Mostrando 45,421 - 45,440 Resultados de 50,061 Para Buscar '"cover"', tiempo de consulta: 0.14s Limitar resultados
  1. 45421
    Publicado 2009
    “…An impressive range of topics is covered here from studies of Caṅkam literature and devotional texts of the Tamil Bhakti traditions to contemporary Tamil novels and short stories. …”
    Libro electrónico
  2. 45422
    Publicado 2022
    “…Fluoride covers a continuum of topics that are frequently studied in the broad area of fluoride (F) research. …”
    Libro electrónico
  3. 45423
    Publicado 2022
    “…The latter part of thebook deals with the practice of network security, covering practicalapplications that have been implemented and are in use to provide networksecurity. …”
    Libro electrónico
  4. 45424
    Publicado 2023
    “…It also motivates readers to find new AI-based solutions for these challenges by providing a comprehensive collection of findings on AI techniques. It covers important topics including solar irradiance variability, solar power forecasting, solar irradiance forecasting, maximum power point tracking, hybrid algorithms, swarm optimization, evolutionary optimization, sensor-based sun- tracking systems, single-axis and dual-axis sun-tracking systems, smart metering, frequency regulation using AI, emerging multilevel inverter topologies, and voltage and reactive power control using AI. …”
    Libro electrónico
  5. 45425
    Publicado 2024
    “…This essential collection of practice tests contains study questions covering every single objective domain included on the SY0-701. …”
    Libro electrónico
  6. 45426
    Publicado 2024
    “…Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system. …”
    Libro electrónico
  7. 45427
    Publicado 2024
    “…Moreover, the course covers essential security practices necessary for protecting data, with in-depth sessions on using IAM and KMS to manage access and encryption. …”
    Video
  8. 45428
    Publicado 2017
    “…Including studies from over 30 countries distributed across Africa, North America, South America, Asia and Europe; the collection of articles covers a diverse range of research backgrounds and situations. …”
    Libro electrónico
  9. 45429
    Publicado 2023
    “…This guide for users of iPhones and iPads explores the new features and interface changes in iOS 17 and iPadOS 17. It also covers iOS and iPadOS basics, such as working with the Lock screen, Control Center, and Home screen, and using built-in apps like Camera, Messages, and Siri. …”
    Libro electrónico
  10. 45430
    Publicado 2023
    “…Additionally, this book covers advanced topics such as PCF components testing and model-driven apps. …”
    Libro electrónico
  11. 45431
    por Chapple, Mike
    Publicado 2023
    “…Whether you're preparing for your first attempt at the CompTIA DataSys+ exam or for your first day on the job at a new database-related IT position, this book walks you through the foundational and intermediate skills you need to have to succeed. It covers every objective tested by the DS0-001 and skills commonly required in the real-world. …”
    Libro electrónico
  12. 45432
    por Harris, David Money
    Publicado 2016
    “…Digital Design and Computer Architecture: ARM Edition covers the fundamentals of digital logic design and reinforces logic concepts through the design of an ARM microprocessor. …”
    Libro electrónico
  13. 45433
    Publicado 2022
    “…A Frequency Dictionary of Old English Prose is a list of Old English words arranged according to their frequency, covering the whole York-Toronto-Helsinki Parsed Corpus of Old English Prose (Taylor et al. 2003), i.e. an electronic collection of all prose texts written in Old English. …”
    Libro electrónico
  14. 45434
    Publicado 2024
    “…You'll set up MongoDB as a document store, construct a simple API with FastAPI, and build an application using React. The guide also covers enhancing application security through authentication and authorization with JSON Web Tokens. …”
    Libro electrónico
  15. 45435
    Publicado 2021
    “…About the Open Source Software Superstream Series: Each day in the four-part OSCON Superstream Series covers a different programming language and its ecosystem, with unique sessions including keynotes from language luminaries, debates on controversial topics, and hands-on coding talks. …”
    Video
  16. 45436
    Publicado 2024
    “…This three-part book covers all the processes behind the creation of a stunning environment in UE 5. …”
    Libro electrónico
  17. 45437
    Publicado 2019
    “…"Ian Varley (Salesforce) covers the emerging field of cognitive biases--bugs in our mental operating system--and takes a cold, hard look at how these mental blind spots defeat our attempts to build quality software in every domain. …”
    Vídeo online
  18. 45438
    Publicado 2023
    “…AWS Certified Security - Specialty Exam Prep This video series provides comprehensive preparation for the AWS Certified Security - Specialty (SCS-C02) exam. Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
    Video
  19. 45439
    Publicado 2023
    “…They'll spend a few minutes covering the trends that are influencing software, then tell you what you need to know to stay ahead of the curve. …”
    Video
  20. 45440
    Publicado 2023
    “…You'll learn full-stack JavaScript development with over 24 hours of HD video tutorials covering ReactJS, NodeJS, LoopbackJS, Redux, Material-UI, and socket programming. …”
    Video