Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
26041por Ilag, Balu Nivrutti“…This includes mastering sophisticated authentication methods, implementing stringent access controls, and utilizing vulnerability scanning tools to detect and mitigate potential security threats. …”
Publicado 2024
Libro electrónico -
26042Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
26043Publicado 2010“…These results represent a potential tool for aquaculture, allowing the modification of the natural reproductive schedule of a high commercial value species…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales UPSA
Tesis -
26044por Hernández Castellano, Pedro“…One of the most significant advantages associated with the technologies of RM is the potential elimination of the tools. Hence, companies can reduce or eliminate their capital investment in fixed assets and, in this way, the products can be brought to market faster, with a much lower cost and less risk. …”
Publicado 2013
Texto completo en Odilo
Otros -
26045por Paul, Clayton R.“…An Appendix contains a brief tutorial on SPICE (PSPICE), an important computational tool that is used extensively throughout the book. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
26046Publicado 2017“…Ionic has evolved as the most popular choice for Hybrid Mobile App development as it tends to match the native experience and provides robust components/tools to build apps. The Ionic Complete Developers course takes you on an end?…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
26047Publicado 2016“…People Analytics in the Era of Big Data is the essential guide to optimizing your workforce with the tools already at your disposal"-- Provided by publisher "This book will be the ultimate guide for integrating analytics into a company's HR business practices. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
26048Publicado 2017“…Most of our knowledge of fleshy fruit development, ripening and quality traits comes from work done in a reduced number of species that are not only of economic importance but can also benefit from a number of genetic and genomic tools available to their specific research communities. …”
Libro electrónico -
26049Publicado 2015“…This so-called RNA revolution also lead to the exploitation of RNA interference and the development of related tools as potential treatment of a vast array of CNS disease that could benefit from regulation of disease-associated genes. …”
Libro electrónico -
26050Publicado 2015“…For this purpose, a collection of Original Research articles, Review Articles, and Methods Articles will discuss both our basic knowledge in immunology and AAV biology, and the preclinical and clinical experience with AAV vectors, including the tools used to decipher the complex interactions between a gene transfer vehicle and the host immune system…”
Capítulo de libro electrónico -
26051Publicado 2008“…One approach is based on formal or global kinetic mechanisms together with the computational fluid dynamics (CFD) tool. The other approach is based on detailed chemistry with simplified or ideal flow models. …”
Libro electrónico -
26052Publicado 2015“…We envision a diverse set of tools, including optical, spectroscopical, chemical and ultrastructural imaging techniques that will be utilized to address questions regarding e.g. intra- and inter-organism interactions linked to ultrastructure, and correlated adaptive responses in gene expression, physiological and metabolic states as a consequence of the alterations of their environment. …”
Libro electrónico -
26053Publicado 2014“…The significance of these original observations has only been recently revisited, and the development of more powerful tools to study the brain immune response has certainly contributed to this field of research. …”
Libro electrónico -
26054Publicado 2015“…Therefore, pharmacological tools are urgently needed to further elucidate hemichannels functions and to validate them as drug targets for the development of novel therapies for connexin-based diseases. …”
Libro electrónico -
26055por Eghbal, Nadia“…Our modern society runs on software. But the tools we use to build software are buckling under increased demand. …”
Publicado 2017
Electrónico -
26056Publicado 2016“…In this research topic, we aim to fill the aforementioned void by covering a broad range of topics that include: - Identification of signaling pathways and mechanisms that operate globally or locally to induce specific pre-synaptic adaptations - The nature of pre-synaptic ion channels relevant to this form of plasticity and their synapse-specific modulation and trafficking - Development and utilization of new tools or methods to study homeostatic plasticity in axons and pre-synaptic terminals - Novel mechanisms of homeostatic adaptations in pre-synaptic neurons - Postsynaptic sensors of activity and retrograde synaptic signaling systems - A comprehensive analysis of the kinds of pre-synaptic adaptations in diverse neural circuits and cell types - Identification of physiological or developmental conditions that promote pre-synaptic homeostatic adaptations - How activity-dependent (Hebbian) and homeostatic synaptic changes are integrated to both permit sufficient flexibility and maintain stable activity - Relevance of pre-synaptic homeostatic plasticity to the etiology of neuropsychiatric disorders - Computational modeling of pre-synaptic homeostatic plasticity and network stability…”
Libro electrónico -
26057Publicado 2015“…Thus, kisspeptin antagonists have been developed as novel tools for treatment of hormone-dependent disorders of reproduction such as precocious puberty and endometriosis or kisspeptin for treatment of infertility, in humans. …”
Libro electrónico -
26058Publicado 2007“…Research on extending well-known statistical tools like regression, mixture distribution, and hierarchical linear models has led to the adoption of Rasch model features to handle categorical observed variables. …”
Libro electrónico -
26059por Wolter, Kirk M.“…Software developers concerned with creating the computer tools necessary to enable sound decision-making will find it essential. …”
Publicado 2007
Libro electrónico -
26060por Cleland, Keith N. author“…As you’ll learn, the financial tool Cleland created, TARI (Target Average Rate Index), provides insight into each product’s value. …”
Publicado 2013
Libro electrónico