Mostrando 6,761 - 6,780 Resultados de 14,132 Para Buscar '"FEDER"', tiempo de consulta: 0.12s Limitar resultados
  1. 6761
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Implementing and Managing Identity and Access -- Chapter 1: Planning for Hybrid Identity -- Planning your hybrid environment -- Authentication methods in Azure AD -- Multi-factor authentication -- Self-service password reset -- Conditional Access -- Passwordless authentication -- Synchronization methods with Azure AD Connect -- Password hash synchronization -- Pass-through authentication -- Federation -- Azure AD Seamless Single Sign-On -- Azure AD Connect cloud sync -- Event monitoring and troubleshooting in Azure AD Connect -- Summary -- Questions -- Further reading -- Chapter 2: Authentication and Security -- Implementing Azure AD dynamic group membership -- Creating a dynamic group in Azure AD using the Azure portal -- Creating dynamic groups with Azure AD PowerShell -- Using group-based licensing in Azure AD -- Implementing password management -- Setting up SSPR -- Registering for SSPR -- Using SSPR to reset passwords -- Combined registration for SSPR and MFA -- Implementing and managing external identities -- Implementing and managing MFA -- Enabling MFA -- Service settings -- Configuring secondary authentication methods -- Planning and implementing device authentication methods -- Summary -- Questions -- Further reading -- Chapter 3: Implementing Conditional Access Policies -- Explaining Conditional Access -- Creating a Simple Conditional Access policy -- Conditional Access and Microsoft Intune -- Introducing the types of Conditional Access -- Device-based Conditional Access -- App-based Conditional Access -- Monitoring Conditional Access events -- Summary -- Questions -- Further reading -- Chapter 4: Managing Roles and Identity Governance -- Planning and configuring PIM -- Planning PIM -- Configuring PIM…”
    Libro electrónico
  2. 6762
    Publicado 2010
    Tabla de Contenidos: “…addNodeGroupMember -- removeNodeGroupMember -- removeNodeGroup -- moveClusterToCoreGroup -- moveServerToCoreGroup -- deleteCoreGroup -- AdminReports Command Group -- reportConfigInconsistencies -- ReportConfiguredPorts -- ClusterConfigCommands Command Group -- createCluster -- createClusterMember -- deleteClusterMember -- deleteCluster -- ConfigArchiveOperations Command Group -- exportServer -- importServer -- GenerateSecurityConfigCommand Command Group -- generateSecConfigReport -- PortManagement Command Group -- listApplicationPorts -- listServerPorts -- ServerManagement Command Group -- listServer -- getServerType -- listServerTypes -- showServerInfo -- showServerTypeInfo -- createApplicationServer -- createApplicationServerTemplate -- deleteServer -- setJVMProperties -- setJVMSystemProperties -- setProcessDefinition -- Server Management Methods that Do Not Belong to Any Command Group -- createServerType -- Summary -- Chapter 12 Scripting and Security -- WebSphere Security Basics -- JAAS (J2C) Aliases -- Create a J2C (JAAS) Alias -- Viewing JAAS Aliases -- Modify a JAAS Alias -- Delete a JAAS Alias -- Configuring Application Security -- Enabling/Disabling Administrative and Application Security -- Mapping Java EE Roles -- Review the Current and Available Mappings -- Mapping Roles to Users and/or Groups -- Enable/Disable Java 2 Security -- LDAP Failover -- Viewing the Hosts -- Adding Additional LDAP Hosts -- Setting the Host List -- Removing LDAP Hosts -- Federated Registries (and Other Essentially Undocumented Scripting Areas) -- Multiple Security Domains (WebSphere V7) -- Additional Security Topics -- Bus Security -- Datasources -- Web Services -- AdminTask Security Reference -- SecurityConifgurationCommands Group -- SecurityDomainCommands Group -- SecurityRealmInfoCommands -- WIMManagementCommands -- WizardCommands -- JACCUtilityCommands…”
    Libro electrónico
  3. 6763
    Publicado 2012
    Tabla de Contenidos:
    Libro electrónico
  4. 6764
    Publicado 2022
    Tabla de Contenidos: “…Physical Access Control -- The Data Center -- Service Level Agreements -- Summary -- Chapter 2 Access Controls -- Access Control Concepts -- Subjects and Objects -- Privileges: What Subjects Can Do with Objects -- Data Classification, Categorization, and Access Control -- Access Control via Formal Security Models -- Implement and Maintain Authentication Methods -- Single-Factor/Multifactor Authentication -- Accountability -- Single Sign-On -- Device Authentication -- Federated Access -- Support Internetwork Trust Architectures -- Trust Relationships (One-Way, Two-Way, Transitive) -- Extranet -- Third-Party Connections -- Zero Trust Architectures -- Participate in the Identity Management Lifecycle -- Authorization -- Proofing -- Provisioning/Deprovisioning -- Identity and Access Maintenance -- Entitlement -- Identity and Access Management Systems -- Implement Access Controls -- Mandatory vs. …”
    Libro electrónico
  5. 6765
    Publicado 2023
    Tabla de Contenidos: “…How to compensate for equivalent CO2e emissions -- Design patterns of FL-based model training -- Sustainability in model deployments -- Design patterns of FL-based model deployments -- Summary -- Further reading -- Chapter 13: Sustainable Model Life Cycle Management, Feature Stores, and Model Calibration -- Sustainable model development practices -- Organizational standards for sustainable, trustworthy frameworks -- Explainability, privacy, and sustainability in feature stores -- Feature store components and functionalities -- Feature stores for FL -- Exploring model calibration -- Determining whether a model is well calibrated -- Calibration techniques -- Model calibration using scikit-learn -- Building sustainable, adaptable systems -- Concept drift-aware federated averaging (CDA-FedAvg) -- Summary -- Further reading -- Chapter 14: Industry-Wide Use Cases -- Technical requirements -- Building ethical AI solutions across industries -- Biased chatbots -- Ethics in XR/AR/VR -- Use cases in retail -- Privacy in the retail industry -- Fairness in the retail industry -- Interpretability - the role of counterfactuals (CFs) -- Supply chain use cases -- Use cases in BFSI -- Deepfakes -- Use cases in healthcare -- Healthcare system architecture using Google Cloud -- Survival analysis for Responsible AI healthcare applications -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  6. 6766
    Publicado 2024
    Tabla de Contenidos: “…Administrative Concerns -- Virtualization Risks -- Regulatory Non-Compliance -- Distributed Denial of Service (DDoS) Attacks -- Man-in-the-Middle Attacks -- Vendor Issues -- Shadow IT -- Natural Disasters -- Insider Threats -- Insecure APIs -- Misconfigurations -- Forensic Challenges in Cloud Environments and Solutions -- Implementing Cloud Security Best Practices, Controls and Countermeasures -- Best Practices -- Controls -- Data Encryption and Protection Techniques in the Cloud -- IAM in Cloud Environments -- Information Rights Management (IRM) / Digital Rights Management (DRM) -- Virtualization -- Network Segmentation -- Firewalls and Other Devices -- DLP Tools / Egress Monitoring -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 10: Security Control Implementation -- Physical and Environmental Protection Controls -- Site Selection and Facility Design -- System, Storage, and Communication Protection Controls -- Protecting Data -- Cryptographic Key Establishment and Management -- Managing a Network to Protect Systems and Services -- Landing Zones -- Virtualization Systems -- IAM Solutions for Identification, Authentication, and Authorization -- OpenID -- OAuth -- Identification -- Authentication -- Authentication Methods -- Conditional Authentication Policies -- Authorization -- Federation -- Key Cloud Control Audit Mechanisms -- Log Collection -- Correlation -- Packet Capturing -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 11: Planning for the Worst-Case Scenario - Business Continuity and Disaster Recovery -- BCDR Definitions -- The Importance of BCDR -- Key Concepts and Terminology -- BCDR Strategies -- Defining the Scope of the BCDR Plan -- Gathering Requirements and Generating Objectives -- Integrating Requirements -- Assessing Risk -- Performance Issues Due to Location Change…”
    Libro electrónico
  7. 6767
    Publicado 2024
    Tabla de Contenidos: “…Insourcing - a strategic counterbalance -- Shadowing and knowledge transition -- Talent management -- The integral roles of data engineering, data science, and data analytics - life learnings -- Our real-life learnings -- Summary and key takeaways -- Takeaway #1 - a dynamic and collaborative journey -- Takeaway #2 - a balanced ecosystem of outsourcing and insourcing -- Takeaway #3 - a fair approach to technology and business -- Chapter 7: Unique Data IP Is Your Magic -- Defining data IP -- Documentation -- Outsourcing -- Community -- Technology -- Processes -- People -- Evolving, scaling, modernizing, and governing your data IP -- Embracing interactive and in-depth feedback -- Comprehensive tracking and celebration of each step forward -- Fostering community participation -- Seeking external inspiration -- Creating a team that loves to learn and share -- Protecting and navigating when managing change -- Federate and share knowledge -- Rely on the steady parts -- Show how data helps the business -- Executive summary and key takeaways -- Takeaway #1 - define your IP, with six dimensions in mind -- Takeaway #2 - evolve, modernize, and govern -- Takeaway #3 - protect your company -- Chapter 8: Pareto Principle in Action -- Solid at the core, flexible at the edge -- Data management is a team sport with a focus on people -- The discipline of change management is key for landing the value of data -- Any and all feedback is a learning opportunity -- Listening to your partners and customers is critical to drive incremental value -- DQ by design, must be implemented to instantly align with strategic and connected data work at the enterprise -- Prioritize the demand and run an agile service portfolio -- Get solid at the core first, before becoming flexible at the edge -- What to avoid - personal experience -- Addressing top enterprise data issues…”
    Libro electrónico
  8. 6768
    por Lat, Joshua Arvin
    Publicado 2022
    Tabla de Contenidos: “…Registering models to SageMaker Model Registry -- Creating a new notebook in SageMaker Studio -- Registering models to SageMaker Model Registry using the boto3 library -- Deploying models from SageMaker Model Registry -- Enabling data capture and simulating predictions -- Scheduled monitoring with SageMaker Model Monitor -- Analyzing the captured data -- Deleting an endpoint with a monitoring schedule -- Cleaning up -- Summary -- Further reading -- Chapter 9: Security, Governance, and Compliance Strategies -- Managing the security and compliance of ML environments -- Authentication and authorization -- Network security -- Encryption at rest and in transit -- Managing compliance reports -- Vulnerability management -- Preserving data privacy and model privacy -- Federated Learning -- Differential Privacy -- Privacy-preserving machine learning -- Other solutions and options -- Establishing ML governance -- Lineage Tracking and reproducibility -- Model inventory -- Model validation -- ML explainability -- Bias detection -- Model monitoring -- Traceability, observability, and auditing -- Data quality analysis and reporting -- Data integrity management -- Summary -- Further reading -- Part 5: Designing and Building End-to-end MLOps Pipelines -- Chapter 10: Machine Learning Pipelines with Kubeflow on Amazon EKS -- Technical requirements -- Diving deeper into Kubeflow, Kubernetes, and EKS -- Preparing the essential prerequisites -- Preparing the IAM role for the EC2 instance of the Cloud9 environment -- Attaching the IAM role to the EC2 instance of the Cloud9 environment -- Updating the Cloud9 environment with the essential prerequisites -- Setting up Kubeflow on Amazon EKS -- Running our first Kubeflow pipeline -- Using the Kubeflow Pipelines SDK to build ML workflows -- Cleaning up -- Recommended strategies and best practices -- Summary -- Further reading…”
    Libro electrónico
  9. 6769
    Publicado 1991
    Tabla de Contenidos: “…Education and Training in the Care and Use of Laboratory Animals -- Copyright -- Preface -- Contents -- I INTRODUCTION -- 1 Introduction -- Reference -- 2 How to Use this Guide -- II COURSE MODULES -- 1 Core Module -- INTRODUCTION -- OUTLINE FOR THE CORE MODULE -- Laws, Regulations, and Policies that Impact on the Care and Use of Animals -- Ethical and Scientific Issues -- Alternatives -- Responsibilities of the Institution, the Animal Care and Use Committee, and the Research and Veterinary Staffs -- Pain and Distress -- Anesthetics, Analgesics, Tranquilizers, and Neuromuscular Blocking Agents -- Survival Surgery and Postsurgical Care -- Euthanasia -- Husbandry, Care, and the Importance of the Environment -- Resources -- 2 Species-Specific Module -- INTRODUCTION -- OUTLINE FOR THE SPECIES-SPECIFIC MODULE -- Selection and Procurement of Animals -- Husbandry and Care -- Handling and Restraint -- Identification and Records -- Animal Health -- Safety and Health Considerations (Zoonoses) -- Specific Techniques -- Euthanasia -- Skill Building -- 3 Pain-Management Module -- INTRODUCTION -- OUTLINE FOR THE PAIN-MANAGEMENT MODULE -- Definitions, Mechanisms, and Assessment -- Legal and Ethical Obligations -- Alleviation of Pain or Distress -- Anesthesia -- Euthanasia -- Skill Building -- 4 Surgery Module -- INTRODUCTION -- OUTLINE FOR THE SURGERY MODULE -- Definitions -- Legal Requirements for Survival Surgery -- Aseptic Technique -- Selection and Administration of Anesthetic -- Surgical Complications -- Surgical Techniques -- Postsurgical Care -- Medical Records -- Terminal Surgeries -- Skill Building -- III CONTENT OUTLINES -- Introduction -- 1 Laws, Regulations, and Policies That Impact on the Care and Use of Animals -- 1.1 FEDERAL REGULATIONS AND POLICIES AFFECTING THE CARE AND USE OF ANIMALS IN RESEARCH, TESTING, AND EDUCATION…”
    Libro electrónico
  10. 6770
    Publicado 1955
    Libro
  11. 6771
    Publicado 1995
    Revista digital
  12. 6772
    Publicado 2008
    Revista digital
  13. 6773
    Publicado 1995
    Libro
  14. 6774
    Publicado 1932
    Revista
  15. 6775
    Seriada digital
  16. 6776
    Publicado 1977
    Seriadas
  17. 6777
    Publicado 1970
    Libro
  18. 6778
    por Costantini, Daniel
    Publicado 1999
    Libro
  19. 6779
    por Steiner, Gertraud
    Publicado 1995
    Libro
  20. 6780
    Publicado 1993
    Libro