Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 439
- Historia 357
- Economic conditions 299
- Economics 259
- Economic policy 227
- Economía 223
- Education 212
- General 204
- Politics and government 188
- Social Science 184
- Law 169
- Federalismo 165
- Política y gobierno 162
- Economic history 150
- Political Science 143
- Research 134
- Management 130
- Ciencias políticas 129
- Business & Economics 121
- Law and legislation 120
- Mexico 113
- Finance 111
- Derecho 110
- History and criticism 109
- Study and teaching 109
- Government policy 108
- Sociology 102
- Ciencias Sociales 99
- United States 99
- Derecho constitucional 98
-
6761Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Implementing and Managing Identity and Access -- Chapter 1: Planning for Hybrid Identity -- Planning your hybrid environment -- Authentication methods in Azure AD -- Multi-factor authentication -- Self-service password reset -- Conditional Access -- Passwordless authentication -- Synchronization methods with Azure AD Connect -- Password hash synchronization -- Pass-through authentication -- Federation -- Azure AD Seamless Single Sign-On -- Azure AD Connect cloud sync -- Event monitoring and troubleshooting in Azure AD Connect -- Summary -- Questions -- Further reading -- Chapter 2: Authentication and Security -- Implementing Azure AD dynamic group membership -- Creating a dynamic group in Azure AD using the Azure portal -- Creating dynamic groups with Azure AD PowerShell -- Using group-based licensing in Azure AD -- Implementing password management -- Setting up SSPR -- Registering for SSPR -- Using SSPR to reset passwords -- Combined registration for SSPR and MFA -- Implementing and managing external identities -- Implementing and managing MFA -- Enabling MFA -- Service settings -- Configuring secondary authentication methods -- Planning and implementing device authentication methods -- Summary -- Questions -- Further reading -- Chapter 3: Implementing Conditional Access Policies -- Explaining Conditional Access -- Creating a Simple Conditional Access policy -- Conditional Access and Microsoft Intune -- Introducing the types of Conditional Access -- Device-based Conditional Access -- App-based Conditional Access -- Monitoring Conditional Access events -- Summary -- Questions -- Further reading -- Chapter 4: Managing Roles and Identity Governance -- Planning and configuring PIM -- Planning PIM -- Configuring PIM…”
Libro electrónico -
6762Publicado 2010Tabla de Contenidos: “…addNodeGroupMember -- removeNodeGroupMember -- removeNodeGroup -- moveClusterToCoreGroup -- moveServerToCoreGroup -- deleteCoreGroup -- AdminReports Command Group -- reportConfigInconsistencies -- ReportConfiguredPorts -- ClusterConfigCommands Command Group -- createCluster -- createClusterMember -- deleteClusterMember -- deleteCluster -- ConfigArchiveOperations Command Group -- exportServer -- importServer -- GenerateSecurityConfigCommand Command Group -- generateSecConfigReport -- PortManagement Command Group -- listApplicationPorts -- listServerPorts -- ServerManagement Command Group -- listServer -- getServerType -- listServerTypes -- showServerInfo -- showServerTypeInfo -- createApplicationServer -- createApplicationServerTemplate -- deleteServer -- setJVMProperties -- setJVMSystemProperties -- setProcessDefinition -- Server Management Methods that Do Not Belong to Any Command Group -- createServerType -- Summary -- Chapter 12 Scripting and Security -- WebSphere Security Basics -- JAAS (J2C) Aliases -- Create a J2C (JAAS) Alias -- Viewing JAAS Aliases -- Modify a JAAS Alias -- Delete a JAAS Alias -- Configuring Application Security -- Enabling/Disabling Administrative and Application Security -- Mapping Java EE Roles -- Review the Current and Available Mappings -- Mapping Roles to Users and/or Groups -- Enable/Disable Java 2 Security -- LDAP Failover -- Viewing the Hosts -- Adding Additional LDAP Hosts -- Setting the Host List -- Removing LDAP Hosts -- Federated Registries (and Other Essentially Undocumented Scripting Areas) -- Multiple Security Domains (WebSphere V7) -- Additional Security Topics -- Bus Security -- Datasources -- Web Services -- AdminTask Security Reference -- SecurityConifgurationCommands Group -- SecurityDomainCommands Group -- SecurityRealmInfoCommands -- WIMManagementCommands -- WizardCommands -- JACCUtilityCommands…”
Libro electrónico -
6763Publicado 2012Tabla de Contenidos:Libro electrónico
-
6764Publicado 2022Tabla de Contenidos: “…Physical Access Control -- The Data Center -- Service Level Agreements -- Summary -- Chapter 2 Access Controls -- Access Control Concepts -- Subjects and Objects -- Privileges: What Subjects Can Do with Objects -- Data Classification, Categorization, and Access Control -- Access Control via Formal Security Models -- Implement and Maintain Authentication Methods -- Single-Factor/Multifactor Authentication -- Accountability -- Single Sign-On -- Device Authentication -- Federated Access -- Support Internetwork Trust Architectures -- Trust Relationships (One-Way, Two-Way, Transitive) -- Extranet -- Third-Party Connections -- Zero Trust Architectures -- Participate in the Identity Management Lifecycle -- Authorization -- Proofing -- Provisioning/Deprovisioning -- Identity and Access Maintenance -- Entitlement -- Identity and Access Management Systems -- Implement Access Controls -- Mandatory vs. …”
Libro electrónico -
6765Publicado 2023Tabla de Contenidos: “…How to compensate for equivalent CO2e emissions -- Design patterns of FL-based model training -- Sustainability in model deployments -- Design patterns of FL-based model deployments -- Summary -- Further reading -- Chapter 13: Sustainable Model Life Cycle Management, Feature Stores, and Model Calibration -- Sustainable model development practices -- Organizational standards for sustainable, trustworthy frameworks -- Explainability, privacy, and sustainability in feature stores -- Feature store components and functionalities -- Feature stores for FL -- Exploring model calibration -- Determining whether a model is well calibrated -- Calibration techniques -- Model calibration using scikit-learn -- Building sustainable, adaptable systems -- Concept drift-aware federated averaging (CDA-FedAvg) -- Summary -- Further reading -- Chapter 14: Industry-Wide Use Cases -- Technical requirements -- Building ethical AI solutions across industries -- Biased chatbots -- Ethics in XR/AR/VR -- Use cases in retail -- Privacy in the retail industry -- Fairness in the retail industry -- Interpretability - the role of counterfactuals (CFs) -- Supply chain use cases -- Use cases in BFSI -- Deepfakes -- Use cases in healthcare -- Healthcare system architecture using Google Cloud -- Survival analysis for Responsible AI healthcare applications -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
Libro electrónico -
6766Publicado 2024Tabla de Contenidos: “…Administrative Concerns -- Virtualization Risks -- Regulatory Non-Compliance -- Distributed Denial of Service (DDoS) Attacks -- Man-in-the-Middle Attacks -- Vendor Issues -- Shadow IT -- Natural Disasters -- Insider Threats -- Insecure APIs -- Misconfigurations -- Forensic Challenges in Cloud Environments and Solutions -- Implementing Cloud Security Best Practices, Controls and Countermeasures -- Best Practices -- Controls -- Data Encryption and Protection Techniques in the Cloud -- IAM in Cloud Environments -- Information Rights Management (IRM) / Digital Rights Management (DRM) -- Virtualization -- Network Segmentation -- Firewalls and Other Devices -- DLP Tools / Egress Monitoring -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 10: Security Control Implementation -- Physical and Environmental Protection Controls -- Site Selection and Facility Design -- System, Storage, and Communication Protection Controls -- Protecting Data -- Cryptographic Key Establishment and Management -- Managing a Network to Protect Systems and Services -- Landing Zones -- Virtualization Systems -- IAM Solutions for Identification, Authentication, and Authorization -- OpenID -- OAuth -- Identification -- Authentication -- Authentication Methods -- Conditional Authentication Policies -- Authorization -- Federation -- Key Cloud Control Audit Mechanisms -- Log Collection -- Correlation -- Packet Capturing -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 11: Planning for the Worst-Case Scenario - Business Continuity and Disaster Recovery -- BCDR Definitions -- The Importance of BCDR -- Key Concepts and Terminology -- BCDR Strategies -- Defining the Scope of the BCDR Plan -- Gathering Requirements and Generating Objectives -- Integrating Requirements -- Assessing Risk -- Performance Issues Due to Location Change…”
Libro electrónico -
6767Publicado 2024Tabla de Contenidos: “…Insourcing - a strategic counterbalance -- Shadowing and knowledge transition -- Talent management -- The integral roles of data engineering, data science, and data analytics - life learnings -- Our real-life learnings -- Summary and key takeaways -- Takeaway #1 - a dynamic and collaborative journey -- Takeaway #2 - a balanced ecosystem of outsourcing and insourcing -- Takeaway #3 - a fair approach to technology and business -- Chapter 7: Unique Data IP Is Your Magic -- Defining data IP -- Documentation -- Outsourcing -- Community -- Technology -- Processes -- People -- Evolving, scaling, modernizing, and governing your data IP -- Embracing interactive and in-depth feedback -- Comprehensive tracking and celebration of each step forward -- Fostering community participation -- Seeking external inspiration -- Creating a team that loves to learn and share -- Protecting and navigating when managing change -- Federate and share knowledge -- Rely on the steady parts -- Show how data helps the business -- Executive summary and key takeaways -- Takeaway #1 - define your IP, with six dimensions in mind -- Takeaway #2 - evolve, modernize, and govern -- Takeaway #3 - protect your company -- Chapter 8: Pareto Principle in Action -- Solid at the core, flexible at the edge -- Data management is a team sport with a focus on people -- The discipline of change management is key for landing the value of data -- Any and all feedback is a learning opportunity -- Listening to your partners and customers is critical to drive incremental value -- DQ by design, must be implemented to instantly align with strategic and connected data work at the enterprise -- Prioritize the demand and run an agile service portfolio -- Get solid at the core first, before becoming flexible at the edge -- What to avoid - personal experience -- Addressing top enterprise data issues…”
Libro electrónico -
6768por Lat, Joshua ArvinTabla de Contenidos: “…Registering models to SageMaker Model Registry -- Creating a new notebook in SageMaker Studio -- Registering models to SageMaker Model Registry using the boto3 library -- Deploying models from SageMaker Model Registry -- Enabling data capture and simulating predictions -- Scheduled monitoring with SageMaker Model Monitor -- Analyzing the captured data -- Deleting an endpoint with a monitoring schedule -- Cleaning up -- Summary -- Further reading -- Chapter 9: Security, Governance, and Compliance Strategies -- Managing the security and compliance of ML environments -- Authentication and authorization -- Network security -- Encryption at rest and in transit -- Managing compliance reports -- Vulnerability management -- Preserving data privacy and model privacy -- Federated Learning -- Differential Privacy -- Privacy-preserving machine learning -- Other solutions and options -- Establishing ML governance -- Lineage Tracking and reproducibility -- Model inventory -- Model validation -- ML explainability -- Bias detection -- Model monitoring -- Traceability, observability, and auditing -- Data quality analysis and reporting -- Data integrity management -- Summary -- Further reading -- Part 5: Designing and Building End-to-end MLOps Pipelines -- Chapter 10: Machine Learning Pipelines with Kubeflow on Amazon EKS -- Technical requirements -- Diving deeper into Kubeflow, Kubernetes, and EKS -- Preparing the essential prerequisites -- Preparing the IAM role for the EC2 instance of the Cloud9 environment -- Attaching the IAM role to the EC2 instance of the Cloud9 environment -- Updating the Cloud9 environment with the essential prerequisites -- Setting up Kubeflow on Amazon EKS -- Running our first Kubeflow pipeline -- Using the Kubeflow Pipelines SDK to build ML workflows -- Cleaning up -- Recommended strategies and best practices -- Summary -- Further reading…”
Publicado 2022
Libro electrónico -
6769Publicado 1991Tabla de Contenidos: “…Education and Training in the Care and Use of Laboratory Animals -- Copyright -- Preface -- Contents -- I INTRODUCTION -- 1 Introduction -- Reference -- 2 How to Use this Guide -- II COURSE MODULES -- 1 Core Module -- INTRODUCTION -- OUTLINE FOR THE CORE MODULE -- Laws, Regulations, and Policies that Impact on the Care and Use of Animals -- Ethical and Scientific Issues -- Alternatives -- Responsibilities of the Institution, the Animal Care and Use Committee, and the Research and Veterinary Staffs -- Pain and Distress -- Anesthetics, Analgesics, Tranquilizers, and Neuromuscular Blocking Agents -- Survival Surgery and Postsurgical Care -- Euthanasia -- Husbandry, Care, and the Importance of the Environment -- Resources -- 2 Species-Specific Module -- INTRODUCTION -- OUTLINE FOR THE SPECIES-SPECIFIC MODULE -- Selection and Procurement of Animals -- Husbandry and Care -- Handling and Restraint -- Identification and Records -- Animal Health -- Safety and Health Considerations (Zoonoses) -- Specific Techniques -- Euthanasia -- Skill Building -- 3 Pain-Management Module -- INTRODUCTION -- OUTLINE FOR THE PAIN-MANAGEMENT MODULE -- Definitions, Mechanisms, and Assessment -- Legal and Ethical Obligations -- Alleviation of Pain or Distress -- Anesthesia -- Euthanasia -- Skill Building -- 4 Surgery Module -- INTRODUCTION -- OUTLINE FOR THE SURGERY MODULE -- Definitions -- Legal Requirements for Survival Surgery -- Aseptic Technique -- Selection and Administration of Anesthetic -- Surgical Complications -- Surgical Techniques -- Postsurgical Care -- Medical Records -- Terminal Surgeries -- Skill Building -- III CONTENT OUTLINES -- Introduction -- 1 Laws, Regulations, and Policies That Impact on the Care and Use of Animals -- 1.1 FEDERAL REGULATIONS AND POLICIES AFFECTING THE CARE AND USE OF ANIMALS IN RESEARCH, TESTING, AND EDUCATION…”
Libro electrónico -
6770
-
6771
-
6772
-
6773
-
6774
-
6775
-
6776
-
6777Publicado 1970Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro
-
6778
-
6779
-
6780