Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,400
- Application software 1,242
- History 1,188
- Historia 743
- Management 741
- Artificial intelligence 628
- Python (Computer program language) 606
- Computer programs 597
- Data processing 580
- Cloud computing 535
- Social aspects 530
- Machine learning 514
- Computer networks 493
- Engineering & Applied Sciences 476
- Security measures 403
- Design 393
- Computer programming 364
- Computer security 360
- Computer software 360
- Programming 358
- Operating systems (Computers) 354
- Philosophy 347
- Web site development 341
- Computer Science 337
- Information technology 331
- History and criticism 327
- Education 325
- Filosofía 324
- Technological innovations 313
- Data mining 312
-
21641Publicado 2008“…One simple principle drives this book: explore a few things deeply rather than offer a shallow view of the whole C# landscape. …”
Libro electrónico -
21642Publicado 2018“…Its modern feel and features empower you to explore new projects with less friction in the dev process."…”
Vídeo online -
21643Publicado 2023“…You're a financial practitioner who wants to explore the latest advancements in AI technology, which is poised to change the future of finance. …”
Video -
21644Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
21645Publicado 2023“…They'll discuss why, more than ever, it's crucial that organizations big and small take whatever steps they can to keep their data, people, and systems safe. They'll also explore how secure engineering practices have evolved and what that implies for the future. …”
Video -
21646Publicado 2023“…Recommended follow-up: Read Fluent Python, second edition (book) Explore O'Reilly's Django Sandbox Watch Software Development Superstream: Becoming a Senior Software Engineer (live event video)…”
Video -
21647Publicado 2022“…This course includes source code so you can try the code for yourself and explore what you can make happen. And it's also loaded with tips for better web development and site creation…”
Video -
21648Publicado 2022“…What you'll learn and how you can apply it Explore the origins of and need for eBPF See what's coming next for infrastructure and ops This recording of a live event is for you because... …”
Video -
21649Publicado 2024“…This book will show you how to master those features as you explore the world of digital photography and hone your creativity with your new camera. …”
Libro electrónico -
21650Publicado 2022“…You'll also start designing data models to navigate and explore relationships within your data and building DAX formulas to make data easier to work with. …”
Libro electrónico -
21651Publicado 2024“…This practical guide will help you: Build efficient applications composed of functions and objects; Explore the type system of modern PHP; Understand key concepts such as encryption, error handling, debugging, and performance tuning; Examine the PHP package/extension ecosystem; Learn how to build basic web and command-line applications; Work securely with files on a machine, both encrypted and in plain text"--…”
Libro electrónico -
21652por Briggs, Melody R“…The first section of the study establishes the nature of the text and the readers in this project: exploring the Gospel of Luke as a narrative of Jesus' birth, life, death, and resurrection, and then looking at the developmental traits of children as readers. …”
Publicado 2017
Libro electrónico -
21653Publicado 2023“…Based on extremely timely and deeply researched case studies on Ukraine, Syria, and the West, Jade McGlynn explores how Russian politicians and a pro-Kremlin media have 'historically framed' the news, conflating current policies with past triumphs and traumas, shedding critical new light on the role of the highly influential Ministry of Culture and Russian Military Historical Society in constructing a narrative of Russian 'history' which can shape everyday citizen's perceptions of contemporary politics under Putin. …”
Libro -
21654Publicado 2010“…A great deal of effort has been, and continues to be, expended in exploring new approaches to the book, both within the conventional critical methodologies and beyond them. …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad Eclesiástica San Dámaso)Libro -
21655por Durkheim, Émile, 1858-1917 aut“…The need and capacity of men and women to relate socially lies at the heart of Durkheim's exploration, in which religion embodies the beliefs that shape our moral universe. …”
Publicado 2008
Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
21656por Papacharissi, Zizi“…Technologies network us but it is our stories that connect us to each other, making us feel close to some and distancing us from others. Affective Publics explores how storytelling practices facilitate engagement among movements tuning into a current issue or event by employing three case studies: Arab Spring movements, various iterations of Occupy, and everyday casual political expressions as traced through the archives of trending topics on Twitter. …”
Publicado 2014
Libro -
21657Publicado 2014“…The third section contains essays on the textual history and reception of Exodus in Judaism and Christianity. The final section explores the theologies of the book of Exodus…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto, Red de bibliotecas Iglesia Navarra, Biblioteca Universitat Ramon Llull)Libro -
21658Publicado 2014“…This book explores the ways in which Greek and Latin writers from the late 1st to the 3rd century CE experienced and portrayed Roman cultural institutions and power. …”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
21659Publicado 2013“…Presentación del editor: "The essays in this handbook, written by leading scholars working in the rapidly developing field of witchcraft studies, explore the historical literature regarding witch beliefs and witch trials in Europe and colonial America between the early fifteenth and early eighteenth centuries. …”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
21660Publicado 2021“…"This collection of essays, most of which are previously published in distinguished scholarly journals, explores the possible or necessary intersecting points between the concept of ius (the juridical phenomenon, in the broadest sense) and the concept of good. …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso)Libro