Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
2641Publicado 2016“…Thus, having the alternative of noninvasive elastographic methods for the evaluation of liver fibrosis (maybe together with serum tests such as FibroMax) and knowing the low real life yield of liver biopsy ()and the risk of complications), we can safely conclude that, for daily medical activity, liver biopsy can be avoided in the vast majority of cases. …”
Libro electrónico -
2642Publicado 2022“…It also provides extensive insight into keeping meetings safe, and warning or removing problematic participants. …”
Libro electrónico -
2643Publicado 2019“…You're an IT architect or developer moving to the cloud You're an IT security professional tasked with keeping your teams safe in the cloud Prerequisites: General knowledge of computing concepts, such as storage and virtual machines General knowledge of networking, including IP addresses, subnetting, and firewalls If you're new to IT architecture or IT security, you might need some additional introductory courses prior to this one Materials or downloads needed in advance: Code repository for the course: https://resources.oreilly.com/examples/110000448 A useful, open source textbook: Problem Solving with Algorithms and Data Structures using Python Further resources Threat Modeling: Designing for Security, by Adam Shostack is a very good read for anyone who wants more in-depth information on threat modeling Applied Cryptography by Bruce Schneier is the definitive reference for anyone who would like to dig deep into cryptography The online documentation for the different cloud providers is the best, most up-to-date resource for determining how to do exactly what you want to do with that provider; this course teaches you to ask the right questions, but in most cases it doesn't give step-by-step instructions on how to do it, because those would quickly become obsolete…”
Video -
2644Publicado 2023“…It requires governments to: - provide physical security and decent working conditions- address diverse needs and psychosocial risk factors, and tackle stigma and discrimination- consider wider measures around childcare, transportation and safe accommodation.1.3. Getting support and protection right enhances retention of the existing workforce and will attract a new generation of HCWs.5. …”
Libro electrónico -
2645Publicado 2020“…For these reasons, “PharmaCaRe Report 2018” represents a useful and valuable tool for political decision-makers in identifying strategies aimed at optimizing the allocation of resources, as well as improving care pathways through constant monitoring, the promotion of higher standards of care and safe, efficient and effective use of drugs…”
Libro electrónico -
2646Publicado 2022“…Deal with unusual backup needs: If you deal with exceptionally large files (such as audio and video files), spend a lot of time on the road away from your usual backup hardware, run Windows on your Mac, or rely on cloud services to store essential data, you'll want to take extra (or different) steps to make sure everything is safely backed up. Manage your media: What happens when a backup drive fills up, or becomes so old that you worry about its future reliability? …”
Libro electrónico -
2647Publicado 2023“…You will learn foundational concepts on how to keep the ICS/SCADA/IoT operational environment safe, secure, and resilient against current and emerging cyber threats. …”
Video -
2648Publicado 2024“…About the Instructor Tommy Norman (CSM, A-CSM, CSPO, CSP, CTC, CEC, CAL, PSM, SAFe Agilist, Microsoft MVP) has had an IT career spanning over 30 years, he has been helping organizations of all sizes and shapes build great software with a practical approach in a multitude of roles. …”
Video -
2649Publicado 2020“…We received submissions on a variety of topics including: novel assessments of learning, drawing on computational techniques for automated, peer, or human-assisted assessment; new methods for validating inferences about human learning from established measures, assessments, or proxies; experimental interventions in large-scale learning environments that show evidence of improved learning outcomes; domain independent interventions inspired by social psychology, behavioral economics, and related fields with the potential to benefit learners in diverse fields and disciplines; domain specific interventions inspired by discipline-based educational research that have the potential to advance teaching and learning of specific ideas, misconceptions, and theories within a field; tools or techniques for personalization and adaptation, based on log data, user modeling, or choice; usability studies and effectiveness studies of design elements for students or instructors; tools and pedagogy to promote community, support learning, or increase retention in atscale environments; new tools and techniques for learning at scale; best practices in the archiving and reuse of learner data in safe, ethical ways; fairness in student predictive models; challenges in learning at scale across the globe; exploration of affordable degrees at scale; innovations in platforms for supporting learning at scale; and platforms to broadly engage individuals of all ages in citizen science. …”
Libro electrónico -
2650