Mostrando 26,921 - 26,940 Resultados de 26,998 Para Buscar 'RTL9~', tiempo de consulta: 0.81s Limitar resultados
  1. 26921
    Publicado 2021
    Tabla de Contenidos: “…The photograph as a mediating space in clinical and creative encounters ; How Images change nonverbal interaction in chronic pain consultations ; Picturing pain ; Making charcoal for drawing ; The art of pain and inter-subjectivity in Frida Kahlo's self-portraits ; The thing about pain: the remaking of illness narratives on social media ; Exhibiting pain: the role of online exhibitions in sharing creative expressions of chronic physical pain Section III, Speaking. …”
    Libro electrónico
  2. 26922
    Publicado 2020
    “…Requirements for "meaningful use" of electronic health records (EHRs) have elevated the role of patient portals as a standard communication tool for patients with chronic health conditions. …”
    Libro electrónico
  3. 26923
    Publicado 2023
    “…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
    Video
  4. 26924
    Publicado 2012
    “…Existen dos de ellas que juegan un rol fundamental: las temáticas y las taxonómicas. …”
    Enlace del recurso
    Electrónico
  5. 26925
    Publicado 2019
    Tabla de Contenidos: “…-- EU CITIZENSHIP AND RELEVANCY FOR ASEAN IN SUSTAINABLE REGUGEE MANAGEMENT THROUGH THE ROLE OF TNCS -- THE REGULATION OF INTERNET AS LITERACY MEDIA FOR CYBER COMMUNITY -- THE CONTINUITY OF ASEAN CENTRALITY WITHIN INDONESIAN FOREIGN POLICY UNDER PRESIDENT JOKO WIDODO -- THE SECURITIZATION OF CYBER ISSUE IN ASEAN -- ASEAN CONNECTIVITY 2025: SHALL AUSTRALIA BECOME THE FUTURE MEMBER OF ASEAN? …”
    Libro electrónico
  6. 26926
    Publicado 2014
    “…Bd.1: "Epigramme spielen innerhalb des literarischen Schaffens der Byzantiner eine wichtige Rolle. In nicht geringer Anzahl (mehr als 1000 Stück) sind diese auch heute noch inschriftlich erhalten, sei es auf Fresken, Mosaiken, Ikonen, auf so genannten Objekten der Kleinkunst und in Handschriften, in denen sie als Rahmen von Miniaturen fungieren oder Figurengedichte bilden. …”
    Libro electrónico
  7. 26927
    Publicado 2022
    “…This keynote was shared with the ACM Web Science Conference, where the speaker questioned web scientists and hypertext researchers to explore the role of web science in general and hypertext in particular in helping to create the infrastructure of radical cultural shift towards health. …”
    Libro electrónico
  8. 26928
    Publicado 2010
    “…In contrast, dangerous demons and accompanying phenomena, such as the evil eye and witchcraft, play a vital role in concepts of folk religion. Particularly in peripheral and rural areas of the present-day Syrian Arab Republic, many people have stories to tell about their own encounters with such supernatural beings. …”
    Libro electrónico
  9. 26929
    Publicado 2004
    “…Der zweite Teil der Arbeit bietet solcherart eine differenzierte Analyse und Neubewertung des Phänomens der "Kriegsneurosen" wie auch der Rolle der österreichischen Psychiatrie im Ersten Weltkrieg…”
    Libro electrónico
  10. 26930
    por Stephenson, James, 1946-
    Publicado 2007
    “…Both organizations were essentially civilian, and though they availed themselves of some experienced officers from the Department of State, USAID, and other agencies, they relied heavily on temporary employees recruited and hired by the Pentagon. …”
    Libro
  11. 26931
    por Chemes, Lucía Beatriz
    Publicado 2010
    “…La proteína supresora de tumores retinoblastoma (Rb) es una proteína "hub" o central que juega un rol central en el control del ciclo celular en células eucariotas, y su inactivación funcional se encuentra asociada a la progresión del cáncer en humanos. …”
    Enlace del recurso
    Tesis
  12. 26932
    por Harkins, Malcolm. author
    Publicado 2013
    “…This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer.” Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA “For too many years, business and security – either real or imagined – were at odds. …”
    Libro electrónico
  13. 26933
    Publicado 2022
    “…Therefore, differential equations play a crucial role for their study. The content is thinking above all to facilitate understanding by the student, providing the basic technique to face a problem. …”
    Libro electrónico
  14. 26934
    por OECD
    Publicado 2016
    Tabla de Contenidos: “…Détails des réformes des retraites de septembre 2013 à septembre 2015 -- Chapitre 2. Le rôle des pensions du premier pilier -- 2.1. Introduction -- Principaux résultats -- 2.2. …”
    Libro electrónico
  15. 26935
    Publicado 2023
    “…Focused exercises help you internalize what matters, without wasting time on details pros don't care about. Soon, it'll be like you were born knowing this stuff--and you'll be suddenly, seriously dangerous. …”
    Video
  16. 26936
    Publicado 2020
    “…Synthesis Papers (Champion: Ido Roll)-- Studies that evaluate, synthesize, and contextualize existing bodies of knowledge and research to support collaboration.The call for papers attracted submissions from all over the world, covering a broad range of topics from the theoretical to the pragmatic. …”
    Libro electrónico
  17. 26937
    Publicado 2020
    “…Patient-centered outcomes research (PCOR) relies on access to researchable health care data for a broad spectrum of patients. …”
    Libro electrónico
  18. 26938
    Publicado 2013
    “…They raise the crucial role of the historization of literature in the establishment of literary traditions and identities and foster the rethinking of historical discourses insofar they have promoted the founding, support and perpetuation of certain assumptions which have affected female and ethnic literary production and consideration. …”
    Enlace del recurso
    Electrónico
  19. 26939
    Publicado 2017
    “…In particular, the document takes into account the role that innovation and information technologies will play in the safety, quality and sustainability of the system. …”
    Libro electrónico
  20. 26940
    Publicado 2005
    “…They came out of another non-music scene: the so-called “Freundeskreis” (circle of friends) around writer Rolf Schwendter. Partly in touch with the MoUJ, the RAU developed a completely different style of free improvisation, on the one hand inspired by contemporary Austrian composers (Giselher Smekal, Günther Rabl, Mia Zabelka), on the other hand by oriental music: The debut “Darjeeling” (1970) was recorded with Indian sitar player Ram Chandra Mistry. …”
    Libro electrónico