Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,665
- Bible 1,923
- Bíblia 1,428
- Historia 1,177
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 551
- Computer Science 516
- Història 512
- History 456
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
53841Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
53842Publicado 2018Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull)Proveedor del acceso Xebook
Tutorial de uso de Xebook
Libro electrónico -
53843
-
53844Publicado 2010“…El epígrafe titulado una noble vía muerta trata de señalar tanto la sabiduría y la riqueza imprescriptibles que encerraba esa manera de ver el mundo como el trágico aparrtamiento que suponía ese pensamiento respecto a la línea hegemónica que marcaría el progreso histórico en Occidente. …”
Enlace del recurso
Electrónico -
53845Publicado 2010“…This parasite has many differential metabolic characteristics with respect to their vector insects and host mammals, being unable to synthesize many cell components. However, this metabolic inability is compensated by multiple conveyor systems of metabolites from the host. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales UPSA
Tesis -
53846Publicado 2017“…At the same time, Rodin's apparent inability to bring this work to an end seemed to betray a very similar understanding of time. …”
Libro electrónico -
53847Publicado 2023“…About Paul Stringer Paul started using his first computer, an Apple ][ in 1983. This began a programming journey that included all things from Basic to Swift. …”
Video -
53848Publicado 1990Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca del Seminario Diocesano de Jaén, Red de Bibliotecas de la Archidiócesis de Granada, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull, Bibliotecas de la Diócesis de Teruel y Albarracín, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Universidad de Deusto, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca Central de Capuchinos de España, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro
-
53849Publicado 2010“…Al analizar comparativamente el uso de codones de las PMRCVs en Nb, maíz y Nilaparvata lugens (delfácido en el que replica el NLRV), no se encontraron diferecias en el uso de codones que pudieran explicar los bajos niveles de expresión en Nb. …”
Acceso restringido con credenciales UPSA
Libro electrónico -
53850por Scodeller, Pablo David“…These multilayers, of nanometric thicknesses, were built using layer by layer (lbl) self assembly of enzymes and an electroactive polyelectrolyte PAH-Os. …”
Publicado 2011
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Tesis -
53851por Mongelli, Vanesa Claudia“…Al analizar comparativamente el uso de codones de las PMRCVs en Nb, maíz y Nilaparvata lugens (delfácido en el que replica el NLRV), no se encontraron diferecias en el uso de codones que pudieran explicar los bajos niveles de expresión en Nb. …”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
53852Publicado 2021“…Es proposa com a marc teòric de la recerca, un doble estadi de perspectives, en primer lloc, la visió basada en recursos i la seva derivada de capacitats dinàmiques, per entendre com una organització s'adapta a les situacions de canvi ràpid i dinàmic que provenen del seu entorn competitiu i, en el segon estadi, amb el marc teòric de l'aprenentatge organitzacional ja que, com es presenta en les troballes d'aquest treball, la implantació d'un ERP pot estar condicionada pe la manera en que l’organització aprèn y, també, a la vegada, es beneficia de l'aprenentatge que l'organització pot tenir al llarg del seu període d'implantació.Aquest treball de recerca proposa considerar la implantació d'un ERP com un problema de situació de canvi de l'estat anterior a la implantació a l'estat posterior a aquesta. …”
Accés lliure
Tesis -
53853Publicado 2021“…La detectabilitat del reg pels productes considerats s'ha avaluat mitjançant índexs derivats de la teoria d’estabilitat temporal aquí utilitzada sota aquesta nova perspectiva. …”
Accés lliure
Tesis -
53854Publicado 2020“…They share a common purpose--to increase human potential--and a common infrastructure of data and computation to enable learning at scale.Investigations of learning at scale naturally bring together two different research communities. …”
Libro electrónico -
53855Publicado 2021“…Es proposa com a marc teòric de la recerca, un doble estadi de perspectives, en primer lloc, la visió basada en recursos i la seva derivada de capacitats dinàmiques, per entendre com una organització s'adapta a les situacions de canvi ràpid i dinàmic que provenen del seu entorn competitiu i, en el segon estadi, amb el marc teòric de l'aprenentatge organitzacional ja que, com es presenta en les troballes d'aquest treball, la implantació d'un ERP pot estar condicionada pe la manera en que l’organització aprèn y, també, a la vegada, es beneficia de l'aprenentatge que l'organització pot tenir al llarg del seu període d'implantació.Aquest treball de recerca proposa considerar la implantació d'un ERP com un problema de situació de canvi de l'estat anterior a la implantació a l'estat posterior a aquesta. …”
Tesis -
53856Publicado 2021“…La detectabilitat del reg pels productes considerats s'ha avaluat mitjançant índexs derivats de la teoria d’estabilitat temporal aquí utilitzada sota aquesta nova perspectiva. …”
Tesis -
53857
-
53858Publicado 2012“…I have chosen two marginal moments with regard to the traditional artistic conception officially accepted, since this may enable us to come closer to the essence of concepts such as identity, survival and creation. …”
Enlace del recurso
Electrónico -
53859Publicado 1546Tabla de Contenidos: “…. ; [pt.2]:Sefer Ṿeeleh Shemot = Exodus.- [246],[2]p.en bl ; [pt.3]:Sefer Ṿayiḳra = Leuiticus.- [176]p. ; [pt.4]:Sefer Ṿayedaber = Numeri.- [244] p. ; [pt.5]:Sefer Eleh hadevarim = Deuteronomium.- [214]p…”
Libro -
53860