Mostrando 114,701 - 114,720 Resultados de 114,864 Para Buscar 'Will~', tiempo de consulta: 0.88s Limitar resultados
  1. 114701
    Publicado 2023
    “…Focused exercises help you internalize what matters, without wasting time on details pros don't care about. Soon, it'll be like you were born knowing this stuff--and you'll be suddenly, seriously dangerous. …”
    Video
  2. 114702
    Publicado 2022
    “…Va ser imprescindible donar significat i sentit al fenomen mil·lenial, i algunes dades ja ens van revelar certa asimetria entre un grup jove i nou i un grup veterà i consolidat a l'hora de conèixer el món. …”
    Accés lliure
    Tesis
  3. 114703
    por Electricité de France
    Publicado 2014
    “…Losing a pole position in these areas is dangerous; taking on a leader's role is a challenge Si la tendance au regroupement des industries métallurgiques en pôles de taille mondiale paraît inéluctable, il faut tout faire pour que cette évolution n'entraîne pas un affaissement de la France dans ce domaine clé. …”
    Libro electrónico
  4. 114704
    Publicado 2023
    “…About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
    Video
  5. 114705
    Publicado 2019
    “…Mark has worked to transform wide-scale teaching practice through contextualized computing education, most notably with the Media Computation curriculum, advocated and supported policy changes supporting computing for all in many states in the U.S., published core research in computing education over decades, and helped to foster the next generation of computing educators through his mentorship. …”
    Libro electrónico
  6. 114706
    Publicado 2016
    “…Approximately 35.27% of the papers fell in this category. Each of these decisions involved the active participation of all the reviewers. …”
    Libro electrónico
  7. 114707
    “…The pandemic crisis of the last five months has also found most of us locked in our homes and all movement cancelled. Amidst this stillness, we have been confronted with -- individually and as a society -- many moments of reflection on the issues that matter most. …”
    Libro electrónico
  8. 114708
    Publicado 2017
    “…A human eye seeing such a dwelling Buddha in the temple does not see a dwelling Buddha in the temple at all, because the Buddha has entered nirvāṇa. …”
    Libro electrónico
  9. 114709
    Publicado 2007
    “…A total of 1411 abstracts were retrieved. 40 articles were read in full text and 19 were included in the documentation. …”
    Libro electrónico
  10. 114710
    Publicado 2023
    “…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
    Video
  11. 114711
    Publicado 2010
    “…Un exhaustivo análisis de seguridad reveló que las papas -PPO son seguras para el consumo, si bien son metabólicamente diferentes a sus parentales silvestres (WT, de sus siglas en ingles Wild Type). Este estudio instauró el debate sobre la relevancia de los conceptos actualmente utilizados para la evaluación de la seguridad de cultivos transgénicos. …”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  12. 114712
    por Rossi, Melina Brenda
    Publicado 2011
    “…However, the spectroscopic behavior of the dinuclear compound [RuII(DMAP)5(?-NC)MIII(CN)5]- as well as the mixed valence trinuclear compound [(CN)5FeII(?…”
    Enlace del recurso
    Tesis
  13. 114713
    por Llorente, Briardo Ernesto
    Publicado 2010
    “…Un exhaustivo análisis de seguridad reveló que las papas -PPO son seguras para el consumo, si bien son metabólicamente diferentes a sus parentales silvestres (WT, de sus siglas en ingles Wild Type). Este estudio instauró el debate sobre la relevancia de los conceptos actualmente utilizados para la evaluación de la seguridad de cultivos transgénicos. …”
    Enlace del recurso
    Libro electrónico
  14. 114714
    Publicado 2013
    “…Esta investigación plantea un análisis comparativo de los significados subyacentes en las estructuras sociales y las manifestaciones religiosas de dos poblaciones rurales de origen agrícola: Acaxochitlán, Hidalgo, en México y la Villa de Tamames de la Sierra en la Provincia de Salamanca, España. …”
    Enlace del recurso
    Electrónico
  15. 114715
    Publicado 2002
    “…In this regard I also wish to welcome all our international contributors and visitors. …”
    Libro electrónico
  16. 114716
    Publicado 2023
    “…About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
    Video
  17. 114717
    Publicado 2004
    “…Der zweite Teil der Arbeit bietet solcherart eine differenzierte Analyse und Neubewertung des Phänomens der "Kriegsneurosen" wie auch der Rolle der österreichischen Psychiatrie im Ersten Weltkrieg…”
    Libro electrónico
  18. 114718
    Publicado 2015
    “…Web editorial v. 2 " Siguiendo con la colección de publicaciones para divulgar la Historia de la Danza tanto a escuelas y conservatorios como a aficionados, el Volumen Ill se ocupa de las danzas urbanas tratando de presentar una introducción a su conocimiento desde diferentes miradas. …”
    Libro
  19. 114719
    Publicado 2021
    “…Compagina la profesión jurídica con la actividad docente: profesor en el Instituto de Seguridad Pública de Catalunya, de la Generalitat de Catalunya; profesor en la Facultad de Derecho de la Universitat de Barcelona, donde imparte la asignatura “Justicia de menores”; en junio de 2021, impartió el curso titulado “El interés superior del menor: su aplicación en la intervención en justicia juvenil y en protección de menores”, dirigido a profesionales de la educación especializada - inadaptación social y del trabajo social, organizado por la Escola Balear d'Administració Pública - Conselleria d'Administracions Publiques i Modernització, del Gobierno Autónomo de las Illes Balears. Igualmente, ha presentado ponencias sobre menores en Congresos internacionales. …”
    Enlace del recurso
    Libro electrónico
  20. 114720