Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Amazon Web Services (Firm) 8
- Cloud computing 8
- Historia 7
- Web services 5
- Crítica i interpretació 3
- Keller, Helen 3
- Leadership 3
- Management 3
- RELIGION 3
- Adolescents 2
- Big data 2
- Christianity and culture 2
- Cybernetics 2
- Eucaristía 2
- Eucharistie 2
- Husserl, Edmund 2
- Iglesia Católica 2
- Lord's Supper 2
- Marketing 2
- Medicina 2
- Mujeres sordociegas 2
- Química orgánica 2
- Sacerdocio femenino 2
- Sartre, Jean-Paul 2
- Security measures 2
- Social aspects 2
- Sound recording industry 2
- Sound recordings 2
- Sullivan, Annie 2
- "Multi-User" 1
-
101Publicado 2024Tabla de Contenidos: “…Security Hub-your AWS security dashboard -- Config-your AWS compliance watchdog -- Organizations-your AWS multi-account manager -- Control Tower-your AWS governance blueprint -- Best practices for security governance and compliance -- Handling secrets securely -- SSM Parameter Store versus Secrets Manager -- Best practices for secrets management -- Identifying and protecting sensitive data -- Macie-your AWS data custodian -- Best practices for managing sensitive and private data -- Orchestrating AWS security services -- Building an integrated security architecture -- Cost and efficiency considerations -- Aligning compliance and governance -- Alerting and incident response -- Orchestrating AWS Security in practice -- Summary -- Questions -- Answers -- Further readings -- Part 2: Architecting and Deploying Secure AWS Environments -- Chapter 6: Designing Secure Microservices Architectures in AWS -- Why choose microservices today? …”
Libro electrónico -
102Publicado 2021Tabla de Contenidos: “…Cataloging your data to avoid the data swamp -- How to avoid the data swamp -- The AWS Glue/Lake Formation data catalog -- AWS services for data encryption and security monitoring -- AWS Key Management Service (KMS) -- Amazon Macie -- Amazon GuardDuty -- AWS services for managing identity and permissions -- AWS Identity and Access Management (IAM) service -- Using AWS Lake Formation to manage data lake access -- Hands-on - configuring Lake Formation permissions -- Creating a new user with IAM permissions -- Transitioning to managing fine-grained permissions with AWS Lake Formation -- Summary -- Section 2: Architecting and Implementing Data Lakes and Data Lake Houses -- Chapter 5: Architecting Data Engineering Pipelines -- Technical requirements -- Approaching the data pipeline architecture -- Architecting houses and architecting pipelines -- Whiteboarding as an information-gathering tool -- Conducting a whiteboarding session -- Identifying data consumers and understanding their requirements -- Identifying data sources and ingesting data -- Identifying data transformations and optimizations -- File format optimizations -- Data standardization -- Data quality checks -- Data partitioning -- Data denormalization -- Data cataloging -- Whiteboarding data transformation -- Loading data into data marts -- Wrapping up the whiteboarding session -- Hands-on - architecting a sample pipeline -- Detailed notes from the project "Bright Light" whiteboarding meeting of GP Widgets, Inc -- Summary -- Chapter 6: Ingesting Batch and Streaming Data -- Technical requirements -- Understanding data sources -- Data variety -- Data volume -- Data velocity -- Data veracity -- Data value -- Questions to ask -- Ingesting data from a relational database -- AWS Database Migration Service (DMS) -- AWS Glue -- Other ways to ingest data from a database…”
Libro electrónico -
103Publicado 2022Tabla de Contenidos: “…Optimizing Performance for the Core AWS Services -- Compute -- Storage -- Database -- Network Optimization and Load Balancing -- Infrastructure Automation -- CloudFormation -- Third-Party Automation Solutions -- Reviewing and Optimizing Infrastructure Configurations -- AWS Well-Architected Tool -- Load Testing -- Visualization -- Optimizing Data Operations -- Caching -- Partitioning/Sharding -- Compression -- Summary -- Exam Essentials -- Review Questions -- Chapter 12 Secure Architectures -- Introduction -- Identity and Access Management -- Protecting AWS Credentials -- Fine-Grained Authorization -- Permissions Boundaries -- Roles -- Enforcing Service-Level Protection -- Detective Controls -- CloudTrail -- CloudWatch Logs -- Searching Logs with Athena -- Auditing Resource Configurations with AWS Config -- Amazon GuardDuty -- Amazon Inspector -- Amazon Detective -- Security Hub -- Amazon Fraud Detector -- AWS Audit Manager -- Protecting Network Boundaries -- Network Access Control Lists and Security Groups -- AWS Web Application Firewall -- AWS Shield -- AWS Firewall Manager -- Data Encryption -- Data at Rest -- Data in Transit -- Macie -- Summary -- Exam Essentials -- Review Questions -- Chapter 13 Cost-Optimized Architectures -- Introduction -- Planning, Tracking, and Controlling Costs -- AWS Budgets -- Monitoring Tools -- AWS Trusted Advisor -- Online Calculator Tools -- Cost-Optimizing Compute -- Maximizing Server Density -- EC2 Reserved Instances -- EC2 Spot Instances -- Auto Scaling -- Elastic Block Store Lifecycle Manager -- Summary -- Exam Essentials -- Review Questions -- Appendix A: Answers to Review Questions -- Chapter 1: Introduction to Cloud Computing and AWS -- Chapter 2: Compute Services -- Chapter 3: AWS Storage -- Chapter 4: Amazon Virtual Private Cloud (VPC) -- Chapter 5: Database Services…”
Libro electrónico -
104Publicado 2019Tabla de Contenidos: “…Novak -- Managing the Changing Climate of Business Collections / Katharine V. Macy, Heather A. Howard, Alyson S. Vaaler -- Simplifying the Collections Budget to Maximize Flexibility and Increase Responsiveness to User Needs / Denise Koufogiannakis, Denise Pan -- On the Winds of Change: Repositories, Researchers and Technologies: The 18th Health Sciences Lively Lunch Discussion / Jean Gudenas, Ramune K. …”
Libro electrónico -
105Publicado 2023Tabla de Contenidos: “…Learning about Amazon Simple Storage Service (S3) -- S3 Standard -- Amazon S3 Intelligent-Tiering -- Amazon S3 Standard-IA (Infrequent Access) -- Amazon S3 One Zone-IA -- Amazon S3 Glacier -- Managing data with S3 Object Lambda -- Versioning in Amazon S3 -- Amazon S3 Multi-Destination Replication -- Choosing the right cloud storage type -- Exploring Amazon S3 best practices -- Enhancing Amazon S3 performance -- Amazon CloudFront -- Amazon ElastiCache -- Amazon S3 Transfer Acceleration -- Choosing the right S3 bucket/prefix naming convention -- Protecting your data in Amazon S3 -- Blocking Amazon S3 public access to buckets and objects whenever possible -- Avoiding wildcards in policy files -- Leveraging the S3 API -- Leveraging IAM Access Analyzer to inspect S3 -- Enabling AWS Config -- Implementing S3 Object Lock to secure resources -- Implementing data at rest encryption -- Enabling data-in-transit encryption -- Turning on Amazon S3 server access logging -- Considering the use of Amazon Macie with Amazon S3 -- Implementing monitoring leveraging AWS monitoring services -- Using VPC endpoints to access Amazon S3 whenever possible -- Leveraging Amazon S3 cross-region replication -- Amazon S3 cost optimization -- Building hybrid storage with AWS Storage Gateway -- AWS Storage Gateway -- Amazon S3 File Gateway -- Amazon FSx File Gateway -- Tape Gateway -- Volume Gateway -- AWS Backup -- Summary -- Chapter 6: Harnessing the Power of Cloud Computing -- Compute in AWS -- Learning about Amazon EC2 -- AWS Graviton -- Advantages of EC2 -- EC2 instance families -- General Purpose (A1, M6, T4, Mac) -- Compute Optimized (C7, Hpc6a) -- Accelerated Computing (P4, G5, F1) -- Memory Optimized (R6, X2, High Memory) -- Storage Optimized (H1, D3, I4) -- EC2 pricing model -- AWS Compute Optimizer -- Amazon Machine Images (AMIs) -- Reviewing Amazon EC2 best practices…”
Libro electrónico -
106Publicado 2023Tabla de Contenidos: “…Chapter 4: Data Governance, Security, and Cataloging -- Technical requirements -- The many different aspects of data governance -- Data security, access, and privacy -- Common data regulatory requirements -- Core data protection concepts -- Personally identifiable information (PII) -- Personal data -- Encryption -- Anonymized data -- Pseudonymized data/tokenization -- Authentication -- Authorization -- Putting these concepts together -- Data quality, data profiling, and data lineage -- Data quality -- Data profiling -- Data lineage -- Business and technical data catalogs -- Implementing a data catalog to avoid creating a data swamp -- Business data catalogs -- Technical data catalogs -- AWS services that help with data governance -- The AWS Glue/Lake Formation technical data catalog -- AWS Glue DataBrew for profiling datasets -- AWS Glue Data Quality -- AWS Key Management Service (KMS) for data encryption -- Amazon Macie for detecting PII data in Amazon S3 objects -- The AWS Glue Studio Detect PII transform for detecting PII data in datasets -- Amazon GuardDuty for detecting threats in an AWS account -- AWS Identity and Access Management (IAM) service -- Using AWS Lake Formation to manage data lake access -- Permissions management before Lake Formation -- Permissions management using AWS Lake Formation -- Hands-on - configuring Lake Formation permissions -- Creating a new user with IAM permissions -- Transitioning to managing fine-grained permissions with AWS Lake Formation -- Activating Lake Formation permissions for a database and table -- Granting Lake Formation permissions -- Summary -- Section 2: Architecting and Implementing Data Engineering Pipelines and Transformations -- Chapter 5: Architecting Data Engineering Pipelines -- Technical requirements -- Approaching the data pipeline architecture -- Architecting houses and pipelines…”
Libro electrónico -
107
-
108
-
109Publicado 2020“…Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. …”
Libro electrónico -
110Publicado 2012“…—Terry Lundgren, Chairman, President, and CEO, Macy’s Inc. “This collection of essays . . . will broaden you as a manager, a leader, and as a human being. . . . …”
Libro electrónico -
111
-
112por Milstein, Jeff“…In addition to the urban topography, events and activities have also been captured, such as the Macy’s Thanksgiving Day Parade and outings at the beach…”
Publicado 2017
Libro -
113
-
114Publicado 2006“…One generation of marketers has hooked three generations on the addiction of price promotion, and it has wreaked havoc on our waistlines, credit ratings, and life experience. From Wal-Mart to Macy's, Ralph Lauren, Whole Foods, and the Home Shopping Network, Newlin reveals what the world's leading retailers really know about us, and what it takes to kick the addiction to getting the best deal possible. …”
Libro electrónico -
115Publicado 2014“…This all-in-one guide provides: Practical Six Sigma implementation guidelines anyone can understand New insights from managers who successfully applied the advice from the first edition Detailed case studies from such companies as Adobe, Macy’s, and Starwood Hands-on “maps” that guide you through key decisions you must make The definitive guide to successfully implementing Lean Six Sigma approaches into any organization is essential for any manager who wants to stop thinking about building a continuous improvement culture—and actually make it happen. …”
Libro electrónico -
116
-
117Publicado 2019“…Skill Level Beginner+ Learn How To * Set up the root account and know when to use it* Use access control policies* Understand monitoring and its impact on billing* Use CloudWatch and set up billing alarms* Use tags and implement compliance features* Use data protection mechanisms in AWS* Use CloudTrail, GuardDuty, and Macie for monitoring* Use Control Tower, Security Hub, and AWS Backup to reduce overhead Who Should Take This Course * Anyone getting into AWS for the first time and looking specifically for account setup strategies and best practices* Anyone with a basic knowledge of AWS who has been using it for a while and wants to restart with a strategy in place before account setup Course Requirements Basic understanding of AWS fundamental concepts Lesson Descriptions Lesson 1, "Securing AWS Account Access," covers the basics of account creation, including the root account and when to use it and access control using policies. …”
-
118
-
119
-
120