Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Medical care 820
- Development 693
- Management 678
- Engineering & Applied Sciences 619
- Application software 553
- Computer programs 458
- Bases de dades 442
- Historia 418
- Computer Science 406
- Col·leccions d'art 385
- History 378
- Computer networks 367
- Data processing 364
- Operating systems (Computers) 351
- Història 349
- TFC 347
- Exposicions 335
- Cloud computing 304
- Leadership 303
- Photography 286
- Business & Economics 278
- Medicine 263
- Security measures 253
- Business 250
- Digital techniques 246
- Computer software 241
- Economics 235
- Processament de dades 233
- Examinations 231
- Computer security 230
-
30841Publicado 2024“…Listen to industry leaders share first-hand experience, insights, and best practices using essential and emerging technologies…”
Grabación no musical -
30842por Enrech Rivero, Julia ( 1993-)“…Most of the parents said that the paediatricians did not provide them with detailed information about oral health care or about the convenience of visiting the paediatric dentist. …”
Publicado 2018
Electrónico -
30843Publicado 2023“…Listen to industry leaders share first-hand experience, insights, and best practices using essential and emerging technologies…”
Grabación no musical -
30844Publicado 2020“…Clinical practice guidelines (CPGs) provide systematically developed recommendations for deciding on appropriate health care options for specific conditions and clinical circumstances. …”
Libro electrónico -
30845por Villena, Miguel Ángel, 1956-“…VERSIÓN PDF: Edición España . Imprimir Enviar ShareThis Imprimir Enviar ShareThis La política republicana Victoria Kent (Málaga, 1892 -Nueva York, 1987) fue una de esas escasas mujeres españolas que hacia los años veinte del siglo pasado recibieron el nombre de “vanguardistas” o “avanzadas” por ser las primeras en romper moldes morales y abrir caminos para sus congéneres femeninos en profesiones y ámbitos que hasta entonces eran propiedad exclusiva de los varones. …”
Publicado 2007
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
30846Publicado 2007“…Besides such practical goals, the Alpenverein also cherished ideal motives such as the intention of providing city dwellers by way of compensation with the chance of enjoying nature and finding physical recreation, which at the same were to foster qualities of character such as determination, daring and presence of mind. The sections - besides giving information on the Alps - also cherished the social life among their members, especially during the annual general meetings, which were organized alternately by various sections and which were to rank among the highlights of urban social life. …”
Libro electrónico -
30847por Pérez Andreo, Bernardo 1970-“…La creencia -credere- vendría de cor-dare, darle el corazón. Y, la religión sería respetar a todos y no ser inhumanos: un proceso de humanización para no saltarse las "reglas de juego" (p. 167-8). …”
Publicado 2009
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca Central de Capuchinos de España)Libro -
30848por Association for Computing Machinery“…As the sessions from refereed papers emerged, the chairs have carefully curated the overall program through keynotes and invited speakers. …”
Publicado 2020
Libro electrónico -
30849Publicado 2023“…Així mateix, el veurem arrencar un somriure al lector amb ocurrències construïdes entorn dels elements més diversos del seu entorn més proper: un bandoler famós, un bevedor d’aiguardent, frares i monges de moral relaxada, la majordona, o l’escolà que va tenir al seu servei i que va morir molt prematurament. …”
Libro -
30850por Vila Gimeno, Carme“…Aquests fets, van suposar un augment de la població molt important, no tant sols dins de la ciutat, sinó també als seus voltants, on varen aparèixer les anomenades ciutats dormitori. …”
Publicado 2014
Accés lliure
Tesis -
30851Publicado 2024“…Her exceptional career is only matched by her deep love for animals and the environment, which she serves through her role with an NGO in Africa. Her spare time is spent traveling and exploring new parts of the world. …”
Video -
30852Publicado 2024“…It shows how to use tools and techniques taught in preceding lessons to create short feedback loops. Tommy shares his favorite ways of reviewing progress and new information, and illustrating how the team's efforts are helping stakeholders achieve the right outcomes. …”
Video -
30853Publicado 2020“…Eligible children were consented and randomly assigned 1:1 within site to tier 1 (online patient portal only) or tier 2 interventions (online patient portal plus care manager). Both groups used an online patient portal that included secure online access to an ADHD dashboard containing family treatment preferences and goals, parent and teacher ADHD symptom scales, ADHD resources, and parent-teacher information-sharing. …”
Libro electrónico -
30854Publicado 2014Tabla de Contenidos: “…The transformation and Christianization of urban and rural landscapes in central Lusitania during Late Antiquity and the Early Middle Ages: the case of Ammaia: Emilia Gallo La dinámica arqueológica de la ciudad de Dertosa en época tardoantigua (siglos IV-VII d.n.E.). …”
Libro -
30855Publicado 2018“…It is our pleasure to share with you the proceedings of SIGMOD 2018, the 44th ACM SIGMOD International Conference on Management of Data, in Houston, Texas. …”
Libro electrónico -
30856Publicado 2022“…Lessons Covered Include: 1.0 Introduction to the AWS Certified Data Analytics (DAS-C01) - Specialty-2023 1.1 technology prerequisite 1.2 sagemaker studio lab 1.3 learn aws cloudshell 1.4 cloud developer workspace advantage 1.5 prototyping ai apis aws cloudshell bash 1.6 cloud9 with codewhisperer Learning Objectives Domain 1: Collection Determine the operational characteristics of the collection system Select a collection system that handles the frequency, volume, and source of data Select a collection system that addresses the key properties of data, such as order, format, and compression 1.0 Introduction to the AWS Certified Data Analytics (DAS-C01) - Specialty-2023 1.1 technology prerequisite 1.2 sagemaker studio lab 1.3 learn aws cloudshell 1.4 cloud developer workspace advantage 1.5 prototyping ai apis aws cloudshell bash 1.6 cloud9 with codewhisperer 1.7 operationalizing collection system 1.11 job styles batch vs streaming 1.12 data ingestion pipelines 1.13 aws batch demo 1.14 step function demo 1.15 transform data in transit 1.16 handle ml specific map reduce 1.17 install rust cloud9 1.18 build aws rust s3 size calculator Domain 2: Storage and Data Management Determine the operational characteristics of the storage solution for analytics Determine data access and retrieval patterns Select the appropriate data layout, schema, structure, and format Define data lifecycle based on usage patterns and business requirements Determine the appropriate system for cataloging data and managing metadata 2.0 domain intro 2.2 one size database 2.3 serverless data engineering 2.4 provisioning ebs 2.5 retrain models 2.6 use s3 storage 2.7 big data challenges 2.8 build systems tools with rust deduplication Domain 3: Processing Determine appropriate data processing solution requirements Design a solution for transforming and preparing data for analysis Automate and operationalize data processing solutions 3.0 domain intro 3.1 kubernetes key concepts 3.2 kubernetes clust 3.3 kubernetes pods nodes 3.4 services deployments 3.5 running minikube 3.6 minikube fastapi kubernetes 3.7 building tiny container 3.8 aws api app runner 3.9 pytorch fastapi deploy app runner 3.10 aws app runner csharp 3.11 options container orchestration 3.12 AWS ECS Fargate Dotnet Microservice 3.1* 3 load testing locust 3.14 sre mindset mlops 3.15 compute choices 3.16 provisioning ec2 Domain 4: Analysis and Visualization Determine the operational characteristics of the analysis and visualization solution Select the appropriate data analysis solution for a given scenario Select the appropriate data visualization solution for a given scenario 4.0 domain intro 4.1 cleanup data 4.2 scaling data 4.3 labeling data 4.4 mechanical turk labeling 4.5 identify extract features 4.6 feature engineering concepts 4.7 graphing data 4.9 clustering 4.11 kaggle nba quicksight 4.12 sagemaker canvas demo 4.13 train test split Domain 5: Security Select appropriate authentication and authorization mechanisms Apply data protection and encryption techniques Apply data governance and compliance controls 5.0 intro domain 5.1 security access strategy 5.2 firewall 5.5 aws trusted advisor demo 5.6 shared security model 5.7 encryption in transit rest 5.8 data protection aws 5.9 audit network 5.10 integrated security 5.11 plp lambda 5.12 analyze logs aws 5.13-conclusion Additional Popular Resources Pytest Master Class AWS Solutions Architect Professional Course Github Actions and GitOps in One Hour Video Course Jenkins CI/CD and Github in One Hour Video Course AWS Certified Cloud Practitioner Video Course Advanced Testing with Pytest Video Course AWS Solutions Architect Certification In ONE HOUR Python for DevOps Master Class 2022: CI/CD, Github Actions, Containers, and Microservices MLOPs Foundations: Chapter 2 Walkthrough of Practical MLOps Learn Docker containers in One Hour Video Course Introduction to MLOps Walkthrough AZ-900 (Azure Fundamentals) Quick reference guide 52 Weeks of AWS Episode 8: Infrastructure as Code with CDK and AWS Lambda Learn GCP Cloud Functions in One Hour Video Course Python Devops in TWO HOURS! …”
Video -
30857por Harkins, Malcolm. author“…It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. …”
Publicado 2013
Libro electrónico -
30858Publicado 2023“…You'll also learn how to plan for SharePoint online and OneDrive for business, including what's involved with migrating on premises file storage to a cloud-based solution. …”
Video -
30859por Zaffarana, Claudia Beatriz“…The mapping of the internal structure of the magmatic rocks showed the existence of a narrow structural corridor of subvertical NW-SE foliation planes shared by all granitoid facies. Magnetic lineations inside this corridor are of shallow, subvertical and intermediate inclination. …”
Publicado 2011
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Tesis -
30860Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
Video