Mostrando 43,261 - 43,280 Resultados de 44,310 Para Buscar 'SEBIN~', tiempo de consulta: 1.10s Limitar resultados
  1. 43261
    Publicado 2022
    “…A proven methodology to build a PolicyOps function and public policy design frameworks for digital adoption, supporting your organization's journey into new paradigms and service models such as Cloud, SaaS, CaaS, FaaS, and DevOps Key Features Understand and define policies that can be consumed across the business Leverage a framework to embed Policy as Code into the organization Learn how to use Open Policy Agent and its powerful policy language, Rego Book Description Policy as Code (PaC) is a powerful paradigm that enables organizations to implement, validate, and measure policies at scale. …”
    Libro electrónico
  2. 43262
    Publicado 2022
    “…This book will enable information security and cloud engineers to recognize the risks involved in public cloud and find out how to implement security controls as they design, build, and maintain environments in the cloud. You'll begin by learning about the shared responsibility model, cloud service models, and cloud deployment models, before getting to grips with the fundamentals of compute, storage, networking, identity management, encryption, and more. …”
    Libro electrónico
  3. 43263
    Publicado 2024
    “…The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. …”
    Video
  4. 43264
    por Nicolaï, Robert
    Publicado 2017
    “…It is addressed to linguists, epistemologists, language theorists and historians, as well as anyone interested in how we construe meaning in and through language. Beginning with how genealogical filiation has been...…”
    Electrónico
  5. 43265
    Publicado 2016
    “…In particular, when small molecules are integrated into genetic strategies (thereby defining “chemical genetics”), they may help to circumvent inherent problems of classical (forward) genetics. …”
    Libro electrónico
  6. 43266
    “…Lehman is currently a post-doctoral fellow at the University of Texas at Austin. In August 2015 he begins as an assistant professor at the IT University of Copenhagen…”
    Libro electrónico
  7. 43267
    por Bémont, Colette
    Publicado 2021
    “…The volume is a collective work by over forty different archaeologists Defined by a research team pi me CNRS, the work include two complementary sets of contribution: a series of 45 notices, each on dedicated to a particular workshop (some of the workshops have been extensively dug, others have only been prospected); a series of 15 reports, some address problems of general methodology and regional history, others are concerned with the relations with the workshops in Switzerland and the Rhine Valley. …”
    Electrónico
  8. 43268
    Publicado 2023
    “…You'll also explore challenges faced in testing concurrent code, and learn how to leverage generics and write fuzz tests. The book begins by teaching you how to use TDD to tackle various problems, from simple mathematical functions to web apps. …”
    Libro electrónico
  9. 43269
    Publicado 2023
    “…--Kent Beck, Chief Scientist, Mechanical Orchard; author, Extreme Programming Explained "This entire journey--beginning with the Wild West era of software development through the Agile Era to today's Digital Transformation era--is entirely empowered by people. …”
    Libro electrónico
  10. 43270
    Publicado 2023
    “…By the end of this book, you'll be able to create and manage temporal systems, prevent SQL injection attacks, use existing functionalities and define your own robust solutions for date management, and apply time zone and region rules. …”
    Libro electrónico
  11. 43271
    Publicado 2023
    “…Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software. The book begins by introducing you to two open source fuzzer engines: QEMU, which allows you to run software for whatever architecture you can think of, and American fuzzy lop (AFL) and its improved version AFL++. …”
    Libro electrónico
  12. 43272
    por Sakinmaz, Serkan
    Publicado 2023
    Tabla de Contenidos: “…-- Features of AWS Glue -- Creating an S3 sample file -- Defining the permissions for a Glue job -- Creating an AWS Glue service -- Summary -- Chapter 12: Reference Project on AWS -- What have we learned? …”
    Libro electrónico
  13. 43273
    Publicado 2023
    Tabla de Contenidos: “…Johdanto : kirkonmäellä - osana yhteiskuntaa / Ella Viitaniemi -- Papin perhe ja paikallisyhteisö 1600-luvun loppupuolen Viipurin hiippakunnassa / Miia Kuha -- Vanhan Suomen luterilainen papisto, seurakunnat ja kansallinen kuva / Antti Räihä -- Maaseutupappilat tyttöjä jatko-opintoihin valmistaneina kotikouluina / Sofa Kotilainen -- Viestejä nimettömiltä rakentajilta : keskiaikaisten kivikirkkojen rakenteiden merkinnät ja niiden tulkinta / Panu Savolainen, Liisa Seppänen, Ilari Aalto ja Laura Laine -- Jonas Erik Korler ja Hauhon kirkon lehterimaalaukset / Tiina Miettinen ja Leena Elina Valkeapää -- Kilpailu pyhän tilan kokemuksesta uuden ajan alun Suomessa / Raisa Maria Toivo -- Yhteisöllisyyttä luova kolehtihaavi : kolehtikeräykset Koivulahden ja Säbyn seurakunnissa 1751–1760 ja 1811–1820 / Britt-Marie Villstrand ja Nils Erik Villstrand ; käännös Ella Viitaniemi -- Jumalanpalvelussaarna hengellisten ryhmien määrittelijänä 1800-luvun taitteen raumalaisessa paikallisyhteisössä / Joonas Tammela -- Pitäjänkokousten kielet ja käytänteet osana poliittisen kulttuurin muutosta / Lauri Viinikkala ja Ella Viitaniemi…”
    Libro electrónico
  14. 43274
    Publicado 2020
    “…A variety of topics including well-being, happiness, security, open democracy, open government, smart education, smart innovation, and migration have been addressed in this Special Issue. They define the direction for future research in both domains. …”
    Libro electrónico
  15. 43275
    Publicado 2019
    “…Raffestin thus makes a major contribution to the social sciences as a whole by defining territoriality as a form of spatial mediation of social relations. …”
    Libro electrónico
  16. 43276
    Publicado 2023
    “…You'll also learn which critical principles to consider when developing Android apps. The book begins with recipes to get you started with the declarative UI framework, Jetpack Compose, and help you with handling UI states, Navigation, Hilt, Room, Wear OS, and more as you learn what's new in modern Android development. …”
    Libro electrónico
  17. 43277
    Publicado 2023
    “…The course offers a comprehensive exploration of Git and GitHub, covering everything you need to know to effectively manage your code and collaborate with others. The course begins with an introduction to Git and the version control system, guiding you through the installation and setup process. …”
    Video
  18. 43278
    Publicado 2023
    “…The book will show you how data contracts ensure that consumers get quality data with clearly defined expectations, enabling them to build on that data with confidence to deliver valuable analytics, performant ML models, and trusted data-driven products. …”
    Libro electrónico
  19. 43279
    Publicado 2023
    “…Puppet, a powerful configuration management tool, is widely used by leading enterprises and boasts a thriving open source community.This book provides a comprehensive explanation of both the Puppet language and the platform. It begins by helping you grasp the basic concepts and approach of Puppet as a stateful language, and then builds up to explaining how to structure Puppet code to scale and allow flexibility and collaboration among teams. …”
    Libro electrónico
  20. 43280
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
    Video