Mostrando 4,361 - 4,380 Resultados de 4,852 Para Buscar 'Azerat~', tiempo de consulta: 1.27s Limitar resultados
  1. 4361
    por Institute of Medicine (U.S.).
    Publicado 2015
    “…To achieve better health at lower cost, all stakeholders - including health professionals, payers, policy makers, and members of the public - must be alert to what matters most. What are the core measures that will yield the clearest understanding and focus on better health and well-being for Americans? …”
    Libro electrónico
  2. 4362
    por Kucharavy, Andrei
    Publicado 2024
    “…It attempts to outrun the malicious attackers by anticipating what they could do. It also alerts LLM developers to understand their work's risks for cybersecurity and provides them with tools to mitigate those risks. …”
    Libro electrónico
  3. 4363
    Publicado 2022
    “…Along the way, Sam and Alex will also discuss some of the more complicated aspects of implementing an SLO-based approach, including how to create meaningful service-level indicators (SLIs) and how to assign accurate SLO targets so that you get useful alerts for your team--and company-wide buy-in. What you'll learn and how you can apply it Explore the origins of, need for, and challenges around SLOs and SRE What's coming next for infrastructure and ops This recording of a live event is for you because... …”
    Video
  4. 4364
    Publicado 2013
    “…The chapters think beyond national and continental boundaries so that readers are informed about general trends in the West, while still alert to differences in gender, class, race, and time. …”
    Libro
  5. 4365
    Publicado 2023
    “…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
    Video
  6. 4366
    Publicado 2020
    “…A diario, desde diferentes sectores (científicos, de divulgación, informativos) de uno u otro modo se aborda la cuestión por medio de noticias, comentarios, difusión de nuevos descubrimientos en el tema, alertas. De este modo, es evidente que el fenómeno se extiende a través de un espectro que sobrepasa la incumbencia de la ciencia para interpelar directamente a otras áreas como la tecnología, la economía y la política. …”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  7. 4367
    por Cuena Casas, Matilde
    Publicado 2017
    “…Desde el punto de vista del particular empresario, una política en materia de prevención no puede obviar los mecanismos de alerta temprana de empresas y prevención del fracaso empresarial. …”
    Acceso al texto completo en Aranzadi
    Libro
  8. 4368
    Publicado 2020
    “…A diario, desde diferentes sectores (científicos, de divulgación, informativos) de uno u otro modo se aborda la cuestión por medio de noticias, comentarios, difusión de nuevos descubrimientos en el tema, alertas. De este modo, es evidente que el fenómeno se extiende a través de un espectro que sobrepasa la incumbencia de la ciencia para interpelar directamente a otras áreas como la tecnología, la economía y la política. …”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  9. 4369
    por Gouyon, Marie
    Publicado 2014
    “…The artist-author population is relatively old (average age 49), and with strong representation in the Île de France. …”
    Electrónico
  10. 4370
    por Farris, William Wayne
    Publicado 2009
    “…Broken families and an appallingly high rate of infant mortality were also part of kinship patterns. The average family lived in a cold, drafty dwelling susceptible to fire, wore clothing made of scratchy hemp, consumed meals just barely adequate in the best of times, and suffered from a lack of sanitary conditions that increased the likelihood of disease outbreak. …”
    Libro electrónico
  11. 4371
    Publicado 2021
    “…Become a better-than-average Python programmer, and develop self-documented, maintainable, easy-to-understand programs that are fast to run and hard to break. …”
    Libro electrónico
  12. 4372
    “…As the third issue of the OECD's new brief series Education Indicators in Focus describes, girls and women are making solid gains on both fronts - though still more can be done to promote gender equality.On the 2009 PISA assessment, for example, 15-year-old girls outperformed boys in every country, and on average by 39 score points - the equivalent of one year of schooling. …”
    Capítulo de libro electrónico
  13. 4373
    por D'Addio, Anna Christina
    Publicado 2009
    “…The results show a median real return of 7.3% a year on a portfolio equally weighted between equities and bonds (averaging across the countries studied). It might be expected that, over a very long period, the degree of uncertainty in investment returns is small. …”
    Capítulo de libro electrónico
  14. 4374
    por International Energy Agency.
    Publicado 2020
    “…This is of particular relevance in Asia, where the average age of coal-fired power plants is just 12 years. …”
    Libro electrónico
  15. 4375
    por Foster, Jack, 1930-
    Publicado 2001
    “…Nathan Mhyrvold, former chief technology officer at Microsoft, has said that a great employee is worth 1,000 times more than an average one simply because of his or her ideas. In Ideaship, the sequel to his bestselling book, How to Get Ideas, Jack Foster shifts from how individuals spark their new ideas to how to unleash the creative genius of an entire organization. …”
    Libro electrónico
  16. 4376
    Publicado 2016
    “…But Caesar, who rose from impoverished beginnings, proved by his words and deeds that he never saw himself as being above the average Roman citizen. And he had an amazing ability to generate loyalty, to turn enemies into allies and allies into devoted followers. …”
    Libro electrónico
  17. 4377
    Publicado 2019
    “…Data is constantly increasing; everything from app usage, to sales, to customer surveys generate data in an average business. Out on the streets data is everywhere too, from speed and security cameras, weather monitoring and measuring footfall to name just a few examples. …”
    Libro electrónico
  18. 4378
    Publicado 2016
    “…Lewitt lays out a survival plan for the average investor to protect their assets when the debt bubble bursts. …”
    Libro electrónico
  19. 4379
    por Alekkett, Kjell
    Publicado 2007
    “…Statistical trends of oil intensity from individual countries and groups of countries show that an average increase of GDP of 3% per annum equates to a projected demand for liquids of 101 Million barrels per day (Mbpd) by the year 2030. …”
    Capítulo de libro electrónico
  20. 4380
    por Égert, Balázs
    Publicado 2012
    “…Policies should ensure that the country’s substantial reduction potential, mainly linked to the energy sector’s high emissions intensity, and implying overall abatement costs above the EU-average, is realised in a least-cost fashion by imposing an economy-wide single carbon price. …”
    Capítulo de libro electrónico