Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
8421Publicado 2021“…We hope that the book The Aegean Sea and the Eastern Mediterranean in the Global and Regional Balance Based on the Axes of Geography, History, and Interna tional Law drawn up in cooperation between the Grand National Assembly of Turkey and Istanbul University can contribute to creating such a horizon and produce theses to this effect. No matter what topic of international relations one may address, it is impossible to understand and present it independently of other problems and topics. …”
Libro electrónico -
8422Publicado 2013“…Furthermore, Arabidopsis SALK line plants were grown and selected, mutating the genes in question, and in parallel gene expression tests were performed on the main circadian rhythm genes in order to monitor their expression both in conditions of alternating light and dark, and in constant conditions. …”
Libro electrónico -
8423por National Academies of Sciences, Engineering, and Medicine“…Many service members, particularly those who served in Iraq and Afghanistan, have reported health problems they attribute to their exposure to emissions from open-air burn pits on military installations.In 2013, Congress directed the Department of Veterans Affairs (VA) to establish and maintain the Airborne Hazards and Open Burn Pit (AH&OBP) Registry to "ascertain and monitor" the health effects of such exposures. This report serves as a follow-up to an initial assessment of the AH&OBP Registry completed by an independent committee of the National Academies in 2017. …”
Publicado 2023
Libro electrónico -
8424Publicado 2015“…"Many measurement systems to monitor the well-being of children and guide services are implemented across the community, state, and national levels in the United States. …”
Libro electrónico -
8425Publicado 2023“…Using empirical data from the Horizon2020 SIRIUS Project, it investigates how legal, political, social and personal circumstances combine to determine the work trajectory for migrants who choose Europe as their home…”
Libro electrónico -
8426
-
8427Publicado 2023“…Rather than 'follow in Humboldt's footsteps' this book outlines the new critical horizon of 'post-Humboldtian' Studies: the archaeology of all that lies buried under the Baron's epistemological footprint. …”
Libro -
8428Publicado 2021“…Dans le débat actuel, en revanche, toute position idéaliste semble être compromise puisque relevant d'un subjectivisme désuet.0L'idéalisme transcendantal ici défendu poursuit une perspective dans laquelle la question de l' "être" doit être posée à l'horizon de ses "corrélations" en deçà d'un rapport sujet-objet hypostasié. …”
Libro -
8429Publicado 2021Tabla de Contenidos: “…5.2 Background -- 5.3 Related work -- 5.4 Elderly people detect depression signs and symptoms -- 5.4.1 Causes of depression in older adults -- 5.4.2 Medical conditions that can cause elderly depression -- 5.4.3 Elderly depression as side effect of medication -- 5.4.4 Self-help for elderly depression -- 5.5 Proposed methodology -- 5.5.1 Proposed algorithm -- 5.5.2 Persistent monitoring for depression detection -- 5.5.3 Emergency monitoring -- 5.5.4 Personalized monitoring -- 5.5.5 Feature extraction -- 5.6 Result analysis -- References -- 6. …”
Libro electrónico -
8430Publicado 2018Tabla de Contenidos: “…-- Mail plugin -- PDF plugin -- Web integration -- Excel and Word plugins -- Excel plugin -- Word plugin -- Credential management -- Extensions - Java, Chrome, Firefox, and Silverlight -- Summary -- Handling User Events and Assistant Bots -- What are assistant bots? -- Monitoring system event triggers -- Hotkey trigger -- Mouse trigger -- System trigger -- Monitoring image and element triggers -- An example of monitoring email -- Example of monitoring a copying event and blocking it -- Launching an assistant bot on a keyboard event -- Summary -- Exception Handling, Debugging, and Logging -- Exception handling -- Common exceptions and ways to handle them -- Unavailability of UI element -- Handling runtime exceptions -- Orbit reference not set to the instant of an object -- Index was outside the bounds of an array. …”
Libro electrónico -
8431Publicado 2017Tabla de Contenidos: “…-- Authoring and template anatomy -- Intrinsic functions -- Cross stack references -- Creating a base network using CloudFormation -- Validating a base network template -- Running a base network template -- Creating an EC2 instance using CloudFormation -- Nested stack -- Stack policies -- Helper scripts -- Dropping the template -- Summary -- Chapter 15: AWS CloudWatch -- CloudWatch -- Types of CloudWatch monitoring -- CloudWatch alarm states -- Simple Notification Service -- Creating SNS topics -- Subscribing to the topic -- Monitoring EC2 instances -- Creating an alarm for an EC2 instance -- Custom monitoring for an EC2 instance -- Monitoring RDS DB instances -- CloudWatch logs -- Summary -- Chapter 16: AWS Resource Auditing -- Introduction to CloudTrail -- Why CloudTrail? …”
Libro electrónico -
8432Publicado 2017Tabla de Contenidos: “…Identity Repositories and Directory Services -- Single Sign-On (SSO) -- Federated Identity Management -- Federation Standards -- Multifactor Authentication -- Supplemental Security Devices -- Cloud Application Architecture -- Application Programming Interfaces -- Tenancy Separation -- Cryptography -- Sandboxing -- Application Virtualization -- Cloud Application Assurance and Validation -- Threat Modeling -- Quality of Service -- Software Security Testing -- Approved APIs -- Software Supply Chain (API) Management -- Securing Open Source Software -- Runtime Application Self-Protection (RASP) -- Secure Code Reviews -- OWASP Top 9 Coding Flaws -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 8 Operations Elements -- Physical/Logical Operations -- Facilities and Redundancy -- Virtualization Operations -- Storage Operations -- Physical and Logical Isolation -- Security Training and Awareness -- Training Program Categories -- Additional Training Insights -- Basic Operational Application Security -- Threat Modeling -- Application Testing Methods -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 9 Operations Management -- Monitoring, Capacity, and Maintenance -- Monitoring -- Maintenance -- Change and Configuration Management (CM) -- Baselines -- Deviations and Exceptions -- Roles and Process -- Business Continuity and Disaster Recovery (BC/DR) -- Primary Focus -- Continuity of Operations -- The BC/DR Plan -- The BC/DR Kit -- Relocation -- Power -- Testing -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 10 Legal and Compliance Part 1 -- Legal Requirements and Unique Risks in the Cloud Environment -- Legal Concepts -- U.S. …”
Libro electrónico -
8433por Webber, EmilyTabla de Contenidos: “…References -- Chapter 9: Advanced Training Concepts -- Evaluating and improving throughput -- Calculating model TFLOPS -- Using Flash Attention to speed up your training runs -- Speeding up your jobs with compilation -- Integrating compilation into your PyTorch scripts -- Amazon SageMaker Training Compiler and Neo -- Best practices for compilation -- Running compiled models on Amazon's Trainium and Inferentia custom hardware -- Solving for an optimal training time -- Summary -- References -- Part 4: Evaluate Your Model -- Chapter 10: Fine-Tuning and Evaluating -- Fine-tuning for language, text, and everything in between -- Fine-tuning a language-only model -- Fine-tuning vision-only models -- Fine-tuning vision-language models -- Evaluating foundation models -- Model evaluation metrics for vision -- Model evaluation metrics in language -- Model evaluation metrics in joint vision-language tasks -- Incorporating the human perspective with labeling through SageMaker Ground Truth -- Reinforcement learning from human feedback -- Summary -- References -- Chapter 11: Detecting, Mitigating, and Monitoring Bias -- Detecting bias in ML models -- Detecting bias in large vision and language models -- Mitigating bias in vision and language models -- Bias mitigation in language - counterfactual data augmentation and fair loss functions -- Bias mitigation in vision - reducing correlation dependencies and solving sampling issues -- Monitoring bias in ML models -- Detecting, mitigating, and monitoring bias with SageMaker Clarify -- Summary -- References -- Chapter 12: How to Deploy Your Model -- What is model deployment? …”
Publicado 2023
Libro electrónico -
8434Publicado 2022Tabla de Contenidos: “…Chapter 8: Planning and Managing Passwordless Authentication Methods -- Technical requirements -- Administering authentication methods (FIDO2/passwordless) -- Modern authentication for identity and access management -- Implementing an authentication solution based on Windows Hello for Business -- Implementing an authentication solution with the Microsoft Authenticator app -- Summary -- Chapter 9: Planning, Implementing, and Administering Conditional Access and Azure Identity Protection -- Technical requirements -- Planning and implementing Conditional Access policies and controls -- Zero-trust methodology -- Conditional Access policies -- Configuring Smart Lockout thresholds -- Implementing and managing a user risk policy -- Azure AD Identity Protection -- Monitoring, investigating, and remediating elevated risky users -- Summary -- Section 4 - Implementing Access Management for Applications -- Chapter 10: Planning and Implementing Enterprise Apps for Single Sign-On (SSO) -- Technical requirements -- Designing and implementing access management and SSO for apps -- Discovering apps with Microsoft Cloud App Security -- Integrating on-premises apps using Azure AD Application Proxy -- Planning your line-of-business application registration strategy -- Implementing application registrations -- Planning and configuring multi-tier application permissions -- Summary -- Chapter 11: Monitoring Enterprise Apps with Microsoft Defender for Cloud Apps -- Technical requirements -- Planning your cloud application strategy -- Discovering apps with Microsoft Defender for Cloud Apps -- Implementing cloud app security policies -- Planning and configuring cloud application permissions -- Discovering apps by using MCAS or an ADFS app report -- Discovering apps with MCAS app report -- Discovering apps with an ADFS app report…”
Libro electrónico -
8435por Hughes, ChrisTabla de Contenidos: “…Risk Management and Patching -- Building a Patch Management Program -- People -- Process -- Technology -- Summary -- Chapter 3 Secure Configuration -- Regulations, Frameworks, and Laws -- NSA and CISA Top Ten Cybersecurity Misconfigurations -- Default Configurations of Software and Applications -- Improper Separation of User/Administrator Privilege -- Insufficient Internal Network Monitoring -- Lack of Network Segmentation -- Poor Patch Management -- Bypass of System Access Controls -- Weak or Misconfigured Multifactor Authentication Methods -- Lack of Phishing-Resistant MFA -- Insufficient Access Control Lists on Network Shares and Services -- Poor Credential Hygiene -- Unrestricted Code Execution -- Mitigations -- Default Configurations of Software Applications -- Improper Separation of User/Administration Privilege -- Insufficient Network Monitoring -- Poor Patch Management -- Wrapping up the CIS Misconfigurations Guidance -- CIS Benchmarks -- DISA Security Technical Implementation Guides -- Summary -- Chapter 4 Continuous Vulnerability Management -- CIS Control 7-Continuous Vulnerability Management -- Establish and Maintain a Vulnerability Management Process -- Establish and Maintain a Remediation Process -- Perform Automated Operating System Patch Management -- Perform Automated Application Patch Management -- Perform Automated Vulnerability Scans of Internal Enterprise Assets -- Perform Automated Vulnerability Scans of Externally Exposed Enterprise Assets -- Remediate Detected Vulnerabilities -- Continuous Monitoring Practices -- Summary -- Chapter 5 Vulnerability Scoring and Software Identification -- Common Vulnerability Scoring System -- CVSS 4.0 at a Glance -- Base Metrics -- Exploitability Metrics -- Threat Metrics -- Environmental Metrics -- Supplemental Metrics -- Qualitative Severity Rating Scale -- Vector String…”
Publicado 2024
Libro electrónico -
8436Publicado 2023Tabla de Contenidos: “…Chapter 3: Using Microsoft Sentinel to Mitigate Lateral Movement Paths -- Understanding the Zero Trust strategy -- Understanding lateral movement -- Leveraging Microsoft Sentinel to improve your security posture -- Collecting data -- Detecting threats -- Investigating anomalies -- Responding to incidents -- Enabling Microsoft Sentinel -- Global prerequisites -- Enabling Microsoft Sentinel using the Bicep language -- Enabling Microsoft Sentinel using the Azure portal -- Setting up data connectors -- Mitigating lateral movements -- An Office 365 impersonation following a suspicious Azure AD sign-in -- Suspicious inbox manipulation rules set following suspicious Azure AD sign-in -- Summary -- Part 2 - Architecting Compute and Network Solutions -- Chapter 4: Understanding Azure Data Solutions -- Technical requirements -- Understanding Azure storage types -- Structured data -- Unstructured data -- Semi-structured data -- Azure storage accounts -- Understanding Azure database options -- Azure SQL -- Azure Cosmos DB -- Creating a Cosmos DB account -- Summary -- Chapter 5: Migrating to the Cloud -- Technical requirements -- Understanding migration options -- Managing servers -- Update management -- VM backups -- Modernizing applications -- Scale sets -- Azure App Service/Web Apps -- Further modernization -- Migrating data -- Summary -- Chapter 6: End-to-End Observability in Your Cloud and Hybrid Environments -- Understanding the importance of a monitoring strategy -- Working on an effective monitoring strategy -- Azure Monitor - a comprehensive solution for observability and efficiency -- Components -- Data sources -- Consumption -- Summary -- Chapter 7: Working with Containers in Azure -- Understanding cloud-native applications -- Understanding the difference between virtual machines and containers -- Terminology -- Azure Container Instances…”
Libro electrónico -
8437Publicado 2004Tabla de Contenidos: “…Start with Goal Stories -- Slice the Cake -- Write Closed Stories -- Put Constraints on Cards -- Size the Story to the Horizon -- Keep the UI Out as Long as Possible -- Some Things Aren't Stories -- Include User Roles in the Stories -- Write for One User -- Write in Active Voice -- Customer Writes -- Don't Number Story Cards -- Don't Forget the Purpose -- Summary -- Questions -- PART II: Estimating and Planning -- Chapter 8: Estimating User Stories -- Story Points -- Estimate as a Team -- Estimating -- Triangulate -- Using Story Points -- What If We Pair Program? …”
Libro electrónico -
8438Publicado 2018Tabla de Contenidos: “…Boundary defense with firewalls and filtering -- Comprehensive access control -- Core and edge gateways -- Unidirectional gateway protection -- Asset discovery, visibility, and monitoring -- Physical security - the first line of defense -- Security assessment of IIoT connectivity standards and protocols -- Fieldbus protocols -- Connectivity framework standards -- Data Distribution Service -- DDS security -- oneM2M -- oneM2M security -- Open Platform Communications Unified Architecture (OPC UA) -- OPC UA security -- Web services and HTTP -- Web services and HTTP security -- Connectivity transport standards -- Transmission Control Protocol (TCP) -- TCP security -- User Datagram Protocol (UDP) -- UDP security -- MQTT and MQTT-SN -- MQTT security -- Constrained Application Protocol (CoAP) -- CoAP security -- Advanced Message Queuing Protocol (AMQP) -- Connectivity network standards -- Data link and physical access standards -- IEEE 802.15.4 WPAN -- IEEE 802.11 wireless LAN -- Cellular communications -- Wireless wide area network standards -- IEEE 802.16 (WiMAX) -- LoRaWAN -- Summary -- Chapter 6: Securing IIoT Edge, Cloud, and Apps -- Defining edge, fog, and cloud computing -- IIoT cloud security architecture -- Secured industrial site -- Secured edge intelligence -- Secure edge cloud transport -- Secure cloud services -- Cloud security - shared responsibility model -- Defense-in-depth cloud security strategy -- Infrastructure security -- Identity and access management -- Application security -- Microservice architecture -- Container security -- Credential store and vault -- Data protection -- Data governance -- Data encryption -- Key and digital certificate management -- Securing the data life cycle -- Cloud security operations life cycle -- Business continuity plan and disaster recovery -- Secure patch management -- Security monitoring…”
Libro electrónico -
8439Publicado 2022Tabla de Contenidos: “…Understanding that AI can't eliminate safety issues -- Chapter 7 Using AI to Address Medical Needs -- Implementing Portable Patient Monitoring -- Wearing helpful monitors -- Relying on critical wearable monitors -- Using movable monitors -- Making Humans More Capable -- Using games for therapy -- Considering the use of exoskeletons -- Addressing a Range of Physical Abilities -- Considering the software-based solutions -- Relying on hardware augmentation -- Seeing AI in prosthetics -- Completing Analysis in New Ways -- Relying on Telepresence -- Defining telepresence -- Considering examples of telepresence -- Understanding telepresence limitations -- Devising New Surgical Techniques -- Making surgical suggestions -- Assisting a surgeon -- Replacing the surgeon with monitoring -- Performing Tasks Using Automation -- Working with medical records -- Predicting the future -- Making procedures safer -- Creating better medications -- Combining Robots and Medical Professionals -- Chapter 8 Relying on AI to Improve Human Interaction -- Developing New Ways to Communicate -- Creating new alphabets -- Working with emoji and other meaningful graphics -- Automating language translation -- Incorporating body language -- Exchanging Ideas -- Creating connections -- Augmenting communication -- Defining trends -- Using Multimedia -- Embellishing Human Sensory Perception -- Shifting data spectrum -- Augmenting human senses -- Part 3 Working with Software-Based AI Applications -- Chapter 9 Performing Data Analysis for AI -- Defining Data Analysis -- Understanding why analysis is important -- Reconsidering the value of data -- Defining Machine Learning -- Understanding how machine learning works -- Understanding the benefits of machine learning -- Being useful -- being mundane -- Specifying the limits of machine learning -- Considering How to Learn from Data…”
Libro electrónico -
8440Publicado 2017Tabla de Contenidos: “…Using Other Startup Setting Options -- Understanding System Restore -- Using the System Image Recovery -- Using the Startup Repair Tool -- Maintaining Windows 10 with Backup and Restore -- Creating a Backup -- Restoring Files from a Backup -- Recovering Files from OneDrive -- Using the Wbadmin Command Utility -- Using Advanced Backup Options -- Using System Protection -- Creating Restore Points -- Restoring Restore Points -- Cleaning Up Old Restore Points -- Using the Recycle Bin -- Monitoring Windows -- Introducing Performance Monitor -- Using Other Performance-Monitoring Tools -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Appendix A Answers to Review Questions -- Chapter 1: Windows 10 Installation -- Chapter 2: Installing in an Enterprise Environment -- Chapter 3: Configuring Devices and Drivers -- Chapter 4: Configuring Storage -- Chapter 5: Configuring the Windows 10 Environment -- Chapter 6: Configuring Data Security -- Chapter 7: Windows 10 Networking -- Chapter 8: Installing Applications -- Chapter 9: Managing Authorization and Authentication -- Chapter 10: Configuring Monitoring and Recovery -- Appendix B Windows 10 PowerShell Commands -- Index -- Advert -- EULA…”
Libro electrónico