Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 5,801
- History 2,966
- Història 1,692
- Filosofía 1,576
- Crítica e interpretación 1,484
- Biblia 1,399
- Iglesia Católica 947
- Ateísmo 827
- Universidad Pontificia de Salamanca (España) 825
- Security measures 770
- Teología 748
- Computer security 735
- Computer networks 731
- Management 723
- Engineering & Applied Sciences 706
- Development 700
- Derecho 698
- Social aspects 693
- Atlas 680
- Política y gobierno 671
- Education 667
- Església Catòlica 652
- Bíblia 607
- Historia y crítica 576
- Philosophy 573
- Derecho canónico 572
- History and criticism 556
- Politics and government 520
- Educación 515
- Application software 490
-
152921Publicado 2018“…Somewhat disappointingly, well-controlled, blinded RCTs using a sham exposure to 1.2 or 1.3 ATA breathing air fail to confirm any such benefit. …”
Libro electrónico -
152922Publicado 2022“…Most often these were attributed to inadequate knowledge, skills, or reasoning, particularly in "atypical" or otherwise subtle case presentations. …”
Libro electrónico -
152923Publicado 2018“…LT-NRT leads to comparable results and would appear to be an option for smokers who are not immediately willing to make a quit attempt. LIMITATIONS AND SUBPOPULATION CONSIDERATIONS: Most participants in the SSC arm (96%) were willing to set a quit date; findings might be different in actual clinical practice, which might include more smokers not interested in quitting in the immediate future. …”
Libro electrónico -
152924Publicado 2019“…STUDY LIMITATIONS: There were a greater of proportion of GE dropouts immediately after randomization and a potential attention bias due to the greater amount of individualized attention given to the MTE group. …”
Libro electrónico -
152925por Patient-Centered Outcomes Research Institute (U.S.)“…Given the high rates of side effects related to DPN medications reported, automated monitoring may have reinforced more conservative dosing strategies among providers in an attempt to limit treatment-related harms. To be effective in the management of DPN symptoms, automated monitoring may first require accurate identification of those patients most likely to benefit from, or be harmed by, available medications…”
Publicado 2019
Libro electrónico -
152926por National Research Council (U.S.) Joint Committee on Reducing Maternal and Neonatal Mortality in Indonesia“…This progress may be attributable in part to the fact that Indonesia has put considerable effort into meeting the MDGs. …”
Publicado 2013
Libro electrónico -
152927por National Research Council (U.S.).“…Such an approach needs to focus on two critical elements: (1) careful design and conduct to limit the amount and impact of missing data and (2) analysis that makes full use of information on all randomized participants and is based on careful attention to the assumptions about the nature of the missing data underlying estimates of treatment effects. …”
Publicado 2010
Libro electrónico -
152928por Leveraging Action to Support Dissemination of the Pregnancy Weight Gain Guidelines (Workshop)“…Leveraging Action to Support Dissemination of the Pregnancy Weight Gain Guidelines summarizes the workshop's keynote address and the various presentations and discussions from the workshop, highlighting issues raised by presenters and attendees. Interested stakeholders, organizations, health professionals, and federal agencies met to discuss issues related to encouraging behavior change that would reflect the updated guidelines on weight gain during pregnancy. …”
Publicado 2013
Libro electrónico -
152929Publicado 2023“…You're a security analyst who wants to better understand how to better combat the threat presented by recent increases in API attacks. You're a business leader looking to lead and accelerate your digital transformation efforts. …”
Video -
152930Publicado 2022“…Recommended follow-up: Read Cloud Native (book) Attend Cloud Superstream: AWS (live event on October 19)…”
Video -
152931Publicado 2022“…Recommended follow-up: Read Data Mesh (book) Read Software Architecture Metrics (book) Read Designing Data-Intensive Applications (book) Read Software Architecture: The Hard Parts (book) Attend Software Architecture Superstream: Architecture Meets Data (live event on November 30)…”
Video -
152932Publicado 2021“…Yiannis Paraskevopoulos, University of West Attica NARRATED BY DEREK DYSART…”
Video -
152933Publicado 2021“…To study the private, it argues, we are compelled to pay special attention to the public and how private and public interacted. …”
Libro electrónico -
152934por Internal Clinical Guidelines Team“…The authors conclude that it is unlikely that the early identification of diabetes was the explanation for a few deaths identified as diabetes related (8%) in this population cohort; rather the screening process and information on CV disease may have heightened the awareness of practitioners and patients, thus resulting in greater attention to risk factor modification and management.78 The risk of [...] …”
Publicado 2015
Seriada digital -
152935Publicado 2019“…Further, given that LSTMs operate sequentially and are quite slow to train, Arun and Ira shed light on how architectures such as convolutional neural networks (CNNs) and self-attention networks (SANs) can be leveraged to achieve significant improvements in accuracy. …”
Vídeo online -
152936Publicado 2019“…You're a developer using Kubernetes to configure, manage, and rollout applications, and you want to obtain CKAD certification You want to understand the basics of Kubernetes by solving hands-on problems You want to become a Certified Kubernetes Application Developer Prerequisites: You should have experience working with containers, in particular Docker You should possess beginner-level understanding of Kubernetes concepts and the resources API You should have familiarity with a Unix environment and Bash commands as well as with command-line-based text editors (optimally vim) and the YAML format Recommended preparation: Attendees will need access to a Kubernetes cluster, either local or remote; the recommended setup is to install minikube and kubectl CKAD candidate handbook (PDF) Introduction to Kubernetes (free edx video course) Recommended follow-up: Introduction to Kubernetes (live online training) Kubernetes Patterns (book) Common misunderstandings: Learners might understand the basic Kubernetes ideas and concepts but aren't able to apply them in practice Format, time management, and shell environment of the CKAD exam which leads to candidates failing when taking the test Ability to troubleshoot and debug Kubernetes setups by using appropriate kubectl commands under pressure…”
Video -
152937Publicado 2022“…Recommended follow-up: Read Data Mesh (early release book) Attend Data Mesh in Practice--with Interactivity (live online training course with Max Schultze and Arif Wider) Please note that slides or supplemental materials are not available for download from this recording. …”
Video -
152938Publicado 2022“…Recommended follow-up: Read Building Microservices, second edition (book) Read Monolith to Microservices (book) Read Fundamentals of Software Architecture (book) Read Software Architecture: The Hard Parts (book) Attend Software Architecture Superstream: Soft Skills Are the Hardest Part (live online event, June 22)…”
Video -
152939Publicado 2023“…. - Prukalpa Sankar, Co-Founder of Atlan Satisfies all those 'what', 'why', and 'how' questions. …”
Grabación no musical -
152940Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video