Mostrando 33,801 - 33,820 Resultados de 33,948 Para Buscar 'COPCON~', tiempo de consulta: 1.06s Limitar resultados
  1. 33801
    Publicado 2014
    “…He explains the major phases in a technology company's life cycle, helping entrepreneurs avoid common pitfalls and survive crises when they strike. …”
    Grabación no musical
  2. 33802
    Publicado 2011
    “…Simon & amp; Sons "Most leadership authors describe how to apply common-sense principles. Michelli is a notable exception. …”
    Grabación no musical
  3. 33803
    Publicado 2018
    “…In Norway, the Constitution of 1814 marks the shift from autocratic rule to early democracy. 18th century peasant riots may be interpreted as expressions of impotence of the common people, but also as an opportunity for action with the potential to influence the authorities. …”
    Libro electrónico
  4. 33804
    Publicado 2012
    “…The central corpus of analysis are the mentioned letters from emigration solicitudes, commonly called cartas de llamada or recruitment letters. …”
    Libro electrónico
  5. 33805
    Publicado 2024
    “…It dives into the specifics of on-prem and cloud threats, emphasizing common security vulnerabilities and attack mitigation strategies. …”
    Video
  6. 33806
    Publicado 2024
    “…The course then focuses on deploying the Firepower Management Center virtual (FMCv), a pivotal component for effective security policy management and monitoring. …”
    Video
  7. 33807
    Publicado 2024
    “…Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. …”
    Video
  8. 33808
    Publicado 2023
    “…With the aging of the family members, the vulnerability of the family life situation increases. Changes are commonly initiated by the parents' decreasing health, directly affecting the parents ability of care intensity . …”
    Libro electrónico
  9. 33809
    Publicado 2012
    “…Moreover this is a series of descriptions about civil laws, valid for different hereditary provinces of the Habsburg Monarchy, which should then serve as basic sources in regard of the project of an unified Civil Code, which was provided as a common law for the entire monarchy instead of particular laws in different provinces. …”
    Libro electrónico
  10. 33810
    Publicado 2024
    “…Skill Level: Beginner Learn How To: Protect data and secure an organizations operation in their day-to-day business Observe, collect, and secure date Detect common security encounters and be prepared for them Implement processes that allow communication of information in a correct and timely manner Who Should Take This Course: Cybersecurity Professionals Anyone interested in learning cyber security fundamentals. …”
    Video
  11. 33811
    por National Toxicology Program
    Publicado 2019
    “…Samples of CRCM and crumb rubber-conditioned PBS or ALF were analyzed by non-targeted ultraperformance liquid chromatography-mass spectrometry (UPLC-MS). Principal component analysis of the data showed segregation of chemical features present in the CRCM from the crumb rubber-conditioned PBS and ALF. …”
    Libro electrónico
  12. 33812
    Publicado 2023
    “…Leverage globally distributed data centers to launch virtual machines with EC2 Store and archive large volumes of data with EBS, S3, and EFS Persist and query data with highly available and scalable database systems with RDS and DynamoDB Enhance performance with caching data in-memory with ElastiCache and MemoryDB Use Infrastructure as Code to automate your cloud infrastructure Secure workloads running in the cloud with VPC and IAM Build fault-tolerant web applications with ALB and SQS Automate common sysadmin tasks with Lambda, CLI, and SDK Build cloud-native applications based on containers with AppRunner, ECS, Fargate Thousands of developers have chosen Amazon Web Services in Action: An in-depth guide to AWS to help them succeed with the AWS cloud. …”
    Video
  13. 33813
    Publicado 2023
    “…Leverage globally distributed data centers to launch virtual machines with EC2 Store and archive large volumes of data with EBS, S3, and EFS Persist and query data with highly available and scalable database systems with RDS and DynamoDB Enhance performance with caching data in-memory with ElastiCache and MemoryDB Use Infrastructure as Code to automate your cloud infrastructure Secure workloads running in the cloud with VPC and IAM Build fault-tolerant web applications with ALB and SQS Automate common sysadmin tasks with Lambda, CLI, and SDK Build cloud-native applications based on containers with AppRunner, ECS, Fargate Thousands of developers have chosen Amazon Web Services in Action: An in-depth guide to AWS to help them succeed with the AWS cloud. …”
    Grabación no musical
  14. 33814
    Publicado 2022
    “…About the Book Istio in Action teaches you how to implement an Istio-based service mesh that can handle complex routing scenarios, traffic encryption, authorization, and other common network-related tasks. You'll start by defining a basic service mesh and exploring the data plane with Istio's service proxy, Envoy. …”
    Grabación no musical
  15. 33815
    Publicado 2022
    “…In Spring Boot in Practice you will learn: Spring Boot's features from an expert's perspective Configuring, logging, and monitoring Spring Boot applications Effective methods for database communication Utilizing Spring Security and securing your Spring application in production Designing and developing microservices and RESTful APIs with Spring Boot Microservice versioning, documentation, and security Reactive application development and reactive data access with WebSocket and RSocket Deploying Spring Boot applications on Kubernetes and major cloud platforms Implementing containerization in a Spring Boot application Using Spring Boot with Kotlin and GraalVM Spring Boot in Practice is full of practical recipes for common development problems in Spring Boot. Author Somnath Musib has spent years building applications with Spring, and he shares that extensive experience in this focused guide. …”
    Grabación no musical
  16. 33816
    Publicado 2022
    “…In Spring Boot in Practice you will learn: Spring Boot's features from an expert's perspective Configuring, logging, and monitoring Spring Boot applications Effective methods for database communication Utilizing Spring Security and securing your Spring application in production Designing and developing microservices and RESTful APIs with Spring Boot Microservice versioning, documentation, and security Reactive application development and reactive data access with WebSocket and RSocket Deploying Spring Boot applications on Kubernetes and major cloud platforms Implementing containerization in a Spring Boot application Using Spring Boot with Kotlin and GraalVM Spring Boot in Practice is full of practical recipes for common development problems in Spring Boot. Author Somnath Musib has spent years building applications with Spring, and he shares that extensive experience in this focused guide. …”
    Video
  17. 33817
    Publicado 2022
    “…AWS Certified Advanced Networking - Specialty (ANS-C01)-2023 Learning AWS Certified Advanced Networking This video series the AWS Certified Advanced Networking Certification 2023 Lessons Covered Include: 1.0 course intro 1.1 sap prerequisite 1.2 Domain intro 1.3 CDN Pattern 1.4 ELB Design 1.5 Amazon API Gateway 1.6 Route 53 Demo 1.7 Public vs Private Hosted Zones DNS-DEMO 1.8 Load Balancing Layer 3, 4, 7 of OSI Model 1.9 Cloudwatch Metrics Demo 1.1 Layer 1/2 concepts: VLAN, Jumbo Frames 1.11 Multiple AWS Accounts 1.12 VPC Peering 2.0 domain intro 2.1 Infrastructure Automation (IAC) with CDK Demo 2.2 Hybrid Networks 2.3 Authentication and Authorization 2.4 Network Monitoring 2.5 Traffic Management DNS 2.6 AWS Boto3 Cloud9 CodeWhisper Demo 2.7 AWS CLI Demo 3.0 domain intro 3.1 Quotas and Limits in AWS Networking 3.2 Inter-Regional communication patterns 3.3 Network performance testing tools- demo 3.4 VPC Flow logs - Demo 3.5 Different types of Network interfaces AWS 3.6 High-Availability via Route 53 4.0 domain intro 4.1 common security threats 4.2 network acls 4.3 AWS Cloud Trail - Demo 4.4 AWS Trusted Advisor Demo 4.5 Network encryption options AWS 4.6 AWS Shared Security Model 5.0 conclusion Learning Objectives Network Design (25%) Network Implementation (25%) Network Management and Operations (25%) Network Security, Compliance, and Governance Additional Popular Resources Pytest Master Class AWS Solutions Architect Professional Course Github Actions and GitOps in One Hour Video Course Jenkins CI/CD and Github in One Hour Video Course AWS Certified Cloud Practitioner Video Course Advanced Testing with Pytest Video Course AWS Solutions Architect Certification In ONE HOUR Python for DevOps Master Class 2022: CI/CD, Github Actions, Containers, and Microservices MLOPs Foundations: Chapter 2 Walkthrough of Practical MLOps Learn Docker containers in One Hour Video Course Introduction to MLOps Walkthrough AZ-900 (Azure Fundamentals) Quick reference guide 52 Weeks of AWS Episode 8: Infrastructure as Code with CDK and AWS Lambda Learn GCP Cloud Functions in One Hour Video Course Python Devops in TWO HOURS! …”
    Video
  18. 33818
    Publicado 2024
    “…About the Book Web Design Playground, Second Edition takes a creative, visual approach and clear explanations of the components, concepts, and of each step you'll need to build your own web pages. …”
    Grabación no musical
  19. 33819
    Publicado 2024
    “…About the Book Web Design Playground, Second Edition takes a creative, visual approach and clear explanations of the components, concepts, and of each step you'll need to build your own web pages. …”
    Vídeo online
  20. 33820
    Publicado 2024
    “…About the Book Grokking Algorithms, Second Edition teaches you important algorithms to speed up your programs, simplify your code, and solve common programming problems. Start with tasks like sorting and searching, then build your skills to tackle advanced problems like data compression and artificial intelligence. …”
    Vídeo online