Mostrando 55,441 - 55,460 Resultados de 55,492 Para Buscar 'NPBL~', tiempo de consulta: 0.79s Limitar resultados
  1. 55441
    por Freudenthal, Ramiro A. M.
    Publicado 2006
    “…Más aún, una segunda estrategia independiente para inhibir el NF-kappa B en el cerebro, la administración icv de un oligonucleótido doble cadena de ADN conteniendo la secuencia consenso de NF-kappa B (kB Decoy) también resulta amnésica. …”
    Enlace del recurso
    Tesis
  2. 55442
    Publicado 2015
    “…Se estudia la situación del doble poder el verano de 1936 con preeminencia de las fuerzas proletarias con las Milicias armadas y los Comités obreros, hasta el progresivo equilibrio en favor del poder del Estado burgués a partir de septiembre con la entrada de los partidos marxistas en los Gobiernos de la República y la Generalitat. …”
    Enlace del recurso
    Tesis
  3. 55443
    Publicado 2022
    Tabla de Contenidos: “…Front Matter -- Table of Contents -- Introducción -- El concepto de metaficción -- Aproximación desde la Teoría de la Escritura de Mujeres -- DOS PERSPECTIVAS PARA NOVELAS METAFICTICIAS -- ALGUNOS APRENDIZAJES -- BIBLIOGRAFÍA -- NOTAS -- Back Matter…”
    Acceso restringido con credenciales, usuarios UPSA
    Libro electrónico
  4. 55444
    Publicado 2023
    Tabla de Contenidos: “…Front Matter(pp. 2-6) -- Table of Contents(pp. 7-10) -- PRÓLOGO(pp. 11-14) -- INTRODUCCIÓN(pp. 15-18) -- CAPÍTULO I RUSIA: SOCIALISMO, LIBERALISMO Y REALISMO(pp. 19-28) -- CAPÍTULO II RUSIA COMO SUPERPOTENCIA ENERGÉTICA(pp. 29-42) -- CAPÍTULO III EL CÁUCASO NORTE: EL «ENEMIGO» EN CASA(pp. 43-62) -- CAPÍTULO IV EL CÁUCASO SUR: DE NUEVOS CORREDORES Y VIEJOS ODIOS(pp. 63-90) -- CAPÍTULO V ASIA CENTRAL: EL «HEARTLAND»(pp. 91-126) -- CAPÍTULO VI LA EUROPA POST-SOVIÉTICA ... …”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  5. 55445
    “…As to the signature meeting event itself, the organizing community and KDD steering committee took on the challenge and worked together so that KDD 2020 would be a brand new experience of a virtual conference with innovations that enable the community to socialize, make acquaintance and strike conversations among the presenters and attendees. …”
    Libro electrónico
  6. 55446
    Publicado 2023
    “…També utilitza tècniques i figures retòriques que posen de manifest les ambigüitats del llenguatge, com les paradoxes, els oxímorons i les dilogies (paraules de doble sentit). Les imatges que fa servir acostumen a remetre a la seva realitat quotidiana, així com a la tradició clàssica. …”
    Libro
  7. 55447
    Publicado 2000
    “…En este libro, Giddens advierte que la globalización va ligada al riesgo. El riesgo tiene doble filo porque va unido a la innovación y no siempre debe ser minimizado; la adopción activa de riesgos económicos y empresariales es la fuerza motriz de la economía globalizada. …”
    Libro
  8. 55448
    por Cervo, Dalton, 1967-
    Publicado 2011
    “…Master Data Management in Practice provides a logical order toward planning, implementation, ongoing management, and advanced practices of Customer MDM with tables, graphs, and charts. Authors Dalton Cervo and Mark Allen show organizations how to implement Master Data Management (MDM) within their business model to create a more quality controlled approach for successfully managing and maintaining their customer master data. …”
    Libro electrónico
  9. 55449
    Publicado 2022
    “…In the period of 05 days, it gives us the following results: Influence of the temperature in the photovoltaic module, in which we were able to observe that the temperatures of each cell in the module are not the same, having a deviation of up to 3C which it causes lost by dispersion of parameters. …”
    Libro electrónico
  10. 55450
    Publicado 2010
    “…While it is impossible to re-construct a universal history of population policies on the basis of the two case studies, in the concluding chapter more universal premises relating to 20th century trends and developments beyond the case studies are suggested. To enable a comprehensive, yet focused comparison the analysis concentrates on three aspects of reproductive policies: sexual advice centers in the cities of New York and Vienna during the interwar period; 20th century policies aimed at the interface between workplace and child care; and the abortion conflicts taking place in the last third of the 20th century. …”
    Libro electrónico
  11. 55451
    Publicado 2002
    “…Therefore, Aristotle's approach shall be investigated in a most complex and comprehensive way in its close systematic link to all fields of philosophy, including practical reason, physics and metaphysics, in order to enable a most distinct historical judgment that will also finally reveal its actual significance. …”
    Libro electrónico
  12. 55452
    Publicado 2024
    “…Throughout the course, Megan Andrew takes you through the top 20 skills that will enable you to effectively manage any project, even if it is your first time. …”
    Video
  13. 55453
    Publicado 2022
    “…The main expectations highlighted by the interviewees were that the course could enable a greater understanding of learning difficulties (33%), and be an option to improve teaching practice (30%). …”
    Libro electrónico
  14. 55454
    Publicado 2023
    “…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
    Video
  15. 55455
  16. 55456
  17. 55457
    Publicado 2010
    “…El epígrafe titulado “una noble vía muerta” trata de señalar tanto la sabiduría y la riqueza imprescriptibles que encerraba esa manera de ver el mundo como el trágico aparrtamiento que suponía ese pensamiento respecto a la línea hegemónica que marcaría el progreso histórico en Occidente. …”
    Enlace del recurso
    Electrónico
  18. 55458
    Publicado 2010
    “…This parasite has many differential metabolic characteristics with respect to their vector insects and host mammals, being unable to synthesize many cell components. However, this metabolic inability is compensated by multiple conveyor systems of metabolites from the host. …”
    Acceso restringido con credenciales UPSA
    Tesis
  19. 55459
    Publicado 2017
    “…At the same time, Rodin's apparent inability to bring this work to an end seemed to betray a very similar understanding of time. …”
    Libro electrónico
  20. 55460
    Publicado 2023
    “…About Paul Stringer Paul started using his first computer, an Apple ][ in 1983. This began a programming journey that included all things from Basic to Swift. …”
    Video