Mostrando 455,421 - 455,440 Resultados de 457,774 Para Buscar 'AS*', tiempo de consulta: 1.03s Limitar resultados
  1. 455421
    por Charue-Duboc, Florence
    Publicado 2021
    “…Cet ouvrage a bénéficié de l'appui scientifique de l'Association Francophone pour la Gestion des Connaissances dans la Société et les Organisations. …”
    Electrónico
  2. 455422
    por Mekki, Ali
    Publicado 2021
    “…Cette histoire, sans aucun doute assez unique et exemplaire dans l’histoire des migrations, avec une unité de lieux, une ancienneté et une longévité exceptionnelles, ne peut être transposée et pourtant éclaire l’histoire d’autres groupes. …”
    Electrónico
  3. 455423
    por Faure, Olivier
    Publicado 2021
    “…Au-delà de la diversité des thèmes abordés, ce recueil ne se contente pas de réévaluer le rôle de certains acteurs méconnus mais il tente de démontrer que nos actuelles attitudes face à la maladie et à la santé, ne sont pas seulement le fruit d’une médicalisation imposée du haut mais aussi le reflet des aspirations populaires. Enfin, il laisse entrevoir ce qu’aurait pu être un système de santé dans lequel les patients et les professions intermédiaires auraient eu toute leur place aux côtés des médecins…”
    Electrónico
  4. 455424
    por Bratus, Alessandro
    Publicado 2021
    “…L’interazione dei vari punti di vista consente di affrontare l’oralità nella sua valenza trasversale e, al tempo stesso, negli aspetti specifici propri di ciascuna espressione artistica…”
    Electrónico
  5. 455425
    por Arino, Marc
    Publicado 2020
    “…Les productions des personnages-artistes tremblayens peuvent en effet être assimilées à de multiples apocalypses qui doublent l’œuvre-mère et qui dévoilent les mystères de l’origine et de la fin du Monde de l’auteur. …”
    Electrónico
  6. 455426
    por Aguado-López, Eduardo
    Publicado 2019
    “…ELPUB Conference has featured research results in various aspects of digital publishing for over two decades, involving a diverse international community of librarians, developers, publishers, entrepreneurs, administrators and researchers across the disciplines in the sciences and the humanities…”
    Electrónico
  7. 455427
    por Hübsch, Bruno
    Publicado 2019
    “…La controverse sur le ministère touche ainsi à la conception qu’on se fait de l’Église, considérée comme universelle ou envisagée d’abord sous son aspect local. La thèse de Bruno Hübsch permet ainsi de mieux comprendre l’enjeu de controverses souvent mieux connues. …”
    Electrónico
  8. 455428
    por Desportes, Matthieu
    Publicado 2018
    “…La deuxième partie du volume réunit les actes du colloque international qui s'est tenu à l'Hôtel de Ville de Canteleu le 4 décembre 1999, à l'initiative du Centre Flaubert et de l'Association des Amis de Flaubert et de Maupassant, et en collaboration avec la ville de Canteleu et avec le Musée Flaubert et d'Histoire de la Médecine…”
    Electrónico
  9. 455429
    por Allainguillaume, Micaël
    Publicado 2018
    “…Mais elle ne s'est pas contentée de fouiller, elle a toujours voulu replacer ce qu'elle découvrait dans le cadre plus large de la recherche historique, associant ainsi l'archéologie à l'histoire…”
    Electrónico
  10. 455430
    Publicado 2020
    “…È stata ricercatrice nell'Università di Milano Bicocca (2006-2014). È stata assistente di studio presso la Corte costituzionale italiana (2011-2014). …”
    Libro electrónico
  11. 455431
    por Ferrigno, Amélie
    Publicado 2021
    “…Éloge du théâtre classique (Egidio Gallo, Bophilaria et Annularia), techniques de comptabilité commerciale (Juan de Ortega, Suma de aritmetica), réforme du calendrier (Giorgio Benigno Salviati), ou encore livre de jeux mêlant hasard et astronomie (Thomas Ram, l’Almanach novo), tous ces ouvrages publiés à Rome entre 1505 et 1515 sont le reflet des intérêts d’un homme d’affaires à l’affût des dernières créations de son temps…”
    Electrónico
  12. 455432
    por Payn-Echalier, Patricia
    Publicado 2021
    “…Ce document, croisé avec d’autres sources (registres paroissiaux, délibérations communales, registres fiscaux et notariaux), donne le moyen de percevoir la stratégie d’ascension sociale que cet homme met en œuvre dans le contexte politique de la période et d’en découvrir l’efficacité puisqu’il accède au statut de bourgeois et que, peu après sa disparition, son fils aîné accèdera à la noblesse…”
    Electrónico
  13. 455433
    Publicado 2022
    “….), prioritization techniques, ongoing backlog maintenance, and stakeholder communication Major aspects of IT delivery, including Agile teams, roles, frameworks, and success criteria Waterfall planning and Scrum, in detail, including its Sprint structure, artifacts, roles, and ceremonies (meetings) as well as a comparison of Agile scaling frameworks Case studies of modern technology leaders, from startups to FAANG Examples of release plans and delivery reports based on actual projects in a wide range of companies, ways to minimize technical debt, implement DevOps, and establish quality management practices for software products Effective ways of managing dependencies and delivering products that delight customers and made the Silicon Valley giants successful and allowed for rapid business growth…”
    Libro electrónico
  14. 455434
    Publicado 2022
    “…Audience This course is for developers who want to manage their infrastructure as code; for system administrators and Ops engineers who want to learn CDK; and solutions architects who want to understand the benefit of using CDK to manage infrastructure and steer their team to use CDK. This course assumes you know how to use the AWS cloud. It will help you transform your solution architecting skills into CDK Stack…”
    Video
  15. 455435
    Publicado 2022
    “…System administrators, and Ops engineers who would like to automate and manage their AWS infrastructure as code. This course assumes you know how to use the AWS Cloud. It will help you transform your solution architecting skills into CDK Stack. …”
    Video
  16. 455436
    Publicado 2019
    “…You're a system administrator whose company is migrating to AWS in the near future You're a cloud architect responsible for designing AWS infrastructure You're an IT professional who needs to develop AWS technical knowledge and skills You're a developer who will be creating applications in the AWS cloud and need to learn about AWS IaaS and PaaS Prerequisites: You should have a technical background in networking, system administration, and working with virtualized resources You should have a strong interest in cloud technology You should have a solid understanding of computing Materials or downloads needed in advance: Readings (PDFs): AWS Compute Services AWS Global Services AWS Storage Services AWS Managed Services Introduction to automation at AWS Case study (a case study will be available before class along with the questions that will be asked during class) Videos: five-minute videos on AWS cloud services will be posted online in Safari Learning Availability Zones Choosing a Region Create a Custom VPC Public and Private Subnets Route Tables Creating Security Groups Adding an Internet Gateway Creating a custom AMI Creating Instances Creating launch templates Deploying EC2 Auto Recovery Understanding ELB Features EC2 Auto Scaling Creating EBS volumes Creating snapshots Creating S3 buckets Creating a lifecycle policy Creating IAM users and groups CloudWatch in operation Exploring CloudTrail events Creating EC 2 instances with Cloud Formation Deploying Elastic Beanstalk S3 buckets and alerts using Lambda Trusted Advisor Further resources: AWS Core Concepts AWS Managed Services AWS Core Design Services…”
    Video
  17. 455437
    Publicado 2019
    “…What you'll learn--and how you can apply it How to define an inspiring mission statement, vision, and strategy for your team Follow the "understand, identify, and execute loop" to build great products Work backward from the customer problem and capture it all in a press release Pick an effective goal metric to rally your team around Drive amazing execution with your team through great communication and decision making This video course is for you because... You're a new or aspiring product manager who wants to get a head start on learning the end-to-end process of defining and building a product You're an experienced product manager who wants to pick up more product development best practices You're a designer, developer, data scientist, or someone in any other profession who is interested in becoming a product manager You've taken the Product Management Starter Kit learning path and want to dive deeper into the product development process Prerequisites: It would benefit you to first take the Product Management Starter Kit learning path. …”
    Video
  18. 455438
    Publicado 2022
    “…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
    Video
  19. 455439
    Publicado 2022
    “…Audience This audiobook is for aspiring as well as existing CISOs. This audiobook will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. …”
    Grabación no musical
  20. 455440
    Publicado 2022
    “…You will begin by learning the components of HTML, including its lists, tables, URLs, hyperlinks, and many other important aspects of the language. Also, you will learn how to put all of them together to create a structure for your website to style with CSS. …”
    Video