Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 8,834
- Engineering & Applied Sciences 7,958
- Computer Science 5,441
- History 4,617
- Business & Economics 3,403
- Economic conditions 3,102
- Biblia 2,616
- Història 2,609
- Education 2,569
- Management 2,517
- Economic policy 2,319
- Islam 2,301
- Research 2,039
- Electrical & Computer Engineering 1,973
- Crítica e interpretación 1,783
- Islamismo 1,759
- Filosofía 1,739
- Law 1,706
- Study and teaching 1,685
- Economics 1,610
- Development 1,544
- Telecommunications 1,522
- Bíblia 1,466
- Medicine 1,461
- Information Technology 1,443
- Philosophy 1,376
- Economic History 1,294
- Politics and government 1,237
- Computer Science (Hardware & Networks) 1,223
- Social Sciences 1,223
-
271741Publicado 2018“…I have discussed this issue in more detail previously in the pages of this journal…”
Libro electrónico -
271742Publicado 2020“…Participants expressed satisfaction with the RPM, noting that the method helped them better understand DMD and prepared them to discuss difficult issues with providers. Although panelists appreciated participating in an educational, interactive, and convenient discussion forum that allowed them to share their opinions and learn from each other, they noted that participation in a 3-round process requires some effort. …”
Libro electrónico -
271743por Stem Cell Therapies: Opportunities for Ensuring the Quality and Safety of Unregulated Clinical Offerings (Workshop)“…In the absence of substantiated claims, the potential for harm to patients - as well as to the field of stem cell research in general - may outweigh the potential benefits. To explore these issues, the Institute of Medicine, the National Academy of Sciences, and the International Society for Stem Cell Research held a workshop in November 2013. …”
Publicado 2014
Libro electrónico -
271744por National Research Council (U.S.).“…The second phase, drawing on that workshop and on additional briefings, site visits, and committee deliberations, will result in a final report with recommendations, to be issued at the end of the project in 2011."--Publisher's description…”
Publicado 2010
Libro electrónico -
271745por Roundtable on Population Health Improvement“…The roundtable engaged members, outside experts, and stakeholders on three core issues: supporting fruitful interaction between primary care and public health; strengthening governmental public health; and exploring community action in transforming the conditions that influence the public's health. …”
Publicado 2014
Libro electrónico -
271746por Institute of Medicine (U.S.).“…Stakeholders, including clinicians, researchers, patients, and government officials, discussed the issues related to the use of genomic information in medical practice. …”
Publicado 2014
Libro electrónico -
271747Publicado 2014“…The financing of long-term services and supports has become a major issue in the United States. These are the services and supports that individuals with disabilities, chronic conditions, and functional impairments need in order to live independently, such as assistance with eating, bathing, and dressing. …”
Libro electrónico -
271748Publicado 2023“…In this third event in the AWS Observe and Operate series, we dive deep into key use cases for operations and observability and demo solutions as you set up alarms, detect anomalies, identify and analyze issues, build in proactive and reactive operational processes, and automate responses to issues in order to lower Mean Time To Resolution (MTTR), maintain availability and performance, prevent and mitigate operational issues, and optimize resources and infrastructure. …”
Video -
271749Publicado 2020“…What you'll learn--and how you can apply it Be prepared for the questions asked on the CSAA exam Master best practices for designing cloud solutions at AWS Understand the concepts encompassed by the The AWS Well-Architected Framework Understand the concepts underpinning regions and Availability Zones How to work with subnets, security groups, and storage strategies Configure monitoring using Amazon CloudWatch Solve single points of failure issues Design effective solutions using compute, storage, networking, and key managed services offered in AWS cloud, and much more This video course is for you because... …”
Video -
271750Publicado 2021“…Jeremy Lange, G2 Learn the new API paradigm with this excellent practical guide. Isaac Wong, Priv̌ Technologies If you want to develop an API with best practices, GraphQL is for you, and this book can help you get started quickly. …”
Video -
271751Publicado 2021“…Highly recommended! Edin Kapic, isolutions This book really helped me to move to the next level. …”
Video -
271752por Muir, Alice“…Nicki Beveridge, Fellow CIPD, member ISMA, business coach and HR consultant…”
Publicado 2014
Libro electrónico -
271753Publicado 2023“…The second part then addresses controversial issues of current theory building such as the question of flat or binary branching structures being more appropriate, the question whether constructions should be treated on the phrasal or the lexical level, and the question whether abstract, non-visible entities should play a role in syntactic analyses. …”
Libro electrónico -
271754Publicado 2024“…Exploring newly emerging work-life issues, this expansive book will be an invaluable resource for practitioners, scholars, and for students of business management, public administration, Human Resource Management, social policy and the sociology of work. …”
Libro electrónico -
271755Publicado 2019“…Max also shows you how to set goals for your web content, find issues that can negatively affect UX, and apply some basic techniques that will improve user perception. …”
Video -
271756Publicado 2024“…With this book, you will learn how DeFi fits into the blockchain and fintech worlds; understand why it’s important to move beyond the banking system; explore the tools for building a useful, functional DeFi application; and learn the risks, benefits, regulatory concerns, and unresolved issues in this nascent and fast-growing industry. …”
Grabación no musical -
271757Publicado 2021“…Amaresh Rajasekharan, IBM Corporation Exactly the practice I needed to be comfortable with machine learning. Nathan D'Elboux, Isparex NARRATED BY ADAM NEWMARK…”
Video -
271758Publicado 2020“…We showcase some of the challenges we faced with exploring other entity resolution methods, with manually labeling a comprehensive training set, and how this approach might extend to solve other data issues."--Resource description page…”
Vídeo online -
271759Publicado 2022“…This book is produced in stunning full colour and provides invaluable insights, examples, and mini-missions that will show you precisely how to make some immediate changes that will yield fast and exciting results and revolutionise how you manage forever. This isn't another post-pandemic management guide contemplating the nuances of remote work. …”
Libro electrónico -
271760Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video