Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 5,723
- History 2,967
- Història 1,697
- Filosofía 1,552
- Crítica e interpretación 1,430
- Biblia 1,346
- Iglesia Católica 945
- Ateísmo 825
- Universidad Pontificia de Salamanca (España) 825
- Security measures 770
- Computer security 735
- Computer networks 731
- Management 723
- Engineering & Applied Sciences 706
- Development 700
- Social aspects 693
- Teología 687
- Atlas 680
- Derecho 677
- Política y gobierno 669
- Education 667
- Església Catòlica 653
- Bíblia 609
- Historia y crítica 577
- Philosophy 573
- History and criticism 556
- Politics and government 520
- Educación 512
- Derecho canónico 507
- Application software 490
-
151241Publicado 2021“…To study the private, it argues, we are compelled to pay special attention to the public and how private and public interacted. …”
Libro electrónico -
151242por Internal Clinical Guidelines Team“…The authors conclude that it is unlikely that the early identification of diabetes was the explanation for a few deaths identified as diabetes related (8%) in this population cohort; rather the screening process and information on CV disease may have heightened the awareness of practitioners and patients, thus resulting in greater attention to risk factor modification and management.78 The risk of [...] …”
Publicado 2015
Seriada digital -
151243Publicado 2019“…Further, given that LSTMs operate sequentially and are quite slow to train, Arun and Ira shed light on how architectures such as convolutional neural networks (CNNs) and self-attention networks (SANs) can be leveraged to achieve significant improvements in accuracy. …”
Vídeo online -
151244Publicado 2019“…You're a developer using Kubernetes to configure, manage, and rollout applications, and you want to obtain CKAD certification You want to understand the basics of Kubernetes by solving hands-on problems You want to become a Certified Kubernetes Application Developer Prerequisites: You should have experience working with containers, in particular Docker You should possess beginner-level understanding of Kubernetes concepts and the resources API You should have familiarity with a Unix environment and Bash commands as well as with command-line-based text editors (optimally vim) and the YAML format Recommended preparation: Attendees will need access to a Kubernetes cluster, either local or remote; the recommended setup is to install minikube and kubectl CKAD candidate handbook (PDF) Introduction to Kubernetes (free edx video course) Recommended follow-up: Introduction to Kubernetes (live online training) Kubernetes Patterns (book) Common misunderstandings: Learners might understand the basic Kubernetes ideas and concepts but aren't able to apply them in practice Format, time management, and shell environment of the CKAD exam which leads to candidates failing when taking the test Ability to troubleshoot and debug Kubernetes setups by using appropriate kubectl commands under pressure…”
Video -
151245Publicado 2022“…Recommended follow-up: Read Data Mesh (early release book) Attend Data Mesh in Practice--with Interactivity (live online training course with Max Schultze and Arif Wider) Please note that slides or supplemental materials are not available for download from this recording. …”
Video -
151246Publicado 2022“…Recommended follow-up: Read Building Microservices, second edition (book) Read Monolith to Microservices (book) Read Fundamentals of Software Architecture (book) Read Software Architecture: The Hard Parts (book) Attend Software Architecture Superstream: Soft Skills Are the Hardest Part (live online event, June 22)…”
Video -
151247Publicado 2023“…. - Prukalpa Sankar, Co-Founder of Atlan Satisfies all those 'what', 'why', and 'how' questions. …”
Grabación no musical -
151248Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
151249Publicado 2023“…It just might save the day! - Atul Shriniwas Khot, SquareOne Insights I wish I had this collection of efficient and usable techniques at the beginning of my career. - Andriy Stosyk, EPAM Systems A great book with deep explanations about debugging techniques. - C♯3t♯3lin Matei, Endava Understand how Java applications work under the hood. - Fernando Bernardino, Wise…”
Video -
151250Publicado 2023“…It just might save the day! - Atul Shriniwas Khot, SquareOne Insights I wish I had this collection of efficient and usable techniques at the beginning of my career. - Andriy Stosyk, EPAM Systems A great book with deep explanations about debugging techniques. - Cătălin Matei, Endava Understand how Java applications work under the hood. - Fernando Bernardino, Wise…”
Grabación no musical -
151251Publicado 2023“…Daniel Zingaro University of Toronto, author of Algorithmic Thinking How these tools can be both so very amazing in what they produce, and simultaneously so utterly doltish in their numerous failures, is the main thing this book tries to understand. For reasons I attempt to elucidate throughout, of all the domains of computer programming, games with regular expressions are particularly well suited for getting a grasp on the peculiar behaviors of AI. - From the Preface I am a strong believer in Augmented Intelligence and welcome tools such as ChatGPT & Co-Pilot. …”
Video -
151252Publicado 2023“…Course Overview Course One: Designing and planning a cloud solution architecture 1.0 Rough Draft Introduction Introduction to Google Professional Architect Course Onboarding to GCP Cloud Designing a solution infrastructure that meets business requirements Designing a solution infrastructure that meets technical requirements Designing network, storage, and compute resources Using Google Cloud Functions Running Minikube Running Minikube with FastAPI for Kubernetes development Getting Started with Google Cloud Run Load testing with locust Design technical solutions for evolution and migration SRE Mindset Conclusion and Next Steps Course Two: Managing and provisioning a solution infrastructure Introduction to Google Professional Architect Course Two Exploring Network Topologies in GCP: A Demonstration Embracing Hybrid Networking in Google Cloud Platform Overview of GCP Storage Demo of using the SDK and CLI to manage storage Data lifecycle management Data security Demo of building Rust deduplication finder Compute volatility configuration (preemptible vs. standard) Demo Build and Deploy Rust Actix Microservice Cloud Run Container orchestration with GKE Demo of extending Google Cloud Functions Conclusion Course Two Course Three: Designing for Security and Compliance Introduction to Google Professional Architect Course Three Mastering Identity and Access Management in GCP Data Security Best Practices for GCP Secrets Manager API: A Hands-on Guide Exploring a data poisoning attack Meeting Industry Certification Requirements in GCP Auditing GCP Security with Log Analysis Creating Custom Log Dashboards for GCP Security Monitoring Scanning Web Applications with GCP's Cloud Web Security Scanner Analyzing GCP Logs with BigQuery GCP Security: Conclusion and Next Steps Course Four: Designing and optimizing technical and business processes Introduction to Google Professional Architect Course Four Continuous Delivery: An Introduction Hands-on with Continuous Integration in GCP Troubleshooting Techniques: The Five Whys Implementing Simple GitHub Actions for CI/CD The Three Most Important Files in a Python Project Utilizing Trello for Effective Project Management Leveraging Spreadsheets for Project Management Exploring the MLOps Maturity Model Building Bespoke Systems for Core Business Functions Data Science on Windows: Virtualenv and Pip Site Reliability Engineering (SRE) in GCP Performing Load Testing in GCP: A Demo Course Five: Managing and optimizing cloud solution Implementation Introduction to Google Professional Architect Course Five Makefiles Made Easy: A Comprehensive Guide Configuring Your Bashrc for an Optimal Environment Implementing Continuous Integration for Rust with GitHub Actions Unit Testing in Rust: A Hands-on Demonstration Supercharging Rust Development with Copilot Setting Up a GCP Workstation for Python Development Mastering Google Cloud Shell: A Practical Guide Streamline Your Development with Google Cloud Editor Getting Started with the Google Cloud CLI SDK Unleashing the Power of Google Cloud's 'gcloud' Command-Line Tool Deploying Rust Applications to App Engine: A Step-by Course Six: Ensuring solution and operations reliability Introduction to Google Professional Architect Course Six Monitoring and Logging Rust App Engine Applications: A Demo Uncovering the Advantages of Cloud Developer Workspaces Operationalizing Microservices in the Cloud Introducing GitHub Codespaces for Streamlined Development Compiling Python Projects in GitHub Codespaces Mastering Continuous Integration in GCP Course Wrap-up and Future Steps in Your GCP Journey Learning Objectives Design and optimize cloud solutions Analyze and optimize technical and business processes Manage and provision cloud infrastructure Ensure solution and operations reliability By the end of this course, you will have the knowledge and skills needed to pass the Google Cloud Certified Professional Cloud Architect exam and to effectively design and manage cloud solutions using Google Cloud Platform. …”
Video -
151253Publicado 2022“…. - Ariel Andres, MD Financial Management What caught my attention were the practical examples immediately applicable to real life. …”
Grabación no musical -
151254Publicado 2022“…Recommended follow-up: Read Software Architecture Metrics (book) Read Learning Domain-Driven Design (book) Read Fundamentals of Software Architecture (book) Read Software Architecture: The Hard Parts (book) Watch How Thoughtworks and Open GI Used 4 Key Metrics to Succeed with Their Digital Transformation (case study) Attend Software Architecture Superstream: Software Architecture Fundamentals (live online event on September 28)…”
Video -
151255Publicado 2022“…Recommended follow-up: Read Presentation Patterns (book) Read Thinking Architecturally (report) Read The Software Architect Elevator (book) Attend Software Architecture Superstream: Soft Skills Are the Hardest Part (live event on June 22) Attend Software Developer to Architect (live online training course) Please note that slides or supplemental materials are not available for download from this recording. …”
Video -
151256Publicado 2022“…Event 3: Finals - December 7, 2022 The top teams' videos are shown, judges provide feedback, attendees vote for their favorite, and judges announce the winner. …”
Video -
151257Publicado 2022“…Recommended follow-up: Read Alice and Bob Learn Application Security (book) Take Kubernetes Security: Attacking and Defending Kubernetes (video course) Read Digital Fluency: Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their Applications for Digital Transformation (book) Please note that slides or supplemental materials are not available for download from this recording. …”
Video -
151258Publicado 2022“…Recommended follow-up: Read Modern Software Engineering (book) Read Fundamentals of Software Architecture (book) or listen to the audiobook Read Software Engineering at Google (book) or listen to the audiobook Read Software Architecture Metrics (book) Attend Software Architecture Superstream: Architecture Meets Data (live online event on November 30)…”
Video -
151259Publicado 2023“…Daniel Zingaro University of Toronto, author of Algorithmic Thinking How these tools can be both so very amazing in what they produce, and simultaneously so utterly doltish in their numerous failures, is the main thing this book tries to understand. For reasons I attempt to elucidate throughout, of all the domains of computer programming, games with regular expressions are particularly well suited for getting a grasp on the peculiar behaviors of AI. - From the Preface I am a strong believer in Augmented Intelligence and welcome tools such as ChatGPT & Co-Pilot. …”
Grabación no musical -
151260Publicado 2023“…Recommended follow-up: Read Microservices Patterns (book) Listen to Microservices Patterns (audiobook) Read Monolith to Microservices (book) Read Building Microservices, second edition (book) Attend Microservices in 3 Weeks (live event) Watch Software Architecture Superstream: Microservices (live Superstream event recording)…”
Video