Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,678
- Bible 1,923
- Bíblia 1,461
- Historia 1,331
- RELIGION 1,044
- Development 808
- Application software 802
- Engineering & Applied Sciences 772
- Management 649
- Crítica e interpretación 573
- Història 538
- Computer Science 518
- History 463
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 306
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 261
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 254
-
55441por Freudenthal, Ramiro A. M.“…Más aún, una segunda estrategia independiente para inhibir el NF-kappa B en el cerebro, la administración icv de un oligonucleótido doble cadena de ADN conteniendo la secuencia consenso de NF-kappa B (kB Decoy) también resulta amnésica. …”
Publicado 2006
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Tesis -
55442Publicado 2015“…Se estudia la situación del doble poder el verano de 1936 con preeminencia de las fuerzas proletarias con las Milicias armadas y los Comités obreros, hasta el progresivo equilibrio en favor del poder del Estado burgués a partir de septiembre con la entrada de los partidos marxistas en los Gobiernos de la República y la Generalitat. …”
Enlace del recurso
Tesis -
55443Publicado 2022Tabla de Contenidos: “…Front Matter -- Table of Contents -- Introducción -- El concepto de metaficción -- Aproximación desde la Teoría de la Escritura de Mujeres -- DOS PERSPECTIVAS PARA NOVELAS METAFICTICIAS -- ALGUNOS APRENDIZAJES -- BIBLIOGRAFÍA -- NOTAS -- Back Matter…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales, usuarios UPSA
Libro electrónico -
55444Publicado 2023Tabla de Contenidos: “…Front Matter(pp. 2-6) -- Table of Contents(pp. 7-10) -- PRÓLOGO(pp. 11-14) -- INTRODUCCIÓN(pp. 15-18) -- CAPÍTULO I RUSIA: SOCIALISMO, LIBERALISMO Y REALISMO(pp. 19-28) -- CAPÍTULO II RUSIA COMO SUPERPOTENCIA ENERGÉTICA(pp. 29-42) -- CAPÍTULO III EL CÁUCASO NORTE: EL «ENEMIGO» EN CASA(pp. 43-62) -- CAPÍTULO IV EL CÁUCASO SUR: DE NUEVOS CORREDORES Y VIEJOS ODIOS(pp. 63-90) -- CAPÍTULO V ASIA CENTRAL: EL «HEARTLAND»(pp. 91-126) -- CAPÍTULO VI LA EUROPA POST-SOVIÉTICA ... …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales UPSA
Libro electrónico -
55445por Association for Computing Machinery“…As to the signature meeting event itself, the organizing community and KDD steering committee took on the challenge and worked together so that KDD 2020 would be a brand new experience of a virtual conference with innovations that enable the community to socialize, make acquaintance and strike conversations among the presenters and attendees. …”
Publicado 2020
Libro electrónico -
55446Publicado 2023“…També utilitza tècniques i figures retòriques que posen de manifest les ambigüitats del llenguatge, com les paradoxes, els oxímorons i les dilogies (paraules de doble sentit). Les imatges que fa servir acostumen a remetre a la seva realitat quotidiana, així com a la tradició clàssica. …”
Libro -
55447Publicado 2000“…En este libro, Giddens advierte que la globalización va ligada al riesgo. El riesgo tiene doble filo porque va unido a la innovación y no siempre debe ser minimizado; la adopción activa de riesgos económicos y empresariales es la fuerza motriz de la economía globalizada. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Universidad Loyola - Universidad Loyola Granada)Libro -
55448por Cervo, Dalton, 1967-“…Master Data Management in Practice provides a logical order toward planning, implementation, ongoing management, and advanced practices of Customer MDM with tables, graphs, and charts. Authors Dalton Cervo and Mark Allen show organizations how to implement Master Data Management (MDM) within their business model to create a more quality controlled approach for successfully managing and maintaining their customer master data. …”
Publicado 2011
Libro electrónico -
55449Publicado 2022“…In the period of 05 days, it gives us the following results: Influence of the temperature in the photovoltaic module, in which we were able to observe that the temperatures of each cell in the module are not the same, having a deviation of up to 3C which it causes lost by dispersion of parameters. …”
Libro electrónico -
55450Publicado 2010“…While it is impossible to re-construct a universal history of population policies on the basis of the two case studies, in the concluding chapter more universal premises relating to 20th century trends and developments beyond the case studies are suggested. To enable a comprehensive, yet focused comparison the analysis concentrates on three aspects of reproductive policies: sexual advice centers in the cities of New York and Vienna during the interwar period; 20th century policies aimed at the interface between workplace and child care; and the abortion conflicts taking place in the last third of the 20th century. …”
Libro electrónico -
55451Publicado 2002“…Therefore, Aristotle's approach shall be investigated in a most complex and comprehensive way in its close systematic link to all fields of philosophy, including practical reason, physics and metaphysics, in order to enable a most distinct historical judgment that will also finally reveal its actual significance. …”
Libro electrónico -
55452Publicado 2024“…Throughout the course, Megan Andrew takes you through the top 20 skills that will enable you to effectively manage any project, even if it is your first time. …”
Video -
55453Publicado 2022“…The main expectations highlighted by the interviewees were that the course could enable a greater understanding of learning difficulties (33%), and be an option to improve teaching practice (30%). …”
Libro electrónico -
55454Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
55455Publicado 2018Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull)Proveedor del acceso Xebook
Tutorial de uso de Xebook
Libro electrónico -
55456
-
55457Publicado 2010“…El epígrafe titulado una noble vía muerta trata de señalar tanto la sabiduría y la riqueza imprescriptibles que encerraba esa manera de ver el mundo como el trágico aparrtamiento que suponía ese pensamiento respecto a la línea hegemónica que marcaría el progreso histórico en Occidente. …”
Enlace del recurso
Electrónico -
55458Publicado 2010“…This parasite has many differential metabolic characteristics with respect to their vector insects and host mammals, being unable to synthesize many cell components. However, this metabolic inability is compensated by multiple conveyor systems of metabolites from the host. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales UPSA
Tesis -
55459Publicado 2017“…At the same time, Rodin's apparent inability to bring this work to an end seemed to betray a very similar understanding of time. …”
Libro electrónico -
55460Publicado 2023“…About Paul Stringer Paul started using his first computer, an Apple ][ in 1983. This began a programming journey that included all things from Basic to Swift. …”
Video