Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
26541Publicado 2022“…We were able to include two great keynote speakers whose topics covered a diverse range of areas of interest for the community: m.c. schraefel, Professor of Computer Science and Human Performance at the University of Southampton and leader of the Wellthlab. …”
Libro electrónico -
26542Publicado 2002“…The expansion of computer ability means that the same function can be performed by far cheaper and smaller computers. The advent of portable and mobile computers and pervasive computing devices, is evidence of this. …”
Libro electrónico -
26543Publicado 2008“…The fundamental change in Hanslick ́s occupation as a critic as can be seen exactly from the 1860s, that is his stronger attention to reviewing the performance cannot be substantiated by his own editions so well because he often left out parts related to the concert. …”
Libro electrónico -
26544Publicado 2019“…The characterization of the new catalyst was performed, providing context for the observed changes in the specificity. …”
Libro electrónico -
26545Publicado 2005“…An evaluation was not performed of documentation from animal experiments with snuff or components of snuff. …”
Libro electrónico -
26546Publicado 2023“…Course Overview Course One: Designing and planning a cloud solution architecture 1.0 Rough Draft Introduction Introduction to Google Professional Architect Course Onboarding to GCP Cloud Designing a solution infrastructure that meets business requirements Designing a solution infrastructure that meets technical requirements Designing network, storage, and compute resources Using Google Cloud Functions Running Minikube Running Minikube with FastAPI for Kubernetes development Getting Started with Google Cloud Run Load testing with locust Design technical solutions for evolution and migration SRE Mindset Conclusion and Next Steps Course Two: Managing and provisioning a solution infrastructure Introduction to Google Professional Architect Course Two Exploring Network Topologies in GCP: A Demonstration Embracing Hybrid Networking in Google Cloud Platform Overview of GCP Storage Demo of using the SDK and CLI to manage storage Data lifecycle management Data security Demo of building Rust deduplication finder Compute volatility configuration (preemptible vs. standard) Demo Build and Deploy Rust Actix Microservice Cloud Run Container orchestration with GKE Demo of extending Google Cloud Functions Conclusion Course Two Course Three: Designing for Security and Compliance Introduction to Google Professional Architect Course Three Mastering Identity and Access Management in GCP Data Security Best Practices for GCP Secrets Manager API: A Hands-on Guide Exploring a data poisoning attack Meeting Industry Certification Requirements in GCP Auditing GCP Security with Log Analysis Creating Custom Log Dashboards for GCP Security Monitoring Scanning Web Applications with GCP's Cloud Web Security Scanner Analyzing GCP Logs with BigQuery GCP Security: Conclusion and Next Steps Course Four: Designing and optimizing technical and business processes Introduction to Google Professional Architect Course Four Continuous Delivery: An Introduction Hands-on with Continuous Integration in GCP Troubleshooting Techniques: The Five Whys Implementing Simple GitHub Actions for CI/CD The Three Most Important Files in a Python Project Utilizing Trello for Effective Project Management Leveraging Spreadsheets for Project Management Exploring the MLOps Maturity Model Building Bespoke Systems for Core Business Functions Data Science on Windows: Virtualenv and Pip Site Reliability Engineering (SRE) in GCP Performing Load Testing in GCP: A Demo Course Five: Managing and optimizing cloud solution Implementation Introduction to Google Professional Architect Course Five Makefiles Made Easy: A Comprehensive Guide Configuring Your Bashrc for an Optimal Environment Implementing Continuous Integration for Rust with GitHub Actions Unit Testing in Rust: A Hands-on Demonstration Supercharging Rust Development with Copilot Setting Up a GCP Workstation for Python Development Mastering Google Cloud Shell: A Practical Guide Streamline Your Development with Google Cloud Editor Getting Started with the Google Cloud CLI SDK Unleashing the Power of Google Cloud's 'gcloud' Command-Line Tool Deploying Rust Applications to App Engine: A Step-by Course Six: Ensuring solution and operations reliability Introduction to Google Professional Architect Course Six Monitoring and Logging Rust App Engine Applications: A Demo Uncovering the Advantages of Cloud Developer Workspaces Operationalizing Microservices in the Cloud Introducing GitHub Codespaces for Streamlined Development Compiling Python Projects in GitHub Codespaces Mastering Continuous Integration in GCP Course Wrap-up and Future Steps in Your GCP Journey Learning Objectives Design and optimize cloud solutions Analyze and optimize technical and business processes Manage and provision cloud infrastructure Ensure solution and operations reliability By the end of this course, you will have the knowledge and skills needed to pass the Google Cloud Certified Professional Cloud Architect exam and to effectively design and manage cloud solutions using Google Cloud Platform. …”
Video -
26547Publicado 2023“…: 2.40-what-is-colab.mp4 Using Bard to enhance notebook development: 2.41-using-bard-to-enhance-productivity.mp4 Exploring Life Expectency in a Notebook: 2.42-life-expectancy-eda.mp4 Load a DataFrame with sensitive data: 2.43-Load-a-DataFrame-with-sensitive-information.mp4 Using MLFlow with Databricks Notebooks: 2.44-mlops-mlflow-tracking.mp4 End to End ML with MLFlow and Databricks: 2.45-end-to-end-ml-with-mlflow-and-databricks.mp4 Comparing DataFrame Libraries between Rust and Python: 2.46-comparing-dataframe-libs-rust-python.mp4 Lesson 3: Data Engineering Libraries and Tools with Rust Parquet file writing and reading with Rust: 2.50-parquet-read-write-rust.mp4 Arrow & Parquet in Rust: 2.51-arrow-parquet-rust.mp4 Serverless functions with Rust and AWS Lambda: 2.52-serverless-rust-aws-lambda.mp4 Polars library overview: 2.53-polars-library-overview.mp4 Building RESTful APIs with Rocket: 2.54-building-restful-apis-rocket.mp4 Utilizing Async Rust in Web Development: 2.55-utilizing-async-rust-web-development.mp4 Applying Data Cleaning Techniques with Rust: 2.56-applying-data-cleaning-rust.mp4 Deploying Rust Applications in a Kubernetes Environment: 2.57-deploying-rust-apps-kubernetes.mp4 Section 4: Designing Data Processing Systems in Rust Lesson 1: Getting Started with Rust Data Pipelines (Including ETL) Jack and the Beanstalk Data Pipelines: 4.1-jack-beanstalk-building-data-pipelines.mp4 Open Source Data Engineering - Pros and Cons: 4.2-open-source-de-pro-con.mp4 Core Components of Data Engineering Pipelines: 4.3-core-components-data-engineering-pipelines.mp4 Rust AWS Step Functions Pipeline: 4.4-rust-aws-step-functions.mp4 Rust AWS Lambda Async S3 Size Calculator: 4.5-rust-async-s3-size-calculator-lambda.mp4 What is Distroless: 4.6-what-is-distroless.mp4 Demo Deploying Rust Microservices on GCP: 4.7-demo-build-deploy-rust-microservice-cloud-run.mp4 Lesson 2: Using Rust and Python for LLMs, ONNX, Hugging Face, and PyTorch Pipelines Introduction to Hugging Face Hub: 4.10-intro-hugging-face-hub.mp4 Rust PyTorch Pre-trained Model Ecosystem: 4.11-rust-pytorch-pretrained-models-ecosystem.mp4 Rust GPU Hugging Face Translator: 4.12-rust-gpu-hugging-face-translator.mp4 Rust PyTorch High-Performance Options: 4.13-high-performance-pytorch-rust-demo.mp4 Rust CUDA PyTorch Stress Test: 4.14-building-cuda-enabled-stress-test-with-rust-pytorch.mp4 EFS ONNX Rust Inference with AWS Lambda: 4.15-efs-onnx-lambda-rust-inference-mlops.mp4 Theory behind model fine-tuning: 4.16-intro-fine-tuning-theory.mp4 Doing Fine Tuning: 4.17-doing-fine-tuning.mp4 Lesson 3: Building SQL Solutions with Rust, Generative AI and Cloud Selecting the correct database on GCP: 4.20-gcp-optimize-database-solution.mp4 Rust SQLite Hugging Face Zero Shot Classifier: 4.21-rust-sqlite-hugging-face-zero-shot-classifier-demo.mp4 Prompt Engineering for BigQuery: 4.22-big-query-prompt-engineering-v3.mp4 Big Query to Colab Pipeline: 4.23-bq-colab-pipeline-v2.mp4 Exploring Data with Big Query: 4.24-exploring-data-google-bigquery-v2.mp4 Using Public Datasets for Data Science: 4.25-using-public-datasets.mp4 Querying Log files with BigQuery: 4.26-demo-big-query-log-query.mp4 There is no one size database: 4.27-one-size-database.mp4 Course Conclusion: 4.28-conclusion.mp4 Learning Objectives By the end of this Course, you will be able to: Leverage Rust's robust data structures and collections for efficient data manipulation. …”
Video -
26548Publicado 2010“…In the fourth section, we performed enzymatic digestions of LF and the resulting peptides were characterized by means of biochemical and microbiological methods. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales UPSA
Tesis -
26549por Chemes, Lucía Beatriz“…In the second part of this thesis, we performed thermodynamic and kinetic analysis of the interaction between HPV-E7 and RbAB. …”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Tesis -
26550Publicado 2023“…Individuals preparing to take Exam MS-100: Microsoft 365 Identity and Services Enterprise administrators planning to perform Microsoft 365 tenant-level planning, implementation, and administration of cloud and hybrid enterprise environments Course Requirements: Requires a basic knowledge of Microsoft 365 workloads and Microsoft Azure Active Directory (Azure AD). …”
Video -
26551Publicado 2020“…Responses to regular mail slightly out-performed email outreach. Our structured interviews identified opportunities for HPRNs to engage in PCOR. …”
Libro electrónico -
26552
-
26553Publicado 2023“…Benchmark Models: Conduct performance tests to ensure optimal LLM functionality. …”
Video -
26554Publicado 2022“…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
Video -
26555por Tagliazucchi, Mario Eugenio“…The selectivity and performance of the nanocatalyzers greatly surpasses those of the electrodes prepared by direct electroreduction of Pd salts in solutions, which are a standard in the electrosynthesis literature. …”
Publicado 2009
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Tesis -
26556Publicado 1981Seriada digital
-
26557
-
26558por Carbó Ochoa, David“…Building on the previously noted initiatives, the majority of evaluated certifications now also assess the environmental performance of the company. The control and management of resource consumption and waste, the minimization of impacts, environmental protection and education, etc. are all practices that have been introduced into the secto r, and are generally included in assessment. …”
Publicado 2013
Accés lliure
Tesis -
26559Publicado 1981Seriada digital