Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 240
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
2661
-
2662
-
2663por Turner, Jay“…First, a comprehensive review is conducted of the publicly available ground-level air monitoring data for the selected countries, including their geographic coverage, data quality, comparability, etc. …”
Publicado 2016
Capítulo de libro electrónico -
2664Publicado 2023Tabla de Contenidos: “…Creating a custom role for Azure Machine Learning -- Authenticating with application identities -- Creating a service principal -- Working with managed identities -- Enhancing access security -- Conditional Access -- PIM -- Azure Key Vault -- Summary -- Chapter 7: Managing and Securing Your Azure Machine Learning Workspace -- Technical requirements -- Exploring network security -- Creating a VNet -- Securing the workspace -- Securing associated resources -- Validating connectivity -- Working with Azure Machine Learning compute -- Securing compute instances -- Securing compute clusters -- Managing container registries and containers -- Securing images with Azure Container Registry -- Working with ML endpoints -- Summary -- Chapter 8: Managing and Securing the MLOps Life Cycle -- Technical requirements -- Working with MLOps in Azure Machine Learning -- Leveraging IaC -- Combining IaC with Azure Machine Learning -- Implementing CI/CD -- Working with Azure DevOps -- Exploring event-driven workflows in Azure -- Exploring Event Grid -- Working with events in Azure Machine Learning -- Discovering event handlers in Azure -- Summary -- Chapter 9: Logging, Monitoring, and Threat Detection -- Technical requirements -- Enabling logging and configuring data retention for Azure services -- Working with Azure Monitor -- Enabling diagnostic settings -- Working with alerts -- Working with Application Insights -- Visualizing the data -- Securing resources with Microsoft Defender -- Improving our security posture -- Exploring threat management with Sentinel -- Summary -- Part 4: Best Practices for Enterprise Security in Azure Machine Learning -- Chapter 10: Setting a Security Baseline for Your Azure Machine Learning Workloads -- Setting a baseline for Azure Machine Learning -- Discovering services for added security -- Exploring an example solution architecture…”
Libro electrónico -
2665
-
2666
-
2667
-
2668Publicado 1999Materias: “…Environmental monitoring Developing countries Remote sensing Periodicals…”
Tesis -
2669991003438019706719
-
2670
-
2671
-
2672Publicado 2019Materias:Libro electrónico
-
2673
-
2674
-
2675Publicado 2017Materias:Libro electrónico
-
2676Publicado 2022Materias:Libro electrónico
-
2677
-
2678
-
2679
-
2680Publicado 2003Materias:Libro