Mostrando 39,941 - 39,960 Resultados de 40,026 Para Buscar 'Tresali~', tiempo de consulta: 1.48s Limitar resultados
  1. 39941
    “…Drawing from the authors' unique experience,The8 Elements of Collaborationfeatures examples from supply chains in manufacturing, marketing alliances among airlines, bundled pricing networks among healthcare providers, creditors who form networks to protect their investments, businesses struggling to form enterprise solutions across departments, government agencies collaboratively solving problems with other agencies, environmental clean ups among adversaries, standards created by competitors to achieve a better outcome for all, and treaties among competing nations. Leaders in every sector of the economy intuitively see the value of bringing together competitors, scientists, activists, government representatives and others to forge solutions to problems they cant solve on their own. …”
    Grabación musical
  2. 39942
    por Lingamallu, Phani Kumar
    Publicado 2023
    “…Accelerate cloud adoption using AWS CloudWatch, X-ray, Distro for OpenTelemetry, Amazon DevOps Guru, and more to monitor and build resilient systems Purchase of the print or Kindle book includes a free PDF eBook Key Features Gain a thorough understanding of observability principles along with different AWS service offerings and best practices Ensure customer satisfaction by monitoring user experience and fixing bottlenecks quickly Learn from experts to get the best possible insights into AWS' observability solutions Book Description As modern application architecture grows increasingly complex, identifying potential points of failure and measuring end user satisfaction, in addition to monitoring application availability, is key. …”
    Libro electrónico
  3. 39943
    Publicado 2022
    “…L'Hospital es comença a construir el 1902, amb la col·locació de la primera pedra, i s'acaba el 1930 amb la inauguració oficial, però si ens quedem amb això ens perdrem la meitat de la història, ja que abans de poder començar les obres, Domènech i Montaner desenvolupa una intensa tasca prèvia d'estudi sobre el terreny, de recerca i de disseny que desemboca en el Projecte d'Hospitals de la Santa Creu i de Sant Pau, en el qual seguirà treballant fins i tot després de començar a construir. …”
    Libro
  4. 39944
    Publicado 2024
    “…. - Yuan Chen, Apple An amazing guide to designing resilient and scalable ML systems for both training and serving models. - Ryan Russon, Capital One A wonderful book! …”
    Grabación no musical
  5. 39945
    Publicado 2014
    “…Precisament Vicens Vives havia estat un dels mestres més influents de Termes, tot i que sovint se’n distanciava i en criticava alguns aspectes, com posen en relleu alguns dels diversos treballs publicats ara, fonamentalment referents a l’home i a l’historiador Josep Termes, estudiós dels orígens del catalanisme —en franca oposició a les teories de Jordi Solé Tura i d’altres que consideren el catalanisme un producte de la burgesia— i de l’obrerisme català dels segles XIX i XX. …”
    Libro
  6. 39946
    Publicado 2024
    “…A partire dal Rinascimento, infatti, le classi colte d'Europa completavano la loro educazione con un viaggio in Italia, sebbene più per conoscerne le antichità che gli abitanti reali. In questo saggio straordinario Luigi Zoja traccia una parabola, che vede una crescita evidente dal Medioevo fino al suo apice, il Rinascimento: qui le arti, ma anche la ricchezza materiale, hanno superato qualunque paese dell'Occidente. …”
    Libro
  7. 39947
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
    Video
  8. 39948
    Publicado 2018
    “…Finalment, el tercer estudi analitza l'impacte de la implicació sobre les variables de resultats relacionades amb l'èxit objectiu i subjectiu (ofertes de treball rebudes, satisfacció vital, satisfacció a la feina, etc.). …”
    Tesis
  9. 39949
    Publicado 2018
    “…Efforts to strengthen health workforce capacity not only increases access, safety and availability of care, but is critical to building resilient health systems capable of caring for the world’s neediest populations. …”
    Libro electrónico
  10. 39950
    Publicado 2021
    “…Per aconseguir aquests objectius, i després d’haver desenvolupat un treball de revisió de la literatura científica i reflexió teòrica, es va estructurar la tesi en dos estudis. …”
    Accés lliure
    Tesis
  11. 39951
    Publicado 2022
    “…També s’estableixen línies de treball comunes i no comunes en les diferents metodologies d’intervenció. …”
    Accés lliure
    Tesis
  12. 39952
    por OECD
    Publicado 2016
    “…Passer de la fragilité à la résilience après 2015 91 Question 7 : Quelles sont les possibilités de remédier à la fragilité ? …”
    Libro electrónico
  13. 39953
    Publicado 2023
    “…Lyndon Williams: Lyndon Williams creates innovative cybersecurity solutions with Cisco, Palo Alto, and Juniper platforms to provide business acceleration and produce intelligent, resilient automated response and remediation systems. …”
    Video
  14. 39954
    Publicado 2024
    “…Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. …”
    Video
  15. 39955
    por Hernández Navarro, Fabiola
    Publicado 2016
    “…En el seu conjunt, els resultats del primer estudi van indicar que els estudiants van identificar les següents cinc competències com aquelles que havien desenvolupat en major mesura: 1) Capacitat de treball en equip, 2) Compromís amb la qualitat, 3) Capacitat de prendre decisions, 4 ) Compromís ètic i 5) Coneixements sobre l'àrea d'estudi i la professió. …”
    Accés lliure
    Tesis
  16. 39956
    Publicado 2018
    “…Finalment, el tercer estudi analitza l'impacte de la implicació sobre les variables de resultats relacionades amb l'èxit objectiu i subjectiu (ofertes de treball rebudes, satisfacció vital, satisfacció a la feina, etc.). …”
    Accés lliure
    Tesis
  17. 39957
    por Gimeno, Mercè
    Publicado 2016
    “…L'estudi s'ha realitzat amb una mostra de 51 persones adultes amb SD amb edats compreses entre els 30 i els 49 anys, laboralment actives en la modalitat de treball amb suport en empreses ordinàries. , als quals s'ha fet un seguiment longitudinal del rendiment cognitiu durant un interval de temps de 2,9 anys. …”
    Accés lliure
    Tesis
  18. 39958
    por Templar, Richard, 1950-2006
    Publicado 2022
    “…Helping you to cultivate and practice mindfulness straight away, you'll discover: · A no-nonsense, light-hearted, and clear introduction to mindfulness and its benefits · Unique and clever 'I-haven't-got-time-for-this' exercises that you can do anywhere, anytime · A fulfilling way to feel less stressed with immediate effect · A new found confidence, resilience and a greater sense of optimism · Improved focus, energy, efficiency and creativity Feel calm, confident and in control - whatever you're doing, wherever you are. …”
    Libro electrónico
  19. 39959
    Publicado 2020
    “…The development of intelligent security strategies for establishing resilient and robust systems for autonomous vessels Safety and security integration in the operative context of autonomous maritime systems Safety aspects of autonomous shipping in extreme environments Scope - ESWC Traditional system safety approaches are being challenged by the introduction of new technology and the increasing complexity of the systems we design, manufacture and operate. …”
    Libro electrónico
  20. 39960
    Publicado 2022
    “…Solve difficult service-to-service communication challenges around security, observability, routing, and resilience with an Istio-based service mesh. Istio allows you to define these traffic policies as configuration and enforce them consistently without needing any service-code changes. …”
    Grabación no musical