Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,216
- Historia 640
- Management 562
- Development 453
- Economics 371
- Engineering & Applied Sciences 355
- Social aspects 344
- Business & Economics 322
- Education 293
- Economic conditions 268
- Computer networks 266
- Politics and government 259
- Filosofía 255
- Leadership 254
- Application software 243
- Computer Science 236
- Crítica e interpretación 232
- Economic policy 220
- History and criticism 218
- Philosophy 218
- Data processing 209
- Economic aspects 208
- Technological innovations 208
- Computer security 206
- Security measures 206
- Information technology 204
- Cloud computing 196
- Artificial intelligence 194
- Rilke, Rainer Maria 192
- Atles 188
-
26921Publicado 2021Tabla de Contenidos: “…The photograph as a mediating space in clinical and creative encounters ; How Images change nonverbal interaction in chronic pain consultations ; Picturing pain ; Making charcoal for drawing ; The art of pain and inter-subjectivity in Frida Kahlo's self-portraits ; The thing about pain: the remaking of illness narratives on social media ; Exhibiting pain: the role of online exhibitions in sharing creative expressions of chronic physical pain Section III, Speaking. …”
Libro electrónico -
26922Publicado 2020“…Requirements for "meaningful use" of electronic health records (EHRs) have elevated the role of patient portals as a standard communication tool for patients with chronic health conditions. …”
Libro electrónico -
26923Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
26924Publicado 2012“…Existen dos de ellas que juegan un rol fundamental: las temáticas y las taxonómicas. …”
Enlace del recurso
Electrónico -
26925Publicado 2019Tabla de Contenidos: “…-- EU CITIZENSHIP AND RELEVANCY FOR ASEAN IN SUSTAINABLE REGUGEE MANAGEMENT THROUGH THE ROLE OF TNCS -- THE REGULATION OF INTERNET AS LITERACY MEDIA FOR CYBER COMMUNITY -- THE CONTINUITY OF ASEAN CENTRALITY WITHIN INDONESIAN FOREIGN POLICY UNDER PRESIDENT JOKO WIDODO -- THE SECURITIZATION OF CYBER ISSUE IN ASEAN -- ASEAN CONNECTIVITY 2025: SHALL AUSTRALIA BECOME THE FUTURE MEMBER OF ASEAN? …”
Libro electrónico -
26926Publicado 2014“…Bd.1: "Epigramme spielen innerhalb des literarischen Schaffens der Byzantiner eine wichtige Rolle. In nicht geringer Anzahl (mehr als 1000 Stück) sind diese auch heute noch inschriftlich erhalten, sei es auf Fresken, Mosaiken, Ikonen, auf so genannten Objekten der Kleinkunst und in Handschriften, in denen sie als Rahmen von Miniaturen fungieren oder Figurengedichte bilden. …”
Libro electrónico -
26927Publicado 2022“…This keynote was shared with the ACM Web Science Conference, where the speaker questioned web scientists and hypertext researchers to explore the role of web science in general and hypertext in particular in helping to create the infrastructure of radical cultural shift towards health. …”
Libro electrónico -
26928Publicado 2010“…In contrast, dangerous demons and accompanying phenomena, such as the evil eye and witchcraft, play a vital role in concepts of folk religion. Particularly in peripheral and rural areas of the present-day Syrian Arab Republic, many people have stories to tell about their own encounters with such supernatural beings. …”
Libro electrónico -
26929Publicado 2004“…Der zweite Teil der Arbeit bietet solcherart eine differenzierte Analyse und Neubewertung des Phänomens der "Kriegsneurosen" wie auch der Rolle der österreichischen Psychiatrie im Ersten Weltkrieg…”
Libro electrónico -
26930por Stephenson, James, 1946-“…Both organizations were essentially civilian, and though they availed themselves of some experienced officers from the Department of State, USAID, and other agencies, they relied heavily on temporary employees recruited and hired by the Pentagon. …”
Publicado 2007
Libro -
26931por Chemes, Lucía Beatriz“…La proteína supresora de tumores retinoblastoma (Rb) es una proteína "hub" o central que juega un rol central en el control del ciclo celular en células eucariotas, y su inactivación funcional se encuentra asociada a la progresión del cáncer en humanos. …”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Tesis -
26932por Harkins, Malcolm. author“…This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer.” Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA “For too many years, business and security – either real or imagined – were at odds. …”
Publicado 2013
Libro electrónico -
26933Publicado 2022“…Therefore, differential equations play a crucial role for their study. The content is thinking above all to facilitate understanding by the student, providing the basic technique to face a problem. …”
Libro electrónico -
26934por OECDTabla de Contenidos: “…Détails des réformes des retraites de septembre 2013 à septembre 2015 -- Chapitre 2. Le rôle des pensions du premier pilier -- 2.1. Introduction -- Principaux résultats -- 2.2. …”
Publicado 2016
Libro electrónico -
26935Publicado 2023“…Focused exercises help you internalize what matters, without wasting time on details pros don't care about. Soon, it'll be like you were born knowing this stuff--and you'll be suddenly, seriously dangerous. …”
Video -
26936Publicado 2020“…Synthesis Papers (Champion: Ido Roll)-- Studies that evaluate, synthesize, and contextualize existing bodies of knowledge and research to support collaboration.The call for papers attracted submissions from all over the world, covering a broad range of topics from the theoretical to the pragmatic. …”
Libro electrónico -
26937Publicado 2020“…Patient-centered outcomes research (PCOR) relies on access to researchable health care data for a broad spectrum of patients. …”
Libro electrónico -
26938Publicado 2013“…They raise the crucial role of the historization of literature in the establishment of literary traditions and identities and foster the rethinking of historical discourses insofar they have promoted the founding, support and perpetuation of certain assumptions which have affected female and ethnic literary production and consideration. …”
Enlace del recurso
Electrónico -
26939Publicado 2017“…In particular, the document takes into account the role that innovation and information technologies will play in the safety, quality and sustainability of the system. …”
Libro electrónico -
26940Publicado 2005“…They came out of another non-music scene: the so-called “Freundeskreis” (circle of friends) around writer Rolf Schwendter. Partly in touch with the MoUJ, the RAU developed a completely different style of free improvisation, on the one hand inspired by contemporary Austrian composers (Giselher Smekal, Günther Rabl, Mia Zabelka), on the other hand by oriental music: The debut “Darjeeling” (1970) was recorded with Indian sitar player Ram Chandra Mistry. …”
Libro electrónico