2022“…First, you'll go through an architectural overview of the end-result, then you will go through every configuration item needed to set the automation right between Azure and GitHub Actions and the GitHub Container Registry. …”
Video -
20484Publicado 2024“…You'll learn how to migrate your existing apps onto Kubernetes without a rebuild, and implement modern cloud native architectures that can handle your future growth. Inside, you'll learn how to: Containerize a web application with Docker Host a containerized app on Kubernetes with a public cloud service Save money and improve performance with cloud native technologies Make your deployments reliable and fault tolerant Prepare your deployments to scale without a redesign Monitor, debug and tune application deployments on Kubernetes Designed for busy working developers, this hands-on guide helps your first steps into Kubernetes using the powerful Google Kubernetes Engine (GKE) service. …”
Vídeo online -
20485por Somer, Cornelis Jacob, 1959-“…Delving beneath the surface of the ‘official’ history affords insight into the quest for a unique position, role and methodology within the architectural and urban development spectrum. The book examines the positioning of CIAM during its early years, before probing more deeply into the pursuit of collectivity and the idea of CIAM as a cooperative, which was primarily embraced by its Dutch and Swiss members. …”
Publicado 2007
Tesis -
20486Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
Video -
20487Publicado 2017“…Explore the machine learning landscape, particularly neural nets Use scikit-learn to track an example machine-learning project end-to-end Explore several training models, including support vector machines, decision trees, random forests, and ensemble methods Use the TensorFlow library to build and train neural nets Dive into neural net architectures, including convolutional nets, recurrent nets, and deep reinforcement learning Learn techniques for training and scaling deep neural nets Apply practical code examples without acquiring excessive machine learning theory or algorithm details…”
Libro electrónico -
20488Publicado 2018“…This book gives an insight into the latest research and practical aspects of the broadband communication networks in support of many emerging paradigms/applications of global Internet from the traditional architecture to the incorporation of smart applications. …”
Libro electrónico -
20489Publicado 2021“…She has co-edited Development Cooperation and Emerging Powers: New Partners or Old Patterns (2012) and Institutional Architecture and Development: Responses from Emerging Powers (2015). …”
Libro electrónico -
20490por Weber, Rolf H.“…In light of the general comprehension that an international treaty structure is mi- ing and that self-regulation as a normative model does not sufce in all respects, new architectural and constitutional theories have been developed; furthermore, the international body of the Internet Governance Forum (IGF) came to life. …”
Publicado 2010
Libro electrónico -
20491Publicado 2021“…Weaving between the historical context of Mexico's post-revolutionary period and our present-day world, Embodied Archive approaches literary and archival documents that include anti-alcohol and hygiene campaigns; projects in school architecture and psychopedagogy; biotypological studies of urban schoolchildren and indigenous populations; and literary approaches to futuristic utopias or violent pasts. …”
Libro electrónico -
20492por Deitel, Paul“…The book's modular architecture enables instructors toconveniently adapt the text to a wide range of computer-science anddata-science courses offered to audiences drawn from many majors.Computer-science instructors can integrate as much or as little data-scienceand artificial-intelligence topics as they'd like, and data-science instructorscan integrate as much or as little Python as they'd like. …”
Publicado 2021
Libro electrónico -
20493Publicado 2017“…It comes with plenty of architectural as well as design-based changes. Laravel Foundations is a blend of several recipes that will give you all the essential tips you need to build an application. …”
-
20494Publicado 2016“…Introduces advanced high-capacity data encoding and throughput improvement techniques for fully printable multi-bit Chipless RFID tags and reader systems The book proposes new approaches to chipless RFID tag encoding and tag detection that supersede their predecessors in signal processing, tag design, and reader architectures. The text is divided into two main sections: the first section introduces the fundamentals of electromagnetic (EM) imaging at mm-wave band to enhance the content capacity of Chipless RFID systems. …”
Libro electrónico -
20495Publicado 2017“…Agile) that respondents use most often The range of tasks that respondents perform, including user research, usability testing, information architecture, and project management How salaries compare for job titles such as director, manager, consultant, developer, analyst, and designer To stay up to date on this research, your participation is critical. …”
Libro electrónico -
20496por Bitterman, Alex“…This book will be of interest to students and scholars in various disciplines—including sociology, social work, anthropology, gender and sexuality, LGTBQ+ and queer studies, as well as urban geography, architecture, and city planning—and to policymakers and advocates concerned with LGBTQ+ rights and social justice…”
Publicado 2021
Libro electrónico -
20497por Hofmarcher, Maria M.“…With these developments occurring in a context of tight public finance, some countries have been attempting to improve both the quality of care provided to the chronically ill and reduce cost pressures via changes to the architecture of health-care systems that encourage greater care coordination..…”
Publicado 2007
Capítulo de libro electrónico -
20498Publicado 2016“…You can find this resource as the following website: IBM Spectrum Control Knowledge Center Also provided are descriptions and an architectural overview of the IBM Spectrum Family, highlighting Spectrum Control, as integrated into software-defined storage environments. …”
Libro electrónico -
20499Publicado 2016“…Before you start reading, you must be familiar with the general concepts of kernel-based virtual machine (KVM), Linux, and IBM Power architecture…”
Libro electrónico -
20500Publicado 2016“…The ARM processor was chosen as it has fewer instructions and irregular addressing rules to learn than most other architectures, allowing more time to spend on teaching assembly language programming concepts and good programming practice. …”
Libro electrónico