Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 239
- Application software 202
- Artificial intelligence 200
- Management 192
- Engineering & Applied Sciences 170
- Computer networks 160
- Cloud computing 157
- Computer programs 127
- Machine learning 123
- Computer security 116
- Computer graphics 102
- Data processing 101
- Python (Computer program language) 101
- Security measures 101
- Digital techniques 98
- Computer Science 94
- Photography 85
- Web site development 82
- Design 81
- Technological innovations 81
- Internet of things 79
- Image processing 77
- Computer software 76
- History 71
- Programming 71
- Examinations 68
- Information technology 67
- Historia 65
- Leadership 65
- Computer programming 59
-
5241Publicado 2022“…Skill Level Intermediate What You Will Learn How high-performance organizations are addressing the requirements of distribution with Spring Boot, Spring Cloud, and Kubernetes The need for cloud native Foundational first steps in Java, Kotlin, Spring Boot, Reactive Programming, Containers, and Kubernetes How to turn applications into docker images to package for production How to build native images with Spring Native Build observable services Implement continuous integration and continuous delivery Build applications into the production cloud with Azure Spring Cloud Build distributed systems including configuration, service registration, and discovery and RSocket and edge services Extend the platform by building on top of Kubernetes to enhance the platform using Spring Who Should Take This Course Java developers interested in deploying applications to the cloud using Spring Cloud Enterprise developers who need to quickly build new applications that are scalable, portable, resilient, and easily updated Course Requirements Experience with Java EE or Spring and a basic knowledge of distributed computing, cloud-based services, Agile methods, and microservice architectures. …”
Video -
5242Publicado 2014“…The IoT developments address the whole IoT spectrum - from devices at the edge to cloud and datacentres on the backend and everything in between, through ecosystems are created by industry, research and application stakeholders that enable real-world use cases to accelerate the Internet of Things and establish open interoperability standards and common architectures for IoT solutions. …”
Libro electrónico -
5243por Ramsay, Morgan. author“…Video games define a cultural crossroad where business, entertainment, and technology converge, where the risks are great, cutting edge technology is vitally important and competition is intense. …”
Publicado 2015
Libro electrónico -
5244Publicado 2019“…Additionally, we have 22 poster presentations and 5 highlight presentations on recently published, cutting-edge and high-impact research. The technical program is enriched by 7 pre-conference workshops and 7 tutorials. …”
Libro electrónico -
5245Publicado 2022“…This book shows you how to build apps using cutting-edge technologies. You'll learn how to solve common web development problems with GraphQL and Apollo, such as database access, authentication, and image uploads. …”
Libro electrónico -
5246Publicado 2023“…What you will learn Master responsive web design using HTML, CSS, and JavaScript Stay current with modern web development techniques and trends Utilize the latest HTML5, CSS3, and JavaScript features for cutting-edge websites Create captivating and resonating web design templates Develop a deep understanding of adaptable design Enhance your creative skills with CSS3 animations and interactivity Audience This course is ideal for students seeking to elevate their proficiency in HTML, CSS, and JavaScript. …”
Video -
5247Publicado 2022“…What You Will Learn This book serves as a guide to all relevant Internet Engineering Task Force (IETF) standards Request for Comments (RFCs), organized by topic and discussed in plain language Understand how IPv6 makes viable technologies such as multicast (for efficient global audio/video streaming), IPsec VPNs (for better security), and simpler VoIP Take “edge computing” to the limit by eliminating intermediary servers made necessary by IPv4 NAT–for example, making connections directly from my node to yours Discover how organizations can introduce IPv6 into existing IPv4 networks (“Dual Stack”), and then eliminate the legacy IPv4 aspects going forward (“Pure IPv6”) for the mandates going into place now (for example, US DoD requirements to move all networks to Pure IPv6) Recognize that 5G networking (the Grand Convergence of conventional networks and wireless service) depends heavily on the advanced features IPv6 This book is for networking professionals. …”
Libro electrónico -
5248Publicado 2010“…HARD Goals gives you the cutting-edge science to engage every employee in pursuing and achieving extraordinary goals. …”
Grabación no musical -
5249por Hayes, Andrew F.“…Hayes's approach is cutting edge in both philosophy and pragmatics. I've used the first edition extensively as a course text as well as in my own research, and am excited to move to the second edition."…”
Publicado 2018
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
5250GLSVLSI'18 proceedings of the 2018 Great Lakes Symposium on VLSI : May 23-25, 2018, Chicago, IL, USAPublicado 2018“…Artificial Intelligence at the Edge. Implementing and Benchmarking Post-Quantum Cryptography in Hardware. …”
Libro electrónico -
5251Publicado 2022“…However, the periphery does not necessarily coincide with the geographical edges of the cities: both in Berlin and in Naples, historical events, or the particular topography have naturally shifted the "peripheral" location along a radius that only ideally starts from the city centre and often extends to its inner fringes. …”
Libro electrónico -
5252Publicado 2024“…Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running on Android v8.0 and above and iOS v13 and above, smartphones with a minimum screen size of 4.7. …”
Libro electrónico -
5253Publicado 2024“…This official study guide helps you master all the topics on the CCNP and CCIE Security Core SCOR 350-701 exam, including Network security Cloud security Content security Endpoint protection and detection Secure network access Visibility and enforcement Companion Website: The companion website contains more than 200 unique practice exam questions, practice exercises, and a study planner Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running Android v8.0 and above or iPadOS v13 and above, smartphones running Android v8.0 and above or iOS v13 and above with a minimum screen size of 4.7. …”
Libro electrónico -
5254Publicado 2024“…Pearson Test Prep online system requirements: Browsers: Microsoft Edge 90 and above, Chrome version 105 and above, and Safari version 13 and above. …”
Libro electrónico -
5255Publicado 2023“…. - Simon Tschk̲e, Head of Research, German Edge Cloud…”
Grabación no musical -
5256Publicado 2020“…We are also pleased to offer a diverse set of 11 workshops which cover a wide range of cutting-edge topics important for the field of multimedia. …”
Libro electrónico -
5257Publicado 2018“…Finally, 2 pre-conference workshops will enable focused work to advance cutting-edge topics and a doctoral consortium will provide valuable, personalized feedback to student researchers. …”
Libro electrónico -
5258Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
5259Publicado 2021“…Wireless devices are used to extend the edge to user devices as well as perform bridging between separate physical locations. …”
Video -
5260Publicado 2021“…In Length-Bounded Cut, we search for a bounded-size set of edges that intersects all paths between two given vertices of at most some given length. …”
Libro electrónico