Mostrando 54,421 - 54,440 Resultados de 54,464 Para Buscar 'NPBL~', tiempo de consulta: 0.85s Limitar resultados
  1. 54421
    Publicado 2002
    “…Therefore, Aristotle's approach shall be investigated in a most complex and comprehensive way in its close systematic link to all fields of philosophy, including practical reason, physics and metaphysics, in order to enable a most distinct historical judgment that will also finally reveal its actual significance. …”
    Libro electrónico
  2. 54422
    Publicado 2024
    “…Throughout the course, Megan Andrew takes you through the top 20 skills that will enable you to effectively manage any project, even if it is your first time. …”
    Video
  3. 54423
    Publicado 2022
    “…The main expectations highlighted by the interviewees were that the course could enable a greater understanding of learning difficulties (33%), and be an option to improve teaching practice (30%). …”
    Libro electrónico
  4. 54424
    Publicado 2023
    “…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
    Video
  5. 54425
  6. 54426
  7. 54427
    Publicado 2010
    “…El epígrafe titulado “una noble vía muerta” trata de señalar tanto la sabiduría y la riqueza imprescriptibles que encerraba esa manera de ver el mundo como el trágico aparrtamiento que suponía ese pensamiento respecto a la línea hegemónica que marcaría el progreso histórico en Occidente. …”
    Enlace del recurso
    Electrónico
  8. 54428
    Publicado 2010
    “…This parasite has many differential metabolic characteristics with respect to their vector insects and host mammals, being unable to synthesize many cell components. However, this metabolic inability is compensated by multiple conveyor systems of metabolites from the host. …”
    Acceso restringido con credenciales UPSA
    Tesis
  9. 54429
    Publicado 2017
    “…At the same time, Rodin's apparent inability to bring this work to an end seemed to betray a very similar understanding of time. …”
    Libro electrónico
  10. 54430
    Publicado 2023
    “…About Paul Stringer Paul started using his first computer, an Apple ][ in 1983. This began a programming journey that included all things from Basic to Swift. …”
    Video
  11. 54431
  12. 54432
    Publicado 2010
    “…Al analizar comparativamente el uso de codones de las PMRCVs en Nb, maíz y Nilaparvata lugens (delfácido en el que replica el NLRV), no se encontraron diferecias en el uso de codones que pudieran explicar los bajos niveles de expresión en Nb. …”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  13. 54433
    por Scodeller, Pablo David
    Publicado 2011
    “…These multilayers, of nanometric thicknesses, were built using layer by layer (lbl) self assembly of enzymes and an electroactive polyelectrolyte PAH-Os. …”
    Enlace del recurso
    Tesis
  14. 54434
    por Mongelli, Vanesa Claudia
    Publicado 2010
    “…Al analizar comparativamente el uso de codones de las PMRCVs en Nb, maíz y Nilaparvata lugens (delfácido en el que replica el NLRV), no se encontraron diferecias en el uso de codones que pudieran explicar los bajos niveles de expresión en Nb. …”
    Enlace del recurso
    Libro electrónico
  15. 54435
    Publicado 2021
    “…Es proposa com a marc teòric de la recerca, un doble estadi de perspectives, en primer lloc, la visió basada en recursos i la seva derivada de capacitats dinàmiques, per entendre com una organització s'adapta a les situacions de canvi ràpid i dinàmic que provenen del seu entorn competitiu i, en el segon estadi, amb el marc teòric de l'aprenentatge organitzacional ja que, com es presenta en les troballes d'aquest treball, la implantació d'un ERP pot estar condicionada pe la manera en que l’organització aprèn y, també, a la vegada, es beneficia de l'aprenentatge que l'organització pot tenir al llarg del seu període d'implantació.Aquest treball de recerca proposa considerar la implantació d'un ERP com un problema de situació de canvi de l'estat anterior a la implantació a l'estat posterior a aquesta. …”
    Accés lliure
    Tesis
  16. 54436
    Publicado 2021
    “…La detectabilitat del reg pels productes considerats s'ha avaluat mitjançant índexs derivats de la teoria d’estabilitat temporal aquí utilitzada sota aquesta nova perspectiva. …”
    Accés lliure
    Tesis
  17. 54437
    Publicado 2020
    “…They share a common purpose--to increase human potential--and a common infrastructure of data and computation to enable learning at scale.Investigations of learning at scale naturally bring together two different research communities. …”
    Libro electrónico
  18. 54438
    Publicado 2021
    “…Es proposa com a marc teòric de la recerca, un doble estadi de perspectives, en primer lloc, la visió basada en recursos i la seva derivada de capacitats dinàmiques, per entendre com una organització s'adapta a les situacions de canvi ràpid i dinàmic que provenen del seu entorn competitiu i, en el segon estadi, amb el marc teòric de l'aprenentatge organitzacional ja que, com es presenta en les troballes d'aquest treball, la implantació d'un ERP pot estar condicionada pe la manera en que l’organització aprèn y, també, a la vegada, es beneficia de l'aprenentatge que l'organització pot tenir al llarg del seu període d'implantació.Aquest treball de recerca proposa considerar la implantació d'un ERP com un problema de situació de canvi de l'estat anterior a la implantació a l'estat posterior a aquesta. …”
    Tesis
  19. 54439
    Publicado 2021
    “…La detectabilitat del reg pels productes considerats s'ha avaluat mitjançant índexs derivats de la teoria d’estabilitat temporal aquí utilitzada sota aquesta nova perspectiva. …”
    Tesis
  20. 54440
    por Brandsen, Taco
    Publicado 2018
    Libro electrónico