Mostrando 2,661 - 2,680 Resultados de 14,769 Para Buscar 'Honiton~', tiempo de consulta: 1.84s Limitar resultados
  1. 2661
    Publicado 2010
    Libro
  2. 2662
    Publicado 2016
    Libro
  3. 2663
    por Turner, Jay
    Publicado 2016
    “…First, a comprehensive review is conducted of the publicly available ground-level air monitoring data for the selected countries, including their geographic coverage, data quality, comparability, etc. …”
    Capítulo de libro electrónico
  4. 2664
    Publicado 2023
    Tabla de Contenidos: “…Creating a custom role for Azure Machine Learning -- Authenticating with application identities -- Creating a service principal -- Working with managed identities -- Enhancing access security -- Conditional Access -- PIM -- Azure Key Vault -- Summary -- Chapter 7: Managing and Securing Your Azure Machine Learning Workspace -- Technical requirements -- Exploring network security -- Creating a VNet -- Securing the workspace -- Securing associated resources -- Validating connectivity -- Working with Azure Machine Learning compute -- Securing compute instances -- Securing compute clusters -- Managing container registries and containers -- Securing images with Azure Container Registry -- Working with ML endpoints -- Summary -- Chapter 8: Managing and Securing the MLOps Life Cycle -- Technical requirements -- Working with MLOps in Azure Machine Learning -- Leveraging IaC -- Combining IaC with Azure Machine Learning -- Implementing CI/CD -- Working with Azure DevOps -- Exploring event-driven workflows in Azure -- Exploring Event Grid -- Working with events in Azure Machine Learning -- Discovering event handlers in Azure -- Summary -- Chapter 9: Logging, Monitoring, and Threat Detection -- Technical requirements -- Enabling logging and configuring data retention for Azure services -- Working with Azure Monitor -- Enabling diagnostic settings -- Working with alerts -- Working with Application Insights -- Visualizing the data -- Securing resources with Microsoft Defender -- Improving our security posture -- Exploring threat management with Sentinel -- Summary -- Part 4: Best Practices for Enterprise Security in Azure Machine Learning -- Chapter 10: Setting a Security Baseline for Your Azure Machine Learning Workloads -- Setting a baseline for Azure Machine Learning -- Discovering services for added security -- Exploring an example solution architecture…”
    Libro electrónico
  5. 2665
    Publicado 1993
    Libro
  6. 2666
  7. 2667
  8. 2668
    Publicado 1999
    Materias: “…Environmental monitoring Developing countries Remote sensing Periodicals…”
    Tesis
  9. 2669
  10. 2670
  11. 2671
  12. 2672
    Publicado 2019
    Materias:
    Libro electrónico
  13. 2673
    Publicado 2016
    Materias:
    Libro electrónico
  14. 2674
    Publicado 2014
    Materias:
    Libro electrónico
  15. 2675
    Publicado 2017
    Materias:
    Libro electrónico
  16. 2676
    Publicado 2022
    Materias:
    Libro electrónico
  17. 2677
    Publicado 2017
    Materias:
    Video
  18. 2678
    Publicado 2020
    Materias:
    Video
  19. 2679
    Publicado 2023
    Materias:
    Video
  20. 2680
    Publicado 2003
    Materias:
    Libro