Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (3,775)
  • HU Berlin
  • MARKK
  • World Bank Group  (3,318)
  • Packt Publishing,  (457)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Development Economics and Aid Effectiveness ; Effectiveness ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; Stakeholder Engagement ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Mali assists the World Bank Group (WBG) in better understanding how stakeholders in Mali perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Mali on 1) their views regarding the general environment in Mali; 2) their overall attitudes toward the WBG in Mali; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Mali; and 4) their perceptions of the WBG's future role in Mali
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Social Analysis
    Keywords: Infrastructure and Growth ; Infrastructure Economics ; Infrastructure Economics and Finance ; Urban Accessibility ; Urban Development ; Urban Economic Development
    Abstract: The World Bank's Vietnam Scaling Up Urban Upgrading Project aimed to develop sustainable urban infrastructure in Vietnam's Mekong Delta Region. The project focused on universally accessible design principles for infrastructure development and aimed to strengthen planning capacity, improve infrastructure design, increase awareness of universal accessibility, and promote green infrastructure. A QII Partnership grant supported the project by facilitating the application of principles and providing technical advice. These activities will benefit seven urbanizing cities, improve livelihoods, and reach approximately 90,000 individuals in low-income areas with universal accessibility design. It has also informed new World Bank initiatives to improve accessibility regionally and globally
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Climate and Development Reports (CCDRs)
    Keywords: Adaptation To Climate Change ; Climate Change Adaptation ; Economic Growth ; Environment ; Finance ; Inlcusive Growth ; Macroeconomics and Economic Growth ; Poverty Reduction ; Resilience
    Abstract: This Country Climate and Development Report (CCDR) examines Liberia's development trajectory through the lens of the country's vulnerability to climate change. It identifies Liberia's development risks and opportunities, models various scenarios of climate impact and intervention, and proposes ways to strengthen resilience and finance climate actions that support Liberia's development aspirations of inclusive growth and poverty reduction
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Environmental Study
    Keywords: Carbon Emissions ; Climate Change Mitigation and Green House Gases ; Digitalization ; Energy Footprint ; Environment ; GHG ; ICT Policy and Strategies ; ICT Sector ; Information and Communication Technologies
    Abstract: Digitalization is increasing rapidly worldwide, requiring more energy, and resulting in greenhouse gas (GHG) emissions. According to International Telecommunication Union (ITU) two thirds of the world's population are now online. Estimates of the internet and communication technology (ICT) sector's share of global carbon emissions vary across the literature ranging from 1.5 to 4 percent. Based on the data and estimates in this report at least 1.7 percent of global emissions stem from the ICT sector. Meanwhile, one-third of the world's population, or 2.6 billion people, remain unconnected to the internet. The large majority, about 94 percent, live in low and middle-income countries (LMICs), and less than 20 percent of LMICs have modern data infrastructure, such as co-location data centers and access to cloud computing. Connecting people in these countries will require more infrastructure and devices, which will further increase demand for scarce energy resources and drive emissions even higher if targeted interventions are not implemented. The objective of this report is two-fold. First, the report breaks down the energy and emissions profile of the sector and assesses the 30 highest emitting countries for telecommunications while providing global estimates for other ICT sector segments. The report uses a key framework for categorizing energy use and emissions, the greenhouse gas protocol corporate standard. Second, the report addresses the policy and regulatory implications inferred from this data and the examination of these issues through several country case studies
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other ESW Reports
    Keywords: Business Environment ; Climate Adaptation ; Environment ; Flood Risks ; Natural Disasters ; Private Sector Development ; Private Sector Resilience
    Abstract: Building resilience to natural disasters is imperative for sustainable private sector development and growth in Malaysia. Floods have been Malaysia's most frequent natural disaster, accounting for 85 percent of all natural disasters since 2000. This report looks holistically at the challenges of adaptation to climate change for businesses, exploring the complementarity among the public sector, the financial sector, and the private sector efforts in managing flood risks. It does so by using a range of complementary analyses that bring together the private sector perspective drawn from a firm-level survey, the financial sector perspective based on a survey of financial institutions (both banks and insurers and takaful operators), along with macro-modelling estimates of the aggregate impacts of future floods. The report concludes with a roadmap for policy action to strengthen private sector resilience and enhance the management of flood risks for businesses, zooming in on policies for the financial sector
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Demographics ; Family Planning Research ; Female Education ; Gender ; Gender and Education ; Health, Nutrition and Population ; High Fertility Rates ; High Population Growth ; Human Capital ; Mortality ; Population Policies ; Women's Agency
    Abstract: Tanzania has managed to sustain its growth momentum despite the intensifying effects of climate change. While Tanzania's economy continues to expand, recent growth has been concentrated in sectors that employ few workers from poor households, limiting its impact on poverty. The Bank of Tanzania (BoT) has implemented an effective monetary policy designed to curb inflation and alleviate mounting short-term demand pressure on foreign exchange. While Tanzania's recovery continues to accelerate, several serious threats cloud its economic outlook. Key risks include the slow or incomplete implementation of structural reforms, the damaging effects of climate change on the agriculture and tourism sectors, and the possibility of a global recession caused by fiscal and monetary policy tightening in advanced economies and major EMDEs. To mitigate these risks, policymakers must accelerate structural reforms as part of a sustained effort to attract greater private investment and spur resilient and inclusive private-sector-led growth. Over the longer term, one of the country's key challenges will be to complete its structural economic transformation, which will require creating a more favorable business climate to support the growth of the industrial and services sectors while boosting agricultural productivity. Another key long-term growth challenge will be achieving more balanced and inclusive growth
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Risk and Vulnerability Assessment
    Keywords: Access To Finance ; CPGA ; Environment ; Finance and Financial Sector Development ; Financial Preparedness ; Natural Disasters ; Primary Response ; Risk ; Social and Livelihood Support ; Social Protections and Assistance ; Social Protections and Labor
    Abstract: Crisis preparedness is cral to preventing shocks from becoming crises. Investments in ex ante preparedness are especially relevant in countries like Nepal that face high levels of exposure and vulnerability to a range of risks. In seeking to identify opportunities to strengthen the Government of Nepal's (GoN's) capacity to prepare for crisis events in an effective and timely manner, this Technical Annex presents findings from the application of the Crisis Preparedness Gap Analysis (CPGA) diagnostic in the country. It provides details on findings and entry points across the five componnts of crisis preparedness. For a summary, please refer to the accompanying CPGA Nepal Briefing Note. Following a brief description of the CPGA methodology, the Technical Annex presents a summary of findings from each CPGA component alongside identification of entry points and opportunities to strengthen crisis preparedness in the country. To provide a holistic assessment of preparedness, the CPGA focuses on five core components of crisis preparedness. These are (i) Legal and Institutional Foundations, (ii) Understanding and Monitoring Risks, (iii) FinancialPreparedness, (iv) Primary Response, and (v) Social and Livelihood Support
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Social Protection Study
    Keywords: Demographics ; Early Childhood Development ; Education ; Fetal and Maternal Health ; Food and Nutrition Policy ; Gender ; Gender and Poverty ; Government Financing ; Health, Nutrition and Population ; Human Capital ; Mortality ; Nutrition Services ; Pregnancy ; Social Protections and Assistance ; Social Protections and Labor
    Abstract: This Human Capital Review (HCR) report presents an in-depth analysis of human capital indicators throughout a person's lifetime, from in utero to productive aging. By examining the various stages of human capital accumulation, the report aims to provide accurate recommendations for specific groups in Sierra Leone. Thus, the report disaggregates data whenever possible. It relies on an extensive consultative process involving various stakeholders such as Government counterparts, development partners, teachers, adolescent girls, students, private sector representatives, and local representatives. The consultation process followed a Problem-Driven Iterative Adaptation (PDIA) approach, which facilitates the identification and resolution of problems by local leadership. In addition, this report aims to inform the design and implementation of human capital reforms that will respond to specific challenges identified in the report
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Aid Effectiveness ; Development Economics and Aid Effectiveness ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; World Bank Strategy
    Abstract: The Country Opinion Survey in Sao Tome and Principe assists the World Bank Group (WBG) in better understanding how stakeholders in Sao Tome and Principe perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Sao Tome and Principe on 1) their views regarding the general environment in Sao Tome and Principe; 2) their overall attitudes toward the WBG in Sao Tome and Principe; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Sao Tome and Principe; and 4) their perceptions of the WBG's future role in Sao Tome and Principe
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Development Economics and Aid Effectiveness ; Effectiveness ; Financial Aid ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Azerbaijan assists the World Bank Group (WBG) in better understanding how stakeholders in Azerbaijan perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Azerbaijan on 1) their views regarding the general environment in Azerbaijan; 2) their overall attitudes toward the WBG in Azerbaijan; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Azerbaijan; and 4) their perceptions of the WBG's future role in Azerbaijan
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Effectiveness ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; Stakeholder Engagement ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in the Kyrgyz Republic assists the World Bank Group (WBG) in better understanding how stakeholders in the Kyrgyz Republic perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in the Kyrgyz Republic on 1) their views regarding the general environment in the Kyrgyz Republic; 2) their overall attitudes toward the WBG in the Kyrgyz Republic; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in the Kyrgyz Republic; and 4) their perceptions of the WBG's future role in the Kyrgyz Republic
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource (178 pages)
    Series Statement: Women, Business and the Law
    Parallel Title: Erscheint auch als
    Keywords: Discrimination ; Domestic Violence ; Empowering Women ; Equal Rights ; Gender Disparities ; Gender Equality ; Gender Inequality ; Women ; Women's Rights
    Abstract: Women, Business and the Law 2024 is the 10th in a series of annual studies measuring the enabling conditions that affect women's economic opportunity in 190 economies. To present a more complete picture of the global environment that enables women's socioeconomic participation, this year Women, Business and the Law introduces two new indicators--Safety and Childcare--and presents findings on the implementation gap between laws (de jure) and how they function in practice (de facto). This study presents three indexes: (1) legal frameworks, (2) supportive frameworks (policies, institutions, services, data, budget, and access to justice), and (3) expert opinions on women's rights in practice in the areas measured. The study's 10 indicators--Safety, Mobility, Workplace, Pay, Marriage, Parenthood, Childcare, Entrepreneurship, Assets, and Pension--are structured around the different stages of a woman's working life. Findings from this new research can inform policy discussions to ensure women's full and equal participation in the economy. The indicators build evidence of the critical relationship between legal gender equality and women's employment and entrepreneurship. Data in Women, Business and the Law 2024 are current as of October 1, 2023. wbl.worldbank.org
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Development Economics and Aid Effectiveness ; Effectiveness ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; Stakeholder Engagement ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Fiji assists the World Bank Group (WBG) in better understanding how stakeholders in Fiji perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Fiji on 1) their views regarding the general environment in Fiji; 2) their overall attitudes toward the WBG in Fiji; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Fiji; and 4) their perceptions of the WBG's future role in Fiji
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: IEG Independent Evaluations and Annual Reviews
    Keywords: Adaptation To Climate Change ; Economic Growth ; Environment ; Gender ; Gender and Development ; Gender and Law ; Gender Based Violence ; Gender Equality ; Macroeconomics and Economic Growth ; Nonextractive Sectors ; Resilience
    Abstract: Papua New Guinea has abundant resources in the form of oil and mineral wealth. But a complex set of factors, including systemic gender inequality, underinvestment in non-extractive sectors, and fragility compounded by vulnerability to disasters caused by natural hazards act as barriers to sustainable and inclusive growth of the country. This Country Program Evaluation (CPE) report assesses the relevance and effectiveness of World Bank Group support to Papua New Guinea between fiscal year FY08 and FY23. It assesses the Bank Group's development effectiveness in addressing the above three core themes, namely: (i) lack of investment in Papua New Guinea's non-extractive sectors and their poor performance, (ii) the economic exclusion of women and gender-based violence (GBV) issues associated with it, and (iii) unmitigated risks of disaster from natural hazards, and violence, and conflict. The report answers three specific questions. The first explores the extent to which the Bank Group adapted its engagement in line with key constraints, including in relation to development partners, changes in country context, and lessons from experience. The second focuses on the results of Bank Group support and explanatory factors for results under each them, answered by applying a gender lens where relevant. The third question explores the extent to which the Bank Group successfully identified and addressed conflict, violence, and disaster from natural hazards risks. The report offers key lessons to inform the World Bank Group's future engagement with the country: (i) Data gaps need to be addressed to inform sound policy making and effective programming in Papua New Guinea. (ii) Declining governance quality and increasing bilateral aid will require the World Bank to reassess how it supports key policy reforms to achieve development impact, including through using DPOs. (iii) The Bank Group could elevate its impact on gender equality and GBV by shifting from a project-centric approach to a strategic country engagement approach. (iv) The negative effects that compound and interrelated risks pose to achieving development aims need to be addressed more comprehensively
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835885321 , 1835885322
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to Linux, the powerful operating system that powers most servers and embedded systems worldwide. We explore the significance of Linux in today's tech-driven world, highlighting its use in everything from mobile phones to supercomputers. The journey continues with a deep dive into open-source software, illustrating how it fosters innovation and collaboration in the tech community. The course focuses on the Linux family tree, detailing the relationships and differences between distributions such as Debian, Ubuntu, RHEL, and CentOS. This section is vital for understanding the landscape of Linux distributions and selecting the right one for your needs. We also cover essential considerations for selecting compatible hardware, ensuring you can build or choose a system that runs Linux flawlessly. The course wraps up with practical skills, including installing Ubuntu and CentOS, using productivity suites, and navigating the Linux filesystem. You'll learn the basics of the terminal and shell, discover how to install software across different distributions, and manage user accounts and permissions. These skills are crucial for anyone looking to thrive in a tech environment powered by Linux.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835889046 , 1835889042
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the installation and configuration of the BIND DNS server, moving on to the intricacies of creating forward and reverse lookup zones, which are pivotal for network navigation and management. It emphasizes the critical role DNS plays in network infrastructure, detailing troubleshooting techniques and ways to enhance mail server support through DNS configurations. It continues with securing BIND using DNSSEC, ensuring data integrity and authentication across the network. The course focuses on web server deployment and management, starting with Apache, which includes virtual server configuration, SSL encryption, and URL redirection, before transitioning to the Squid proxy server setup, user authentication, and access restrictions. It also covers Nginx for web serving and reverse proxy applications, highlighting its flexibility and efficiency. The course wraps up with an exploration of network file sharing and server management using Samba and NFS, DHCP server configuration, OpenLDAP for authentication, Postfix for SMTP services, and secure communications with OpenVPN and SSH. Additionally, it touches on firewall management with iptables, FTP server setup, and the importance of Fail2ban for security.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835887042 , 183588704X
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Linux ; Computer networks Security measures ; Client/server computing ; Web servers ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Architecture client-serveur (Informatique) ; Serveurs Web ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883440 , 1835883443
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a critical look at password security, emphasizing the importance of robust credentials in protecting personal and professional data. Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. You'll learn the importance of being careful about who you trust online. Next, the course covers how to protect your computers and devices from being physically broken into. It also talks about the right way to get rid of old data so that nobody else can find it. This part is all about keeping your stuff safe in the real world. The course also looks at safe and unsafe networks. You'll learn how to check if a network is secure and what to do when using a risky one. Finally, the course dives into malicious software or malware. You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security. What you will learn Secure passwords with best practices Conduct safe data disposal protocols Navigate networks with safety measures Identify various forms of malicious software Apply defenses against software threats Adopt proactive cyber hygiene habits Audience This course is ideal for individuals looking to bolster their digital security acumen. Tailored for users who wish to protect their online presence against evolving cybersecurity threats. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885925 , 1835885926
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Artificial intelligence ; Computer programming ; Chatbots ; Application program interfaces (Computer software) ; Python (Computer program language) ; Intelligence artificielle ; Programmation (Informatique) ; Interfaces de programmation d'applications ; Python (Langage de programmation) ; artificial intelligence ; computer programming ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This comprehensive masterclass takes you on a transformative journey into the realm of LangChain and Large Language Models, equipping you with the skills to build autonomous AI tools. Starting with the basics, you'll set up your development environment, including OpenAI API and Python, and progress to advanced topics like LangChain's architecture, prompt templates, and parsers. The course meticulously guides you through creating complex chains, memory models, and agents, culminating in the development of practical applications such as PDF extractors, newsletter generators, and multi-document chatbots. With hands-on tutorials, you'll learn to leverage LangChain for tasks ranging from document loading and splitting to embedding vector stores for semantic similarity searches. By the end, you'll have the knowledge to implement AI in creative and impactful ways, from image-to-text conversion to building interactive chatbots and more, all while navigating the ethical considerations of AI deployment. What you will learn Configure OpenAI API and Python for AI development Create and manipulate LangChain prompt templates and parsers Implement LangChain memory models and chains for complex AI applications Develop real-world applications, including newsletter generators and chatbots Work with LangChain embeddings and vector stores for semantic searches Navigate the ethical and copyright implications of AI-generated content Audience This course is designed for a broad audience interested in artificial intelligence, from data scientists enhancing projects with AI and LangChain, to product managers boosting user experience with AI features. AI enthusiasts, tech innovators, and programmers will deepen their understanding of LangChain, unlocking new opportunities in AI-driven development and pioneering next-gen solutions. While specific knowledge of Python is not necessary, familiarity with programming concepts is essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9781800563940 , 1800563949
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Sécurité informatique ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. It unpacks the significance of GDPR for businesses and individuals, emphasizing the importance of compliance in today's data-driven world. By dissecting the regulation piece by piece, the course offers clear, accessible insights into its complexities. The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. This structured approach demystifies each component, making it easier to understand how GDPR affects various aspects of data handling and privacy. The course wraps up by addressing the crucial elements of accountability and governance, preparing you to implement GDPR-compliant strategies within your organization. Through this journey, you will gain the knowledge and tools necessary to navigate the requirements of GDPR, ensuring your business or organization not only complies with the regulation but also upholds the highest standards of data protection. What you will learn Understand GDPR's core principles Navigate GDPR compliance requirements Manage data breaches and notifications Enhance data protection and privacy Handle cross-border data transfers Apply GDPR in organizational contexts Audience This course is ideal for data protection officers, compliance managers, IT professionals, and legal advisors. Basic knowledge of data protection laws is beneficial. Perfect for those looking to ensure GDPR compliance within their organizations. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463376 , 1835463371
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with foundational security principles, introducing you to the landscape of digital threats, vulnerabilities, and the mechanisms behind cyber exploits. It delves into the importance of understanding and mitigating risks to minimize their impact on organizations and individuals. The course focuses on both the human and technical aspects of security, ranging from social engineering and physical security measures to the intricacies of browser and wireless security. It emphasizes the criticality of robust user authentication methods, comprehensive permissions, and stringent password policies to fortify defenses against unauthorized access. The course wraps up by exploring advanced concepts such as encryption, secure protocols, and network isolation, equipping you with the knowledge to implement effective security strategies and solutions. Throughout this journey, you'll gain insights into the significance of each topic in protecting information assets and ensuring the integrity of digital environments. What you will learn Understand core security principles Identify and mitigate digital risks Combat social engineering tactics Implement strong password policies Secure networks with firewalls Protect against malware threats Audience This course is ideal for IT professionals, system administrators, and cybersecurity enthusiasts seeking to bolster their knowledge of digital defense mechanisms. A fundamental understanding of computer networks and internet functionality is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883020 , 1835883028
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an essential overview, preparing you to dive into the world of Blender with a focus on lighting and compositing fundamentals. It progresses to cover lighting basics, where you'll learn to manipulate area, point, spot, and sunlight sources, and understand their properties for creating mood and atmosphere. The course focuses on Blender's Eevee renderer to teach ambient occlusion, bloom effects, and real-time rendering options, enhancing the visual fidelity of your projects. Advanced lessons explore techniques for reducing render times, exploring HDRI skybox lighting, and achieving stylistic effects with cell shading. The course wraps up with practical applications in night scene lighting, professional 3-point setups, interior and studio lighting configurations, and the intricacies of 3D environment presentation. By the end, you'll be equipped to add depth, realism, and emotion to your 3D scenes through proficient lighting and compositing. What you will learn Apply HDRI skyboxes for environmental lighting Utilize Eevee renderer for ambient and bloom effects Accelerate Blender render times efficiently Implement cell shading with Freestyle Light night scenes and create volumetric fog Set up professional 3-point lighting Audience This course is ideal for beginners and hobbyists eager to delve into 3D art, with a focus on lighting and compositing. No prior knowledge of Blender is required, making this course perfect for those new to 3D modeling and looking to enhance their visual storytelling skills. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886267 , 1835886264
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an engaging introduction to Blender and its pivotal role in asset management, laying the groundwork for aspiring 3D artists to navigate the complexities of digital modeling. From the outset, learners are immersed in the Blender Basics Overview, accompanied by a rich Resource Pack, to swiftly get up to speed with the software's capabilities. Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. The course continues through the nuances of creating detailed 3D environments, leveraging greyboxing techniques, and applying lifelike textures and materials to bring scenes to life. Special emphasis is placed on generating creative references using AI, crafting natural elements with geometry nodes, and designing intricate architectural features that stand out in any portfolio. As the course progresses, learners delve into advanced modeling, lighting, and the art of texture application, culminating in a segment dedicated to rendering techniques that showcase their projects in the best light. By the end, participants are not just proficient in Blender; they are equipped with a holistic view of 3D design, enabling them to bring their creative visions to fruition. What you will learn Navigate Blender's interface and tools Create efficient asset management workflows Design 3D environments with advanced greyboxing Apply textures and materials for realism Construct architectural elements in Blender Model and texture dynamic 3D foliage Audience This course is ideal for 3D artists, designers, and enthusiasts looking to enhance their Blender skills. Prior basic knowledge of 3D concepts is helpful but not required. This course is perfect for those seeking to create professional 3D models and environments. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835883600 , 1835883605
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 1 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Computer science ; Systèmes d'exploitation (Ordinateurs) ; Informatique ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Linux, offering insights into its importance and widespread use in today's tech-driven world. You'll learn why Linux is the backbone of many servers, devices, and systems, and how its open-source nature fosters innovation and customization. The course focuses on choosing a Linux distribution, guiding you through the myriad of options available and helping you select the one that best fits your needs. This segment is crucial for understanding the diversity within the Linux ecosystem and how it caters to different user preferences and requirements. Next, we delve into choosing a desktop environment, emphasizing the significance of the user interface in your day-to-day interaction with Linux. You'll explore popular desktop environments, their features, and how to select one that aligns with your usability and aesthetic preferences. The course wraps up with a detailed walkthrough on installing software on Linux, covering various package managers and installation methods. This section is designed to equip you with the skills to extend the functionality of your Linux system and customize it to your liking.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835887660 , 183588766X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Internet of things ; Embedded Internet devices ; Computer networks Security measures ; Tests d'intrusion ; Internet des objets ; Internet intégré ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888148 , 1835888143
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Service-oriented architecture (Computer science) ; Architecture logicielle ; Architecture orientée service (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Docker, the pivotal tool in container technology, with our Docker Mastery course. Designed for beginners, this course guides you through the essentials of Docker, explaining its importance and how it revolutionizes deployment processes. Starting with an introduction to Docker and its ecosystem, you'll understand why Docker is a game-changer in software development and deployment. You'll set up your development environment, master Docker fundamentals through hands-on exercises, and learn to manage containers efficiently. The course progresses to more complex topics like Dockerfile, image publishing, Docker layers, caching, and Docker Compose for multi-tier applications. With a special focus on CI/CD using Docker, GitHub Actions, and AWS Elastic Beanstalk, you'll gain the skills to automate your deployment workflows, ensuring faster and more reliable releases. By the end, you'll have a solid foundation in Docker, ready to tackle real-world challenges and streamline your development pipeline. What you will learn Setup and manage your Docker development environment Run, stop, and manage containers and images efficiently Optimize Dockerfile for effective image creation and management Publish Docker images and explore Docker layers and caching Develop CI/CD pipelines with Docker, GitHub Actions, and AWS Deploy complex web applications using Docker Compose Audience This course targets aspiring DevOps professionals, software developers, system administrators, IT managers, QA engineers, and technology enthusiasts. Ideal for those aiming to refine development workflows, enhance application portability, and ensure project consistency using Docker. It's perfect for individuals responsible for efficient app deployment, scaling, and management, as well as QA professionals looking to improve testing accuracy. No Docker experience required; some programming knowledge preferred but not essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835460429 , 1835460429
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Begin your 3D modeling journey with Blender, starting from the basics of setting up projects and creating grey boxes to organizing work with collections. Learn the intricacies of seams, sharps, and UV mapping, essential for effective texturing. The course progresses to scene optimization and asset management, followed by an exploration of materials, shaders, and advanced mesh editing techniques, including proportional editing and the use of Booleans. Dive deeper into refining skills with texturing, structural elements, and the art of adding Viking details. Transition your creations to Unreal Engine 5, where you'll set up scenes, integrate assets, and apply advanced materials for realistic environments. This course, designed for beginners ready to advance their skills, combines detailed instruction with project-based learning, preparing you for a career in 3D modeling and game development. From Blender's fundamentals to UE5's dynamic environment, unlock your creative potential and bring your digital worlds to life. What you will learn Utilize UV mapping for texture perfection Optimize 3D scenes for efficiency Craft materials and unique shaders Employ advanced mesh editing techniques Transition assets from Blender to UE5 Finalize scenes with professional lighting Audience This course is ideal for aspiring 3D artists and game developers with a keen interest in environment design. No prior experience is needed, making it perfect for beginners ready to dive into the world of 3D modeling and scene creation. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837633074 , 183763307X
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the foundational elements of Linux Shell Scripting, guiding you through basic script building and the use of variables to automate repetitive tasks efficiently. As the course progresses, it focuses on more complex concepts such as redirection, arithmetic operations, and conditional statements, enhancing your scripting skills for real-world applications. Through practical examples, you'll learn how to craft scripts that solve problems, automate tasks, and streamline your workflow. The course wraps up by delving into advanced topics such as loops, user input handling, and script control, equipping you with the knowledge to write sophisticated scripts. By the end of this course, you'll have a solid understanding of Linux Shell Scripting, enabling you to leverage its capabilities to optimize and automate your Linux environment. What you will learn Craft basic to advanced shell scripts Automate tasks using shell scripts Implement conditional logic in scripts Create loops for repetitive tasks Control script flow and execution Optimize Linux tasks through scripting Audience This course is ideal for IT professionals, system administrators, and developers looking to automate and optimize their Linux environments. Basic knowledge of Linux commands is required. Perfect for those aiming to enhance their scripting skills for efficiency. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835466124 , 1835466125
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Hacking ; Tests d'intrusion ; Piratage informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the groundwork with breach scanning and enumeration, guiding learners through identifying vulnerabilities in network systems and web applications. It covers techniques such as Web App Enumeration, HTTPS analysis with Wireshark and Burp Suite, and POP3 Enumeration, setting the stage for deeper exploration into cybersecurity defenses. The course focuses on practical application, moving from theoretical concepts to real-world hacking techniques. Learners will navigate through gaining access, exploiting systems, and executing privilege escalations both horizontally and vertically. Scenarios involving systems like GoldenEye, Bob, and Straylight offer hands-on experience, emphasizing the attacker's perspective to fortify defense mechanisms. The course wraps up with advanced topics in exploit development and real-world applications, challenging learners to apply their knowledge in complex environments. From scanning and enumeration to gaining access and privilege escalation, learners will develop a solid foundation in hacking techniques and cybersecurity defense. This course not only equips technical professionals with essential skills but also empowers them to think like a hacker, a vital perspective in today's digital world. What you will learn Conduct breach scans and enumerations Analyze HTTPS traffic for vulnerabilities Utilize Burp Suite for web app security testing Execute horizontal and vertical privilege escalations Escape restricted shells for full system access Implement advanced server and client protection strategies Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers looking to deepen their understanding of hacking techniques and security defenses. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886465 , 1835886469
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Information Systems Audit and Control Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to the context of IT risk management, laying the foundation with key concepts and illustrating the vital role of IT risk management in shaping business strategy. The course progresses to elucidate the RACI Chart, essential roles concerning risk, and the influence of organizational structure and culture on risk management practices. It focuses on developing a solid understanding of risk management principles, processes, and controls, and delves into the relationship between IT risk and other business functions. It also addresses project risk, change risk, and the nuances of people and technology in the risk landscape. The course wraps up with practical insights into implementing controls, testing their effectiveness, and deploying risk response plans, all while emphasizing the value of risk communication and the importance of policies, standards, and procedures. What you will learn Grasp IT risk management fundamentals Navigate RACI charts and risk roles Assess organizational risk impact Communicate risk effectively Develop risk scenarios and responses Utilize key risk assessment tools Audience This course is ideal for IT professionals aiming to bolster their risk management skills. Knowledge of basic IT concepts is recommended. Perfect for those prepping for CRISC certification or seeking to align IT strategies with business objectives for robust security management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on chrmodern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885703 , 1835885705
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the fundamentals of penetration testing, distinguishing the roles of pentesters - the good, the essential, and the challenges they face. It lays the groundwork with pre-engagement essentials, including data security agreements and crafting a detailed Statement of Work (SOW), ensuring clarity and legal safeguarding before any testing begins. The course focuses on the pentesting methodology, guiding you through the stages of assessment from validating scope to reconnaissance, vulnerability scanning, and exploitation. It emphasizes the importance of maintaining access, covering tracks, and preparing comprehensive deliverables to ensure actionable insights for enhancing security. The course wraps up by exploring personal engagement toolkits and pentesting platforms, providing practical knowledge for effective pentesting. It also touches upon blue team pentesting, highlighting the collaborative effort required in cybersecurity to protect against threats. What you will learn Plan and execute effective penetration tests Perform detailed reconnaissance and vulnerability scans Exploit vulnerabilities to assess security posture Maintain unauthorized access discreetly Execute strategies to conceal testing activities Produce comprehensive security assessment reports Audience This course is ideal for IT professionals, cybersecurity enthusiasts, and ethical hackers seeking to enhance their pentesting skills. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Brad Stine: Brad Stine is the Chief Information Security Officer at Semper Sec with years of experience in security architecture. Throughout his career, Brad has played a key role in the development and delivery of technology-driven business solutions, including projects centered around cloud transformation, CI pipeline automation, and identity access management. Brad is highly skilled in Analytics, Incident Management, Vulnerability Management, ISO 27001:2013, and Enterprise Architecture. He has an extremely knowledgeable computer science background and holds a CISSP certification.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835467503 , 1835467504
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by laying a solid foundation with an overview of capacity planning, ensuring you understand how to measure and optimize system resources effectively. It then dives into the technicalities of monitoring CPU, memory, disk, and network activity, crucial for maintaining system health and performance. The course focuses on deepening your understanding of Linux's core, including kernel components, modules, and the intricacies of compiling a kernel. You'll learn how to monitor and manage the kernel for peak efficiency, alongside exploring systemd and SysV init systems for better process management. Additionally, system recovery techniques, fstab configuration, and managing swap partitions are thoroughly covered to ensure system resilience. The course wraps up with practical skills in managing storage solutions, network configurations, and troubleshooting, alongside essential system administration tasks such as installing programs from source and effective backup strategies.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462997 , 1835462995
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 55 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence Study guides Examinations ; Microsoft Azure (Computing platform) Study guides Examinations ; Intelligence artificielle ; Examens ; Guides de l'étudiant ; Microsoft Azure (Plateforme informatique) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Azure AI with our meticulously crafted video course, tailored to empower you with a thorough understanding of artificial intelligence fundamentals and its practical applications in the cloud. This course begins with an introduction to the AI-900 exam contents, guiding you through what to expect and how to prepare effectively. As you progress, you'll explore the distinctions between artificial intelligence, machine learning, and data science, and delve into common AI workloads, including machine learning and anomaly detection. The course also covers the application of AI within Microsoft Azure, addressing challenges, risks, and the principles of responsible AI use. Through detailed video content, you'll learn about Azure Machine Learning, Cognitive Services, and how to apply computer vision and natural language processing to solve real-world problems. The course culminates in practical advice on preparing for the AI-900 exam, featuring example questions and strategies for success. Whether you're a beginner or looking to solidify your knowledge, this course will take you on a journey from foundational concepts to advanced applications, ensuring you're well-prepared for the AI-900 certification.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835886007 , 1835886000
    Language: English
    Pages: 1 online resource (1 video file (34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: UNIX Shells ; Computer networks Security measures ; Data encryption (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by introducing you to the fundamentals of SSH, the Secure Shell protocol that is crucial for secure remote administration and file transfers. You'll learn how to set up SSH on various operating systems, ensuring you have the foundational knowledge to build secure connections across networks. The course continues as we delve into the use of certificates with SSH, a pivotal skill for enhancing authentication processes and strengthening your network's security posture. By focusing on practical, real-world applications, this section demystifies the complexities of cryptographic keys and certificates. The course wraps up with advanced strategies for hardening SSH, providing you with the expertise to configure, manage, and troubleshoot SSH-enabled devices with an emphasis on security best practices. Through this comprehensive exploration, you'll emerge equipped to navigate the challenges of securing remote access and data communication in today's interconnected digital world.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835465462 , 1835465463
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7
    Keywords: Web site development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Dive into the freelancing world with this course that bridges the theoretical and practical aspects of web development. This course is designed for aspiring freelancers and seasoned developers looking to expand their skill set with hands-on, project-based learning. You will embark on a journey to build a fully functional website for a surfcamp, complete with an integrated, customizable blog and sign-up forms, using NextJS and Strapi. This course stands out by focusing on real-world projects, avoiding generic examples and diving deep into the synergy of NextJS and Strapi for a flexible design and seamless developer experience. Learn how to deliver websites to clients who lack coding skills, allowing them to update content directly, rivaling the convenience of platforms like WordPress, Squarespace, and Wix with the power of a Headless CMS. From design to deployment, you will transform Figma designs into live sites, mastering the art of a seamless design-to-development workflow. With over 12 hours of content, the curriculum introduces new concepts at a comfortable pace, ensuring a comprehensive understanding of each element.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835883525 , 1835883524
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 42 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins by introducing you to the basics of terminals and shells, laying a solid foundation for command line proficiency. It methodically progresses through executing commands, offering three parts to ensure a thorough grasp of command functionalities and nuances. The course focuses on enhancing your Linux skills further with detailed explanations on filesystem management, permissions, and file editing with Vi, ensuring you can navigate and manipulate the Linux environment with ease. It covers essential topics such as finding files, managing processes, and executing scripts, providing you with the tools needed to optimize and automate your Linux tasks. The course wraps up by delving into advanced programming constructs, presented in two comprehensive parts to solidify your scripting and automation capabilities. Each section is designed to build on the previous, ensuring a seamless learning curve from beginner to advanced techniques. By the end of this course, you will have learned the art of leveraging Linux for powerful, efficient computing, making you an invaluable asset in tech-driven environments.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Financial Sector Study
    Keywords: Equity ; Fiscal and Monetary Policy ; Fiscal Interventions ; Fiscal Policy ; Macroeconomics and Economic Growth ; Policy Reforms
    Abstract: The Lao People's Democratic Republic (Laos) is facing economic challenges. The country is experiencing a growth slowdown with high levels of public debt. Growing current expenditure and debt service obligations amid sluggish tax revenue led to a widening fiscal deficit in the early 2010s, which remained high into the 2020s despite fiscal consolidation efforts. COVID-19 and deteriorating macroeconomic conditions have disrupted human capital investment and are expected to have worsened the incidence of poverty and inequality. Fiscal policy can be an instrument to address these challenges, but its role has been constrained by a precarious fiscal position. This report analyzes the distributive effects of the Lao fiscal system and potential reforms to address current economic challenges. The analysis adopts the Commitment to Equity (CEQ) methodology to assess the distributional impact of the Lao fiscal system on household welfare. The methodology disaggregates income to include or exclude fiscal interventions to analyze the impact of the fiscal system and each intervention on poverty and inequality. Fiscal interventions can be classified into three categories according to how they are imposed on households: direct interventions (direct taxes, social security contributions, and cash transfers), indirect interventions (indirect taxes and subsidies), and in-kind interventions (public health and education). The framework assesses how progressive a fiscal system and each fiscal intervention are and measures their impacts on poverty and inequality
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource (210 pages)
    Series Statement: International Debt Report
    Parallel Title: Erscheint auch als
    Keywords: Bonds ; Creditor ; Data ; Debt ; Debtor ; Developing ; Development ; Economic ; FDI ; Finance ; Foreign Direct Investment ; Government ; Interest Payments ; Interest Rates ; Loans ; Maturity ; Principal ; Private Sector ; Public Sector ; Statistics
    Abstract: The International Debt Report (IDR) is a longstanding annual publication of the World Bank featuring external debt statistics and analysis for the 122 countries that report to the World Bank Debtor Reporting System. IDR 2023 is the 50th annual edition and includes (1) analyses of external debt stocks and flows as of end-2022 for these countries; (2) the macroeconomic and debt outlook for 2023 and beyond; (3) a focus on improved public debt transparency and the quality of debt reporting; (4) a discussion of the need for innovative approaches to debt management; (5) a commentary on how the International Debt Statistics database serves as an indispensable resource for researchers and policy makers; and (6) a one-page snapshot of relevant debt indicators and summary of debt stocks and flows for six years (2010 and 2018-22) for each country, plus global income group and regional aggregates. Unique in its coverage of the important trends and issues fundamental to the financing of low- and middle-income countries, IDR 2023 is an indispensable resource for governments, economists, investors, financial consultants, academics, bankers, and the entire development community. For more information on IDR 2023 and related products, please visit the World Bank's Debt Statistics website at www.worldbank.org/debtstatistics
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Risk and Vulnerability Assessment
    Keywords: Conflict and Development ; Damages ; Earthquake ; Environment ; Grade Methodology ; Herat Province ; Natural Disasters
    Abstract: Following the Herat province (Western Afghanistan) earthquake sequence of October 7 to 15, 2023, the World Bank carried out a remote desk-based assessment of the physical damages using the Global RApid post-disaster Damage Estimation (GRADE) methodology. The objective of the assessment is to develop a model-based estimate of the direct physical (economic) damages to residential buildings (houses), non-residential buildings (e.g., education, health, worship, commercial, industrial assets) and infrastructure (e.g., transport, power, water, telecommunications), and to evaluate the spatial distribution of damages in order to support the development of a roadmap for recovery and reconstruction. This report summarizes the key findings of the assessment
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Energy Study
    Keywords: Anchoring and Mooring ; Energy ; Energy Resources Development ; Energy Yield ; Environment ; Environment and Energy Efficiency ; Floating Solar Photovoltaics ; FSPV Ecosystem ; HSE ; Inverter ; Power Plants
    Abstract: This report builds a compelling case for India to look beyond land and institute an ecosystem that supports the installation and operationalization of floating solar photovoltaics (FSPV) power plants. Since these plants are installed on the underutilized surfaces of large water bodies, no land needs to be diverted from other uses. The installation of FSPVs also spurs job creation and catalyzes the development of a domestic value chain as some of the components, such as floaters, need to bemanufactured close to installation sites. They also provide a range of other benefits as they generate relatively more power than ground-mounted solar plants (due to the cooling effect of water) and better utilize shared infrastructure such as transmission systems, wherever available
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888766 , 1835888763
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a detailed walkthrough of installing Red Hat Enterprise Linux 8, setting the stage for comprehensive learning. It progresses to cover essential concepts such as effective console usage, managing software updates, and handling software repositories. The course also introduces systemd, automation through Kickstart, and the intricacies of building a Kickstart image for streamlined deployments. The course delves into the critical aspects of network management, including configuring Network Manager CLI, Network Time Protocol, and setting up NFS servers and clients. An in-depth exploration of the file system hierarchy is provided, guiding you through selecting and creating robust file systems and managing volumes using the Logical Volume Manager (LVM). You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. The course also covers important tools like the Automatic Bug Reporting Tool and SOS Reports for effective system analysis. Towards the end, the course focuses on performance and log monitoring, providing insights into running and managing virtual machines on RHEL. This comprehensive course equips you with the knowledge and skills to confidently manage and secure Red Hat Enterprise Linux 8 environments, preparing you for advanced roles in system administration. What you will learn Learn to install and configure Red Hat Enterprise Linux 8 Create and modify LVM volumes effectively Implement security protocols and firewalld Secure systems with SELinux and SSH Monitor system performance and logs Run and manage virtual machines on RHEL Audience This course is ideal for IT professionals, system administrators, and technicians keen on enhancing their skills in Linux administration. Familiarity with basic Linux commands and networking concepts is beneficial. This course is suited for those looking to proficiently manage and secure Red Hat Enterprise Linux systems. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: ACI Learning, Don Pezet, Zachary Memos, instructors. - Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880784 , 1835880789
    Language: English
    Pages: 1 online resource (1 video file (39 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881668 , 1835881661
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course provides a comprehensive exploration of Cisco Firewall and IPS systems, optimized for deployment within the AWS ecosystem. It commences with a foundational overview, catering to both novices and seasoned professionals. Beginning with AWS Virtual Private Cloud (VPC) configuration, you'll establish the foundation for building secure network infrastructures. The course then focuses on deploying the Firepower Management Center virtual (FMCv), a pivotal component for effective security policy management and monitoring. You'll master the Next-Generation Firewall virtual (NGFWv) deployment within AWS, bolstering your ability to safeguard networks against evolving cyber threats. Hands-on labs and practical exercises are integrated to impart real-world skills in configuring, troubleshooting, and securing Cisco Firewall and IPS systems. You'll gain expertise in risk management, report generation, and effective troubleshooting techniques. By course completion, you'll be well-prepared for Cisco CCNP Security SNCF (Exam 300-710), poised to excel in the realm of cybersecurity. What you will learn Configure AWS VPC for Cisco Firewall and IPS systems Deploy and manage FMCv and NGFWv in AWS Implement NGFW Routed and Transparent modes Explore multi-instance deployments and clustering Troubleshoot using CLI/GUI and perform packet capture Enhance security with Cisco AMP and other integrations Audience This course is ideal for cybersecurity professionals and network administrators looking to advance their skills in Cisco Firewall and IPS systems. A basic understanding of networking concepts and AWS is preferred. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883907 , 1835883907
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Artificial intelligence ; Apprentissage automatique ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is an innovative course tailored for those who aspire to master the dynamic fields of computer vision and generative artificial intelligence. This course offers a deep dive into the world of image recognition, object detection, and the magic of generative AI using tools like KerasCV, Python, TensorFlow, PyTorch, and JAX. This course guides you from the fundamentals of image classification to the intricacies of object detection, starting with the KerasCV library for deep learning. You'll learn to effectively use and fine-tune pre-trained models, create custom datasets for object detection, using tools like the LabelImg GUI program, and apply these skills to tackle real-world challenges. A key focus is the generative AI segment, particularly on Stable Diffusion, where you'll learn to generate detailed images from text, unlocking your creative potential in this advanced AI domain. This course offers a progressive learning path from basic concepts to advanced techniques, catering to both professional development and creative pursuits in AI. By the end, you'll have the confidence and tools needed for a variety of applications in the ever-evolving field of generative artificial intelligence. What you will learn Harness the power of the KerasCV library for efficient deep learning Master image classification techniques using pre-trained models Implement object detection in real-world scenarios Fine-tune models for tailored applications and datasets Create custom object detection datasets with LabelImg Understand the integration of TensorFlow, PyTorch, and JAX in computer vision Audience This course is ideal for individuals ranging from beginners to advanced learners who possess a fundamental understanding of machine learning and Python programming. It is especially beneficial for those keen on delving into the realm of computer vision using KerasCV. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883341 , 1835883346
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer software developers Certification ; Computer software Study guides Development ; Examinations ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with setting up essential development and virtualization tools on both Linux and Windows, laying the groundwork for efficient network development. You'll delve into various data formats like JSON, XML, and YAML, essential for modern software development and API interactions. As the course progresses, it explores software development methodologies, including Agile, Lean, and Waterfall, providing insights into choosing the right approach for your projects. You'll also gain a solid understanding of software quality, code organization, and version control, with a focus on Git basics for both local and remote management. The course emphasizes practical applications of these skills in real-world scenarios, from API basics to managing application infrastructure and security. The course wraps up by immersing you into the world of DevOps, including Docker and Bash basics, unit testing, and automated testing strategies, complemented by hands-on experience in configuring devices with Bash, Python, and Ansible. You'll also navigate through key networking concepts, IP services, and platform capabilities, culminating with Python scripting using a Cisco SDK. What you will learn Understand Agile, Lean, and Waterfall methodologies Learn Git basics and version control Grasp API usage and application infrastructure Dive into Docker and Bash essentials Configure devices using Python and Ansible Navigate through networking basics and IP services Audience This course is ideal for IT professionals and network enthusiasts seeking to enhance their skills in network development and automation. Familiarity with basic networking and programming concepts is beneficial. Perfect for those aiming to acquire Cisco DevNet Associate certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886281 , 1835886280
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Scrum (Computer software development) ; Agile software development ; Continuous improvement process ; Scrum (Développement de logiciels) ; Méthodes agiles (Développement de logiciels) ; Amélioration continue ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a comprehensive journey into Scrum and Agile project management in our course. Starting with foundational principles, we move on to advanced concepts, guiding you through effective project management with Scrum. Furthermore, gain insights into orchestrating Scrum Teams, exploring the nuances of running projects with Scrum, and understanding key Scrum concepts. Moving on, you will immerse yourself in the dynamic flow of Scrum Events and equip your toolkit with essential platforms using our Scrum Toolkit series. Next up, explore popular tools such as Jira, Microsoft Teams, Microsoft Planner, and the newly introduced Trello. Stay ahead with the latest trends by incorporating ChatGPT into Scrum Teams for optimization and productivity, a cutting-edge dimension unveiled in our course. As you progress through the course, witness Scrum in practice, honing your skills through practical applications. With high-quality video lectures, downloadable handouts for quick reference, and engaging quizzes, this course provides a dynamic and interactive educational experience. By the end of the course, you will have a solid grasp of Scrum and Agile project management. You will be well-versed in the Scrum culture, proficient in managing projects using Scrum methodologies, and skilled in running projects with Scrum Teams. What you will learn Learn to apply Scrum for project success Explore how to deliver business value through Scrum Accelerate project delivery by understanding Scrum Master diverse Scrum concepts for effective implementation Explore proficiency in utilizing Scrum tools Understand the depth of Scrum values, principles, and pillars Audience This course is tailored for diverse audiences, including beginners exploring Scrum and those seeking certification. Ideal for project managers, developers, business analysts, architects, designers, and managers, it covers foundational to advanced Scrum concepts. Whether you are starting your Scrum journey or aiming to enhance existing skills, this course provides valuable, concise, and flexible learning experiences for successful Scrum adoption in various professional roles. About the Author YESI EDUCATION: Mauricio Rubio Parra is an Agile Guru and the founder of YESI EDUCATION. In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. YESI EDUCATION is a global online education business with over 100 products that reach more than half a million students in over 200 countries. Their portfolio of products includes online courses, eBooks, audiobooks, newsletters, apps, podcasts, and other educational resources such as templates. YESI is formally incorporated and headquartered in Sydney, Australia, and has three main divisions: education, property and invest. YESI, founded in 2016, has a strong focus on passive income generation and wealth creation. The company constantly explores new revenue streams, disruptive and innovative technologies as well as investment opportunities and new products within its three divisions.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889749 , 1835889743
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886649 , 1835886647
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Computer science Mathematics ; Apprentissage automatique ; Informatique ; Mathématiques ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course starts with an introduction to the key concepts and outlines the roadmap to success in the field. You'll begin by understanding the foundational elements of matrix and vector derivatives, exploring topics like linear and quadratic forms, chain rules in matrix form, and the derivative of determinants. Each concept is reinforced with exercises, ranging from quadratic challenges to least squares and Gaussian methods. The course progresses into optimization techniques essential in data science and machine learning. Delve into multi-dimensional second derivative tests, gradient descent in one and multiple dimensions, and Newton's method, including practical exercises in Newton's Method for least squares. An additional focus is set on setting up your environment, where you'll learn to establish an Anaconda environment and install crucial tools like Numpy, Scipy, and TensorFlow. The course also addresses effective learning strategies, answering pivotal questions like the suitability of YouTube for learning calculus and the recommended order for taking courses in this field. As you journey through the course, you'll transition from foundational concepts to advanced applications, equipping yourself with the skills needed to excel in data science and machine learning. What you will learn Understand matrix and vector derivatives Master linear and quadratic forms Apply the chain rule in matrix calculus Solve optimization problems using gradient descent and Newton's method Set up the Anaconda environment for machine learning Install and use key libraries like Numpy and TensorFlow Develop effective strategies for learning calculus in data science Audience This course suits students and professionals eager to learn the math behind AI, Data Science, and Machine Learning, ideal for deepening knowledge in these advanced technology fields. Learners should have a basic knowledge of linear algebra, calculus, and Python programming to effectively understand matrix calculus. A keen interest and enthusiasm for exploring this intricate subject are also crucial for a fulfilling learning experience. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463444 , 1835463444
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: Web site development Computer programs ; Application software Development ; Python (Computer program language) ; Sites Web ; Systèmes-auteur ; Logiciels d'application ; Développement ; Python (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Next.js is a popular open-source JavaScript framework designed to make web development with React efficient and scalable. Next.js adds layers of abstraction to React and simplifies the process of building modern web applications. It provides a set of conventions and features that enhance the development experience, making it easier to create performant and SEO-friendly applications. This comprehensive Next.js course unfolds by beginning with an introduction to web development fundamentals, as it progresses through React basics, advanced Next.js concepts, and real-world deployment strategies. We will explore key topics such as server-side rendering (SSR), client-side rendering (CSR), static site generation (SSG), and incremental static regeneration (ISR). The course offers hands-on experience with a final project, covering everything from structuring applications to optimizing for performance and SEO. The modular format accommodates varying skill levels, ensuring a well-rounded and practical learning experience for all learners. Upon completion of this Next.js course, you will become proficient in web development fundamentals, React essentials, and advanced Next.js concepts. Through hands-on experience, master server-side rendering, client-side rendering, dynamic routing, and performance and scalability in real-world scenarios. What you will learn Master SSR, CSR, and SSG for optimized web development Explore React basics and advanced component development in Next.js Implement Next.js best practices for efficient and scalable web applications Learn to create dynamic routes for versatile content handling Deploy fully functional applications using Vercel and Git/GitHub workflows Enhance applications for search engines and social platforms through metadata and SEO practices Audience This Next.js course is tailored for a diverse audience, catering to both entry-level and seasoned developers. Ideal for junior developers, it provides a strong foundation in web development fundamentals, React basics, and advanced Next.js concepts. Intermediate developers can enhance their skills and gain mastery in the latest features of Next.js. Senior web developers seeking to stay updated with modern concepts will find valuable insights for optimizing web applications. No programming experience is required, but basic web development and JavaScript understanding is desirable for the course. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    ISBN: 9781835883549 , 1835883540
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This in-depth masterclass provides end-to-end coverage of developing enterprise-grade LLMs tailored to your unique use cases. Led by experts Maxime Labonne, Dennis Rothman, and Abi Aryan, this video delivers the advanced skills needed to architect performant LLMs that deliver real business impact. You'll learn how to make crucial architecture decisions, select optimal model types, configure hyperparameters, and curate quality training data. Discover professional techniques for pre-training, iterative fine-tuning, and rigorous model evaluation. The instructors reveal insider strategies to productionize your LLMs smoothly, monitor them proactively, and maintain optimal performance post-deployment. Following a structured curriculum spanning the complete LLM lifecycle, this masterclass empowers you with hands-on skills to build, refine, and deploy large language models with confidence. Turbocharge your generative AI initiatives and get the practical knowledge needed to create LLMs that solve complex challenges for your organization. What you will learn How to select the right LLM architecture for your use case Approaches for sourcing, cleaning, and labeling quality training data Pre-training methods and hyperparameter optimization Advanced fine-tuning techniques to boost performance Ways to thoroughly evaluate LLMs before deployment Best practices for monitoring, updating, and maintaining production LLMs Audience Data scientists, machine learning engineers, and AI developers seeking an in-depth understanding of large language model (LLM) development. This masterclass is designed for professionals aiming to build, optimize, and deploy enterprise-grade LLMs tailored to specific use cases, with a focus on practical skills and real business impact. About the Authors Maxime Labonne: Sr. Machine Learning Scientist, JPMorgan. Denis Rothman: Expert in AI Transformers including ChatGPT/GPT-4, Bestselling Author. Abi Aryan: ML Engineer and Author.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885543 , 1835885543
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management Examinations, questions, etc ; Project management Study guides Examinations ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Examens, questions, etc ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an insightful overview of PMI Agile Certified Practitioner (PMI-ACP), starting from the application process to exploring the dynamics of PMI Island for exam preparation. It provides a thorough understanding of the PMBOK Guide and compares predictive and adaptive methodologies, tracing the history of Agile and its basic concepts. The course then dives into various Agile methodologies, including Scrum, Extreme Programming, and Kanban, offering a detailed study of each. The course focuses on applying Agile principles in real-world scenarios. It emphasizes value-driven delivery, understanding business value, risk management in Agile projects, and Agile contracting methods. Learners gain insights into stakeholder engagement, adaptive leadership, and building high-performance teams. The course also covers adaptive planning, detecting and resolving problems in Agile environments, and continuous improvement techniques. The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. What you will learn Understand PMI-ACP exam structure and application Apply Agile principles in project management Prioritize tasks and manage risks in Agile Develop effective stakeholder engagement strategies Implement continuous improvement in Agile projects Prepare comprehensively for the PMI-ACP exam Audience The course is ideal for professionals aspiring to excel in Agile project management. Basic knowledge of project management practices is recommended. It's perfect for those seeking PMI-ACP certification and wanting to implement Agile methodologies in their projects. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835465578 , 1835465579
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: React (Electronic resource) ; Web site development ; Web applications Programming ; Sites Web ; Développement ; Applications Web ; Programmation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to the course, your gateway to mastering Recoil for React web development. Recoil, a powerful state management library by Facebook, revolutionizes app development with its simplicity and scalability. In this course, you will delve into Recoil's fundamentals, understanding why it's favored over Redux, and how it enhances React applications. Starting from scratch, you will learn to configure and use Recoil atoms and selectors, persist state data efficiently, and leverage advanced features like atom families. Embrace the transition from junior to senior developer by mastering Recoil's complexities, refining skills for scalable web and mobile applications, and acing declarative JavaScript solutions for interviews. Throughout the journey, you will build an app, progressing from the basics to advanced topics. Explore Recoil's nuances as we deep-dive into selector functionalities, state persistence mechanisms, and crafting performant logic for complex applications. By the end of this course, you will be equipped with a deep understanding of Recoil, confidently implementing scalable and high-performance state management in React applications. What you will learn Grasp Recoil's principles for popular state management Craft UI elements for better user interaction with Recoil Implement dynamic search filters with Recoil tools Persist data across sessions using recoil-persist Transition local to global state management through Recoil Build scalable state logic using advanced Recoil features Audience This course caters to a diverse audience, spanning junior to senior React developers eager to bolster their skill set. Beginners seeking a strong foundation in React and Recoil, intermediate developers aspiring to refine scalable code, and seasoned professionals keen on staying updated with modern industry requirements will all find immense value. Basic knowledge of JavaScript and React is recommended, but not mandatory, ensuring accessibility for learners at varying proficiency levels. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880760 , 1835880762
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.15/5
    Keywords: Risk management ; Information technology Security measures ; Gestion du risque ; Technologie de l'information ; Sécurité ; Mesures ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The NIST 800-37 Risk Management Framework is a set of guidelines and best practices developed by the National Institute of Standards and Technology to assist organizations in managing and mitigating information security risks effectively. It provides a structured approach to risk management, emphasizing continuous monitoring and a lifecycle process for securing information systems. The NIST 800-37 Risk Management Framework (RMF) guides organizations through a systematic risk management process. It begins with "Prepare" to establish context and allocate resources, followed by "Categorize" for classifying information systems. The subsequent steps include "Select Controls" to tailor security measures, "Implement Controls" to put them into practice, "Assess Controls" for effectiveness evaluation, "Authorize" for system approvals, and "Monitor" for continuous oversight and response to changes in the information system's environment. Upon completion, you will possess a clear understanding of the framework principles and components. Armed with this knowledge, navigate the risk management lifecycle with confidence. You will gain proficiency in identifying, assessing, and prioritizing risks, selecting and implementing security controls, and ensuring continuous monitoring and authorization aligned with industry best practices. What you will learn Understand core principles and significance of NIST 800-37 RMF Learn methodologies for risk identification and prioritization Choose and implement controls based on organizational risk Assess implemented controls and identify vulnerabilities Grasp the steps to grant system and information authorizations Integrate NIST 800-37 RMF with other compliance frameworks and standards Audience The course is tailored for cybersecurity professionals, including risk managers, information security officers, compliance officers, IT and security managers, and risk assessment professionals. Geared toward individuals with a foundational knowledge of cybersecurity, the course equips you with skills to navigate the risk management lifecycle. You will gain proficiency in risk identification, assessment, and prioritization, and implementation of security controls. The course addresses RMF integration with compliance frameworks for those overseeing regulatory compliance within organizations. About the Author Alexander Oni: Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886069 , 183588606X
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a warm welcome and an overview of the PMP exam, setting the stage for an in-depth exploration of project management methodologies. It covers the three domains of project management and delves into various methodologies, including predictive, hybrid, and Agile. The course provides a comprehensive understanding of Agile, from its manifesto and values to detailed principles, along with insights into Agile planning and terminology. The course focuses on practical applications, including Agile estimating techniques, sprint planning, and understanding the project management environment. It also covers the primary skills of a project manager, balancing competing constraints, and the intricacies of project lifecycle and work authorization systems. The course goes beyond theory, delving into tools and techniques for building and leading a team, defining team ground rules, and engaging virtual teams. The course wraps up with extensive preparation for the PMP exam, including breaking down questions, understanding the PMI Code of Conduct, and insights into the application process. It equips you with the knowledge and skills to excel on exam day, setting a strong foundation for your career in project management. What you will learn Navigate the PMP exam overview and structure Understand Agile principles and methodologies Develop key project management skills and strategies Implement effective team building and leadership techniques Manage project scope, budget, and schedules proficiently Apply risk management and stakeholder engagement practices Audience The course is ideal for professionals seeking PMP certification or advancing their project management skills. A foundational understanding of project management principles is beneficial. This course is a perfect fit for those aiming to align with PMI standards and embrace various project management methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887080 , 1835887082
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/4
    Keywords: Computer software Testing ; Automation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing and comparing Cypress with Selenium, emphasizing Cypress's architectural advantages in automation. It guides you through tool installation across various operating systems and dives into Cypress's setup, test runner, and structure, laying a solid foundation for your journey in automation. Beyond setup, the course dives into Cypress automation, covering syntax, locator strategies, selector playground, CSS selectors, and XPath use. It enhances your grasp of Cypress commands, including chaining and handling child elements, and contrasts Cypress's asynchronous nature with synchronous operations, guiding you in promise handling. You'll explore Cypress assertions, including implicit, explicit, and common types used in testing. The course emphasizes interactive web UI elements, teaching interaction techniques with checkboxes, dropdowns, and mouseover events, and covers element list handling with loops and iterations. Additionally, learn to navigate through windows, tabs, popups, and frames, and address common challenges while building a strong framework. The course thoroughly covers the POM, environment variables, and experimental features. It also delves into API testing and automation, along with practical sessions on Git, GitHub, Jenkins, and advanced CSS selectors. What you will learn Understand Cypress architecture and how it compares with Selenium Understand the asynchronous nature of Cypress and handle promises Conduct both implicit and explicit assertions in testing Interact with web UI elements like checkboxes, dropdowns, and mouseover events Perform API automation with Cypress Integrate and manage Jenkins for continuous integration Audience Ideal for a wide range in software testing, this course benefits QA professionals and manual testers transitioning to automation, enhances skills, aids fresh graduates in software engineering, and offers QA Team leads and Managers insights into automation tools and best practices. Perfect for all levels in the QA and testing field. No prior automation or coding experience required; course suitable for beginners with JavaScript concepts included. Requires only a Windows/MAC computer and a browser (Firefox or Chrome). About the Author Let's Kode It : Let's Kode It is here with a mission to teach everyone a new skill--doing what they have always wanted to do. They are a group of software professionals with more than 10 years of expertise in different areas of software industries and working as team leads in multinational companies. All their instructors have master's degrees from reputed universities. Their expertise lies in various fields of Software Development Life Cycle (SDLC)--from application development and testing to system administration. Be it programming or creating a professional-looking MS Word document, they believe anyone can code and that coding is not something out of this world. Their goal is to offer high-quality technology courses, which will suit a newbie as well as an intermediate.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885680 , 1835885683
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a thorough exploration of network threats, vulnerabilities, and their mitigations, providing a solid foundation in cybersecurity. It dives into the specifics of on-prem and cloud threats, emphasizing common security vulnerabilities and attack mitigation strategies. The course also covers the essentials of cryptography, including modern cryptographic solutions and the fundamentals of Public Key Infrastructure (PKI). The course focuses on practical skills, exploring various Cisco security tools and techniques. It delves into network security deployment models, NetFlow, network segmentation, and advanced security protocols like IKEv1 and IKEv2. The course also covers the use of Python scripts for enhancing security appliance API calls and differentiates between intrusion prevention and firewalling. The course wraps up with detailed insights into Cisco's security products, including Firepower devices, Web Proxy, ESA, WSA, and Cisco Umbrella. It provides practical knowledge on configuring and verifying these tools, alongside addressing endpoint security, Multi-Factor Authentication (MFA), and device compliance. What you will learn Identify and mitigate network threats Implement on-prem and cloud security Understand modern cryptographic solutions Utilize Python for security automation Configure Cisco Firepower and Umbrella Manage network security with Cisco tools Audience This course is ideal for any learner who wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this course prepares learners to pass exam 350-701 (SCOR). About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Effectiveness ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; Stakeholder Engagement ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Uzbekistan assists the World Bank Group (WBG) in better understanding how stakeholders in Uzbekistan perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Uzbekistan on 1) their views regarding the general environment in Uzbekistan; 2) their overall attitudes toward the WBG in Uzbekistan; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Uzbekistan; and 4) their perceptions of the WBG's future role in Uzbekistan
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Energy Study
    Keywords: Adaptation to Climate Change ; Decarbonization ; Energy ; Energy Transition ; Environment ; Gas Security ; Renewable Energy ; Urban Development
    Abstract: Since February 2022, geopolitical events have made clear Europe's need to diversify its energy sources and avoid excessive dependence on fossil fuel imports. The drop in Russian natural gas flows to Europe in 2022 marked the single largest supply shock in the history of global gas markets. It caused a significant increase in prices of electricity and heating services for consumers across the continent. With Europe's high reliance on imported natural gas, reestablishing energy security is a paramount objective. But how security can be achieved is subject to many uncertainties. Although Central Asia is not as dependent on gas imports as other parts of the World Bank's Europe and Central Asia (ECA) region, it has not been spared an energy crisis. Chronic underinvestment and the harshest winter conditions in decades resulted in significant blackouts in power and heating during the winter of 2022/23. -- This report analyzes the implications of the 2022/2023 energy crises over the short and long term, observing possible energy scenarios through 2060 in the Bank's ECA region and examining three key questions: -- What is the state of energy security in ECA in the wake of recent geopolitical events? -- What will it take to decarbonize the ECA energy system? -- What are the main uncertainties?
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Equitable Growth, Finance and Institutions Insight
    Keywords: Access To Finance ; ESG Integration ; Finance and Financial Sector Development ; Government Pension Fund ; Investments ; Pension Funds ; Pensions and Retirement Systems ; Social Funds and Pensions ; Social Protections and Labor
    Abstract: This report describes the ESG integration practices at GPF as a practical example of how a pension fund can integrate ESG considerations into its investment practices and processes. The report focuses on the incorporation of ESG issues into our investment analysis and decision-making process. Other elements of responsible investing such as active ownership and ESG disclosure practices whilst also key to GPF's overall approach, are not discussed in detail in this report. The report is a product of technical co-operation between teams from GPF and the World Bank. The report starts by providing some background information on GPF, including its investment philosophy and an overview of ESG investment philosophy before detailing the GPF ESG Score methodology. It then describes how the GPF ESG Score methodology is applied to equity and fixed-income investments, followed by an overview of how GPF ensures that ESG considerations are integrated into the selection, appointment and monitoring of external managers. It concludes with some reflections on the landscape of responsible investment and identifies areas where GPF expects to improve its investment process in the coming years
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Development Economics and Aid Effectiveness ; Effectiveness ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; Stakeholder Engagement ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Turkiye assists the World Bank Group (WBG) in better understanding how stakeholders in Turkiye perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Turkiye on 1) their views regarding the general environment in Turkiye; 2) their overall attitudes toward the WBG in Turkiye; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Turkiye; and 4) their perceptions of the WBG's future role in Turkiye
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Private Sector Development, Privatization, and Industrial Policy
    Keywords: Access To Finance ; Business Environment ; Conflict ; Conflict and Development ; Economic Growth ; Finance and Financial Sector Development ; Fragile States ; Private Sector ; Private Sector Development
    Abstract: This Private Sector Assessment Report on the Republic of Yemen is delivered as part of the Private Sector Technical Assistance project. The goal of the project is to understand the dynamics of the country's private sector during conflict; identify constraints to trade, investment, and finance; and propose recommendations for inclusive private sector entry, survival, and growth. The report also includes an overview of the financial sector's impact on the private sector, especially on the latter's resilience during conflict. Finally, the report provides structural and policy recommendations that, once implemented by the authorities on both national and subnational levels, would prepare the Yemeni private sector to participate in the country's post-conflict recovery and reconstruction
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Financial Sector Study
    Keywords: Consumer Protection ; Consumer Protection Law ; Corruption and Anticorruption Law ; Finance and Development ; Finance and Financial Sector Development ; Financial Capability ; Financial Consumer Protection ; Law and Development ; Social Protections and Assistance ; Social Protections and Labor
    Abstract: The 2022 Global State of Financial Inclusion and Consumer Protection (FICP) Report is an update to the 2013 and 2017 FICP reports. These surveys aim to provide a timely source of global data to benchmark efforts by financial sector authorities to improve the enabling environment for financial inclusion and consumer protection. To date, this is the only longitudinal and global survey of this nature. As such, this report serves as a valuable resource to shape the World Bank's country engagements, a reference document for regulators and supervisors and, finally, a tool for both public and private sector actors with an interest in knowing the developments in this sector. The Survey questionnaire covers key topics related to financial inclusion and financial consumer protection (FCP) and aligns with international guidance to financial sector authorities in these areas. Because the report aims to capture both a snapshot as well as trends over time, the survey questionnaire has been modified over the three cycles to reflect the changing policy and regulatory landscape of financial inclusion and consumer protection
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Health Study
    Keywords: CHVA ; Climate and Health ; Climate Change Adaptation ; Climate Change and Health ; Climate Change Impacts ; Environment ; Health Risks ; Health, Nutrition and Population ; Vulnerability
    Abstract: The objective of this Climate and Health Vulnerability Assessment (CHVA) is to assist decision-makers in Colombia with planning effective adaptation measures to deal with climate-related health risks. This assessment includes sub-national considerations for health-related climate action (see Annex A for the methodology). Sub-national considerations are given for Colombia's 32 departments (see Figure 1). It also incorporates data from a Climate and Health Economic Valuation conducted by the World Bank to estimate of the potential economic costs of health impacts arising from projected changes in temperature and precipitation (see Annex B for the methodology). The findings from this CHVA are organized under four sections. Section I characterizes the climatology in Colombia, highlighting observed and projected climate exposures relevant to health. Section II describes key climate-related risks to health, including nutrition and food security, vector-borne diseases (VDBs), water-borne diseases, increasing temperatures, air quality, and zoonotic diseases. Section III analyzes the adaptive capacity and readiness of Colombia's health system to prevent and manage climate-related health risks. Recommendations are discussed in Section IV
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Risk and Vulnerability Assessment
    Keywords: Conflict and Development ; Disaster Management ; Earth Observation ; Environment ; ICT Applications ; ICT Data and Statistics ; Information and Communication Technologies ; Natural Disasters ; Natural Hazards ; World Settlement Footprint (WSF)
    Abstract: Earth observation is a crucial source of accurate and up-to-date information of Earth's natural and manmade environments that are critical when planning for, responding to, and mitigating the effects of natural hazards. Satellites that regularly collect images of the entire globe combined--with machine learning algorithms to process them more efficiently--have the potential to provide timely, standardized, verifiable, and scalable information. This report focuses on the use of Earth observation to identify built-up areas exposed to natural hazards. It describes the World Settlement Footprint (WSF) suite of derived datasets, developed by the German Aerospace Center (DLR) in collaboration with the European Space Agency (ESA), the Google Earth Engine team, and the World Bank. These gridded datasets capture the extent of built-up areas from 1985-2015 and again for 2019, estimated building heights, impervious surfaces, and estimated population. Earth observation derived information is particularly useful for standardized and recurring World Bank operations. The report looks at several World Bank operations, and the key insights provided through analysis incorporating the various WSF suite products
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource (194 pages)
    Series Statement: Global Economic Prospects
    Parallel Title: Erscheint auch als
    Keywords: Commodity Prices ; Debt Relief ; Emerging and Developing Economies ; Exchange Rates ; Fiscal Frameworks ; Food Price Volatility ; GDP Growth ; Inflation ; Interest Rates ; Macroeconomics ; Trade
    Abstract: Global Economic Prospects is a World Bank Group Flagship Report that examines global economic developments and prospects, with a special focus on emerging market and developing economies, on a semiannual basis (in January and June). Each edition includes analytical pieces on topical policy challenges faced by these economies
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Social Protection Study
    Keywords: Asean Region ; Informal Waste Workers ; IWW ; Livelihood Models ; Marine Plastic Waste ; Social Protections and Assistance ; Social Protections and Labor ; Vulnerabilities ; Work and Working Conditions
    Abstract: The present study focuses on a particular group of actors along the plastics collection and recycling value chain--informal waste workers (IWWs)--on whom limited information has been collected at the country level. Specifically, the study examines two questions: (i) what is the profile and vulnerabilities of informal waste workers in the three countries including gender-specific vulnerabilities; and (ii) what livelihood opportunities and community-based innovation models have been piloted in the selected countries, and can be used as case study examples in future policies and interventions, with the objectives of reducing vulnerability of IWWs and contributing to improving solid waste management and recycling value chains
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Social Protection Study
    Keywords: Education ; Education For All ; Employment ; Employment and Unemployment ; Human Capital ; Poverty ; Poverty Reduction ; Skills Development and Labor Force Training ; Social Protections and Labor ; UMI Countries
    Abstract: This Human Capital Review aims to provide analytical foundations in the support of policies that improve human capital outcomes for the following four UMI countries in Central America: Costa Rica, Guatemala, Panama, and the Dominican Republic. The objective of this report is to identify the key constraints to human capital growth and understand how education and labor market policies can foster a resilient recovery, promote inclusive growth, and contribute to poverty reduction in these countries. The review also estimates the impact of the COVID-19 pandemic on human capital outcomes using a multi-sectoral approach. The analysis compares human capital outcomes in the decade before the COVID-19 pandemic (2010-2019) against trends during the pandemic (2020-2021). Lastly, the report focuses on these four countries, which are the only UMI in Central America to take advantage of new data collected during the pandemic, which allowed to quantify some of the impacts of COVID-19 and understand some of their long-term implications for human development outcomes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Development Economics and Aid Effectiveness ; Effectiveness ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; Stakeholder Engagement ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Montenegro assists the World Bank Group (WBG) in better understanding how stakeholders in Montenegro perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Montenegro on 1) their views regarding the general environment in Montenegro; 2) their overall attitudes toward the WBG in Montenegro; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Montenegro; and 4) their perceptions of the WBG's future role in Montenegro
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Public Expenditure Review
    Keywords: Education ; Financial Economics ; Fiscal Policy ; Fiscal Risks ; Footprint ; Macroeconomics and Economic Growth ; Non-Oil Revenue ; Quasi-Fiscal Activities ; SNG
    Abstract: The first three chapters of the PFR review the core fiscal policy and revenue mobilization issues. Chapter 1 discusses the fiscal landscape, fiscal framework, and progressivity of fiscal policy. Chapter 2 looks at the footprint of quasi-fiscal activities, which affects the overall fiscal stance and exposes certain fiscal risks. Chapter 3 discusses the stagnation in non-oil revenue and collection across taxes and outlines reform options to improve the tax regime. This PFR also covers education and social protection spending, constituting about 42 percent of generalgovernment budget spending, and is critical for Kazakhstan's social agenda and long-term development goals. Chapter 4 analyzes the efficiency of public spending on education, discusses challenges in delivering equitable access to quality education, and offers options for enhancing spending effectiveness through institutional and policy changes. Chapter 5 discusses the efficiency and effectiveness of spending on the social protection system, particularly the coverage and targeting of social assistance programs, issues in implementing active labor market programs, and challenges in delivering social insurance. Because of data constraints, this PFR excludes analysis on social benefits, pensions, and the State Social Insurance Fund. The last two chapters cover the core system of public-finance management issues on budgeting and inter-governmental fiscal relations. Chapter 6 considers options for further improving budgeting, planning, and monitoring to deliver better fiscal outcomes for inclusive and resilient growth. While Chapter 7 examines emerging subnational fiscal issues and options to simplify and improve certainty in the transfer mechanism from central to SNGs and within the SNG hierarchy
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Urban Study
    Keywords: Energy ; Energy Efficiency ; Energy Production and Transportation ; Environment ; Environment and Natural Resource Management ; Finance and Development ; Finance and Financial Sector Development ; Human Development and Gender ; Private Sector Development
    Abstract: In December 2021, the Royal Government of Cambodia (RGC) published Cambodia's Long-Term Strategy for Carbon Neutrality (LTS4CN), which outlines the country's vision in achieving a carbon-neutral economy by 2050. As part of the long-term strategies to achieve net-zero emissions, the RGC set targets for decarbonizing the transportation sector through a combination of measures, including electrifying 70 percent of motorcycles, and 40 percent of cars and urban buses by 2050. It also aims to have 30 percent of mode share by public transport in cities by 2050
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Language: English
    Pages: 1 Online-Ressource (172 pages)
    Series Statement: Climate Change and Development
    Parallel Title: Erscheint auch als
    Keywords: Climate Change ; Digital Tools ; E-Commerce ; Green Digital Transformation ; Green Gas ; Low Emissions
    Abstract: Climate change is unfolding amid the greatest information and communication revolution in human history. From e-commerce and social media to smart manufacturing and precision farming, digital technologies have become prevalent in all aspects of economic and social life. Digital technologies also have the potential to shape climate change action. Green digital transformation can help countries adapt effectively to the impacts of climate change and create greener growth pathways. Doing this means combining a focus on digital transformation and inclusion with a strategic and sustainable use of digital technologies to address climate change. Green Digital Transformation: How to Sustainably Close the Digital Divide and Harness Digital Tools for Climate Action illuminates the channels through which digital technologies intersect with climate change, and it proposes a path to low-emissions applications of digital technologies to help countries mitigate and adapt to climate change
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Development Economics and Aid Effectiveness ; Effectiveness ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Cabo Verde assists the World Bank Group (WBG) in better understanding how stakeholders in Cabo Verde perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Cabo Verde on 1) their views regarding the general environment in Cabo Verde; 2) their overall attitudes toward the WBG in Cabo Verde; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Cabo Verde; and 4) their perceptions of the WBG's future role in Cabo Verde
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Economic Updates and Modeling
    Keywords: Education ; Education Reform ; Education Reform and Management ; Existing Teachers ; Learning ; Teaching Practices
    Abstract: In 2023, growth in the Pacific islands (PIC-11) decelerated but remained robust at 5.5 percent--about two and a half times the long-term average. Fiji's output surpassed pre-pandemic levels in 2023 despite a notable deceleration, with growth rates halving from 20 percent in 2022 to eight percent in 2023. The PIC-11, excluding Fiji, experienced a noteworthy rebound of 2.7 percent growth in 2023, after a 0.5 percent output contraction in 2022. The trajectory of accelerated and sustainable growth in Pacific Island countries depends on a workforce that is well educated and equipped with enhanced skills and capabilities. Boosting education and skills is essential for long-term growth and poverty reduction in the Pacific Island countries. While multiple factors influence learning, once a child enters school, teachers have the largest impact. A robust body of evidence guides policymakers in improving teaching quality and ensuring that all young children acquire strong foundational skills. This report outlines a three-pronged program of action based on this evidence: attracting and recruiting effective teachers, enhancing existing teachers' capacity, and motivating greater teacher effort. Recognizing that 54 percent of teachers expected to teach in 2035 are already recruited, the report emphasizes a special focus on enhancing the capacity of existing teachers. It provides examples of rigorously evaluated interventions, such as structured pedagogy and access to pre-recorded lectures by highly rated teachers. Implementing these recommendations will aid regional countries in accelerating learning, allowing children and societies to achieve their aspirations
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Gender Assessment
    Keywords: Equality ; Gender ; Gender and Development ; Gender Monitoring and Evaluation ; Women ; Women's Empowerment
    Abstract: The aim of this report is to gather evidence that will identify priorities and actions by stakeholders towards positively influencing, up scaling and accelerating gender equality and women's empowerment in Zimbabwe. The report consolidates information on gender gaps and drivers of inequality in human endowments, economic opportunities, ownership and control of assets, and voice and agency. This includes identifying factors that deepen inequalities, and effectiveness of current policies and programming in narrowing gender disparities. The aim is to also identify promising and good practices that can potentially be replicated for greater impact, cascading to all areas in the country. The analysis guided by a conceptual framework that describes the ways households, markets, and institutions (both formal and informal), and their interactions all influence gender equality and economic development outcomes. Additionally, attention is paid to intersecting identities of women and men that affect their ability to access services and opportunities, including disability status, place of residence and other socio cultural and economic factors. The assessment draws on several data sources collected using mixed methods. Available quantitative and qualitative data sources form the basis of the assessment, including surveys, national and institutional reports and broader feminist and economic literature. Robust stakeholder consultations, including representatives from Government of Zimbabwe (GoZ), development partners, the United Nations (UN), Non- Governmental Organizations (NGOs), and communities grounded the analysis and provided insights into priority setting and forward-looking strategies
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Risk and Vulnerability Assessment
    Keywords: Adaptation to Climate Change ; Climate Change Adaptation ; Environment ; Mena ; Natural Disasters ; Risk Management
    Abstract: The Algeria Disaster Risk Management Diagnostic was developed as part of World Bank technical assistance to the Algerian government. The diagnostic offers a concise overview of the country's disaster risk profile, delves into the macroeconomic implications of disasters, outlines Algeria's advancements in disaster risk management (DRM), and highlights ongoing challenges within the DRM sector. This report aims to provide a comprehensive analysis of Algeria's DRM sector and identify key priority areas to enhance the country's resilience. This diagnostic was developed through a robust partnership between the World Bank and the National Delegation for Major Risks (DNRM) under the Algerian Ministry of Interior, Local Authorities and Territorial Development (MICLAT) from 2021 to 2023. It represents the culmination of an extensive review of over 500 documents, a comprehensive multi-stakeholder consultation workshop conducted in July 2021, and bilateral interviews held between March and October 2021 with the DNRM and all DRM stakeholders in Algeria. An initial version was completed in November 2021, which was further refined in 2022 and 2023 based on feedback received from Algerian counterparts through additional discussions, email correspondences, and recommendations from World Bank experts
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other ESW Reports
    Keywords: Co-Evolutionary Framework ; Diversification ; Economic Growth ; ICT Policy and Strategies ; Information and Communication Technologies ; Macroeconomics and Economic Growth ; Principle Of Relatedness ; Technology-Based
    Abstract: This research examines the diversification process by conceptualizing a co-evolutionary framework linking production and technology. The study applies the framework to retrospectively explain Korea's successful diversification path and to Viet Nam to identify how the country could further diversify into complex and value-added products. The authors apply relatedness analysis leveraging patent and trade data and present four different types of diversification patterns, namely unrelated diversification, production-based diversification, technology-based diversification, and complex diversification. Developed countries including Korea shifted toward technology-based or complex diversification strategies as their economies developed. Using a simulated scenario approach, the report outlines potential future trajectories wherein Viet Nam attains technological capabilities. The result shows that Viet Nam can diversify into 233 products if it accumulates capabilities in the 12 identified technologies. The report concludes with policy lessons that could inform policy makers in Viet Nam as well as other developing economies. Namely, that the country would need to invest more intensively in technology and capabilities upgrading to diversify into new complex products and evolve its diversification strategy alongside its economic growth and capability building process
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Environmental Study
    Keywords: Environment ; Environmental Protection ; Policies ; Pollution ; Solid Waste ; Waste Management ; Water Supply and Sanitation
    Abstract: Today the world faces unprecedented challenges in waste management while the state of the municipal waste management sector globally is a matter of concern. To reverse current trends related to waste generation, pollution, and resource management, active collaboration between the various waste actors including governments, civil society, and the private sector will be required along with sustained behavior change. This compendium is designed to help decision-makers - including policy makers, policy professionals, and practitioners-investigate, understand, and respond to waste management challenges in their communities through interventions considering a behavioral science lens. The document contains short case studies that uncover and highlight where and what behavioral tools were applied along three main challenges, that is, getting people to generate less waste, getting people to use waste services, and getting people to be more sustainable with their waste
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Environmental Study
    Keywords: Access To Finance ; Ecosystem Restoration ; Environment ; Environmental Protection ; Finance and Financial Sector Development ; Financing Needs ; Nature Loss ; Private Sector Development ; Private Sector Economics ; Private Sector Investment
    Abstract: Ecosystem restoration is critical to the global ambition of halting and reversing nature loss. Tremendous efforts have been deployed globally to conserve the remaining rainforests, grasslands, rivers and lakes, reefs and mangroves, and other ecosystems that are critical for safeguarding biodiversity and the ecosystem services that humanity depends on. However, the extent of environmental degradation is such that recovering the productivity of ecosystems where it has been lost is equally important - for nature, communities, and economic sectors. While restoration is often viewed as the purview of the public sector, this report demonstrates opportunities for private sector investment. It aims to shift the perception that restoration finance is limited to grant funding from domestic and international public sources only. Drawing on case studies, it highlights the investment drivers and entry points for private finance in restoration projects. The financing models presented also point to opportunities for replication and scaling. This report is a product of the Finance Task Force of the United Nations Decade on Ecosystem Restoration, an initiative led by the United Nations Environment Program and the Food and Agriculture Organization of the United Nations. The United Nations Decade aims to drive the restoration of one billion hectares of degraded land between now and 2030. The role of the Finance Task Force, chaired by The World Bank, is to catalyze action that can contribute to unlocking the capital needed to meet the United Nations Decade's goals
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Health Sector Review
    Keywords: Financial Protection ; Health Service Management and Delivery ; Health Services ; Health, Nutrition and Population ; SDI ; Service Quality ; Systems and Tools ; Workforce
    Abstract: The Service Delivery Indicators (SDI) health survey in Moldova serves as a vital tool for assessing and benchmarking the performance of health service delivery. Its primary aim is to evaluate the quality of basic health services. This comprehensive evaluation enables both governments and service providers to pinpoint deficiencies and bottlenecks in health service delivery, monitor progress over time, and make cross-country comparisons. The widespread availability of and public awareness about SDI indicators foster engagement among policy makers, citizens, service providers, donors, and stakeholders, in turn driving efforts to enhance service quality and ultimately development outcomes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Mobility and Transport Connectivity
    Keywords: BART ; Bot Concession ; Denver ; Infrastructure Economics and Finance ; Italy ; Kuala Lumpur ; Madrid ; Melbourne ; PPP ; Private Participation in Infrastructure ; Railways ; San Francisco ; Tokyo ; Urban Development
    Abstract: Railways play an important role in the transportation systems of many developing countries. Railways stations are a key but often neglected part of this railway service. Many countries are considering railway station redevelopment to improve their rail service. They include many developing countries In this report, the term redevelopment refers to changes to existing stations (as opposed to new development). It encompasses refurbishment, renovation, or improvement to station buildings, platforms, and operational rail infrastructure and to the land in its surrounding areas. Much of this report will focus on the redevelopment of the railway station building itself, as this is often the first level of station redevelopment considered. While station redevelopment projects provide many benefits, they are complex to deliver and require a unique set of knowledge, skills, and know-how. This is particularly true when the railway intends to deliver a project through a public-private partnership (PPP) scheme. PPPs require appropriate institutional arrangement with financial and legal expertise to structure, procure, and implement PPP transactions successfully. The objective of this report is to provide railway authorities and policy makers with guidance and knowledge to help in design and implementation of railway station redevelopment projects, leading to more viable and successful projects
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Mobility and Transport Connectivity
    Keywords: Finance and Development ; Finance and Financial Sector Development ; Financing ; Infrastructure ; Mobility ; Road Pricing ; Transport ; Urban Development
    Abstract: The document is structured into five chapters. Chapter 2 provides a comprehensive overview of the theoretical framework surrounding road pricing. It outlines the fundamental principles and characteristics of road pricing, while exploring the relationship between social equity and road pricing. Additionally, it addresses potential implementation challenges that may arise. The subsequent chapters offer summaries of international experiences in interurban pricing (Chapter.3) and urban pricing (Chapter 4). In the case of interurban pricing, a broad spectrum of approaches is examined, including traditional methods, concession tolls, and the latest trends in variable pricing within the European Union. Lastly, chapter 5 highlights the key trends in road pricing and provides recommendations based on the evidence presented throughout the document. This chapter serves to offer valuable insights for decision-makers, drawing from the comprehensive studies presented within the document
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Social Protection Study
    Keywords: Data Development and Gender ; Economic Growth ; Employment and Unemployment ; Human Development and Gender ; Labor Market Policy and Programs ; Macroeconomics and Economic Growth ; Poverty Reduction ; Social Development and Poverty ; Social Protection Delivery Systems ; Social Protections and Assistance ; Social Protections and Labor
    Abstract: The following analytical report summarizes the technical notes and presentations prepared by the World Bank and the Workforce Development Center under the Ministry of Labor and Social Protection of Population of Kazakhstan (MLSPP). These works aimed to support the MLSPP in the preparation of the Concept Plan of Labor Market Development for 2024-2029. The teams analyzed existing barriers and the potential for the creation of quality jobs in Kazakhstan because employment is essential for economic growth, which contributes to reducing poverty. Despite slower economic growth and some institutional challenges, Kazakhstan, nevertheless, has been successful at reducing the poverty rate. The major factor contributing to Kazakhstan's growth has been productivity, regardless of the period. A much lower contribution stems from labor market factors and employment rates. Therefore, the teams focused on how to boost firm productivity to increase the number and accessibility of better jobs, as well as how to develop skills and provide good education to the different groups of the population and prepare people for new and old jobs. Based on the material delivered by the World Bank, the WDC and other local expert groups, the MLSPP was able to draft the Concept Plan of Labor Market Development for 2024-2029, which the Government of Kazakhstan approved on November 28, 2023
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Opinion Surveys
    Keywords: Accountability ; Development Economics and Aid Effectiveness ; Effectiveness ; Financial Aid ; Macroeconomics and Economic Growth ; Social Accountability ; Social Development ; World Bank Group Strategy
    Abstract: The Country Opinion Survey in Algeria assists the World Bank Group (WBG) in better understanding how stakeholders in Algeria perceive the WBG. It provides the WBG with systematic feedback from national and local governments, multilateral/bilateral agencies, media, academia, the private sector, and civil society in Algeria on 1) their views regarding the general environment in Algeria; 2) their overall attitudes toward the WBG in Algeria; 3) overall impressions of the WBG's effectiveness and results, knowledge work and activities, and communication and information sharing in Algeria; and 4) their perceptions of the WBG's future role in Algeria
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Washington, D.C : The World Bank
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Country Climate and Development Reports (CCDRs)
    Keywords: Climate Change Adaptation ; Climate-Smart Agriculture ; Low-Carbon Transport ; Quantitative Modeling ; Water Sector
    Abstract: The Lebanon Country Climate and Development Report (CCDR) aligns the country's short-term recovery needs with resilient, low-carbon, long-term development, building on quantitative modeling-based analytics, existing research and country diagnostics, and extensive stakeholder consultations to study the effects of climate change on Lebanon's recovery and development objectives
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Urban Study
    Keywords: Demographics and Aging ; Economic Development ; Economic Growth and Planning ; Environment ; Environment and Natural Resource Management ; Human Development and Gender ; Macroeconomics and Economic Growth ; Rural Development ; Rural Development Strategy and Policy ; Urban and Rural Development ; Urban Development ; Urban Economic Development
    Abstract: This report begins with an Executive Summary, which introduces the territorial development approach and the rationale for applying it in Lesotho's development context before going on to summarize key takeaways and recommendations. It is followed by four chapters: chapter 1, Introduction, lays out the country context, presenting in brief Lesotho's economic and demographic situation, population projections, governmental structure, and poverty profile and the government's goals. Chapter 2, territorial development framework and analysis in Lesotho, discusses the territorial development approach, its objectives, and the challenges it aims to address before presenting a customized 2 by 2 territorial framework for Lesotho and explaining how it can be applied. Chapter 3, analyzing Lesotho's Challenges through a Territorial Lens, lays out a spatial analysis centering on four development challenges: economic opportunities, internal connectivity and regional integration, access to basic services, and climate preparedness. To highlight the challenges, the chapter includes 4D heat maps linked to density, distance, disparity, and disaster risk. It also summaries case studies and real-life applications of the territorial development approach in Lesotho. Full case studies are in an annex. Chapter 4, recommendations, covers guiding principles and recommendations based on the territorial development approach and analysis
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other ESW Reports
    Keywords: Adaptation To Climate Change ; Climate Change ; Development Economics and Aid Effectiveness ; Environment ; IDA19 ; Macroeconomics and Economic Growth ; Rating System ; Resilience ; RRS
    Abstract: In response to the growing recognition that measuring inputs, such as climate finance, is not enough to capture the impacts of investments, the World Bank Group developed the Resilience Rating System (RRS). Developed over a two-year, multi-sectoral consultative process through close collaboration with internal and external actors, the RRS methodology aims to guide investment decisions and improve climate resilience in project design and outcomes. The methodology report is publicly available. The RRS evaluates and rates investment projects from C to A+, based on their resilience attributes in two complementary dimensions. The resilience of rating considers a project's design, reflecting the confidence that it will achieve its expected objectives and maximize development benefits in the face of climate and disaster risks. The resilience through rating considers a project's outcomes and reflects its contribution to improving climate resilience in the broader community, sector and systems, and to driving transformational adaptation. Combining the two dimension ratings provides an overall project rating, from CC to A+A+
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: Other Environmental Study
    Keywords: Artisanal Coastal Fleet ; Blue Cabotage ; Blue Economy ; Blue Tourism ; Coastal and Marine Environment ; Environment ; Investment Projects ; STP
    Abstract: The Democratic Republic of Sao Tome e Principe (STP) is the smallest independent island state in Africa, having gained independence in 1975, following the Seychelles. STP has a predominantly young population. However, as an island micro-state, the country faces many development problems specific to islands and small countries, such as weak governance capacity, the inability to provide basic services to the population, and a lack of adequate infrastructure (ports, electricity, airports). Additionally, high production and distribution costs of goods and services, including food products, exacerbate the poverty level of the population. The virtually nonexistent corporate structure and undiversified, highly dependent economy make the country vulnerable to exogenous shocks. To address these challenges, STP developed and adopted a Transition Strategy for the Blue Economy in December 2019. This strategy aims to establish the coherence of public policies linked to oceanic resources with the policies of other sectors, such as fisheries and aquaculture, tourism, and energy. The purpose of this paper is to consolidate the analysis of the three investment projects prioritized for inclusion in the National Investment Plan for the Blue Economy. While the report does not imply endorsement of these projects by the World Bank and Food and Agriculture Organization of the United Nations (FAO), its primary objective is to illuminate the drivers of cost and benefit associated with the priorities already identified by the government of Sao Tome e Principe
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835885567 , 183588556X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with the basics of terminals and shells, setting the foundation for interaction with Linux at a fundamental level. It progresses to cover essential commands for navigating the filesystem and managing files, ensuring students can efficiently organize and manipulate data within the Linux environment. The journey continues through advanced topics such as process management, storage optimization, and package management across Debian and Red Hat systems, ensuring a well-rounded skill set. The course focuses on practical skills, including installing software from source, navigating text editors like vi, vim, and nano, and managing environment variables and file permissions. It emphasizes the importance of these skills in real-world scenarios, illustrating how they contribute to effective system administration and development practices. The course wraps up by exploring file systems, locating files, and utilizing other useful commands that streamline daily tasks. By the end of this course, students will have navigated through the most significant aspects of the Linux command line, equipped with the knowledge to apply these skills in a professional setting.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835466445 , 1835466443
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) Administration ; Systèmes d'exploitation (Ordinateurs) ; Administration ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the basics of installing Linux as a server, guiding you through both initial setup and advanced configurations. It emphasizes the importance of security from the outset, detailing steps for hardening your Linux server against threats and ensuring safe remote access via SSH. The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. The course focuses on essential server services and management techniques, including managing DNS with BIND, deploying DHCP and HTTP services, and securing communications with SSL. It also covers database management with MariaDB, offering insights into installation and data handling, and extends into file sharing and web services with Samba, NFS, and FTP/SFTP configurations. These modules not only highlight the technical skills required but also underscore the importance of these services in maintaining a resilient and efficient server environment. The course wraps up by delving into system initialization processes, comparing SysV Init, Upstart, and systemd, ensuring you're well-equipped to manage services and system boot processes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835464359 , 1835464351
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Penetration testing (Computer security) ; Sécurité informatique ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a solid foundation in Access Control and Password Management, setting the stage for a deep dive into the intricacies of cybersecurity. It progresses into exploring Active Defense mechanisms and the development of effective Contingency Plans, ensuring you're prepared for any security incident. The journey continues with an exploration of Critical Controls, Basic and Advanced Cryptography, ensuring a well-rounded understanding of key security principles. The course focuses on laying out a Defensible Network Architecture, Endpoint Security, and enforcing Windows and Linux security, providing a detailed look at how to secure modern operating systems and their networks. Through practical examples, you'll learn about Incident Handling and Response, IT Risk Management, and the importance of Security Policies and Virtualization for a robust cybersecurity posture. The course wraps up by covering Web Communication Vulnerabilities, Vulnerability Scanning, and Penetration Testing techniques, equipping you with the skills to identify and mitigate potential threats effectively.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462935 , 1835462936
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course not only equips you with the skills to write more efficient and effective scripts but also introduces you to the world of graphical scripting, allowing you to create visually interactive scripts that enhance user experience. From basic text-based menus to sophisticated graphical interfaces using dialog and its widgets, the course offers a comprehensive look at elevating command-line scripts to GUI-based applications, making your scripts more accessible to a wider audience. The exploration doesn't stop there; advanced sed techniques await, revealing the potential within multi-line commands and the intricacies of command negation for complex text processing challenges. Meanwhile, the dive into advanced gawk programming unveils the art of variable management, array handling, and the implementation of structured commands, further broadening your scripting capabilities.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885628 , 1835885624
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Python (Computer program language) ; Intelligence artificielle ; Python (Langage de programmation) ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative learning experience with 'Master ChatGPT and OpenAI APIs By Building AI Tools in Python.' This immersive course takes you from the basics of ChatGPT and OpenAI's potent APIs through a journey of building dynamic AI-powered tools. Discover the magic behind ChatGPT's conversational prowess and dive deep into the neural networks and transformers that make it tick. You'll start by creating and managing your ChatGPT account, understanding the model's anatomy, and grasping the limitations and capabilities of AI language models. Transitioning from theory to hands-on practice, the course guides you through content creation, code generation, and the intricacies of prompt engineering. Moreover, you'll venture into the realms of generative AI with Midjourney, craft AI-driven applications, and harness the synergy of OpenAI and DALL-E for on-the-fly image generation. This course demystifies the AI concepts crucial in today's technology landscape, providing you with the skills to innovate and excel in the burgeoning field of AI. What you will learn Navigate the foundational elements of ChatGPT and OpenAI APIs Generate creative content and code with ChatGPT's language model Design and implement AI applications with user-friendly interfaces Master the art of prompt engineering for optimized AI interactions Build AI-powered tools and images using OpenAI and DALL-E Develop secure, intelligent applications with advanced Python techniques Audience This course welcomes everyone from entrepreneurs to artists and developers, aiming to learn about cutting-edge AI technologies and build AI-powered applications. Basic programming knowledge is preferred but not mandatory, making this course accessible to a wide range of learners. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805123019 , 1805123017
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.276
    Keywords: Active server pages ; Microsoft .NET Framework ; Internet programming ; Web site development ; Programmation Internet ; Sites Web ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins with an introduction, setting you up with essential tools and a clear roadmap for your learning journey. Delve into the fundamentals of .NET Core, understanding the MVC architecture, routing intricacies, and dependency injection. As the course progresses, you'll dive into Category and Product CRUD operations, gaining hands-on experience with database connectivity, Entity Framework Core, and dynamic UI development. We will learn the nuances of Razor Projects and the significance of N-Tier Architecture, enhancing your understanding of scalable and maintainable code structures. The Repository Pattern module deepens your grasp of efficient data handling, leading to seamless database transitions. We will also cover shopping cart implementation, order processing, and user management. You'll tackle advanced features like product image handling, social logins, and interactive UI elements, ensuring your e-commerce platform stands out. As you approach the course's climax, the focus shifts to crucial aspects of user authentication, role management, and secure user experiences with .NET Core Identity. The final modules guide you through deploying your application, integrating email services with SendGrid, and refining your project for real-world use. What you will learn Implement CRUD operations for products and categories Develop and manage Razor Projects with advanced features Apply N-Tier Architecture and Repository Patterns for scalable applications Build and manage shopping carts and order processes Integrate user authentication and manage roles using .NET Core Identity Employ deployment techniques and email integrations Handle multiple product images and social logins effectively Audience This course is designed for learners at all levels interested in mastering ASP.NET MVC Core (.NET 8), from the basics to advanced concepts. Ideal for anyone from web development beginners to seasoned professionals, this is a comprehensive guide for those looking to master Microsoft's latest framework and design large-scale projects using cutting-edge technologies. The ideal participants should have 3-6 months of experience in C# programming, and familiarity with tools like Visual Studio 2022, SQL Server Management Studio, and .NET 6 is recommended to fully benefit from the course content. About the Author Bhrugen Patel: Bhrugen Patel is a Microsoft MVP and a passionate Software Architect, known for his dedication to simplicity and attention to detail. With a background in programming that dates back to high school, Bhrugen has developed a range of web and desktop applications using .NET. He holds a Master's of Science in Computer Science and a Bachelor's in Computer Engineering, complementing his practical expertise. Alongside his full-time role, Bhrugen is devoted to teaching, driven by a mission to simplify coding and make it accessible. His goal is to alleviate the struggles of students seeking understandable resources. For Bhrugen, coding is not just a profession; it's a means to be creative and enjoy the journey of technological innovation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885406 , 1835885403
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the basics of Linux installation, ensuring you're well-equipped to set up Linux on both physical and virtual machines. It takes you through hardware detection and configuration, making sure your system is optimized for performance. You'll learn about the Linux boot process and how to configure GRUB, providing the knowledge needed to troubleshoot boot issues and understand system startup. The course focuses on the Linux shell, where you'll gain skills in managing processes and execution priorities, essential for maintaining a smooth and efficient system. Editing files with nano and vi is covered in detail, along with customizing the bash environment to streamline your workflow. You'll become proficient in managing files, redirecting data, and using powerful tools like grep to filter output, enhancing your day-to-day Linux administration tasks. The course wraps up by delving into advanced topics such as file permissions, ACLs, managing software with dpkg, apt, rpm, and yum, and understanding systemd for service management. Through practical exercises, you'll learn how to maintain filesystem health, manage disk utilization, and handle removable media, equipping you with the skills to manage Linux systems effectively. What you will learn Install Linux on VMs and hardware Detect and configure system hardware Manage boot processes and GRUB Utilize the Linux shell effectively Customize and optimize bash Handle file permissions and ownership Audience This course is ideal for aspiring system administrators, IT professionals, and tech enthusiasts looking to gain or enhance their Linux administration skills. Basic computer literacy and familiarity with operating systems are recommended to get the most out of this course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888940 , 1835888941
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Computer technicians Study guides Certification ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management. Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats. By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise. What you will learn Summarize fundamental security concepts to build a strong base. Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. Implement robust identity and access management controls. Secure enterprise and cloud network architectures against potential threats. Enhance application security capabilities and ensure software integrity. Audience This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field. About the Author Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884904 , 1835884903
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics
    Abstract: The course embarks on a journey through the enchanting world of stylized 3D tavern modeling with Blender 4, starting from the foundational basics and resource pack overview to the sophisticated realms of advanced modeling, texturing, and lighting techniques. Through a series of meticulously crafted lessons, you'll learn to navigate Blender's interface, utilize geometry nodes for creative expression, and employ greyboxing for efficient layout planning. As the course progresses, you will dive deeper into the art of texturing, where wood shaders and stone supports bring your taverns to life with remarkable realism. You will also explore the structural integrity of wooden frameworks, intricate window designs, and the subtleties of lighting that illuminate your creations in a stylized yet realistic manner. The course concludes by teaching you rendering techniques that showcase your taverns in their best light, ensuring your skills are polished for any 3D design challenge. With a focus on both the technical and artistic sides of Blender, this course is your gateway to transforming imaginative concepts into stunning visual stories. What you will learn Initiate projects with Blender fundamentals Employ 3D modeling strategies for taverns Utilize geometry nodes for creative design Implement greyboxing for layout efficiency Apply advanced texturing for realism Design structural elements and frameworks Audience This course is ideal for 3D artists and designers eager to specialize in stylized model creation. Familiarity with basic 3D concepts is beneficial. This course is perfect for those looking to enhance their skills in Blender for professional or personal projects. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889848 , 1835889840
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey into the world of 3D design with our comprehensive Blender 4 Geometry Nodes course. Designed for beginners, this course covers everything from setting up your Blender project to mastering the intricacies of Geometry Nodes for creating stunning 3D models. You'll start with the basics, learning how to manipulate grid meshes and transform them into complex staircase designs. As you progress, the course introduces you to advanced techniques for railing construction, pole support creation, and optimizing your models for efficiency and precision. This hands-on approach is complemented by lessons on mesh manipulation, dynamic staircase shaping, and advanced node group creation, ensuring a comprehensive understanding of 3D modeling techniques. Whether your interest lies in game art, architectural visualization, or digital artistry, this course equips you with the skills to bring your imaginative concepts to life. By understanding the importance of each concept, you'll be able to apply these skills across various projects, enhancing your portfolio and opening up new career opportunities. What you will learn Navigate and utilize Blender 4's interface effectively. Understand and apply geometry node basics for 3D modeling. Design and manipulate grid meshes with curve length density. Transform 2D planes into 3D staircase models seamlessly. Create scalable controls and ensure uniformity in stair steps. Construct complex geometry node groups for detailed modeling. Audience This course welcomes everyone from beginners with no prior experience in Blender or 3D modeling to those looking to enhance their skills. It is ideal for beginners, aspiring artists, architects, digital creators, game developers, and educators eager to master 3D modeling with Blender 4's geometry nodes. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835888728 , 1835888720
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Cloud computing ; Systèmes d'exploitation (Ordinateurs) ; operating systems
    Abstract: The course begins with an in-depth look at Linux's capabilities as a KVM host and guest, establishing a strong foundation in virtualization technology essential for modern cloud computing. Through hands-on examples, you'll learn how to efficiently set up and manage virtual machines, paving the way for more advanced cloud-based applications and services. Following this, the course delves into the practical steps for creating and configuring EC2 instances within Amazon Web Services (AWS), demonstrating the power and flexibility of cloud resources. You'll gain insights into selecting the right instance types for your projects, optimizing performance, and managing security settings to protect your cloud infrastructure. The journey continues with detailed instructions on deploying and fine-tuning Azure Virtual Machines (VMs). This section emphasizes the similarities and differences between Azure and AWS, equipping you with the knowledge to make informed decisions based on project requirements and cloud provider strengths. The course then shifts focus to containerization with Docker, highlighting Linux's role as both a host and a container platform. The course wraps up by reinforcing the learner's ability to navigate the complex landscape of cloud computing with Linux, from virtual machines to containerization.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884461 , 1835884466
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038
    Keywords: Information technology Management ; COBIT (Information technology management standard) ; Technologie de l'information ; Gestion ; COBIT (Norme) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to COBIT 19, setting the stage for a comprehensive exploration of enterprise governance of information and technology. It delves into the significant benefits I&T governance brings to the table, emphasizing the importance of aligning IT processes with business goals. The course focuses on detailing what COBIT is and importantly, what it is not, establishing a clear understanding of its scope and application. Through an examination of COBIT's six principles for a governance system and its three framework principles, learners gain insights into the enhancements introduced in COBIT 2019. The course wraps up by guiding learners through the governance and management objectives, the components of the governance system, and the impactful design factors, alongside providing practical insights into the COBIT implementation guide approach. Through this journey, participants will grasp the vital role of COBIT in the IT world and prepare for what lies beyond the COBIT certification. What you will learn Understand enterprise governance of IT Navigate COBIT 2019 enhancements Identify governance and management objectives Apply COBIT in various IT scenarios Achieve COBIT certification readiness Plan for continual IT governance improvement Audience This course is ideal for IT professionals, auditors, and managers aiming to bolster their organization's IT governance. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...