Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (445)
  • Kalliope (Nachlässe)
  • 2020-2024  (445)
  • [Place of publication not identified] : Packt Publishing  (423)
  • Cham : Imprint: Springer  (22)
  • Nonfiction films  (423)
  • Economics
Datasource
  • MPI Ethno. Forsch.  (445)
  • Kalliope (Nachlässe)
  • BSZ  (22)
Material
Language
Years
Year
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881569 , 1835881564
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the foundation of basic networking hardware, introducing you to pivotal networking models, and navigating through Layer 1 and 2 technologies. You will grasp the core responsibilities in networking, delve into network addressing, and learn to use basic network utilities efficiently. The course focuses on deepening your understanding of Cisco equipment and components, including detailed insights into Cisco port characteristics and memory functions. You'll gain hands-on experience in installing, operating, and troubleshooting Cisco devices, accessing the Cisco IOS, and mastering fundamental Cisco IOS commands. The course wraps up by teaching you advanced skills like upgrading Cisco IOS on routers, password recovery techniques, performing factory resets, and utilizing additional tools for comprehensive network management. Each step is designed to strengthen your proficiency in Cisco's cutting-edge routing and switching technologies. What you will learn Identify key networking hardware components Understand essential networking models Utilize basic Cisco IOS commands effectively Perform network troubleshooting using Windows Execute password recovery on Cisco routers Conduct factory resets on Cisco switches Audience This course is ideal for IT professionals, network engineers, and tech enthusiasts seeking to enhance their skills in Cisco routing and switching. This course is perfect for those aspiring to gain Cisco CCT Routing and Switching certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888186 , 1835888186
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer networks Study guides Examinations ; Telecommunication Study guides Switching systems ; Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Télécommunications ; Systèmes de commutation ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at Cisco's NX-OS, laying a foundation for understanding data center environments. It progresses to OSPFv2 and OSPFv3, crucial for robust network communication, and explores Multi-Protocol BGP and PIM, key for scalable networks. Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. The focus then shifts to Cisco ACI, introducing intent-based networking with Cisco APIC. Topics include ACI Access Policies, Tenant Policies, and Contracts. You'll learn about UCS Rack Servers, Blade Chassis, and delve into UCS Infrastructure and Network Management. The course includes insights on UCS Software Updates, NetFlow, SPAN, and Streaming Telemetry, crucial for network maintenance and troubleshooting. Wrapping up, the course covers Fibre Channel, Port Channels, Nexus Software Updates, and essentials of cloud computing with NIST 800-145, equipping you with the knowledge to handle modern data center demands. What you will learn Understand NX-OS and OSPF protocols Gain expertise in FHRPs and RSTP+ Learn advanced LACP and vPC DCCOR Explore VXLAN and EVPN technologies Grasp ACI Tenant Policies and Contracts Analyze packet flow and cloud concepts Audience This course is ideal for network professionals aiming to specialize in data center technologies. Prior knowledge of networking and basic Cisco concepts is recommended. This course is perfect for those seeking to align their skills with Cisco's advanced data center solutions and practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881309 , 1835881300
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884706 , 1835884709
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Routing (Computer network management) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into advanced routing protocols and their troubleshooting. You'll explore Admin Distance, Route Maps, Loop Prevention, and the nuances of Routing Protocol Redistribution. The course then shifts to advanced concepts like Route Tagging, Filtering, and Policy-Based Routing, providing a practical understanding of network routing mechanisms. As the course progresses, you'll delve into OSPF and EIGRP, gaining insights into their operation and optimization in enterprise environments. BGP's intricate details, from peerings to path attributes, are unpacked, equipping you with skills to manage complex network infrastructures. The course also covers MPLS operations and Layer 3 VPNs, enhancing your understanding of modern networking technologies. The course concludes with a comprehensive look at network security and management. Topics like AAA, RBAC, and First Hop Security are thoroughly explored, alongside CoPP strategies to protect the network control plane. You'll also engage with IPv6 security, SNMP, Syslog, and Cisco DNA Center, ensuring your readiness for diverse network scenarios. What you will learn Troubleshoot advanced network scenarios Implement policy-based routing techniques Deploy and manage MPLS and DMVPN Enhance network security with AAA and CoPP Manage IPv6 first hop security features Apply effective strategies in network management Audience This course is ideal for network professionals seeking advanced skills in Cisco networks. The course is perfect for those aiming to enhance their expertise in network troubleshooting and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882825 , 183588282X
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/01
    Keywords: Six sigma (Quality control standard) ; Organizational effectiveness ; Lean manufacturing ; Six Sigma ; Efficacité organisationnelle ; Production allégée ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Lean Six Sigma (LSS), unraveling its history and foundational concepts. It delves into identifying waste and defects, crucial in process improvement. The journey through the course includes a comprehensive look at project management techniques and the Plan-Do-Check-Act cycle, essential in LSS implementation. The course focuses on the five phases of LSS: Define, Measure, Analyze, Improve, and Control. Each phase is explored in depth, with multiple parts ensuring a thorough understanding. You'll learn about defining project goals, measuring process performance, analyzing data for insights, implementing improvements, and controlling future process performance. The course wraps up with strategic insights into achieving buy-in for LSS initiatives and preparing for the next steps in your LSS journey. By the end of the course, you'll have a holistic understanding of how LSS can drive significant improvements in any organization. What you will learn Identify and eliminate process waste Learn the Plan-Do-Check-Act cycle Control and sustain process gains Gain skills for securing project buy-in Explore LSS project management essentials Utilize tools for effective data analysis Audience This course is ideal for professionals seeking to improve process efficiency and quality. A basic understanding of business processes is beneficial. This course is perfect for those looking to align their skills with Lean Six Sigma methodologies and enhance their problem-solving abilities. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883747 , 1835883745
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management Study guides Examinations ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with the PMI framework, setting the stage for a deep dive into project management methodologies. It delves into the basics of the CAPM exam ensuring a solid foundation in project management principles. The course systematically explores the project management lifecycle, covering topics from project initiation to closure. It covers essential concepts such as risk planning, stakeholder management, and the critical path method, laying the groundwork for managing real-world projects effectively. As you advance, the focus shifts to Agile methodologies, including Scrum and Kanban, blending these with traditional project management approaches. You'll understand the dynamics of the project team, the importance of emotional intelligence, and effective communication management. The course also covers practical applications in predictive and adaptive project environments, quality and integration management, and comprehensive project planning. You'll also delve into advanced areas like earned value analysis and work breakdown structures. The course concludes with a focus on business analysis in various project management frameworks. The course prepares you for both the CAPM exam and real-world challenges, making it an essential resource for aspiring project managers. What you will learn Grasp PMI's approach to project management Learn and apply Scrum, SAFe, and Kanban in projects Develop and implement robust risk management strategies effectively Apply Emotional Intelligence in project leadership Master and apply essential project management tools Execute project plans using Agile methodologies Audience The course is ideal for students and professionals aiming to establish or advance their careers in project management. A basic understanding of management principles is beneficial. The course is perfect for those seeking to align their skills with PMI standards and adapt to Agile methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887882 , 1835887880
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 18 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884966 , 1835884962
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Design ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an overview of Cisco Modeling Labs 2 (CML2) and its installation on Windows 10, macOS Catalina, and VMware ESXi. You'll delve into the essentials of CML2, exploring how to build and configure labs both through the graphical user interface (GUI) and the API. Learn to access CML2 using Telnet and SSH for efficient management. Discover the art of connecting your lab to the outside world and adding VIRL 1.x images to enhance your lab's capabilities. The course focuses on empowering you with hands-on skills in network modeling and simulation using CML2. You'll understand the importance of CML2 in network architecture and how it streamlines network design and testing. As the course progresses, you'll acquire the expertise needed to create and manage complex network scenarios, making you proficient in CML2. By the end, you'll have the knowledge and skills to use CML2 effectively in your networking projects. What you will learn Prepare for CML2 and its installation Build and configure labs using the GUI and API Access CML2 through Telnet and SSH Connect labs to external networks Enhance labs with VIRL 1.x images Gain proficiency in Cisco Modeling Labs 2 Audience This course is ideal for network architects, administrators, and professionals looking to enhance their skills in network modeling and simulation. Basic knowledge of networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835464694 , 1835464696
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application program interfaces (Computer software) ; Software architecture ; Python (Computer program language) ; Interfaces de programmation d'applications ; Architecture logicielle ; Python (Langage de programmation) ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers a detailed exploration of FastAPI, a cutting-edge Python framework for API development. The course starts with basic API and REST principles, quickly advancing to practical application for a thorough understanding of both theory and practice. The curriculum progresses logically, starting with the basics of FastAPI, including app setup, API routing, linting, and formatting. Participants will create a social media API, manage post and comments, and learn code organization with APIRouter, followed by practical testing experience using pytest. A significant portion of the course focuses on asynchronous databases, vital for scalable application development. It covers database setup, connection, and integration within FastAPI. The course also delves into Python logging techniques, crucial for debugging and monitoring FastAPI applications. It also covers user authentication, an essential element in modern web apps. It includes practical training on JWTs, password hashing, authentication management, and database user relationships, alongside addressing many-to-many database relationships and user email confirmation strategies. In later stages, the course addresses advanced topics like file uploads, background image generation tasks, and deployment methodologies, including continuous integration with GitHub Actions. What you will learn Build and structure a FastAPI application Implement and test RESTful APIs with FastAPI Manage asynchronous database operations Configure and utilize Python logging in FastAPI Secure applications with user authentication and JWTs Handle complex database relationships Deploy FastAPI applications and manage them effectively Audience This course is ideal for aspiring back-end developers, testers looking to integrate automation into their workflows, and front-end developers seeking a deeper understanding of server-side processes. This course will particularly benefit those with a basic grasp of programming and a desire to specialize in the fast-paced realm of web development, API construction, and database management using FastAPI. Prior programming experience in any language is recommended; beginners should consider a basic Python course first, as all required software is provided for free. About the Author Jose Salvatierra Fuentes: Jose, a passionate educator in the realm of coding and software development, has dedicated over 7 years to teaching online. He founded Teclado with a vision to democratize software development education, striving to ensure comprehensive understanding for his students. His approach makes learning coding a clear, rewarding journey, connecting the dots that once seemed obscure. Specializing in Python and JavaScript, Jose excels in web and backend development. He's proficient in various libraries and frameworks, including Flask, React, React Native, and AngularJS. His expertise extends to working with UNIX systems, MongoDB, PostgreSQL, and crafting advanced system architectures. Jose's commitment is to make the learning process both efficient and enjoyable, guiding students to mastery in software development.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883044 , 1835883044
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6076
    Keywords: Wireless communication systems ; Telecommunications engineers Certification ; Transmission sans fil ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at the Meraki Dashboard, introducing you to its intuitive interface for network management. You'll delve into the management structure, understand licensing considerations, and design enterprise wireless networks with Cisco Meraki. The course focuses on high-density wireless deployments, equipping you with the skills to handle crowded network environments effectively. Discover the power of Meraki's mesh deployment for extending network coverage effortlessly. You'll unbox and set up a Meraki MR56 Access Point, configure it within the Dashboard, and gain hands-on experience in monitoring and troubleshooting AP setups. Throughout the course, you'll understand why Cisco Meraki is essential for modern network management, and you'll follow a journey of practical learning, from initial setup to advanced troubleshooting. What you will learn Learn Cisco Meraki Wireless basics Implement high-density solutions Troubleshoot wireless networks Configure Cisco Meraki APs Ensure secure deployments Optimize wireless performance Audience This course is ideal for network administrators, IT professionals, and anyone looking to enhance their skills in Cisco Meraki wireless networking. A basic understanding of network concepts is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885468 , 1835885462
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the latest computing and networking trends, equipping you with insights into the evolving landscape of cybersecurity. It delves into the intricacies of identifying cyber threats and common attack techniques, providing you with a strong foundation in cybersecurity defense. The course focuses on building your expertise in network security, covering topics like Wi-Fi vulnerabilities, advanced persistent threats, routing protocols, network addressing, and more. You'll gain a deep understanding of Palo Alto Networks security solutions and their role in safeguarding modern networks. As the course progresses, you'll acquire practical knowledge of endpoint security, server and system administration, ITIL concepts, and Palo Alto Networks NGFW components. You'll also explore the essentials of Prisma Cloud, Prisma Access, Cortex XDR, and Cortex XSOAR. By the end of this course, you'll have the skills and knowledge needed to excel in Palo Alto Networks cybersecurity and contribute to the security and resilience of today's digital environments. What you will learn Identify computing and networking trends Describe cybersecurity threats and common attack techniques Identify Wi-Fi vulnerabilities and attacks Understand advanced persistent threats Learn networking security models and technologies Gain insights into data center, cloud, and DevOps security concepts Audience This course is ideal for anyone who wants to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. There is no pre-requisite required except for a desire to learn more about cybersecurity and Palo Alto Security solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884089 , 1835884083
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Electronic data processing personnel Study guides Certification ; Cloud computing Study guides Examinations ; Software engineering ; Infonuagique ; Examens ; Guides de l'étudiant ; Génie logiciel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cloud computing and Google Cloud Platform, setting a strong foundation for understanding the GCP environment. You'll learn about setting up cloud projects and accounts, managing billing, and configuring the GCP Command Line Interface (CLI), providing you with essential skills for managing cloud resources effectively. The course focuses on practical applications, including using the GCP Pricing Calculator, planning and configuring compute and data storage resources, and managing network resources. You'll gain hands-on experience launching instances in Compute Engine and using the Cloud SDK, as well as understanding instance groups for load balancing and autoscaling. The course wraps up by covering advanced topics such as deploying and implementing Kubernetes Engine, serverless compute, and various data solutions. You'll learn about monitoring, logging, managing IAM, and using audit logs, equipping you with the skills needed to manage complex cloud infrastructures and ensure efficient, secure operations. What you will learn Understand cloud computing basics Set up GCP projects and accounts Manage cloud billing and expenses Configure and use GCP CLI Implement network resource strategies Deploy and monitor Kubernetes Engine apps Audience This course is ideal for IT professionals, system administrators, and developers looking to specialize in cloud computing. Basic knowledge of IT infrastructure and familiarity with cloud concepts is recommended. Perfect for those aspiring to become Google Cloud Certified Associate Cloud Engineers. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884348 , 1835884342
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an understanding of software security fundamentals, where you'll grasp the importance of secure coding practices and the repercussions of negligence. As you progress, you'll tackle real-world scenarios, learning to identify vulnerabilities and employ strategies to mitigate risks. The course focuses on the hands-on application of security principles, from initial software design to post-deployment checks, ensuring you're adept at protecting applications against modern threats. You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. What you will learn Implement secure password protocols Employ encryption for data security Design software with security in mind Apply OWASP security standards Execute thorough security testing Monitor applications against threats Audience The course is ideal for software developers and coders keen to specialize in secure application development. A foundational understanding of programming and basic security concepts is recommended. Perfect for those who aim to integrate top-notch security measures into their development processes. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882047 , 1835882048
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Study guides Design ; Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of enterprise network design, introducing high availability techniques and WLAN deployment options. You'll compare on-premises and cloud solutions, gaining insights into the complexities of modern networking. The journey includes learning about SD-WAN, SD-Access, and QoS, enhancing your network performance skills. Focusing on advanced topics, you'll delve into Cisco Express Forwarding, device and path virtualization technologies like GRE and IPsec, essential for secure network architecture. The course also covers LISP, VXLAN, and VTP, crucial for network scalability. Troubleshooting techniques form a key part of the curriculum, addressing challenges in 802.1Q, EtherChannel, and more. You'll gain expertise in routing protocols such as OSPF and BGP, crucial for enterprise networking. The course also covers wireless networking fundamentals, NTP, NAT/PAT, and FHRP. Wrapping up, the course dives into network security and automation, including REST API security and orchestration tools, equipping you for the dynamic field of enterprise networking. This comprehensive course prepares you for navigating complex network environments and emerging technologies. What you will learn Grasp enterprise network design fundamentals Learn WLAN deployment strategies Compare on-prem and cloud network deployments Deepen knowledge of Quality of Service (QoS) Explore Cisco Express Forwarding techniques Develop troubleshooting skills for network issues Audience This course is ideal for network professionals and enthusiasts seeking advanced skills in enterprise networking. Prior knowledge of basic networking concepts and familiarity with Cisco's network environment is recommended. This course is perfect for those looking to deepen their understanding of Cisco's enterprise solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886328 , 1835886329
    Language: English
    Pages: 1 online resource (1 video file (48 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Hackers Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Pirates informatiques ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881828 , 1835881823
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: VMware ; Virtual computer systems ; Cloud computing ; Systèmes virtuels (Informatique) ; Infonuagique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to basic virtualization concepts and the integration of vSphere in the SDDC and cloud infrastructure. It then progresses to the core of ESXi host architecture, including installation and configuration. You'll learn to utilize the DCUI and Host Client for effective ESXi host configuration, and delve into creating and provisioning virtual machines, along with an understanding of VMware Tools. The course focuses on essential networking concepts, guiding you through network configuration files, Network Manager CLI, and Network Time Protocol setups. You'll gain practical skills in NFS server and client configurations, exploring vSphere networking and storage vocabulary, creating VMFS and NFS datastores, and understanding multipathing. The course wraps up with a deep dive into vSphere security, including SELinux management and firewalld configuration. You'll also learn about virtual machine management, CPU and memory concepts in a virtualized environment, creating a vSphere DRS cluster, vSphere HA architecture, and updates using vSphere Lifecycle Manager, rounding out a complete skill set for managing vSphere environments. What you will learn Manage virtual machines and VMware Tools Configure and manage vSphere networks Implement vSphere storage solutions Secure vSphere environments effectively Utilize vSphere for virtual machine management Deploy and manage vSphere HA and DRS clusters Audience This course is ideal for IT professionals and system administrators aiming to specialize in virtualization with VMware vSphere 7. Knowledge of basic virtualization and networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886922 , 1835886922
    Language: English
    Pages: 1 online resource (1 video file (20 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into Cisco's networking environment, covering foundational concepts such as network component roles and the Cisco CLI. It progresses through network topology, IPv4 and IPv6 addressing, and essential networking principles like virtualization, wireless configurations, and switch functionalities. The course is designed to build a comprehensive understanding of network infrastructure and cybersecurity basics. Focusing on practical applications, you will gain hands-on experience in configuring and managing Cisco networks. The course emphasizes VLAN configuration, Interswitch connectivity, routing protocols, and network security implementations. Through real-world scenarios, you will explore DHCP, NTP, and DNS in network management, alongside configuring static and dynamic routing, understanding ACLs, and navigating network address translation. The course concludes with advanced topics in network management and security. The course also introduces network management automation, SDN architecture, and REST-based APIs application. This course will ensure you are well-equipped for intermediate to advanced roles in network administration and security, with a robust skill set for navigating complex networking environments. What you will learn Understand network component roles and functions Analyze different network topology characteristics Configure IPv4 and IPv6 addresses on devices Gain insights into wireless configuration and security Learn routing components and packet forwarding techniques Implement network security through ACLs and NAT Audience This course is ideal for aspiring network administrators, IT professionals, and students seeking foundational knowledge in networking. This course is perfect for those preparing for the Cisco CCNA (200-301) certification, aiming to acquire a comprehensive understanding of network security, protocols, and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881903 , 1835881904
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Routing (Computer network management) ; Computer networks ; BGP (Protocole de réseaux d'ordinateurs) ; Routage (Gestion des réseaux d'ordinateurs) ; Réseaux d'ordinateurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to BGP, explaining what it is and why it is essential in the networking landscape. You'll explore topics such as Autonomous System Numbers (ASNs), BGP attributes, and route selection. The course also covers advanced concepts like BGP route reflectors, communities, and route summarization. The course focuses on real-world scenarios and hands-on labs, ensuring you gain practical experience in configuring and managing BGP in different network environments. By the end of this course, you'll have the expertise to design, implement, and troubleshoot BGP networks effectively. Whether you're a network administrator, engineer, or IT professional, this course will enhance your networking skills and open new career opportunities in the field of advanced networking. What you will learn Understand BGP attributes and path selection Implement BGP route reflectors for efficient routing Utilize BGP communities for traffic management Explore route summarization techniques Optimize network resources with BGP Troubleshoot common BGP issues Audience This course is ideal for IT professionals, system administrators, and developers aiming to specialize in networking and BGP. Basic knowledge of networking concepts and familiarity with routing protocols is recommended. Perfect for those aspiring to enhance their networking skills and pursue advanced networking roles. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880180 , 1835880185
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/8
    Keywords: Internet of things Study guides Examinations ; Electronic data processing personnel Certification ; Computer networks Study guides Examinations ; Internet des objets ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by establishing a foundational understanding of IoT, addressing common terms, benefits, and challenges. It then transitions into an in-depth look at the physical and network components of IoT and Edge Computing, along with an exploration of Cloud Computing's role in IoT. This sets the stage for a comprehensive view of the IoT ecosystem, crucial for both newcomers and seasoned professionals. The course also delves into IoT market sectors, security, and privacy concerns, highlighting the importance of robust security measures and privacy protocols in the IoT sphere. This segment is particularly vital, considering the growing emphasis on data security in today's digital world. Additionally, the course discusses IoT safety and risk management strategies, equipping learners with the skills to navigate potential risks effectively. Concluding with a detailed walkthrough of the IoT Software Development Life Cycle, the course covers each phase from project initiation and planning to development, integration, and maintenance. This holistic approach ensures that learners are not only well-versed in theoretical aspects but also adept at applying these concepts in real-world scenarios, bridging the gap between learning and practical application. What you will learn Understand key IoT concepts and terminology Explore benefits and challenges of IoT Analyze IoT physical and network components Learn about Cloud Computing in IoT Address IoT security and privacy issues Manage risks in IoT environments Audience This course is ideal for professionals and enthusiasts looking to dive into the IoT world. A basic understanding of networking and computing is beneficial. Perfect for those seeking practical skills and comprehensive knowledge of IoT technologies and applications. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836204459 , 1836204450
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/17
    Keywords: Python (Computer program language) ; Application software Development ; Python (Langage de programmation) ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: """Abstracting with Functions"" is a meticulously curated video course designed for technical professionals eager to master the art of function creation in Python. Through a comprehensive series of videos, learners are taken on a journey that begins with the basics of what functions are and why they are pivotal in programming. The course underscores the significance of functions in collecting logic into reusable chunks, thereby fostering more readable and maintainable codebases. Starting with an introductory overview, the course swiftly moves to dissect the anatomy of functions, from the simplest forms without arguments to more complex functions featuring multiple positional and keyword arguments. Each episode, hosted by dynamic duos such as Aubri and Ronnie or Justin and Zach, not only discusses the syntax and theoretical aspects but also delves into practical demonstrations and the subtleties of function creation, such as edge cases and argument types. The importance of understanding functions is also linked to professional development, highlighting their relevance in networking and certification exams. By the end of the course, learners will have a solid grasp of how to efficiently abstract logic through functions, enabling the construction of more sophisticated and scalable programs. What you will learn Understand the fundamental concept of functions. Explore the syntax and creation of functions in Python. Distinguish between various types of functions. Learn advanced topics such as keyword arguments. Use mixed arguments to enhance function versatility. Grasp the significance of functions in different contexts. Audience Individuals at the beginning of their coding journey who want to learn best practices early on, and those with some experience in Python or other programming languages looking to deepen their understanding of functions and how to use them more effectively in their projects will find this course quite useful. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836202530 , 1836202539
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 33 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; JavaScript (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course is a comprehensive training program designed for IT beginners and network students eager to delve into the fundamentals of network security. In today's digital age, safeguarding information and data is of paramount importance, and this course equips participants with the essential knowledge and skills to excel in the field of cybersecurity. This course is ideal for individuals with a basic understanding of Linux programming, and it provides a solid foundation in network defense and information security. Our primary goal is to enable trainees to reach competency and expertise in network defense and information security skills, ensuring they are well-prepared to navigate the complexities of the digital landscape. The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836207856 , 1836207859
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 47 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: ChatGPT ; React (Electronic resource) ; Artificial intelligence ; Web applications Programming ; Intelligence artificielle ; Applications Web ; Programmation ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This meticulously designed course not only introduces you to the foundational aspects of React.js but also dives deep into integrating ChatGPT API, crafting a cutting-edge, AI-driven chat interface. Beginning with an introduction to React components and props, you'll quickly move on to master state management, essential for responsive and interactive UIs. As the course unfolds, you'll learn how to construct a chat window component, handle user inputs, and engage with the ChatGPT API using Axios for real-time, intelligent conversations. The curriculum is carefully structured to ensure a progressive learning path, from setting up a MySQL environment, through managing and manipulating data, to advanced querying techniques including JOINS and indexes for optimization. Moreover, you'll explore advanced features such as error handling with boundary components and adding polish to your application through CSS styling and loading indicators. The course culminates in a practical deployment phase, where you'll take your local development project to a global audience using Vercel, equipping you with the knowledge to launch your applications into the production environment confidently. What you will learn Create and manage React components and props Utilize React state for dynamic content updates Integrate the ChatGPT API with Axios for AI interactions Implement localStorage() for persistent data storage Secure app configurations with environment variables Design user interfaces with CSS and add loading indicators Audience Ideal for web developers, software engineers, and UI/UX designers looking to enhance their skill set in building AI-driven applications. Prerequisites include basic knowledge of JavaScript, HTML, and CSS. About the Author Eduonix Learning Solutions: Eduonix Learning Solutions creates and distributes high quality technology training content. Our team of industry professionals have been training manpower for more than a decade. We aim to teach technology the way it is used in industry and professional world. We have professional team of trainers for technologies ranging from Mobility, Web to Enterprise and Database and Server Administration.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 22, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881064 , 1835881068
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.75/65
    Keywords: SQL (Computer program language) ; Database management ; SQL (Langage de programmation) ; Bases de données ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This SQL mastery course offers a solid foundation in databases, emphasizing MySQL, a popular database management system. Starting with the essentials, learners are introduced to the pivotal role of databases in data management and given a primer on SQL, laying the groundwork for subsequent, more detailed study. The course is meticulously structured to guide you through setting up a MySQL environment, enabling practical engagement from the onset. As the course unfolds, you'll delve into designing databases and tables, learn to manage data through insertion, updating, and deletion, and explore the construction of basic to complex SQL queries for effective data retrieval. The course further advances into sophisticated SQL features like filtering with WHERE clause and operators, sorting and grouping data, and utilizing functions and aggregates for enhanced data analysis. A pivotal section on JOINs elucidates the intricacies of linking data across tables, while the final modules on indexes and optimization offer crucial insights into improving database performance. Each SkillSprint is designed to be both informative and hands-on, ensuring that by the end of the course, you'll possess a comprehensive understanding of SQL and MySQL, equipped with the skills to tackle real-world data management challenges. What you will learn Understand the fundamental concepts and roles of databases and SQL. Perform data manipulation tasks including inserting, updating, and deleting data. Construct basic and complex SQL queries for effective data retrieval. Apply sorting, grouping, and filtering techniques for data analysis. Utilize built-in functions and aggregates for advanced data operations. Implement various types of JOINs to link data across multiple tables. Audience Ideal for students, business analysts, project managers, software developers, data analysts, and career changers aiming to build or enhance their database management and SQL skills, particularly in MySQL. About the Author SkillSprints Inc., Mark Lassoff: SkillSprints Inc., founded by the visionary Mark Lassoff, specializes in teaching digitally accessible technical skills to people just getting started in their technical careers, including web development, digital design, and other career paths enabled by technology. SkillSprints has bridged the gap between entertainment and education, creating a unique, immersive learning experience that resonates with students. Their instructors are more than just tech-savvy professionals; they are educators first and foremost, handpicked for their unique ability to translate complex technological concepts into digestible, engaging lessons. SkillSprints continues to evolve, constantly innovating to stay at the forefront of the online learning landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836203995 , 1836203993
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Microsoft .NET Framework ; Computer programming ; C++ (Computer program language) ; Programmation (Informatique) ; C++ (Langage de programmation) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers an extensive journey through the realms of C# and .NET, providing a solid foundation in programming concepts, best practices, and the development environment setup with Visual Studio. As you progress, you'll explore the core syntax of C#, delve into GitHub, and learn debugging and troubleshooting techniques that are crucial for real-world development. The course carefully layers complexity with topics on operators, conditional and repetition statements, error and exception handling, and string plus DateTime manipulation before advancing to more sophisticated concepts such as methods, arrays, collections, and object-oriented programming. You will also get acquainted with tools and frameworks like Maven and Gradle, enhancing your development workflow. By the end of this course, you'll have a comprehensive understanding of building and deploying dynamic, scalable applications using C# and .NET, ready to tackle challenges in modern software development. What you will learn Master the basics of C# programming and .NET framework. Utilize operators, conditional and repetition statements in C#. Perform string and DateTime manipulations. Create and use methods, arrays, and collections. Apply object-oriented programming principles using C#. Work with Maven and Gradle for project management. Audience Ideal for beginners in programming or professionals looking to deepen their knowledge in C# and .NET. Pre-requisites include a basic understanding of programming concepts and a keen interest in software development. About the Author Trevoir Williams: Trevoir Williams is a software engineer and part-time lecturer. With a master's degree in computer science, he has spent over a decade teaching web, software, and database development courses. He also has extensive industry experience in web application development, Azure Cloud system, and server administration. He enjoys teaching IT and development courses and hopes to impart knowledge of the latest developments in industry standards and techniques to his students.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 16, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836205456 , 1836205457
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 38 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer algorithms ; Problem solving ; Algorithmes ; Résolution de problème ; algorithms ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: """Algorithmic Problem Solving"" is a cutting-edge video course tailored for those who seek to navigate the complexities of programming with ease and confidence. This comprehensive course begins by addressing the common hurdles newcomers face when diving into the world of programming. Through a series of engaging episodes, instructors Justin and Vonne, alongside Zach, guide learners through the art of algorithmic thinking, starting with foundational concepts and gradually advancing to more complex challenges. The course meticulously covers a range of topics from planning and implementing solutions for finding the maximum number in a list, reversing strings, detecting palindromes, applying title casing to strings, to coding a Caesar cipher. Each topic is designed to not only teach the technicalities of coding but also to sharpen problem-solving skills, thereby enhancing learners' ability to tackle any programming challenge with strategic thinking and precision. By the end of this journey, participants will have gained invaluable insights into algorithmic problem-solving that will serve as a cornerstone for their future projects, making their code more efficient, readable, and above all, effective. What you will learn Approach and solve programming problems algorithmically. Implement solutions for common coding challenges in Python. Enhance code readability and maintainability. Develop strategies for planning and coding algorithms. Apply concepts of string manipulation and data processing. Design algorithms for detecting patterns and encrypting data. Audience Ideal for beginner to intermediate programmers who have a basic understanding of Python or another programming language. No prior algorithmic or advanced mathematical knowledge is required, but familiarity with basic programming concepts is recommended to get the most out of the course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836204473 , 1836204477
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Python (Langage de programmation) ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: An immersive video course designed to introduce and deepen your understanding of Object-Oriented Programming (OOP) principles within the Python ecosystem. Through a hands-on approach, instructors Vonne and Justin guide you from the foundational setup and OOP basics--encapsulation, abstraction, inheritance, and polymorphism--to the creation of a dynamic text-based game, MonsterSlash. This course is structured to enhance your programming skills by applying OOP techniques to reduce code redundancy, promote reusability, and streamline your coding workflow. You'll embark on a project-driven learning path that not only solidifies theoretical concepts but also puts them into practice by developing a fully functional game. As the course progresses, you'll refine your game, add complexity, and implement advanced OOP strategies, culminating in version 2 of MonsterSlash that features enhanced gameplay elements. Whether you're a beginner eager to explore programming or an intermediate looking to sharpen your OOP skills in Python, this course offers valuable insights and skills for your development arsenal. What you will learn Set up your Python environment for OOP development. Understand and apply the four pillars of OOP in Python. Create, extend, and refine classes and objects. Develop a text-based game from scratch using OOP principles. Employ inheritance and composition to optimize your code. Refactor and enhance your game with advanced OOP techniques. Audience This course is ideal for individuals interested in Python programming, especially those curious about object-oriented programming. Beginners will find the course accessible, while intermediate programmers can deepen their OOP knowledge. Prior exposure to basic Python syntax is helpful but not required. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Vonne Smith: Vonne leads the content development for the OfficeProTV and CreativeProTV channels. She has over a decade of experience teaching Office and Adobe applications both online and in the classroom. Certifications: Microsoft Office Master 2016.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835465578 , 1835465579
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: React (Electronic resource) ; Web site development ; Web applications Programming ; Sites Web ; Développement ; Applications Web ; Programmation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to the course, your gateway to mastering Recoil for React web development. Recoil, a powerful state management library by Facebook, revolutionizes app development with its simplicity and scalability. In this course, you will delve into Recoil's fundamentals, understanding why it's favored over Redux, and how it enhances React applications. Starting from scratch, you will learn to configure and use Recoil atoms and selectors, persist state data efficiently, and leverage advanced features like atom families. Embrace the transition from junior to senior developer by mastering Recoil's complexities, refining skills for scalable web and mobile applications, and acing declarative JavaScript solutions for interviews. Throughout the journey, you will build an app, progressing from the basics to advanced topics. Explore Recoil's nuances as we deep-dive into selector functionalities, state persistence mechanisms, and crafting performant logic for complex applications. By the end of this course, you will be equipped with a deep understanding of Recoil, confidently implementing scalable and high-performance state management in React applications. What you will learn Grasp Recoil's principles for popular state management Craft UI elements for better user interaction with Recoil Implement dynamic search filters with Recoil tools Persist data across sessions using recoil-persist Transition local to global state management through Recoil Build scalable state logic using advanced Recoil features Audience This course caters to a diverse audience, spanning junior to senior React developers eager to bolster their skill set. Beginners seeking a strong foundation in React and Recoil, intermediate developers aspiring to refine scalable code, and seasoned professionals keen on staying updated with modern industry requirements will all find immense value. Basic knowledge of JavaScript and React is recommended, but not mandatory, ensuring accessibility for learners at varying proficiency levels. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463444 , 1835463444
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: Web site development Computer programs ; Application software Development ; Python (Computer program language) ; Sites Web ; Systèmes-auteur ; Logiciels d'application ; Développement ; Python (Langage de programmation) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Next.js is a popular open-source JavaScript framework designed to make web development with React efficient and scalable. Next.js adds layers of abstraction to React and simplifies the process of building modern web applications. It provides a set of conventions and features that enhance the development experience, making it easier to create performant and SEO-friendly applications. This comprehensive Next.js course unfolds by beginning with an introduction to web development fundamentals, as it progresses through React basics, advanced Next.js concepts, and real-world deployment strategies. We will explore key topics such as server-side rendering (SSR), client-side rendering (CSR), static site generation (SSG), and incremental static regeneration (ISR). The course offers hands-on experience with a final project, covering everything from structuring applications to optimizing for performance and SEO. The modular format accommodates varying skill levels, ensuring a well-rounded and practical learning experience for all learners. Upon completion of this Next.js course, you will become proficient in web development fundamentals, React essentials, and advanced Next.js concepts. Through hands-on experience, master server-side rendering, client-side rendering, dynamic routing, and performance and scalability in real-world scenarios. What you will learn Master SSR, CSR, and SSG for optimized web development Explore React basics and advanced component development in Next.js Implement Next.js best practices for efficient and scalable web applications Learn to create dynamic routes for versatile content handling Deploy fully functional applications using Vercel and Git/GitHub workflows Enhance applications for search engines and social platforms through metadata and SEO practices Audience This Next.js course is tailored for a diverse audience, catering to both entry-level and seasoned developers. Ideal for junior developers, it provides a strong foundation in web development fundamentals, React basics, and advanced Next.js concepts. Intermediate developers can enhance their skills and gain mastery in the latest features of Next.js. Senior web developers seeking to stay updated with modern concepts will find valuable insights for optimizing web applications. No programming experience is required, but basic web development and JavaScript understanding is desirable for the course. About the Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883907 , 1835883907
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Artificial intelligence ; Apprentissage automatique ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is an innovative course tailored for those who aspire to master the dynamic fields of computer vision and generative artificial intelligence. This course offers a deep dive into the world of image recognition, object detection, and the magic of generative AI using tools like KerasCV, Python, TensorFlow, PyTorch, and JAX. This course guides you from the fundamentals of image classification to the intricacies of object detection, starting with the KerasCV library for deep learning. You'll learn to effectively use and fine-tune pre-trained models, create custom datasets for object detection, using tools like the LabelImg GUI program, and apply these skills to tackle real-world challenges. A key focus is the generative AI segment, particularly on Stable Diffusion, where you'll learn to generate detailed images from text, unlocking your creative potential in this advanced AI domain. This course offers a progressive learning path from basic concepts to advanced techniques, catering to both professional development and creative pursuits in AI. By the end, you'll have the confidence and tools needed for a variety of applications in the ever-evolving field of generative artificial intelligence. What you will learn Harness the power of the KerasCV library for efficient deep learning Master image classification techniques using pre-trained models Implement object detection in real-world scenarios Fine-tune models for tailored applications and datasets Create custom object detection datasets with LabelImg Understand the integration of TensorFlow, PyTorch, and JAX in computer vision Audience This course is ideal for individuals ranging from beginners to advanced learners who possess a fundamental understanding of machine learning and Python programming. It is especially beneficial for those keen on delving into the realm of computer vision using KerasCV. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885680 , 1835885683
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a thorough exploration of network threats, vulnerabilities, and their mitigations, providing a solid foundation in cybersecurity. It dives into the specifics of on-prem and cloud threats, emphasizing common security vulnerabilities and attack mitigation strategies. The course also covers the essentials of cryptography, including modern cryptographic solutions and the fundamentals of Public Key Infrastructure (PKI). The course focuses on practical skills, exploring various Cisco security tools and techniques. It delves into network security deployment models, NetFlow, network segmentation, and advanced security protocols like IKEv1 and IKEv2. The course also covers the use of Python scripts for enhancing security appliance API calls and differentiates between intrusion prevention and firewalling. The course wraps up with detailed insights into Cisco's security products, including Firepower devices, Web Proxy, ESA, WSA, and Cisco Umbrella. It provides practical knowledge on configuring and verifying these tools, alongside addressing endpoint security, Multi-Factor Authentication (MFA), and device compliance. What you will learn Identify and mitigate network threats Implement on-prem and cloud security Understand modern cryptographic solutions Utilize Python for security automation Configure Cisco Firepower and Umbrella Manage network security with Cisco tools Audience This course is ideal for any learner who wants to understand enterprise-level approaches to defense in depth security of systems and data. This course targets implementers and lead architects of security solutions with a bias toward the use of Cisco security hardware and software releases. From a certification perspective, this course prepares learners to pass exam 350-701 (SCOR). About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886649 , 1835886647
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Machine learning ; Computer science Mathematics ; Apprentissage automatique ; Informatique ; Mathématiques ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course starts with an introduction to the key concepts and outlines the roadmap to success in the field. You'll begin by understanding the foundational elements of matrix and vector derivatives, exploring topics like linear and quadratic forms, chain rules in matrix form, and the derivative of determinants. Each concept is reinforced with exercises, ranging from quadratic challenges to least squares and Gaussian methods. The course progresses into optimization techniques essential in data science and machine learning. Delve into multi-dimensional second derivative tests, gradient descent in one and multiple dimensions, and Newton's method, including practical exercises in Newton's Method for least squares. An additional focus is set on setting up your environment, where you'll learn to establish an Anaconda environment and install crucial tools like Numpy, Scipy, and TensorFlow. The course also addresses effective learning strategies, answering pivotal questions like the suitability of YouTube for learning calculus and the recommended order for taking courses in this field. As you journey through the course, you'll transition from foundational concepts to advanced applications, equipping yourself with the skills needed to excel in data science and machine learning. What you will learn Understand matrix and vector derivatives Master linear and quadratic forms Apply the chain rule in matrix calculus Solve optimization problems using gradient descent and Newton's method Set up the Anaconda environment for machine learning Install and use key libraries like Numpy and TensorFlow Develop effective strategies for learning calculus in data science Audience This course suits students and professionals eager to learn the math behind AI, Data Science, and Machine Learning, ideal for deepening knowledge in these advanced technology fields. Learners should have a basic knowledge of linear algebra, calculus, and Python programming to effectively understand matrix calculus. A keen interest and enthusiasm for exploring this intricate subject are also crucial for a fulfilling learning experience. About the Author Lazy Programmer: The Lazy Programmer, a distinguished online educator, boasts dual master's degrees in computer engineering and statistics, with a decade-long specialization in machine learning, pattern recognition, and deep learning, where he authored pioneering courses. His professional journey includes enhancing online advertising and digital media, notably increasing click-through rates and revenue. As a versatile full-stack software engineer, he excels in Python, Ruby on Rails, C++, and more. His expansive knowledge covers areas like bioinformatics and algorithmic trading, showcasing his diverse skill set. Dedicated to simplifying complex topics, he stands as a pivotal figure in online education, adeptly navigating students through the nuances of data science and AI.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883006 , 1835883001
    Language: English
    Pages: 1 online resource (1 video file (19 hr., 34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Access control ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of fundamental concepts in information security and incident management, covering topics such as Vulnerability Management, Threat Assessments, Risk Management, and the NIST RMF. The course guides you through the incident handling process, from preparation to post-incident activities. Learn how to prepare for incident handling, record and assign incidents, perform incident triage, and handle notifications effectively. The curriculum covers incident containment, evidence gathering, forensic analysis, eradication, recovery, and post-incident activities. Gain hands-on experience with ethical hacking tools and techniques, preparing you to address real-world cybersecurity challenges. The course explores various security incidents, including network security, unauthorized access, inappropriate usage, denial-of-service, and web application security incidents. Additionally, delve into cloud security, insider threats, and essential security checks. Upon course completion, you'll possess critical security analysis and incident response skills, equipping you to identify, address, and prevent complex cyber threats effectively. What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. A basic understanding of information security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889749 , 1835889743
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into the foundations of cybersecurity, exploring the CIA Triad and various security approaches. It lays the groundwork for understanding complex security tools and practices, differentiating key security concepts, and identifying risk management methods. As you progress, you'll explore the intricate world of cybersecurity, from understanding different types of threat actors to comparing various security deployments and access control models. The course focuses on enhancing your ability to tackle real-world challenges. You'll learn to identify data visibility challenges and use the 5-tuple approach to isolate hosts effectively. The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. Each module is designed to reinforce your understanding of cybersecurity's most crucial aspects. The course wraps up by integrating all the concepts and skills you've learned. You'll delve into network attacks, web application attacks, and the nuances of social engineering. Additionally, you'll gain valuable insights into certificate components, endpoint-based attacks, and the intricacies of Windows 10 and Ubuntu systems. What you will learn Understand key cybersecurity concepts and tools Evaluate and compare security deployments Tackle data visibility and loss challenges Implement effective detection methodologies Analyze network and web application attacks Apply incident analysis and forensic techniques Audience This course is ideal for aspiring cybersecurity professionals and IT staff. Perfect for those seeking foundational skills in cybersecurity and network threat analysis, aligned with Cisco standards. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888766 , 1835888763
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 16 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a detailed walkthrough of installing Red Hat Enterprise Linux 8, setting the stage for comprehensive learning. It progresses to cover essential concepts such as effective console usage, managing software updates, and handling software repositories. The course also introduces systemd, automation through Kickstart, and the intricacies of building a Kickstart image for streamlined deployments. The course delves into the critical aspects of network management, including configuring Network Manager CLI, Network Time Protocol, and setting up NFS servers and clients. An in-depth exploration of the file system hierarchy is provided, guiding you through selecting and creating robust file systems and managing volumes using the Logical Volume Manager (LVM). You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. The course also covers important tools like the Automatic Bug Reporting Tool and SOS Reports for effective system analysis. Towards the end, the course focuses on performance and log monitoring, providing insights into running and managing virtual machines on RHEL. This comprehensive course equips you with the knowledge and skills to confidently manage and secure Red Hat Enterprise Linux 8 environments, preparing you for advanced roles in system administration. What you will learn Learn to install and configure Red Hat Enterprise Linux 8 Create and modify LVM volumes effectively Implement security protocols and firewalld Secure systems with SELinux and SSH Monitor system performance and logs Run and manage virtual machines on RHEL Audience This course is ideal for IT professionals, system administrators, and technicians keen on enhancing their skills in Linux administration. Familiarity with basic Linux commands and networking concepts is beneficial. This course is suited for those looking to proficiently manage and secure Red Hat Enterprise Linux systems. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: ACI Learning, Don Pezet, Zachary Memos, instructors. - Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880784 , 1835880789
    Language: English
    Pages: 1 online resource (1 video file (39 hr., 53 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885543 , 1835885543
    Language: English
    Pages: 1 online resource (1 video file (17 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Agile software development ; Project management Examinations, questions, etc ; Project management Study guides Examinations ; Méthodes agiles (Développement de logiciels) ; Gestion de projet ; Examens, questions, etc ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an insightful overview of PMI Agile Certified Practitioner (PMI-ACP), starting from the application process to exploring the dynamics of PMI Island for exam preparation. It provides a thorough understanding of the PMBOK Guide and compares predictive and adaptive methodologies, tracing the history of Agile and its basic concepts. The course then dives into various Agile methodologies, including Scrum, Extreme Programming, and Kanban, offering a detailed study of each. The course focuses on applying Agile principles in real-world scenarios. It emphasizes value-driven delivery, understanding business value, risk management in Agile projects, and Agile contracting methods. Learners gain insights into stakeholder engagement, adaptive leadership, and building high-performance teams. The course also covers adaptive planning, detecting and resolving problems in Agile environments, and continuous improvement techniques. The course wraps up with a comprehensive review of the essentials for the PMI-ACP exam, ensuring learners are well-prepared to excel in their Agile project management careers. What you will learn Understand PMI-ACP exam structure and application Apply Agile principles in project management Prioritize tasks and manage risks in Agile Develop effective stakeholder engagement strategies Implement continuous improvement in Agile projects Prepare comprehensively for the PMI-ACP exam Audience The course is ideal for professionals aspiring to excel in Agile project management. Basic knowledge of project management practices is recommended. It's perfect for those seeking PMI-ACP certification and wanting to implement Agile methodologies in their projects. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887080 , 1835887082
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/4
    Keywords: Computer software Testing ; Automation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing and comparing Cypress with Selenium, emphasizing Cypress's architectural advantages in automation. It guides you through tool installation across various operating systems and dives into Cypress's setup, test runner, and structure, laying a solid foundation for your journey in automation. Beyond setup, the course dives into Cypress automation, covering syntax, locator strategies, selector playground, CSS selectors, and XPath use. It enhances your grasp of Cypress commands, including chaining and handling child elements, and contrasts Cypress's asynchronous nature with synchronous operations, guiding you in promise handling. You'll explore Cypress assertions, including implicit, explicit, and common types used in testing. The course emphasizes interactive web UI elements, teaching interaction techniques with checkboxes, dropdowns, and mouseover events, and covers element list handling with loops and iterations. Additionally, learn to navigate through windows, tabs, popups, and frames, and address common challenges while building a strong framework. The course thoroughly covers the POM, environment variables, and experimental features. It also delves into API testing and automation, along with practical sessions on Git, GitHub, Jenkins, and advanced CSS selectors. What you will learn Understand Cypress architecture and how it compares with Selenium Understand the asynchronous nature of Cypress and handle promises Conduct both implicit and explicit assertions in testing Interact with web UI elements like checkboxes, dropdowns, and mouseover events Perform API automation with Cypress Integrate and manage Jenkins for continuous integration Audience Ideal for a wide range in software testing, this course benefits QA professionals and manual testers transitioning to automation, enhances skills, aids fresh graduates in software engineering, and offers QA Team leads and Managers insights into automation tools and best practices. Perfect for all levels in the QA and testing field. No prior automation or coding experience required; course suitable for beginners with JavaScript concepts included. Requires only a Windows/MAC computer and a browser (Firefox or Chrome). About the Author Let's Kode It : Let's Kode It is here with a mission to teach everyone a new skill--doing what they have always wanted to do. They are a group of software professionals with more than 10 years of expertise in different areas of software industries and working as team leads in multinational companies. All their instructors have master's degrees from reputed universities. Their expertise lies in various fields of Software Development Life Cycle (SDLC)--from application development and testing to system administration. Be it programming or creating a professional-looking MS Word document, they believe anyone can code and that coding is not something out of this world. Their goal is to offer high-quality technology courses, which will suit a newbie as well as an intermediate.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886502 , 1835886507
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 25 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Risk management ; Sécurité informatique ; Gestion du risque ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an exploration of NIST Cybersecurity and Risk Management Frameworks, offering insights into their significance in today's digital landscape. You'll delve into NIST publications, relationships, and the framework's core components, setting a strong foundation. As the course progresses, you'll gain an in-depth understanding of NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF). Discover how to assess risks, categorize information systems, and select appropriate security controls. Learn to create System Security Plans (SSPs) and implement security controls effectively. The course wraps up by emphasizing the importance of a risk-based approach to security, highlighting the RMF preparation step, and covering topics like system authorization, risk response, and change management. What you will learn Navigate complex NIST relationships and standards Conduct risk assessments and categorization Implement security controls effectively Ensure system authorization and risk response Manage change and configuration control Handle system disposal and continuity of operations Audience This course is ideal for cybersecurity professionals and risk managers seeking expertise in NIST frameworks. Basic knowledge of cybersecurity concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880760 , 1835880762
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.15/5
    Keywords: Risk management ; Information technology Security measures ; Gestion du risque ; Technologie de l'information ; Sécurité ; Mesures ; risk management ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The NIST 800-37 Risk Management Framework is a set of guidelines and best practices developed by the National Institute of Standards and Technology to assist organizations in managing and mitigating information security risks effectively. It provides a structured approach to risk management, emphasizing continuous monitoring and a lifecycle process for securing information systems. The NIST 800-37 Risk Management Framework (RMF) guides organizations through a systematic risk management process. It begins with "Prepare" to establish context and allocate resources, followed by "Categorize" for classifying information systems. The subsequent steps include "Select Controls" to tailor security measures, "Implement Controls" to put them into practice, "Assess Controls" for effectiveness evaluation, "Authorize" for system approvals, and "Monitor" for continuous oversight and response to changes in the information system's environment. Upon completion, you will possess a clear understanding of the framework principles and components. Armed with this knowledge, navigate the risk management lifecycle with confidence. You will gain proficiency in identifying, assessing, and prioritizing risks, selecting and implementing security controls, and ensuring continuous monitoring and authorization aligned with industry best practices. What you will learn Understand core principles and significance of NIST 800-37 RMF Learn methodologies for risk identification and prioritization Choose and implement controls based on organizational risk Assess implemented controls and identify vulnerabilities Grasp the steps to grant system and information authorizations Integrate NIST 800-37 RMF with other compliance frameworks and standards Audience The course is tailored for cybersecurity professionals, including risk managers, information security officers, compliance officers, IT and security managers, and risk assessment professionals. Geared toward individuals with a foundational knowledge of cybersecurity, the course equips you with skills to navigate the risk management lifecycle. You will gain proficiency in risk identification, assessment, and prioritization, and implementation of security controls. The course addresses RMF integration with compliance frameworks for those overseeing regulatory compliance within organizations. About the Author Alexander Oni: Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    ISBN: 9781835883549 , 1835883540
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This in-depth masterclass provides end-to-end coverage of developing enterprise-grade LLMs tailored to your unique use cases. Led by experts Maxime Labonne, Dennis Rothman, and Abi Aryan, this video delivers the advanced skills needed to architect performant LLMs that deliver real business impact. You'll learn how to make crucial architecture decisions, select optimal model types, configure hyperparameters, and curate quality training data. Discover professional techniques for pre-training, iterative fine-tuning, and rigorous model evaluation. The instructors reveal insider strategies to productionize your LLMs smoothly, monitor them proactively, and maintain optimal performance post-deployment. Following a structured curriculum spanning the complete LLM lifecycle, this masterclass empowers you with hands-on skills to build, refine, and deploy large language models with confidence. Turbocharge your generative AI initiatives and get the practical knowledge needed to create LLMs that solve complex challenges for your organization. What you will learn How to select the right LLM architecture for your use case Approaches for sourcing, cleaning, and labeling quality training data Pre-training methods and hyperparameter optimization Advanced fine-tuning techniques to boost performance Ways to thoroughly evaluate LLMs before deployment Best practices for monitoring, updating, and maintaining production LLMs Audience Data scientists, machine learning engineers, and AI developers seeking an in-depth understanding of large language model (LLM) development. This masterclass is designed for professionals aiming to build, optimize, and deploy enterprise-grade LLMs tailored to specific use cases, with a focus on practical skills and real business impact. About the Authors Maxime Labonne: Sr. Machine Learning Scientist, JPMorgan. Denis Rothman: Expert in AI Transformers including ChatGPT/GPT-4, Bestselling Author. Abi Aryan: ML Engineer and Author.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886281 , 1835886280
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 30 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Scrum (Computer software development) ; Agile software development ; Continuous improvement process ; Scrum (Développement de logiciels) ; Méthodes agiles (Développement de logiciels) ; Amélioration continue ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a comprehensive journey into Scrum and Agile project management in our course. Starting with foundational principles, we move on to advanced concepts, guiding you through effective project management with Scrum. Furthermore, gain insights into orchestrating Scrum Teams, exploring the nuances of running projects with Scrum, and understanding key Scrum concepts. Moving on, you will immerse yourself in the dynamic flow of Scrum Events and equip your toolkit with essential platforms using our Scrum Toolkit series. Next up, explore popular tools such as Jira, Microsoft Teams, Microsoft Planner, and the newly introduced Trello. Stay ahead with the latest trends by incorporating ChatGPT into Scrum Teams for optimization and productivity, a cutting-edge dimension unveiled in our course. As you progress through the course, witness Scrum in practice, honing your skills through practical applications. With high-quality video lectures, downloadable handouts for quick reference, and engaging quizzes, this course provides a dynamic and interactive educational experience. By the end of the course, you will have a solid grasp of Scrum and Agile project management. You will be well-versed in the Scrum culture, proficient in managing projects using Scrum methodologies, and skilled in running projects with Scrum Teams. What you will learn Learn to apply Scrum for project success Explore how to deliver business value through Scrum Accelerate project delivery by understanding Scrum Master diverse Scrum concepts for effective implementation Explore proficiency in utilizing Scrum tools Understand the depth of Scrum values, principles, and pillars Audience This course is tailored for diverse audiences, including beginners exploring Scrum and those seeking certification. Ideal for project managers, developers, business analysts, architects, designers, and managers, it covers foundational to advanced Scrum concepts. Whether you are starting your Scrum journey or aiming to enhance existing skills, this course provides valuable, concise, and flexible learning experiences for successful Scrum adoption in various professional roles. About the Author YESI EDUCATION: Mauricio Rubio Parra is an Agile Guru and the founder of YESI EDUCATION. In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. YESI EDUCATION is a global online education business with over 100 products that reach more than half a million students in over 200 countries. Their portfolio of products includes online courses, eBooks, audiobooks, newsletters, apps, podcasts, and other educational resources such as templates. YESI is formally incorporated and headquartered in Sydney, Australia, and has three main divisions: education, property and invest. YESI, founded in 2016, has a strong focus on passive income generation and wealth creation. The company constantly explores new revenue streams, disruptive and innovative technologies as well as investment opportunities and new products within its three divisions.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 8, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886069 , 183588606X
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management ; Gestion de projet ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a warm welcome and an overview of the PMP exam, setting the stage for an in-depth exploration of project management methodologies. It covers the three domains of project management and delves into various methodologies, including predictive, hybrid, and Agile. The course provides a comprehensive understanding of Agile, from its manifesto and values to detailed principles, along with insights into Agile planning and terminology. The course focuses on practical applications, including Agile estimating techniques, sprint planning, and understanding the project management environment. It also covers the primary skills of a project manager, balancing competing constraints, and the intricacies of project lifecycle and work authorization systems. The course goes beyond theory, delving into tools and techniques for building and leading a team, defining team ground rules, and engaging virtual teams. The course wraps up with extensive preparation for the PMP exam, including breaking down questions, understanding the PMI Code of Conduct, and insights into the application process. It equips you with the knowledge and skills to excel on exam day, setting a strong foundation for your career in project management. What you will learn Navigate the PMP exam overview and structure Understand Agile principles and methodologies Develop key project management skills and strategies Implement effective team building and leadership techniques Manage project scope, budget, and schedules proficiently Apply risk management and stakeholder engagement practices Audience The course is ideal for professionals seeking PMP certification or advancing their project management skills. A foundational understanding of project management principles is beneficial. This course is a perfect fit for those aiming to align with PMI standards and embrace various project management methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883341 , 1835883346
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer software developers Certification ; Computer software Study guides Development ; Examinations ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with setting up essential development and virtualization tools on both Linux and Windows, laying the groundwork for efficient network development. You'll delve into various data formats like JSON, XML, and YAML, essential for modern software development and API interactions. As the course progresses, it explores software development methodologies, including Agile, Lean, and Waterfall, providing insights into choosing the right approach for your projects. You'll also gain a solid understanding of software quality, code organization, and version control, with a focus on Git basics for both local and remote management. The course emphasizes practical applications of these skills in real-world scenarios, from API basics to managing application infrastructure and security. The course wraps up by immersing you into the world of DevOps, including Docker and Bash basics, unit testing, and automated testing strategies, complemented by hands-on experience in configuring devices with Bash, Python, and Ansible. You'll also navigate through key networking concepts, IP services, and platform capabilities, culminating with Python scripting using a Cisco SDK. What you will learn Understand Agile, Lean, and Waterfall methodologies Learn Git basics and version control Grasp API usage and application infrastructure Dive into Docker and Bash essentials Configure devices using Python and Ansible Navigate through networking basics and IP services Audience This course is ideal for IT professionals and network enthusiasts seeking to enhance their skills in network development and automation. Familiarity with basic networking and programming concepts is beneficial. Perfect for those aiming to acquire Cisco DevNet Associate certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881668 , 1835881661
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Computer networks Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course provides a comprehensive exploration of Cisco Firewall and IPS systems, optimized for deployment within the AWS ecosystem. It commences with a foundational overview, catering to both novices and seasoned professionals. Beginning with AWS Virtual Private Cloud (VPC) configuration, you'll establish the foundation for building secure network infrastructures. The course then focuses on deploying the Firepower Management Center virtual (FMCv), a pivotal component for effective security policy management and monitoring. You'll master the Next-Generation Firewall virtual (NGFWv) deployment within AWS, bolstering your ability to safeguard networks against evolving cyber threats. Hands-on labs and practical exercises are integrated to impart real-world skills in configuring, troubleshooting, and securing Cisco Firewall and IPS systems. You'll gain expertise in risk management, report generation, and effective troubleshooting techniques. By course completion, you'll be well-prepared for Cisco CCNP Security SNCF (Exam 300-710), poised to excel in the realm of cybersecurity. What you will learn Configure AWS VPC for Cisco Firewall and IPS systems Deploy and manage FMCv and NGFWv in AWS Implement NGFW Routed and Transparent modes Explore multi-instance deployments and clustering Troubleshoot using CLI/GUI and perform packet capture Enhance security with Cisco AMP and other integrations Audience This course is ideal for cybersecurity professionals and network administrators looking to advance their skills in Cisco Firewall and IPS systems. A basic understanding of networking concepts and AWS is preferred. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 30, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881248 , 1835881246
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Web applications Security measures ; Tests d'intrusion ; Applications Web ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the foundational elements of web application infrastructure, introducing you to the critical aspects of URLs, HTTP Methods, and the underlying technologies that make the internet tick. You will gain a firm grasp on the workings of Web APIs, Content Management Systems, and Databases, setting the stage for more advanced topics. The course focuses on equipping you with the skills to identify, analyze, and exploit vulnerabilities within web applications. From exploring the use of powerful tools like Burp Suite and OWASP ZAP to understanding the intricacies of SQL Injection, XSS attacks, and CSRF (Cross-Site Request Forgery), you will journey through a curriculum designed to challenge and enhance their hacking capabilities. The course wraps up by delving into complex security issues such as JWT Attacks, IDOR, and SSRF, ensuring you emerge with a well-rounded mastery of web app pentesting. Throughout, the emphasis is on hands-on learning, providing you with the opportunity to apply concepts in real-world scenarios, thereby cementing your understanding and preparing you for professional success. What you will learn Conduct vulnerability scans with Nikto and Burp Suite Execute directory fuzzing with Feroxbuster Detect and exploit SQL injections using SQL Map Uncover and mitigate XSS vulnerabilities Safeguard against CSRF and SSRF threats Implement JWT attack strategies for security Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and aspiring ethical hackers seeking to deepen their understanding of web app vulnerabilities. Familiarity with basic security concepts and experience with web technologies are recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883440 , 1835883443
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer security ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a critical look at password security, emphasizing the importance of robust credentials in protecting personal and professional data. Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. You'll learn the importance of being careful about who you trust online. Next, the course covers how to protect your computers and devices from being physically broken into. It also talks about the right way to get rid of old data so that nobody else can find it. This part is all about keeping your stuff safe in the real world. The course also looks at safe and unsafe networks. You'll learn how to check if a network is secure and what to do when using a risky one. Finally, the course dives into malicious software or malware. You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security. What you will learn Secure passwords with best practices Conduct safe data disposal protocols Navigate networks with safety measures Identify various forms of malicious software Apply defenses against software threats Adopt proactive cyber hygiene habits Audience This course is ideal for individuals looking to bolster their digital security acumen. Tailored for users who wish to protect their online presence against evolving cybersecurity threats. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781801078047 , 1801078041
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the foundational concepts of working with variables and basic scripting, setting the stage for more advanced scripting techniques. It delves into the intricacies of the Linux operating system, including the X11 and Xorg configuration. As the course progresses, it covers critical administrative tasks such as managing user accounts, groups, system accounts, and scheduling tasks with cron and systemd. The importance of localizing Linux, managing system time, and configuring network time protocol (NTP) servers and clients is highlighted. The course focuses on essential system management topics, including system logging with rsyslog and journald, configuring mail transfer agents, and managing printers. Networking fundamentals are explored, from understanding TCP/IP to configuring network adapters and troubleshooting network issues. Security is a key theme, with topics on auditing permissions, managing root access with sudo, exploring networks, hardening Linux, and configuring SSH and GPG for secure communications. The course wraps up by offering insights into tunneling traffic with SSH, providing students with a comprehensive skill set for securing and managing Linux systems effectively. What you will learn Manage Linux user accounts and groups efficiently Schedule tasks using cron and systemd Configure and troubleshoot Xorg and remote X servers Secure Linux systems and manage root access Configure network settings and troubleshoot networking issues Encrypt data and communications with GPG Audience This course is ideal for aspiring and current IT professionals seeking to deepen their expertise in Linux administration. Ideal for those aiming to pass the LPIC-1 (102-500) certification exam. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883020 , 1835883028
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an essential overview, preparing you to dive into the world of Blender with a focus on lighting and compositing fundamentals. It progresses to cover lighting basics, where you'll learn to manipulate area, point, spot, and sunlight sources, and understand their properties for creating mood and atmosphere. The course focuses on Blender's Eevee renderer to teach ambient occlusion, bloom effects, and real-time rendering options, enhancing the visual fidelity of your projects. Advanced lessons explore techniques for reducing render times, exploring HDRI skybox lighting, and achieving stylistic effects with cell shading. The course wraps up with practical applications in night scene lighting, professional 3-point setups, interior and studio lighting configurations, and the intricacies of 3D environment presentation. By the end, you'll be equipped to add depth, realism, and emotion to your 3D scenes through proficient lighting and compositing. What you will learn Apply HDRI skyboxes for environmental lighting Utilize Eevee renderer for ambient and bloom effects Accelerate Blender render times efficiently Implement cell shading with Freestyle Light night scenes and create volumetric fog Set up professional 3-point lighting Audience This course is ideal for beginners and hobbyists eager to delve into 3D art, with a focus on lighting and compositing. No prior knowledge of Blender is required, making this course perfect for those new to 3D modeling and looking to enhance their visual storytelling skills. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884461 , 1835884466
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/038
    Keywords: Information technology Management ; COBIT (Information technology management standard) ; Technologie de l'information ; Gestion ; COBIT (Norme) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to COBIT 19, setting the stage for a comprehensive exploration of enterprise governance of information and technology. It delves into the significant benefits I&T governance brings to the table, emphasizing the importance of aligning IT processes with business goals. The course focuses on detailing what COBIT is and importantly, what it is not, establishing a clear understanding of its scope and application. Through an examination of COBIT's six principles for a governance system and its three framework principles, learners gain insights into the enhancements introduced in COBIT 2019. The course wraps up by guiding learners through the governance and management objectives, the components of the governance system, and the impactful design factors, alongside providing practical insights into the COBIT implementation guide approach. Through this journey, participants will grasp the vital role of COBIT in the IT world and prepare for what lies beyond the COBIT certification. What you will learn Understand enterprise governance of IT Navigate COBIT 2019 enhancements Identify governance and management objectives Apply COBIT in various IT scenarios Achieve COBIT certification readiness Plan for continual IT governance improvement Audience This course is ideal for IT professionals, auditors, and managers aiming to bolster their organization's IT governance. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    ISBN: 9781800563940 , 1800563949
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Sécurité informatique ; Protection de l'information (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. It unpacks the significance of GDPR for businesses and individuals, emphasizing the importance of compliance in today's data-driven world. By dissecting the regulation piece by piece, the course offers clear, accessible insights into its complexities. The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. This structured approach demystifies each component, making it easier to understand how GDPR affects various aspects of data handling and privacy. The course wraps up by addressing the crucial elements of accountability and governance, preparing you to implement GDPR-compliant strategies within your organization. Through this journey, you will gain the knowledge and tools necessary to navigate the requirements of GDPR, ensuring your business or organization not only complies with the regulation but also upholds the highest standards of data protection. What you will learn Understand GDPR's core principles Navigate GDPR compliance requirements Manage data breaches and notifications Enhance data protection and privacy Handle cross-border data transfers Apply GDPR in organizational contexts Audience This course is ideal for data protection officers, compliance managers, IT professionals, and legal advisors. Basic knowledge of data protection laws is beneficial. Perfect for those looking to ensure GDPR compliance within their organizations. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835463376 , 1835463371
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with foundational security principles, introducing you to the landscape of digital threats, vulnerabilities, and the mechanisms behind cyber exploits. It delves into the importance of understanding and mitigating risks to minimize their impact on organizations and individuals. The course focuses on both the human and technical aspects of security, ranging from social engineering and physical security measures to the intricacies of browser and wireless security. It emphasizes the criticality of robust user authentication methods, comprehensive permissions, and stringent password policies to fortify defenses against unauthorized access. The course wraps up by exploring advanced concepts such as encryption, secure protocols, and network isolation, equipping you with the knowledge to implement effective security strategies and solutions. Throughout this journey, you'll gain insights into the significance of each topic in protecting information assets and ensuring the integrity of digital environments. What you will learn Understand core security principles Identify and mitigate digital risks Combat social engineering tactics Implement strong password policies Secure networks with firewalls Protect against malware threats Audience This course is ideal for IT professionals, system administrators, and cybersecurity enthusiasts seeking to bolster their knowledge of digital defense mechanisms. A fundamental understanding of computer networks and internet functionality is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835466124 , 1835466125
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Hacking ; Tests d'intrusion ; Piratage informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the groundwork with breach scanning and enumeration, guiding learners through identifying vulnerabilities in network systems and web applications. It covers techniques such as Web App Enumeration, HTTPS analysis with Wireshark and Burp Suite, and POP3 Enumeration, setting the stage for deeper exploration into cybersecurity defenses. The course focuses on practical application, moving from theoretical concepts to real-world hacking techniques. Learners will navigate through gaining access, exploiting systems, and executing privilege escalations both horizontally and vertically. Scenarios involving systems like GoldenEye, Bob, and Straylight offer hands-on experience, emphasizing the attacker's perspective to fortify defense mechanisms. The course wraps up with advanced topics in exploit development and real-world applications, challenging learners to apply their knowledge in complex environments. From scanning and enumeration to gaining access and privilege escalation, learners will develop a solid foundation in hacking techniques and cybersecurity defense. This course not only equips technical professionals with essential skills but also empowers them to think like a hacker, a vital perspective in today's digital world. What you will learn Conduct breach scans and enumerations Analyze HTTPS traffic for vulnerabilities Utilize Burp Suite for web app security testing Execute horizontal and vertical privilege escalations Escape restricted shells for full system access Implement advanced server and client protection strategies Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers looking to deepen their understanding of hacking techniques and security defenses. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886267 , 1835886264
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course kicks off with an engaging introduction to Blender and its pivotal role in asset management, laying the groundwork for aspiring 3D artists to navigate the complexities of digital modeling. From the outset, learners are immersed in the Blender Basics Overview, accompanied by a rich Resource Pack, to swiftly get up to speed with the software's capabilities. Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. The course continues through the nuances of creating detailed 3D environments, leveraging greyboxing techniques, and applying lifelike textures and materials to bring scenes to life. Special emphasis is placed on generating creative references using AI, crafting natural elements with geometry nodes, and designing intricate architectural features that stand out in any portfolio. As the course progresses, learners delve into advanced modeling, lighting, and the art of texture application, culminating in a segment dedicated to rendering techniques that showcase their projects in the best light. By the end, participants are not just proficient in Blender; they are equipped with a holistic view of 3D design, enabling them to bring their creative visions to fruition. What you will learn Navigate Blender's interface and tools Create efficient asset management workflows Design 3D environments with advanced greyboxing Apply textures and materials for realism Construct architectural elements in Blender Model and texture dynamic 3D foliage Audience This course is ideal for 3D artists, designers, and enthusiasts looking to enhance their Blender skills. Prior basic knowledge of 3D concepts is helpful but not required. This course is perfect for those seeking to create professional 3D models and environments. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888940 , 1835888941
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Computer technicians Study guides Certification ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management. Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats. By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise. What you will learn Summarize fundamental security concepts to build a strong base. Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. Implement robust identity and access management controls. Secure enterprise and cloud network architectures against potential threats. Enhance application security capabilities and ensure software integrity. Audience This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field. About the Author Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889244 , 1835889247
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Tests d'intrusion ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course unfolds with a comprehensive introduction to cybersecurity, spanning essential topics like online safety, ethics, and current events. Delving deeper, participants explore core principles, including the CIA Triad, threats, and vulnerabilities. From fundamental to advanced levels, the course covers cybersecurity techniques with hands-on experience in both Microsoft Windows and Linux environments. Navigating through networking basics, Microsoft Windows history, and security tools, the course emphasizes account management, security policies, and tools. A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. The course continues by unraveling the intricacies of computer operations, virtualization, and performance monitoring. Introducing Linux and Ubuntu, the course covers command-line usage, security measures, and advanced techniques. In the final stretch, you will explore ethical hacking tools and techniques, developing critical security analysis and incident response skills. The course concludes with advanced Ubuntu security, providing a comprehensive skill set for tackling evolving cyber threats. What you will learn Grasp the CIA Triad principles Implement basic and advanced cybersecurity techniques Navigate Microsoft Windows and MSDN Understand Linux and Ubuntu fundamentals Apply ethical hacking tools and techniques Develop critical incident response skills Audience This course is ideal for students and professionals seeking to excel in cybersecurity. A basic understanding of computer basics is recommended. Perfect for those aspiring to enhance their skills and adapt to the evolving landscape of cybersecurity. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Steve Linthicum: Steven W. Linthicum was a professor of computer science at Sierra College in Rocklin, California, retiring from his role in June 2017. Steve continues to teach and support other community college faculty in a variety of classes that focus on network administration, information assurance and security, and virtualization/cloud technologies. Steve has always been on the leading edge of technology, holding a variety of industry certifications issued by major industry leaders like Microsoft, VMware, CompTIA, ISC2, EMC, and Citrix. Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885406 , 1835885403
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the basics of Linux installation, ensuring you're well-equipped to set up Linux on both physical and virtual machines. It takes you through hardware detection and configuration, making sure your system is optimized for performance. You'll learn about the Linux boot process and how to configure GRUB, providing the knowledge needed to troubleshoot boot issues and understand system startup. The course focuses on the Linux shell, where you'll gain skills in managing processes and execution priorities, essential for maintaining a smooth and efficient system. Editing files with nano and vi is covered in detail, along with customizing the bash environment to streamline your workflow. You'll become proficient in managing files, redirecting data, and using powerful tools like grep to filter output, enhancing your day-to-day Linux administration tasks. The course wraps up by delving into advanced topics such as file permissions, ACLs, managing software with dpkg, apt, rpm, and yum, and understanding systemd for service management. Through practical exercises, you'll learn how to maintain filesystem health, manage disk utilization, and handle removable media, equipping you with the skills to manage Linux systems effectively. What you will learn Install Linux on VMs and hardware Detect and configure system hardware Manage boot processes and GRUB Utilize the Linux shell effectively Customize and optimize bash Handle file permissions and ownership Audience This course is ideal for aspiring system administrators, IT professionals, and tech enthusiasts looking to gain or enhance their Linux administration skills. Basic computer literacy and familiarity with operating systems are recommended to get the most out of this course. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837633074 , 183763307X
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the foundational elements of Linux Shell Scripting, guiding you through basic script building and the use of variables to automate repetitive tasks efficiently. As the course progresses, it focuses on more complex concepts such as redirection, arithmetic operations, and conditional statements, enhancing your scripting skills for real-world applications. Through practical examples, you'll learn how to craft scripts that solve problems, automate tasks, and streamline your workflow. The course wraps up by delving into advanced topics such as loops, user input handling, and script control, equipping you with the knowledge to write sophisticated scripts. By the end of this course, you'll have a solid understanding of Linux Shell Scripting, enabling you to leverage its capabilities to optimize and automate your Linux environment. What you will learn Craft basic to advanced shell scripts Automate tasks using shell scripts Implement conditional logic in scripts Create loops for repetitive tasks Control script flow and execution Optimize Linux tasks through scripting Audience This course is ideal for IT professionals, system administrators, and developers looking to automate and optimize their Linux environments. Basic knowledge of Linux commands is required. Perfect for those aiming to enhance their scripting skills for efficiency. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885628 , 1835885624
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Python (Computer program language) ; Intelligence artificielle ; Python (Langage de programmation) ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative learning experience with 'Master ChatGPT and OpenAI APIs By Building AI Tools in Python.' This immersive course takes you from the basics of ChatGPT and OpenAI's potent APIs through a journey of building dynamic AI-powered tools. Discover the magic behind ChatGPT's conversational prowess and dive deep into the neural networks and transformers that make it tick. You'll start by creating and managing your ChatGPT account, understanding the model's anatomy, and grasping the limitations and capabilities of AI language models. Transitioning from theory to hands-on practice, the course guides you through content creation, code generation, and the intricacies of prompt engineering. Moreover, you'll venture into the realms of generative AI with Midjourney, craft AI-driven applications, and harness the synergy of OpenAI and DALL-E for on-the-fly image generation. This course demystifies the AI concepts crucial in today's technology landscape, providing you with the skills to innovate and excel in the burgeoning field of AI. What you will learn Navigate the foundational elements of ChatGPT and OpenAI APIs Generate creative content and code with ChatGPT's language model Design and implement AI applications with user-friendly interfaces Master the art of prompt engineering for optimized AI interactions Build AI-powered tools and images using OpenAI and DALL-E Develop secure, intelligent applications with advanced Python techniques Audience This course welcomes everyone from entrepreneurs to artists and developers, aiming to learn about cutting-edge AI technologies and build AI-powered applications. Basic programming knowledge is preferred but not mandatory, making this course accessible to a wide range of learners. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805123019 , 1805123017
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.276
    Keywords: Active server pages ; Microsoft .NET Framework ; Internet programming ; Web site development ; Programmation Internet ; Sites Web ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins with an introduction, setting you up with essential tools and a clear roadmap for your learning journey. Delve into the fundamentals of .NET Core, understanding the MVC architecture, routing intricacies, and dependency injection. As the course progresses, you'll dive into Category and Product CRUD operations, gaining hands-on experience with database connectivity, Entity Framework Core, and dynamic UI development. We will learn the nuances of Razor Projects and the significance of N-Tier Architecture, enhancing your understanding of scalable and maintainable code structures. The Repository Pattern module deepens your grasp of efficient data handling, leading to seamless database transitions. We will also cover shopping cart implementation, order processing, and user management. You'll tackle advanced features like product image handling, social logins, and interactive UI elements, ensuring your e-commerce platform stands out. As you approach the course's climax, the focus shifts to crucial aspects of user authentication, role management, and secure user experiences with .NET Core Identity. The final modules guide you through deploying your application, integrating email services with SendGrid, and refining your project for real-world use. What you will learn Implement CRUD operations for products and categories Develop and manage Razor Projects with advanced features Apply N-Tier Architecture and Repository Patterns for scalable applications Build and manage shopping carts and order processes Integrate user authentication and manage roles using .NET Core Identity Employ deployment techniques and email integrations Handle multiple product images and social logins effectively Audience This course is designed for learners at all levels interested in mastering ASP.NET MVC Core (.NET 8), from the basics to advanced concepts. Ideal for anyone from web development beginners to seasoned professionals, this is a comprehensive guide for those looking to master Microsoft's latest framework and design large-scale projects using cutting-edge technologies. The ideal participants should have 3-6 months of experience in C# programming, and familiarity with tools like Visual Studio 2022, SQL Server Management Studio, and .NET 6 is recommended to fully benefit from the course content. About the Author Bhrugen Patel: Bhrugen Patel is a Microsoft MVP and a passionate Software Architect, known for his dedication to simplicity and attention to detail. With a background in programming that dates back to high school, Bhrugen has developed a range of web and desktop applications using .NET. He holds a Master's of Science in Computer Science and a Bachelor's in Computer Engineering, complementing his practical expertise. Alongside his full-time role, Bhrugen is devoted to teaching, driven by a mission to simplify coding and make it accessible. His goal is to alleviate the struggles of students seeking understandable resources. For Bhrugen, coding is not just a profession; it's a means to be creative and enjoy the journey of technological innovation.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885925 , 1835885926
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Artificial intelligence ; Computer programming ; Chatbots ; Application program interfaces (Computer software) ; Python (Computer program language) ; Intelligence artificielle ; Programmation (Informatique) ; Interfaces de programmation d'applications ; Python (Langage de programmation) ; artificial intelligence ; computer programming ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This comprehensive masterclass takes you on a transformative journey into the realm of LangChain and Large Language Models, equipping you with the skills to build autonomous AI tools. Starting with the basics, you'll set up your development environment, including OpenAI API and Python, and progress to advanced topics like LangChain's architecture, prompt templates, and parsers. The course meticulously guides you through creating complex chains, memory models, and agents, culminating in the development of practical applications such as PDF extractors, newsletter generators, and multi-document chatbots. With hands-on tutorials, you'll learn to leverage LangChain for tasks ranging from document loading and splitting to embedding vector stores for semantic similarity searches. By the end, you'll have the knowledge to implement AI in creative and impactful ways, from image-to-text conversion to building interactive chatbots and more, all while navigating the ethical considerations of AI deployment. What you will learn Configure OpenAI API and Python for AI development Create and manipulate LangChain prompt templates and parsers Implement LangChain memory models and chains for complex AI applications Develop real-world applications, including newsletter generators and chatbots Work with LangChain embeddings and vector stores for semantic searches Navigate the ethical and copyright implications of AI-generated content Audience This course is designed for a broad audience interested in artificial intelligence, from data scientists enhancing projects with AI and LangChain, to product managers boosting user experience with AI features. AI enthusiasts, tech innovators, and programmers will deepen their understanding of LangChain, unlocking new opportunities in AI-driven development and pioneering next-gen solutions. While specific knowledge of Python is not necessary, familiarity with programming concepts is essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888148 , 1835888143
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Software architecture ; Service-oriented architecture (Computer science) ; Architecture logicielle ; Architecture orientée service (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Dive into the world of Docker, the pivotal tool in container technology, with our Docker Mastery course. Designed for beginners, this course guides you through the essentials of Docker, explaining its importance and how it revolutionizes deployment processes. Starting with an introduction to Docker and its ecosystem, you'll understand why Docker is a game-changer in software development and deployment. You'll set up your development environment, master Docker fundamentals through hands-on exercises, and learn to manage containers efficiently. The course progresses to more complex topics like Dockerfile, image publishing, Docker layers, caching, and Docker Compose for multi-tier applications. With a special focus on CI/CD using Docker, GitHub Actions, and AWS Elastic Beanstalk, you'll gain the skills to automate your deployment workflows, ensuring faster and more reliable releases. By the end, you'll have a solid foundation in Docker, ready to tackle real-world challenges and streamline your development pipeline. What you will learn Setup and manage your Docker development environment Run, stop, and manage containers and images efficiently Optimize Dockerfile for effective image creation and management Publish Docker images and explore Docker layers and caching Develop CI/CD pipelines with Docker, GitHub Actions, and AWS Deploy complex web applications using Docker Compose Audience This course targets aspiring DevOps professionals, software developers, system administrators, IT managers, QA engineers, and technology enthusiasts. Ideal for those aiming to refine development workflows, enhance application portability, and ensure project consistency using Docker. It's perfect for individuals responsible for efficient app deployment, scaling, and management, as well as QA professionals looking to improve testing accuracy. No Docker experience required; some programming knowledge preferred but not essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835460429 , 1835460429
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Begin your 3D modeling journey with Blender, starting from the basics of setting up projects and creating grey boxes to organizing work with collections. Learn the intricacies of seams, sharps, and UV mapping, essential for effective texturing. The course progresses to scene optimization and asset management, followed by an exploration of materials, shaders, and advanced mesh editing techniques, including proportional editing and the use of Booleans. Dive deeper into refining skills with texturing, structural elements, and the art of adding Viking details. Transition your creations to Unreal Engine 5, where you'll set up scenes, integrate assets, and apply advanced materials for realistic environments. This course, designed for beginners ready to advance their skills, combines detailed instruction with project-based learning, preparing you for a career in 3D modeling and game development. From Blender's fundamentals to UE5's dynamic environment, unlock your creative potential and bring your digital worlds to life. What you will learn Utilize UV mapping for texture perfection Optimize 3D scenes for efficiency Craft materials and unique shaders Employ advanced mesh editing techniques Transition assets from Blender to UE5 Finalize scenes with professional lighting Audience This course is ideal for aspiring 3D artists and game developers with a keen interest in environment design. No prior experience is needed, making it perfect for beginners ready to dive into the world of 3D modeling and scene creation. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889848 , 1835889840
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey into the world of 3D design with our comprehensive Blender 4 Geometry Nodes course. Designed for beginners, this course covers everything from setting up your Blender project to mastering the intricacies of Geometry Nodes for creating stunning 3D models. You'll start with the basics, learning how to manipulate grid meshes and transform them into complex staircase designs. As you progress, the course introduces you to advanced techniques for railing construction, pole support creation, and optimizing your models for efficiency and precision. This hands-on approach is complemented by lessons on mesh manipulation, dynamic staircase shaping, and advanced node group creation, ensuring a comprehensive understanding of 3D modeling techniques. Whether your interest lies in game art, architectural visualization, or digital artistry, this course equips you with the skills to bring your imaginative concepts to life. By understanding the importance of each concept, you'll be able to apply these skills across various projects, enhancing your portfolio and opening up new career opportunities. What you will learn Navigate and utilize Blender 4's interface effectively. Understand and apply geometry node basics for 3D modeling. Design and manipulate grid meshes with curve length density. Transform 2D planes into 3D staircase models seamlessly. Create scalable controls and ensure uniformity in stair steps. Construct complex geometry node groups for detailed modeling. Audience This course welcomes everyone from beginners with no prior experience in Blender or 3D modeling to those looking to enhance their skills. It is ideal for beginners, aspiring artists, architects, digital creators, game developers, and educators eager to master 3D modeling with Blender 4's geometry nodes. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885703 , 1835885705
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 20 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Tests d'intrusion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the fundamentals of penetration testing, distinguishing the roles of pentesters - the good, the essential, and the challenges they face. It lays the groundwork with pre-engagement essentials, including data security agreements and crafting a detailed Statement of Work (SOW), ensuring clarity and legal safeguarding before any testing begins. The course focuses on the pentesting methodology, guiding you through the stages of assessment from validating scope to reconnaissance, vulnerability scanning, and exploitation. It emphasizes the importance of maintaining access, covering tracks, and preparing comprehensive deliverables to ensure actionable insights for enhancing security. The course wraps up by exploring personal engagement toolkits and pentesting platforms, providing practical knowledge for effective pentesting. It also touches upon blue team pentesting, highlighting the collaborative effort required in cybersecurity to protect against threats. What you will learn Plan and execute effective penetration tests Perform detailed reconnaissance and vulnerability scans Exploit vulnerabilities to assess security posture Maintain unauthorized access discreetly Execute strategies to conceal testing activities Produce comprehensive security assessment reports Audience This course is ideal for IT professionals, cybersecurity enthusiasts, and ethical hackers seeking to enhance their pentesting skills. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: Daniel Lowrie's IT career began with workstation support and Y2K compliance updates for a teaching hospital in North-Central Florida. His journey led him to become an in-classroom trainer and Mentored Learning Instructor, specializing in courses covering Microsoft Windows Desktops and Servers, Active Directory, Networking, CCNA, and Linux. He then transitioned to becoming a Systems and Network administrator for a large insurance company before joining ACI Learning as an Edutainer. Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Brad Stine: Brad Stine is the Chief Information Security Officer at Semper Sec with years of experience in security architecture. Throughout his career, Brad has played a key role in the development and delivery of technology-driven business solutions, including projects centered around cloud transformation, CI pipeline automation, and identity access management. Brad is highly skilled in Analytics, Incident Management, Vulnerability Management, ISO 27001:2013, and Enterprise Architecture. He has an extremely knowledgeable computer science background and holds a CISSP certification.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886465 , 1835886469
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Information Systems Audit and Control Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to the context of IT risk management, laying the foundation with key concepts and illustrating the vital role of IT risk management in shaping business strategy. The course progresses to elucidate the RACI Chart, essential roles concerning risk, and the influence of organizational structure and culture on risk management practices. It focuses on developing a solid understanding of risk management principles, processes, and controls, and delves into the relationship between IT risk and other business functions. It also addresses project risk, change risk, and the nuances of people and technology in the risk landscape. The course wraps up with practical insights into implementing controls, testing their effectiveness, and deploying risk response plans, all while emphasizing the value of risk communication and the importance of policies, standards, and procedures. What you will learn Grasp IT risk management fundamentals Navigate RACI charts and risk roles Assess organizational risk impact Communicate risk effectively Develop risk scenarios and responses Utilize key risk assessment tools Audience This course is ideal for IT professionals aiming to bolster their risk management skills. Knowledge of basic IT concepts is recommended. Perfect for those prepping for CRISC certification or seeking to align IT strategies with business objectives for robust security management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on chrmodern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836208938 , 1836208936
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 42 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer programming ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: """Applied Fundamentals: Guess the Number"" offers a hands-on approach to learning programming by guiding participants through the creation of a simple yet captivating game. Led by Justin and Vonne, along with Zach, this course begins with an overview, setting the stage for what's to come. As learners progress, they're taken through the crucial stages of game development--from initial planning and project setup to coding game logic and user interactions. The course emphasizes the iterative process of building software, including planning, coding, testing, and refining, making it ideal for those looking to strengthen their programming foundations. Through the development of the ""Guess the Number"" game, participants will learn about user input handling, program flow control, function utilization for cleaner code, and implementing game mechanics like guess limits and win/lose determination. This course not only teaches the technical aspects of programming but also instills a problem-solving mindset, critical for any aspiring developer. By the end, learners will have a fully functional game and a deeper understanding of how to apply programming concepts in real-world projects. What you will learn Plan and set up a programming project from scratch. Handle user inputs and process them within your application. Refactor code into functions for improved readability and maintenance. Implement control flow to manage game states, including win and lose conditions. Audience This course is ideal for beginners in programming or those with basic Python knowledge looking to solidify their understanding through a practical project. A fundamental understanding of Python syntax is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836204077 , 1836204078
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 37 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer programming ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course systematically walks you through the foundational aspects of Python, starting with the basics of setting up your programming environment and progressing through more complex programming concepts. Justin and Vonne guide you through understanding variables, values, data types, control structures, data structures, and iteration with clarity and practical examples. You'll delve into the nuances of Python's syntax, exploring how to write clean and efficient code. By tackling real-world problems, you'll apply what you've learned in a hands-on manner, solidifying your understanding and skills in programming. This course not only teaches you how to code in Python but also how to think like a programmer, preparing you for further learning and application in the tech industry. What you will learn Understand and use variables, expressions, and statements. Differentiate and use basic data types. Implement control structures. Work with Python data structures. Master iteration through loops, and comprehensions. Utilize iteration helpers like zip, range, and enumerate. Audience This course is perfect for beginners with no prior programming experience looking to dive into the world of Python programming. A curiosity about coding and a desire to learn are all you need to get started. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Vonne Smith: Vonne leads the content development for the OffceProTV and CreativeProTV channels. She has over a decade of experience teaching Office and Adobe applications both online and in the classroom. Certifications: Microsoft Office Master 2016.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836205357 , 183620535X
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer programming ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: "Embark on a programming adventure with ""Applied Fundamentals: Hangman,"" where you'll apply your foundational coding skills to build the time-honored game of Hangman from scratch. This course, guided by Justin and Vonne, starts with an overview of how learning fundamental programming can be empowering and immediately useful. Through a series of meticulously planned videos, you'll journey from conceptualizing the project, setting up the structure, to implementing the game's core mechanics such as taking guesses, determining correct answers, and enhancing user interface. As the course progresses, you'll dive into refining the code by refactoring into functions, adding a scoreboard, and implementing win/lose conditions, all while ensuring your Hangman game is as engaging as it is functional. This hands-on approach not only solidifies your understanding of programming concepts but also hones your problem-solving and project management skills, preparing you for future software development projects. What you will learn Plan and structure a programming project from the ground up Implement core game mechanics i.e. guess input and answer validation Enhance user experience through improved interface design Refactor code into functions for better organization Manage game states and implement win/lose logic Create dynamic feedback for users Audience Ideal for beginners with a basic understanding of programming concepts looking to apply their knowledge in a fun, tangible project. A rudimentary knowledge of Python or similar languages is recommended but not necessary. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Vonne Smith: Vonne leads the content development for the OfficeProTV and CreativeProTV channels. She has over a decade of experience teaching Office.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836206071 , 1836206070
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: ChatGPT ; Python (Computer program language) ; Computer programming ; Artificial intelligence ; Python (Langage de programmation) ; Programmation (Informatique) ; Intelligence artificielle ; computer programming ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: "Unlock the world of conversational AI with ""Create Your Own ChatGPT Clone using Python,"" a comprehensive video course designed to teach you the intricacies of AI model interactions. Starting with a solid introduction and setup requirements, this course swiftly moves into hands-on exercises where you'll engage with the ChatGPT API using Python. You'll not only learn about API parameters and endpoints but also how to weave these components into a responsive Python FastAPI service. Transitioning from Python to front-end development, the course empowers you to create a React project, giving life to your ChatGPT clone with engaging styles and functionalities. The journey continues into the nuances of fine-tuning models, where you'll tailor ChatGPT solutions to fit specific needs, offering personalized experiences. The course culminates in strategic model selection, ensuring you're equipped to choose the most effective GPT model for your project's requirements, capped off with a cohesive summary tying all learned concepts together. What you will learn Navigate the setup for ChatGPT API interaction. Create a Python FastAPI for ChatGPT. Construct and style a ChatGPT clone in a React environment. Customize ChatGPT models through fine-tuning techniques. Select the optimal GPT model for specific project needs. Synthesize course knowledge in a comprehensive project. Audience Geared towards Python developers keen on building AI chatbots, and AI and NLP enthusiasts looking to delve into chatbot development, this course suits students and professionals eager for hands-on AI and Python experience. A foundational grasp of Python, React, and basic API interactions is assumed, catering to innovators who want to unlock the potential of conversational AI. About the Author Eduonix Learning Solutions: Eduonix Learning Solutions is at the forefront of technology training, boasting a vast global reach with over 1 million students across 200+ courses. With a rich history spanning over a decade, Eduonix's mission is to deliver industry-standard, high-quality training content created by a team of seasoned industry professionals. Their comprehensive curriculum covers a wide range of technologies, from Web and Mobility to Enterprise, Database, and Server Administration. Eduonix is dedicated to teaching technology in the context of real-world professional applications, ensuring that learners are equipped with the skills needed to excel in today's tech-driven landscape.".
    Note: Online resource; title from title details screen (O'Reilly, viewed April 22, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781836209591 , 1836209592
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/8
    Keywords: Microsoft Power BI (Computer file) ; Artificial intelligence ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Our video course is a comprehensive journey through the world of data visualization and analysis using Power BI. Hosted by Adam, this series is tailored for individuals aiming to leverage Power BI's robust capabilities to turn disparate data sources into coherent, visually immersive, and interactive insights. Beginning with an introduction to Power BI's ecosystem, Adam walks you through installing the software, understanding its interface, and the prerequisites needed to get started. The course progresses into more advanced topics such as connecting to data sources, refining data with queries, and creating interactive reports and dashboards. You'll learn not just the technical skills but also the thought processes behind effective data visualization and analysis strategies. Whether you're dealing with Excel spreadsheets or hybrid data warehouses, this course equips you with the knowledge to make data-driven decisions confidently. With a focus on real-world application, Adam ensures that by the end, you'll be proficient in using Power BI to its full potential, making you an invaluable asset to your organization. What you will learn Identify and connect to various data sources with Power BI Refine and transform data using Power BI desktop and service Create dynamic reports and dashboards Use DAX for basic measures Design mobile-responsive reports and dashboards Analyze data trends with Power BI's analysis features Audience This course is ideal for business and data analysts, BI professionals, and anyone interested in data visualization. A basic understanding of data principles is recommended but not required. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Cham : Springer Nature Switzerland | Cham : Imprint: Springer
    ISBN: 9783031530555
    Language: English
    Pages: 1 Online-Ressource (XI, 162 p. 3 illus.)
    Series Statement: International Law and Economics
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als Roy, Shubhangi When Do People Obey Laws?
    Keywords: Law and economics. ; Economics ; Law ; Social psychology. ; Law and social norms ; Law obedience ; Law and behaviour ; Legal compliance ; Law enforcement ; Law and economics ; Behavioral influence ; Human behavior ; Social communication ; Institutional conditions ; Law and social psychology ; Law obedience ; Interest lobbies
    Abstract: Chapter 1. Focusing on When Do People Obey Laws and Why It Matters -- Part I: Developing an Integrated Approach to Compliance -- Chapter 2. An Integrated Framework of Compliance With Law as Social Influence: When Law Changes Behaviors -- Chapter 3. When Law Changes Attitudes Within the Integrated Approach -- Part II: Applying an Integrated Approach to Compliance to Motivational Mechanisms of Why People Obey Laws -- Chapter 4. Understanding the Powers and Limits of Legal Expression to Create Change Through the Integrated Approach to Compliance -- Chapter 5. Understanding the Role of Procedural Justice in Compliance Through the Integrated Framework -- Chapter 6. Understanding When Do People Obey Laws Through an Integrated Approach to Compliance: Concluding Remarks.
    Abstract: This book examines the intricate dynamics of when individuals adhere to laws, taking into account the context in which laws attempt to shape human behavior. While existing literature touches upon various reasons why people comply with laws, the book focuses on a critical question which has been missing from the discussion: when do people obey laws? By treating law as a form of social communication, it develops an integrated framework to answer this question. It explores how social, psychological, and institutional conditions shape compliance decisions of individuals. What does a law signify? When does the compulsion to obey arise? When do individuals comply out of a fear for legal sanctions or social repercussions? Why do some laws have high symbolic values and others fail despite harsh punishments? The book unveils the contextual intricacies that underlie obedience to law. It challenges conventional wisdom and offers a fresh perspective on the power and limitations of law in shaping human behavior. For scholars and academics seeking a deeper understanding of legal compliance and role of law in shaping behaviors, this book will be an indispensable resource.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    ISBN: 9783031484575
    Language: English
    Pages: 1 Online-Ressource (VIII, 316 p. 55 illus., 37 illus. in color.)
    Parallel Title: Erscheint auch als The ESG framework and the energy industry
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    RVK:
    Keywords: Power resources. ; Business enterprises ; Economics ; Energy policy. ; Energy and state. ; Environmental ; Social and Governance ; Corporate finance ; Economic Incentives for ESG Activities ; Market-Based Policies for ESG Activities ; Financial markets ; Financial risks ; Corporate governance ; Behavioral finance ; Energy financing ; Energy markets ; Aufsatzsammlung
    Abstract: Chapter 1. Introduction (James Thewissen) -- Part I. Energy Resources and ESG Criteria: Demand and Supply Issues -- Chapter 2. The Causal Relationship Between ESG and Economic Growth: Evidence from the Panel of Commonwealth Independent States (Nermin Yasar Baskaraagac) -- Chapter 3. Macroeconomic Determinants of Energy Poverty in Türkiye (Goktug Sahin) -- Chapter 4. Towards Economic Growth Without CO2 Emissions: the Case of Türkiye (Wietze Lise) -- Chapter 5. The Natural Gas War between Europe and Russia after the Invasion of Ukraine (Mehmet Baha) -- Part II. Market-Based Policies for ESG Activities in the Energy Sector -- Chapter 6. ESG Performances of Energy Companies in OECD Countries: A Clustering Approach (Cem Menten) -- Chapter 7. The Impact of Renewable Energy Incentives on Carbon Prices in the USA (Esin Hilal Çoşkun) -- Chapter 8. Static and Dynamic Connectedness between Green Bonds and Clean Energy Markets (Ayşe Nur Şahinler) -- Chapter 9. Do Green Bonds Improve the Stock and Environmental Performance of Energy Firms? International Evidence (Mehmet Baha Karan) -- Part III. Dealing with ESG Issues: Creating Corporate Value -- Chapter 10. Resilience in Power Generation: Two Case Studies from Turkey (Fatih Avcı) -- Chapter 11. The Effect of Environmental Scores on Financial Performance in the European Region (Gizem Arı) -- Chapter 12. The Impact of Executive Pay Gap on Environmental and Social Performance in the Energy Sector: Worldwide Evidence (Deniz Kartal) -- Chapter 13. Sector and Country Effects of Carbon Reduction on Firm Performance (Robin van Emous).
    Abstract: This book contributes to a better understanding of the importance of environmental, social, and governance (ESG) principles for corporate value in the energy industry. In particular, it analyzes how the energy industry is achieving this shift in response to government regulations and how it is addressing specific ESG issues. It discusses various economic incentives and market-based policies for ESG activities in the energy sector and highlights how energy firms are using environmental, social and governance initiatives to create value. In turn, the book demonstrates how ESG principles can be implemented while considering various economic and corporate issues, such as financial markets, financial risks, asset pricing, value at risk, capital structure, capital budgeting, corporate (re)structuring, corporate governance, behavioral finance, financial performance, asset pricing, cost control, financial accounting, fiscal issues, institutions, governance, and legal aspects. Accordingly, it will appeal to scholars of economics, finance, and energy policy, and to anyone interested in the implementation of ESG principles in the energy industry. This is the ninth book in a series organized by the Centre for Energy and Value Issues (CEVI). In this book, CEVI collaborates with the Hacettepe University Energy Markets Research and Application Center (Ankara, Turkey). The previous volumes in the series were: Financial Aspects in Energy (2011), Energy Economics and Financial Markets (2012), Perspectives on Energy Risk (2014), Energy Technology and Valuation Issues (2015), Energy and Finance (2016), Energy Economy, Finance and Geostrategy (2018), Financial Implications of Regulations in the Energy Industry (2020) and Applied Operations Research and Financial Modelling in Energy (2021).
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Imprint: Springer
    ISBN: 9783031355837
    Language: English
    Pages: 1 Online-Ressource (ca. 2863 Seiten. eReference.) , 230 Illustrationen
    Edition: 3rd ed. 2024.
    Parallel Title: Erscheint auch als
    Keywords: Kliometrie ; Theorie ; Humankapital ; Wirtschaftswachstum ; Finanzsystem ; Konjunktur ; Wirtschaftsgeschichte ; Welt ; Economic history. ; Econometrics. ; Economics ; Labor economics. ; Population ; Macroeconomics. ; Cliometrics ; Econometric history ; Human capital ; Growth ; Financial systems ; Innovation ; Anthropometrics ; Capital markets ; Economic development ; Gender in Economic History ; Socioeconomic development ; Labor markets ; Robert Fogel ; Industrial revolution ; GDP ; US financial system ; Antebellum banking ; Financial crises ; Income inequality ; Great depression ; Handbuch ; Aufsatzsammlung
    Abstract: Family reconstitution data: a cliometric view -- History of cliometrics -- Growth theories -- Cliometric approaches to war -- GDP and convergence in modern times -- Cliometrics and the great depression -- Financial Systems -- Cliometric approaches to international trade -- Time series -- The industrial revolution: a cliometric perspective -- The cliometric study of financial panics and crashes.
    Abstract: This handbook is a milestone in the field of historical economics and econometric history through its emphasis on the concrete contribution of cliometrics to our knowledge in economics and history. The articles in the handbook authored by the leading scholars in the fields, stress the usefulness of cliometrics for economists, historians and social scientists in general. The handbook offers a comprehensive coverage of topics with each article providing an overview of the contributions of cliometrics to a particular topic. The handbook has set a new standard of quality in the field by offering a world-wide forum of discussion in cliometrics. This updated and extended third edition of the handbook of cliometrics offers a substantially enlarged collection of articles and thus stresses its unique position as authoritative reference work in this field.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Cham : Springer Nature Switzerland | Cham : Imprint: Springer
    ISBN: 9783031487705
    Language: English
    Pages: 1 Online-Ressource (XI, 827 p. 92 illus., 75 illus. in color.)
    Series Statement: Contributions to Management Science
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Finance. ; Commercial law. ; Economics ; Financial services industry. ; Regulation ; Supervision ; Decentralized Finance ; Islamic Finance ; Islamic Law ; Insolvency Law ; Financial Globalization ; Takaful ; Aufsatzsammlung
    Abstract: Chapter 1. Islamic Entrepreneurship: a Systematic Literature Review -- Chapter 2. Harmonization of Islamic Financial Literacy in Understanding the Islamic Banking Services: the Case in Malaysia -- Chapter 3. A Systematic Review: Challenge of Islamic Microfinance Baitul Maal Wat Tanwil in Indonesia -- Chapter 4. Islamic Peer-to-peer (P2P) Financing as an Alternate Model of MSME Financing in Nigeria -- Chapter 5. The Relationship Between Business Intelligence and Digital Banking Services in Jordanian Islamic Banks -- Chapter 6. The Impact of Islamic Finance on Economic Growth : the Malaysian Experience -- Chapter 7. The Efficiency of Participation Banking Sector in Turkey: A DEA Approach -- Chapter 8. Understanding the Practices and Challenges of Sustainability Reporting in Islamic Banking -- Chapter 9. Are Women a Gender Dividend for Investment – an Empirical Analysis From Indian Working Women Perspective -- Chapter 10. Potential Impact of Metaverse-based Banking on Employment in the BankingSector in India -- Chapter 11. The Impact of Credit Risk Mitigation on the Profits of Investment Deposits in Islamic Banks -- Chapter 12. The Effect of Job Seekers' Perception on the Intention to Apply for Jobs in Islamic Banks in Indonesia -- Chapter 13. Factors Influencing the Adoption of Business Intelligence in Islamic Banks -- Chapter 14. Prospects of a Partnership-based Islamic Microfinance ‎model in Bangladesh: Clients Perspectives -- Chapter 15. Analyzing Islamic Crowdfunding Through Bibliometric and Visualization Approaches -- Chapter 16. Benchmarking as a Mechanism to Measure Reference Efficiency and Improve the Performance of a Group of Banks, Using the DEA Data Envelope -- Chapter 17. A Perspective on the Existence and Development of Islamic Banking in India -- Chapter 18. Women Outreach Exploration; Evidence From Islamic Microfinance in Indonesia -- Chapter 19. The Impact of Necessity on Deposit Guarantee in Islamic Banks an Applied Jurisprudential Study -- Chapter 20. The FinancialImpact of Islamic Banking on Supporting and Developing Small and Medium Enterprises an Assessment of the Reality of Global Bank Al-Salam -- Chapter 21. A Qualitative Evaluation of Narrative Effectiveness Used in the Six and Titanic Films: a Forgotten Minority Perspective -- Chapter 22. Sukuk Blockchain - an Innovation: Opportunities and Challenges -- Chapter 23. Linking Brand Awareness, Influencers and Impulse Buying via Sor Theory: a Conceptual Paper -- Chapter 24. Bibliometric Analysis of Internal Audit Quality of Public Sector Organizations -- Chapter 25. Systematic Literature Review About Examining the Factors Affecting Omans Implementation of E-government -- Chapter 26. Role of Payment Innovation on Bank Performance: What Happens to the Bank if Cash Goes Away? -- Chapter 27. Investigating the Factors Influencing Mobile Commerce Usage of SMES in Hargeisa, Republic of Somaliland: a Review of Literature -- Chapter 28. Breaking Barriers: Exploring the Gender Moderation in Factors Affecting University Choice for Students -- Chapter 29. An in-depth Exploration of the Evolution and Imple-mentation of Halal Pharmaceutical Certification Schemes in Malaysia -- Chapter 30. Examining the Impact of Entrepreneurship Performance on Sustainable Entrepreneurship and Sustainable Development Goals (SDGS) -- Chapter 31. The Penta Helix Model in Management of Livestock Compost in Pakisjajar Village Communities -- Chapter 32. Student Performance in Mathematics and Its Impact on Learning Stem Subjects -- Chapter 33. Identifying the Sugarcane Trading System in Indonesia: an Institutional Economics Perspective -- Chapter 34. Going Global in the Digital Age Keeping Up and Staying Ahead in Today's Tech-driven Society -- Chapter 35. The Development of Women's Education Under Local Organizations in Kelantan, 1932-1957 -- Chapter 36. Nurturing Student Academic Performance: Unveiling the Impact of Smart Classroom, Perceived Ease of Use, Self-efficacy, and Islamic Spiritual Values -- Chapter 37. The Prospectof Work From Home in the Public Sector -- Chapter 38. Analytical Study on Ethical Issues in Events- Voices From Muslim Organizers -- Chapter 39. Crowdsourcing: a Catalyst for SMES to Ideation and Commercialization? -- Chapter 40. Correlation Between Flash Floods and Variable Improper Drainage Systems: Experiences Impacts of Flash Floods From Bandar Kuching, Sarawak, Malaysia -- Chapter 41. Development of New Funding Formula in Malaysian Public Universities -- Chapter 42. Adapting to Technologicatransformation: Jobs and Skills in Malaysia's Evolving Work Landscape -- Chapter 43. Factors Shaping the Propensity of UAE Secondary School Teachers to Incorporate Education 4.0 -- Chapter 44. Role of Credit Attitude on Credit Card Misuse: a Study of Malaysian Working Adults -- Chapter 45. Social Media Marketing for Micro-enterprises in Malaysia: Branding for the Future? -- Chapter 46. English Majors Intercultural Competence and Chinese Cultural Aphasia -- Chapter 47. Study on Socio-demographic of Healthcare Waqf Do-nors: Waqf Contribution and Its Association With the Faith and Attitude Influence -- Chapter 48. Students Inclination and Preferences for Tahfiz Program in UiTM -- Chapter 49. Risk Mitigation Strategy for Agency Problems in Micro Business Financing of Baitul Maal Wa Tamwil: a Qualitative Swot Analysis -- Chapter 50. The Mental Processes in Beauty of Shaanxi: an Ecological Discourse Analysis Perspective -- Chapter 51. Powerful Entrepreneurial Networking: Bridging the Gap in Marketing Performance of Halal SMES -- Chapter 52. Environmental Awareness Impact on Coastal Residents Emotional Intelligence and Personality -- Chapter 53. Vernacular Masjid as a Development of the Basic Arche-type of the Punctured Pavilion: a Technological and Cul-tural Manifestation in the Southeast Asian Region -- Chapter 54. Policy and Digital Economy and Society Development Action Plan Phase 2 (B.E. 2566 " 2570) and Digital Economy and Society Development Action Plan for Human Resource Development Phase2 (B.E.2566 " 2570) -- Chapter 55. Factor Influencing of Toxic Masculinity on Young and Adult Productivity: a Systematic Review -- Chapter 56. Metaphor Construction of Environmental Issues in Chinese and American News Media -- Chapter 57. A Proposed Model for Embracing Digital Horizons: Exploring Patient-centric Wearable Healthcare Technology -- Chapter 58. Exploring the Appropriate Legal Mechanisme for Consumer in Halal Food Abuse -- Chapter 59. Islamic Environmental Education: Case Study of the Institute of Islamic Understanding Malaysia (IKIM) -- Chapter 60. Food Waste Management Technology in Malaysia: Lessons From the United States and European Union -- Chapter 61. Consumer Adoption of Brimo Mobile Banking Applica-tion: an Extended Tam Perspective -- Chapter 62. The Issue of Cybersex Addiction Among Children in Peninsular Malaysia: the Process of Development and Validation of Instrument -- Chapter 63. Measurement of Religiosity in Islamic Perspective -- Chapter 64. Ma'iyyah Work-life Enhancement: Islamic Values Approach to Strengthen Work Engagement -- Chapter 65. Digital Loneliness in Social Media: the Epoch of Our Connected and Distraction World.
    Abstract: This volume discusses the new trends in law and regulation in Islamic finance. Islamic finance is a particular component of the global financial system and is very different from secular finance. To understand the development of Islamic finance, it is important to place it in the context of financial globalization. Islamic finance is a new force in the contemporary world financial system and is present in more than a hundred countries. The current generation of Muslim economic power is crowding into the world's financial currents with trillions in liquidity and is growing at a high rate of 10-15% per year. Islamic finance is coming into focus and is not confined to Islamic countries but is present in every larger Muslim community, which means that it cannot be isolated from the effects of financial globalization. This edited volume discusses the effects of global financial transactions in Islamic finance and how it impacts its law and regulation.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Imprint: Springer
    ISBN: 9783031516818
    Language: English
    Pages: 1 Online-Ressource (XLIII, 912 p. 129 illus., 87 illus. in color.)
    Edition: 3rd ed. 2024.
    Series Statement: Springer Texts in Business and Economics
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    RVK:
    Keywords: Dynamisches Gleichgewicht ; Allgemeines Gleichgewicht ; Agentenbasierte Modellierung ; CGE-Modell ; Theorie ; Economics ; Econometrics. ; Macroeconomics. ; Economic development. ; Computer science. ; Equilibrium (Economics) Mathematical models ; Economics, Mathematical ; Business Cycles ; Computational Economics ; Dynamic General Equilibrium Modeling ; General Equilibrium ; General Equilibrium Modeling ; Growth Theory ; Heterogeneous Agents ; Stochastic Rational Expectations Economies ; Agents ; Growth Model ; Ramsey Model ; Perturbation Methods ; Heterogenous Agent Models ; Monetary and Fiscal Policy ; MATLAB ; GAUSS ; Python ; Lehrbuch ; Dynamische Makroökonomie ; Allgemeines Gleichgewichtsmodell ; Dynamische Makroökonomie ; Allgemeines Gleichgewichtsmodell
    Abstract: Part I: Representative Agent Models: Basic Models -- Perturbation Methods: Framework and Tools -- Perturbation Methods: Solutions -- Perturbation Methods: Model Evaluation and Applications -- Weighted Residuals Methods -- Simulation-Based Methods -- Discrete State Space Value Function Iteration -- Part II: Heterogenous Agent Models: Computation of Stationary Distributions -- Dynamics of the Distribution Function -- Overlapping Generations Models with Perfect Foresight -- OLG Models with Uncertainty -- Part III: Numerical Methods: Linear Algebra -- Function Approximation -- Differentiation and Integration -- Nonlinear Equations and Optimization -- Difference Equations and Stochastic Processes.
    Abstract: Contemporary macroeconomics is built upon microeconomic principles, with its most recent advance featuring dynamic stochastic general equilibrium models. The textbook by Heer and Maußner acquaints readers with the essential computational techniques required to tackle these models and employ them for quantitative analysis. This third edition maintains the structure of the second, dividing the content into three separate parts dedicated to representative agent models, heterogeneous agent models, and numerical methods. At the same time, every chapter has been revised and two entirely new chapters have been added. The updated content reflects the latest advances in both numerical methods and their applications in macroeconomics, spanning areas like business-cycle analysis, economic growth theory, distributional economics, monetary and fiscal policy. The two new chapters delve into advanced techniques, including higher-order perturbation, weighted residual methods, and solutions to high-dimensional nonlinear problems. In addition, the authors present further insights from macroeconomic theory, complemented by practical applications like the Smolyak algorithm, Gorman aggregation, rare disaster models and dynamic Laffer curves. Lastly, the new edition places special emphasis on practical implementation across various programming languages; accordingly, its accompanying web page offers examples of computer code for languages such as MATLAB®, GAUSS, Fortran, Julia and Python. "This book does not only an excellent job in explaining the existing tools, but it also teaches the reader on how to write his/her own programs and it provides the reader with the tools to help advance the state of the art of dynamic macroeconomics." Wouter J. Den Haan, London School of Economics ”... provides the reader with exactly the necessary computational tools to solve the dynamic general equilibrium models macroeconomists care about. It is therefore the perfect complement to Stokey, Lucas and Prescott's and Sargent and Ljungqvist's theoretical treatment of modern macroeconomics." Dirk Krueger, University of Pennsylvania.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    ISBN: 9783031499517
    Language: English
    Pages: 1 Online-Ressource (XI, 340 p. 57 illus., 40 illus. in color.)
    Series Statement: Springer Proceedings in Business and Economics
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Finance. ; Economics ; Tourism. ; Entrepreneurship. ; New business enterprises. ; Econometrics. ; Applied economics ; Research Methodology in Applied Economics ; Applied International Economics ; Financial economics ; Tourism economics ; Banking mobile applications ; Positive Externality of Property Rights ; Sustainable development ; Entrepreneurship and management ; Quantitative methods ; Financial Market Analysis ; Computational Economics ; Entrepreneurship ; Business Ethics ; Sustainable Supply Chain ; Konferenzschrift
    Abstract: This book features a collection of high-quality and peer-reviewed papers from the 2023 7th International Conference on Applied Economics and Business, which was held in Copenhagen, Denmark, during August 24-26, 2023. ICAEB is held annually as a platform for the presentation of new advances and research results in the fields of applied economics and business. Applied economics is a way of dealing with esoteric economic concepts in a practical and analytical way. It allows for decisions to be made that are underlined by theoretical economic principles but utilized in such a way that they transform into real work applications. The contributors cover topics such as environment, development, finance, forensics, information, institutions, international, labor, management, mathematics, currency, tourism and many more. Applied Economics affects all aspects of life and science and it is brought to the forefront in this collection of papers. The conference, with its aim to bring together economists from different fields, lends itself to a natural and rich collection of scientific papers all focused on the practical application of economic principles. The scope of this collection of papers will be useful to academics and practitioners who look to economics to help solve problems.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Imprint: Springer
    ISBN: 9783031530517
    Language: English
    Pages: 1 Online-Ressource (XII, 321 p. 36 illus., 1 illus. in color.)
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als Priority of Needs?
    Keywords: Social choice. ; Welfare economics. ; Economics ; Public administration. ; Personality. ; Difference (Psychology). ; Political science ; Need-based distributive justice ; Identification of needs ; Social recognition of needs ; Social groups ; Political recognition of needs ; Welfare ; Social utility ; Justice principles ; Prioritization in the health care sector ; Pandemic ; Covid-19 ; Social equity ; Welfare state ; Social identity ; Decision-making ; Equality ; Administrative processes ; Aufsatzsammlung
    Abstract: Chapter 1. Why Prioritize Needs? -- Part I: Identification of Needs -- Chapter 2. Need as One Distribution Principle: Frames and Framing -- Chapter 3. Measuring Need-Based Justice—Empirically and Formally -- Part II: Structures and Processes of the Recognition of Needs -- Chapter 4. The Social Recognition of Needs -- Chapter 5. The Political Recognition of Needs -- Chapter 6. Deliberation and Need-Based Distribution -- Part III: Welfare Consequences of Prioritizing Need-based Distributions -- Chapter 7. Need-based Justice and Social Utility: A Preference Approach -- Chapter 8. How Sustainable is Need-Based Redistribution? -- Part IV Differentiation -- Chapter 9. Need and Street-Level Bureaucracy. How Street-Level Bureaucrats Understand and Prioritize Need -- Chapter 10. Justice Principles, Prioritization in the Health Care Sector, and the Effect of Framing -- Chapter 11. Conclusion: Elements of a Theory of Need-Based Justice.
    Abstract: This book develops an empirically informed normative theory of need-based justice, summarizing core findings of the DFG research group FOR2104 “Need-based Justice and Distributive Procedures”. In eleven chapters scholars from the fields of economics, political science, philosophy, psychology, and sociology cover the identification and rationale of needs, the recognition and legitimacy of needs, the dynamics and stability of procedures of distributions according to needs, and the consequences and sustainability of need-based distributions. These four areas are studied from the perspective of two mechanisms of need objectification, the social objectification by the discursive generation of mutual understanding (transparency) and the factual objectification by the transfer of decisions to uninvolved experts (expertise). The volume addresses academics in the fields of justice research, ethics, political theory, social choice and welfare, framing, individual and group decision making, inequality and redistribution, as well as advanced students in the contributing disciplines.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837631858 , 1837631859
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    DDC: 794.8/1526
    Keywords: Video games Programming ; UnrealScript (Computer program language) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Have you ever wanted to breathe life into your game world through foliage such as plants, grass, water lilies, and reeds? Then this course is for you. In this course, you will learn how to create vegetation from a simple plane and turn it into 3D foliage. Then you will learn how to make use of Blender's particle system to model foliage including flowers. You will also learn about optimization and the importance of low poly modeling to get the best performance out of a dense foliage setup within any scene at the same time as maintaining the stylized visuals of custom-painted foliage. You will learn how to use weight painting techniques to get better control over foliage position. Then create materials for the foliage using UE5 texture customization and the wind system. Next, you will learn how to paint water foliage into a scene and how to get more depth out of its volume, painting plants on top of the water, inside the water, and underwater. Once all assets are ready in Blender, you will learn how to export them and import them into Unreal Engine. The Unreal Engine 5 (UE5) part of the course includes a full environment scene composition guide to enhance our environment without cluttering up the terrain. By the end of this course, we will be able to create foliage in Blender from scratch easily. What You Will Learn Use Blender 3 and understand its new interface and shortcuts Import and set up custom alpha brushes for texture painting Use Blender's particle system to model foliage including flowers Use weight painting techniques to get better control over foliage position Create clusters of foliage to get the best results in an environment Set up a foliage asset pack that can be easily imported onto any UE5 project Audience This course is designed for beginner 3D modelers who are eager to learn how to build 3D foliage such as plants, lily pads, underwater plants, reeds, shrubs, grass, and much more, or for mid-level 3D modelers who want to take their modeling to a new level and improve their workflow with tips and tricks. Game designers who would like to design a set of over 12 different types of foliage and 30 variations for a myriad of game environments for games in Unreal Engine 5 or Fantasy, and open-world game environments fans who want to walk through and experience a realistic environment, can also benefit from this course. About The Author 3D Tudor Limited By Neil Ian Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil's instructor style--his to-the-point instructions and clear guidance--makes him an excellent tutor. Neil uses Blender for particle effects and complex asset animation. Neil can use two popular game engines, Unreal Engine 5, and Unity, with many years of experience in both.
    Note: "3D Tudor Limited By Neil Ian Bettison.". - "Published in February 2023.". - Online resource; title from title details screen (O'Reilly, viewed March 20, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837639304 , 1837639302
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 54 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Linux ; Computer security ; Information technology Security measures ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: PAM provides dynamic authentication support that sits between Linux applications and Linux native authentication systems. It is one of the main tools that deals with authentication. The main purpose of PAM is to allow system administrators to integrate services or programs with different authentication mechanisms without changing the code for the service. This short course consists of three sections. In the first section, the author introduces you to the course and what to expect from the course. In the second section, you will learn to install VirtualBox in your systems and create your first virtual machine. Following this, you will be installing CentOS 7 and 8 onto your systems. In the third and last section of the course, you will learn about Linux PAM security, where you will understand the importance of PAM. You will get to know the PAM configuration file and the columns within the file; namely, the module interface, control flags, and modules one by one. In the last part of the section, you will explore PAM-aware services and stacks and verify if a service or a program is linked with PAM. By the end of the course, you will be able to understand why PAM is important and how to configure it. What You Will Learn Installation of VirtualBox and CentOS Learn about the module interface column in PAM file Learn about the control flags column in PAM Learn about the module column in PAM file Learn the importance of PAM and its necessity Learn account access through PAM Audience This course is designed for Linux administrators and beginners and for anyone interested in learning about security in Linux servers. No prior knowledge of Linux is required to take this course. About The Author Imran Afzal: Imran Afzal is a systems engineer/manager, entrepreneur, instructor, and a public speaker. He started his career with Time Warner in 2000 as a systems administrator. He was involved in deploying technologies such as DTV, VOD, CableCards, and others. These technologies were built on many Linux distributions. Since then, he has utilized Linux/Unix skills in many Fortune 500 companies. He has worn many different hats and currently manages a large team of systems engineers, administrators and team leads globally. He has spearheaded projects such as datacenter migration, introduction, and deployment of VMware, monitoring tools implementation, Amazon cloud migration, and many more. He is certified in Linux Systems Management, UNIX Operating Systems, Linux System Administration, System Internals, VMWare Certified Professional, RHCSA, and Windows Server Certified.
    Note: "Published in March 2023.". - Online resource; title from title details screen (O'Reilly, viewed March 20, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781803238869 , 1803238860
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 794.8/1526
    Keywords: Video games Programming ; UnrealScript (Computer program language) ; Computer programming ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Want to learn how to make video games? Then why not make games with the exact same software used to develop hit titles such as Fortnite, Batman: Arkham Asylum, Gears of War, and Mass Effect--the state-of-the-art Unreal Engine. By beginning your game development journey with Unreal Engine 5, you will be learning the same engine that the pros use. In this introductory course, you will begin by getting Unreal Engine 5 up and running and then learning the fundamentals of game development. After you master the basics, you will learn the skills needed to craft beautiful environments to stage your games in. You will learn how to script logic for your games, which will help you define game rules; keep track of data such as health and inventory; and create playable characters. This course will teach you how physics works in Unreal Engine 5 and how to handle collisions. You will learn how to create user interfaces, so you can add menus, load screens, and HUDs to your game. You will learn how audio works within the Engine so that you can add music, dialogue, and sound effects. And finally, you will learn how to package your game so that it can be played on other computers and game consoles. By the end of this course, you will gain all the skills necessary to bring your ideas to life and create your own video games using the cutting-edge Unreal Engine 5. What You Will Learn Learn game development using Unreal Engine 5 Learn the fundamentals of game design Understand how to use Unreal Engine 5 Build realistic-looking environments for games to take place in Define custom inputs and movements to control characters Script logic to define gameplay without needing to know how to code Audience This video game development course is for absolute beginners who are interested in making games and learning how to design a game from scratch using UE5. This course is designed for those who want to become professionals using Unreal Engine 5. No programming experience is required. About The Author David Nixon: David Nixon is a professional software developer with a degree in computer science from Florida Atlantic University. He is a lifelong video game aficionado who started with the Atari 2600 and never looked back. He enjoys music, reading, and sports in his spare time.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 20, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837633067 , 1837633061
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Computer networks Administration ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This is a basic introductory course for beginners in Linux where you will start with the installation of Linux, VirtualBox, and CentOS. You will learn about the installation of CentOS7 and 8. You will learn to enable internet access to Virtual Machine and explore network files and commands that help us configure the machine. You will learn about one of the very important and critical aspects of Linux, which is NIC bonding, and learn how to download files and applications in Linux using the wget command. Explore the rsync command, which stands for remote synchronization and is used to transfer or copy files from one machine to another. We will also discuss SSH and telnet, the two main services that run in Linux to accept connections from outside. You will learn how to locate IP addresses using hostnames, the significance of the Network Time Protocol (NTP) for synchronizing time with other servers, and the modern chronyd daemon. Additionally, you will gain hands-on experience in troubleshooting network issues with traceroute. What You Will Learn Learn how to install a virtual machine Install Linux and CentOS in your system Understand the networking components in Linux Understand the network files and commands in Linux Understand the usage of curl and ping commands Understand the usage of traceroute command Audience Anyone who wants to learn Linux networking and people who have Linux experience but would like to learn about the Linux command line interface can take up this course. Existing Linux users who want to become power users can also benefit from this course. About The Author Imran Afzal: Imran Afzal is a systems engineer/manager, entrepreneur, instructor, and a public speaker. He started his career with Time Warner in 2000 as a systems administrator. He was involved in deploying technologies such as DTV, VOD, CableCards, and others. These technologies were built on many Linux distributions. Since then, he has utilized Linux/Unix skills in many Fortune 500 companies. He has worn many different hats and currently manages a large team of systems engineers, administrators and team leads globally. He has spearheaded projects such as datacenter migration, introduction, and deployment of VMware, monitoring tools implementation, Amazon cloud migration, and many more. He is certified in Linux Systems Management, UNIX Operating Systems, Linux System Administration, System Internals, VMWare Certified Professional, RHCSA, and Windows Server Certified.
    Note: "Published in February 2023.". - Online resource; title from title details screen (O'Reilly, viewed March 20, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835461938 , 183546193X
    Language: English
    Pages: 1 online resource (1 video file (20 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; Electronic data processing Backup processing alternatives ; Data recovery (Computer science) ; Relational databases ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Information presented in this course provides Oracle Database Administrators with the knowledge and experience to perform backup and recovery activities on Oracle databases. Starting with the Oracle RMAN architecture, you will seamlessly progress from fundamental database backups to the implementation of advanced options. Then, you will discover and practically execute diverse RMAN backup strategies, covering whole/partial, full/incremental, complete/incomplete, and online/offline backups. Dive into advanced options such as compression, encryption, multisection, duplexing backups, and archival backups for a holistic understanding. You will also simulate common recovery scenarios, from critical file losses to application data and non-critical file losses. Uncover additional RMAN capabilities such as the RMAN Recovery Catalog, cross-platform data transportation, and database cloning, ensuring a comprehensive skill set. Beyond technical proficiency, you will gain insights into developing effective backup and recovery plans with a focus on best practices. Stay abreast of cutting-edge technology with coverage of Oracle's latest advancements, including the Oracle Database Backup Cloud Service. By the end of the course, you will be able to perform and manage backup and recovery activities on Oracle 12c databases using RMAN. What you will learn Use RMAN with Oracle Database Backup Cloud Service Perform all supported cross-platform transportation techniques Perform all supported database duplication techniques Manage RMAN Recovery Catalog and produce encrypted backups Learn how to use RMAN in Oracle RAC and multitenant databases Handle corrupted blocks and use Data Recovery Advisor Audience This course caters to Oracle database administrators seeking to proficiently design and execute a comprehensive backup and recovery plan for Oracle databases utilizing RMAN. It is also tailored for Oracle database administrators aspiring to acquire the skills necessary for the management of backup and recovery activities. You would need familiarity with Oracle database administration concepts and a foundational understanding of the basics of the Linux operating system. You require a PC with Windows 7,8, or 10 64-bit, memory 16 GB, Fee HDD 280 GB, and a connection to the Internet. About the Author Ahmed Baraka: Ahmed Baraka has 25 years of extensive experience in the computer industry, with a focus on Oracle database administration technologies used in complex and high-availability environments. Baraka's expertise is designing and maintaining database solutions for complex business needs using a wide selection of technologies, such as Oracle RAC , ASM, Data Guard, GoldenGate, WebLogic, Database Appliance, and Enterprise Manager. He has worked with international firms in Australia and Abu Dhabi. His hobbies are soccer (football) and listening to soft music.
    Note: Online resource; title from title details screen (O'Reilly, viewed Decenber 19, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837635139 , 1837635137
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux Study guides ; Operating systems (Computers) Study guides ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In this course, you will learn about Linux's basic system administration and gain a thorough command of Linux and its system. Originally written by Linus Torvalds, Linux is widely used, and many developers and technology companies use Linux and Unix, a Linux-based operating system developed about fifty years ago. With both Linux and Unix gaining popularity, it is instrumental in managing very large networks in corporations such as Intel, IBM, and Amazon, and is also used to run offices and homes in some developed countries. How does Linux technically work? As you work through the course, you will learn that Linux is an operating system just as Windows is; however, the difference is that Linux is an open-source operating system that uses a VirtualBox. The VirtualBox reinforces the capacity of your computer to run multiple operating systems on one set of hardware at the same time. You will be taught that Redhat, CentOS, Fedora, and SuSe are some of the main Linux operating systems, and that others include Debian and Ubuntu. As you will discover by the end of this Linux fundamentals course, the operating system stores data on disk drives through a filesystem that consists of files and directories and that information is needed to access and locate them. You will need to learn Linux commands if you want to navigate a file system and these commands are discussed in-depth in this Linux tutorial for beginners' course, along with practical examples. There are various types of commands, including those of file maintenance, file display, file system monitoring, and file network, and you will learn to master these and gain a better understanding of the power of the Linux system. By the end of this course, you will be skilled with the fundamental Linux command line, have knowledge of Linux basic system administration, and have a better grasp of how Linux functions. What You Will Learn Learn how to connect Linux VM through Putty Learn the file system navigation commands Learn about file maintenance commands and file display commands Cover Filter and text processor commands, along with Linux file editor Learn about shell scripting and command history Learn about network files commands and system updates Audience This course is for someone who needs basic training in Linux, someone who is already in IT and wants to add a new skill. It is specifically designed for those who have been busy with their work and don't have enough time. About The Author Imran Afzal: Imran Afzal is a systems engineer/manager, entrepreneur, instructor, and a public speaker. He started his career with Time Warner in 2000 as a systems administrator. He was involved in deploying technologies such as DTV, VOD, CableCards, and others. These technologies were built on many Linux distributions. Since then, he has utilized Linux/Unix skills in many Fortune 500 companies. He has worn many different hats and currently manages a large team of systems engineers, administrators and team leads globally. He has spearheaded projects such as datacenter migration, introduction, and deployment of VMware, monitoring tools implementation, Amazon cloud migration, and many more. He is certified in Linux Systems Management, UNIX Operating Systems, Linux System Administration, System Internals, VMWare Certified Professional, RHCSA, and Windows Server Certified.
    Note: "Published in February 2023.". - Online resource; title from title details screen (O'Reilly, viewed March 20, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837635788 , 1837635781
    Language: English
    Pages: 1 online resource (1 video file (27 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) Study guides ; Computer programming Study guides ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Python is a multi-paradigm programming language with object-oriented and structured programming fully supported, and many features support functional and aspect-oriented programming (metaprogramming and metaobjects). Several other paradigms are supported through extensions, including design by contract and logical programming. This course begins with a brief introduction and covers basic to advanced programming techniques in Python. The first 12 sections of the course cover Python basics. The remaining sections cover intermediate to advanced Python concepts (OOPS, classes, lists, modules, functions, JSON, and so on). Learn to use Matplotlib, NumPy, Flask, and Android APK files. Learn database handling and build geographical apps. The ten buildable apps covered in the course include a volcano web map generator, object detector app, personal website built with Python and Flask, book inventory desktop GUI app with SQL backend, data analysis/visualization dashboard, mobile app on Android and iOS devices, an app that scrapes multiple real estate webpages data, web app to collect user data and sends emails, blog and translator with Django, and web app to process Excel files and download processed files. Upon completion, you can create executable Python programs independently and master coding syntax and Python comprehensively. What You Will Learn Develop an understanding of object-oriented programming in Python Learn how to use various Python libraries and frameworks Learn to create desktop programs, web/data apps, APIs, web scrapers Learn other programming tools like SQL, HTML, deployment, and debug Explore how to use JSON, CSV, Excel, NumPy, and Android APK files Learn data analysis and visualization with Matplotlib and PostgreSQL Audience The course exclusively delivers content for people who have not programmed before and assumes you have no previous programming knowledge. You will learn every programming concept in the context of real-life programming examples by building real-world programs. If you are a budding programmer looking to acquire comprehensive programming skillsets using Python language or are looking to master Python coding, this course is for you. The prerequisites include accessing a computer (Windows, Mac, or Linux). No prior knowledge of Python or previous programming experience is needed. About The Author PythonHow: Ardit Sulce is a Python programmer, teacher, and founder of PythonHow. He graduated in 2013 with a master's degree in science (geospatial technologies) from the University of Muenster in Germany, focusing on using Python for remote sensing. Ardit has worked with companies such as the Center for Conservation Geography to map and understand Australian ecosystems, image processing with the Swiss in-Terra, and data mining to gain business insights with the Australian Rapid Intelligence.
    Note: "Published in February 2023.". - Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837635535 , 1837635536
    Language: English
    Pages: 1 online resource (1 video file (23 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/8
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Web services Study guides Examinations ; Cloud computing Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The AWS Certified Solutions Architect - Associate certification assesses the skills and knowledge of AWS technology across a wide range of AWS services. This certification focuses on cost and performance-optimized solutions and a strong understanding of the AWS Well-Architected Framework. This course begins with a thorough understanding of the certification program. The AWS Technical Essentials course mirrors the class that AWS offers online. The Technical Essentials course covers terminology and concepts related to the AWS platform, navigating the AWS Management Console, key concepts of AWS security measures and AWS Identity and Access Management (IAM), Amazon Elastic Compute Cloud (Amazon EC2), Amazon Virtual Private Cloud (Amazon VPC), Amazon Simple Storage Service (Amazon S3), Amazon Elastic Block Store (Amazon EBS), Amazon DynamoDB, and Amazon Relational Database Service (Amazon RDS), AWS Auto Scaling, Amazon CloudWatch, and AWS Trusted Advisor. The AWS Certified SAA-C03 exam domains covered include Design Secure Architectures (30%), Design Resilient Architectures (26%), Design High-Performing Architectures (24%), and Design Cost-Optimized Architectures (20%). Upon completion of the course, you will thoroughly understand how to prepare for the AWS SAA-XC03 certification and be prepared for the exam comprehensively. What You Will Learn Learn to navigate the AWS Management Console and AWS terminology Explore AWS security, AWS Identity and Access Management (IAM) Understand Amazon DynamoDB and Relational Database Service (RDS) Explore Amazon Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Know Amazon Simple Storage Service (S3) and Elastic Block Store (EBS) Understand AWS Auto Scaling, CloudWatch, and Trusted Advisor Audience This course is intended for individuals looking to move their business solutions to the AWS Cloud and learn how AWS can help manage costs, security, storage, and computational needs. The course will help you prepare for the AWS Certified Solutions Architect - Associate (SAA-C03) certification and help you pass the exam. The AWS SAA-C03 certification is ideal for those in roles such as a solutions architect, DevOps engineer, Site Reliability Engineer (SRE), data engineer, and senior solutions architect. There are no prerequisite requirements for this course. About The Author Total Seminars: Total Seminars, LLC, is a provider of PC and network repair seminars and certification training services through books, videos, and courseware for thousands of organizations throughout the world including the United Nations, the FBI, and all branches of the US Department of Defense. Mike Meyers is the president and co-founder of Total Seminars, which produces the best-selling CompTIA A+ and Network+ Certification books with over 1 million books in print. He is affectionately called the "Alpha Geek" and is the industry's leading authority on CompTIA Certifications. He has created several other best-selling video courses on CompTIA certifications with the Total Seminars team of instructors. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant, and speaker. He is the author of numerous popular PC books and videos, including the best-selling CompTIA A+ Certification All-In-One Exam Guide and CompTIA Network+ Certification All-In-One Exam Guide. His humorous and easy-to-follow approach to teaching comes through in his video training courses as well as his classroom instructor-led courses. Making IT concepts easy to understand and fun to learn helps students stay engaged and retain the information. Tom Carpenter: Tom Carpenter is the chief technical officer at CWNP (Certified Wireless Network Professionals). He has been engaged with the IT industry for 25+ years, has published 20 books on IT-related content, and is heavily involved in objective development and exam creation in the certification industry. The author uses AWS daily to run several business websites and operates test labs for content creation and management, among other things. The author delivers course content in a casual and informal structure. He prefers to make the courses fun while you learn the practical applications of AWS. He welcomes individuals to join his classes and plan to use AWS in their personal or professional lives!.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805128717 , 180512871X
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: ChatGPT ; Natural language generation (Computer science) Computer programs ; Neural networks (Computer science) ; Java (Computer program language) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: ChatGPT is not a replacement, but an enhancing tool and an incredibly powerful tool when it comes to programming and analyzing code, and ignoring the utility now or at the very least not giving it a proper test run could very well be missing out early on gaining the advantage. The primary focus of the course is to equip individuals with the knowledge and skills they need to create a fully functional AI-powered application that generates pet names for users. The course starts with introducing you to ChatGPT, the latest web development tools, and installing the required tools. You will gain hands-on experience with web development technologies, implement machine learning concepts in a real-world project, and gain a deeper understanding of machine learning concepts. The course is structured in a way that enables you to gain hands-on experience with React Hooks, which are essential for building interactive interfaces for ChatGPT-style applications. You will also see how to use Fetch to make API calls to OpenAI and NPX to run Node commands. By the end of the course, you will have gained practical experience in building an AI-powered application, using machine learning concepts, and creating interactive interfaces with React Hooks. You will have a fully functional pet name generator application to add to your portfolio. What You Will Learn Build an AI application using the OpenAI API and web development technologies Download and install the required tools along with dependencies Get hands-on experience with React, Next.js, JavaScript, Node, and CSS Use Fetch to make API calls to OpenAI and NPX to run Node commands Implement machine learning concepts in a real-world project Use React Hooks and build interactive interfaces for the AI application Audience This course is ideal for those who are interested in modern web development technology and want to gain confidence as a developer for jobs with ChatGPT. It is also suitable for those who already have basic JavaScript knowledge and want to learn more about expert topics. If you are interested in exploring the use cases of ChatGPT and want to get started with programming, this course is for you. Additionally, if you are interested in working on a ChatGPT project in the future, this course is a great starting point. No programming experience needed. You will learn everything you need to know inside. Basic JavaScript and web development is a plus! About The Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and has been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: "Published in March 2023.". - Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805121183 , 1805121189
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 49 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: ChatGPT ; Natural language generation (Computer science) Computer programs ; Neural networks (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This course is designed with the latest mobile technology and in-demand job tools including React Native, JavaScript, Expo-GO, and the best conventions in 2023; it also teaches the very latest mobile development techniques and version of React with hooks. This course demonstrates how to leverage the power of ChatGPT as a tool in addition to stack overflow and documentations to build scripts and simplifies tackling difficult code tasks and takes your coding skills to the next level. Here, you will code along with ChatGPT and develop a project from scratch for your portfolio. You will learn how to develop professional web applications with ChatGPT and modern tools and libraries including React Native and JavaScript. Look at the object-oriented programming and functional components in React and React Hooks. You will explore the art of professional coding techniques building a sleek and functional UI. You will see how to write code with templated models and libraries, and clearly document your thought process. Finally, you will learn how to build and work on an entire mobile application with a client-side, simulated database with ChatGPT and enhance your productive levels as a programmer. By the end of the course, you will have deployed an application to your phone with real functionality. What You Will Learn Create a simulated database using ChatGPT Learn to render data on the page using best practices Look at how to use ChatGPT to create realistic simulations Implement features such as likes, comments, stories, and users Learn OOP and functional components in React and React Hooks Create a visually appealing and easy-to-navigate user interface Audience This course is perfect for those who want to gain confidence in mobile app development using ChatGPT and have a basic understanding of JavaScript. It's a great starting point for beginners interested in programming and a valuable addition to the portfolio of those pursuing a career in the industry. While prior knowledge of JavaScript and web development would be advantageous, it is not a prerequisite as the course is designed to cater to learners with no programming experience. About The Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and has been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: "Published in March 2023.". - Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837634286 , 1837634289
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 18 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/1
    Keywords: Deep learning (Machine learning) ; Machine learning ; PyTorch (Computer program language) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Note: The course is primarily focused on teaching PyTorch and deep learning for computer vision, but it also includes a few sections on the fundamentals of Python (Sections 8-12). These optional learning sections are designed for individuals who may be new to Python or who want to refresh their knowledge of Python basics. In this course, we will take a step-by-step method by first grasping PyTorch's fundamentals. Then, using a guide to getting free GPU for learning, you will learn how to code in GPU. You will then learn about PyTorch's AutoGrad feature and how to use it. Later, you will learn how to use PyTorch to create deep learning models and understand the fundamentals of convolutional neural networks (CNN). You will also learn how to use CNN with a real-world dataset. Additionally, the course will emphasize the fundamentals and lay the groundwork for an understanding of Python. We will also talk about the three significant Python libraries known as NumPy, Pandas, and Matplotlib. In this part of the course, we will also build a mini project where we will be building a hangman game in Python. By the end of this course, we will be able to perform Computer Vision tasks with deep learning. What You Will Learn Learn how to work with PyTorch Build intuition on convolution operation on images Implement gradient descent using AutoGrad Learn about LeNet architecture Create a mini-Python project game Understand how to use NumPy, Pandas, and Matplotlib libraries Audience Software developers, machine learning practitioners, data scientists, and anybody else interested in understanding PyTorch and deep learning should take this course. While a basic knowledge of Python would be beneficial, it is not a prerequisite as we will be covering the necessary fundamentals during the course. About The Author Manifold AI Learning: Manifold AI Learning℗ is an online academy with the goal to empower students with the knowledge and skills that can be directly applied to solving real-world problems in data science, machine learning, and artificial intelligence. With a curated curriculum and a hands-on guide, you will always be an industry-ready professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805124436 , 1805124439
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Node.js ; Web applications ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This comprehensive course is designed to take you from the very basics of setting up a web server to creating server-based and serverless applications using the Express framework and Node.js. This course starts with an introduction to Node.js, then you will explore more about the Node.js filesystem. Following that, you will be learning about Express.js and its use cases. After that, you will work on a small project using Express.js and use various CRUD operations while working on the project. Next, you will build a serverless app with API requests. Throughout the course, you will learn how to set up routes, handle post requests, use middleware, authenticate usernames and passwords with Express and Passport, and use Handlebars for templating. Additionally, you will gain hands-on experience in working with databases, hashing and salting, and setting up sign-up forms and log-out functionality. By the end of this course, you will have the confidence and skills to build your own web applications with the Express framework and Node.js. With code-along sessions, quizzes, and solution files available every step of the way, you will be able to reinforce your knowledge and practice until you feel confident in your ability to develop professional-quality applications. What You Will Learn Use optimize and refactor techniques to write efficient and effective code Learn how to set up a web server from scratch with Express and Node Understand the fundamentals of Express.js (CRUD operations) Look at templating engines with Handlebars from scratch Build a serverless app with API requests Learn to solve problems and dig through documentations like a developer Audience If you are looking to improve your coding skills and gain a deeper understanding of the Express framework, then this course is perfect for you. Whether you are an aspiring programmer, web developer, student, or experienced professional, this course is designed to provide you with the knowledge and skills necessary to develop advanced web applications using Express framework and Node.js. No prior programming experience is required, but some familiarity with JavaScript and web development is recommended. About The Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and has been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805127994 , 1805127993
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/6
    Keywords: Application software Development ; Swift (Computer program language) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: SwiftUI creates user interfaces for any Apple platform and helps create beautiful and dynamic apps fast. SwiftUI helps build functional apps across all Apple platforms with surprisingly little code. The course begins with a brief introduction to the text, modifiers, stacks, state variables, and animations and then advances to cover ForEach views, sheets, pickers, sliders, toggle switches, scroll views, buttons, etc. We will move to develop the main app and learn to create an app icon based on Pexels Figma. We will learn to disassemble an SVG image and convert it to PNG using Pexel Figma and Shape and Path to create a speech bubble and add text. We will create a color palette to support light and dark modes and develop a model of a quote-based app on a free quote API, part of the MVVM (Model, View-Model, View design pattern). When tapped, we will test the emoji to generate a new quote and copy the image to the clipboard with a long press. We will create image grids using an iPad/iPhone and create a share sheet to customize the images/quotes; change text color/size or image size, share or save it, and test the app's functionality on a simulator. Upon completion, we can develop an Emoji Quote app using SwiftUI/iOS 16. The course aims for succinct yet fairly comprehensive SwiftUI/iOS 16 development. What You Will Learn Learn about modifiers, stacks, state variables, animation, onAppear Use Shape/Path to create a speech bubble and add text to the bubble Create a customizable color palette to support light and dark modes Develop a quote-based app on a free quote API to use in the course Create image grids using iPad or iPhone adapting to both iPhone/iPad Test the app's features on a simulator, preferably on an actual device Audience This course caters to individuals wishing to acquire application development skills using SwiftUI/iOS 16 with beginner to advanced programming skillsets; however, more than basic to intermediate programming skills are desirable at least to make the most of the course. Anyone wishing to learn programming on iOS 16 using SwiftUI and individuals wanting to learn a quick course on what can be developed using SwiftUI would benefit from this course. About The Author Ron Erez: Dr. Ron Erez is a computer programmer, educator, and mathematician. Dr. Erez has been programming for over 30 years and has always been amazed by the creativity and satisfaction of writing computer programs. Dr. Erez is also an experienced teacher, teaching mathematics, computer science, and English literature from middle school to university level courses. Dr. Erez is out cooking, cleaning, skateboarding, and living in his free time.
    Note: "Published in March 2023.". - Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837638062 , 1837638063
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 025.04
    Keywords: Recommender systems (Information filtering) ; Artificial intelligence ; Machine learning ; Artificial intelligence ; Machine learning ; Recommender systems (Information filtering) ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Recommender systems are used in various areas with commonly recognized examples, including playlist generators for video and music services, product recommenders for online stores and social media platforms, and open web content recommenders. Recommender systems have also been developed to explore research articles and experts, collaborators, and financial services. The course begins with an introduction to deep learning concepts to develop recommender systems and a course overview. The course advances to topics covered, including deep learning for recommender systems, understanding the pros and cons of deep learning, recommendation inference, and deep learning-based recommendation approach. You will then explore neural collaborative filtering and learn how to build a project based on the Amazon Product Recommendation System. You will learn to install the required packages, analyze data for products recommendation, prepare data, and model development using a two-tower approach. You will learn to implement a TensorFlow recommender and test a recommender model. You will make predictions using the built recommender system. Upon completion, you can relate the concepts and theories for recommender systems in various domains and implement deep learning models for building real-world recommendation systems. What You Will Learn Learn about deep learning and recommender systems Explore the mechanisms of deep learning-based approaches Learn to implement a two-tower model for recommenders Implement TensorFlow to develop a recommender system Learn basic neural network models for recommendations Explore neural collaborative filtering and variational autoencoders Audience This course is designed for individuals looking to advance their skills in applied deep learning, understand relationships of data analysis with deep learning, build customized recommender systems for their applications, and implement deep learning algorithms for recommender systems. Individuals passionate about recommender systems with the help of TensorFlow Recommenders will benefit from this course. Deep learning practitioners, research scholars, and data scientists will also benefit from the course. The prerequisites include a basic to intermediate knowledge of Python and Pandas library. About The Author AI Sciences: AI Sciences is a group of experts, PhDs, and practitioners of AI, ML, computer science, and statistics. Some of the experts work in big companies such as Amazon, Google, Facebook, Microsoft, KPMG, BCG, and IBM. They have produced a series of courses mainly dedicated to beginners and newcomers on the techniques and methods of machine learning, statistics, artificial intelligence, and data science. Initially, their objective was to help only those who wish to understand these techniques more easily and to be able to start without too much theory. Today, they also publish more complete courses for a wider audience. Their courses have had phenomenal success and have helped more than 100,000 students master AI and data science.
    Note: "Published in February 2023.". - Online resource; title from title details screen (O'Reilly, viewed March 21, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837635092 , 1837635099
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.33
    Keywords: Human-computer interaction ; Machine learning ; Python (Computer program language) ; Artificial intelligence ; Artificial intelligence ; Human-computer interaction ; Machine learning ; Python (Computer program language) ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Chatbots are software applications used for online chat conversations through text or text-to-speech instead of providing direct contact with a live human agent. Chatbots are used in dialog systems for various purposes, including customer service, request routing, or information gathering. This course begins with a brief overview of chatbots, their need, and the types of chatbots. We will explore rule-based versus self-learning chatbots. We will understand the working mechanism of chatbots. We will explore machine learning-based chatbots and understand the ML-based architecture of chatbots. You will learn about the purpose of ML-based chatbots and their impact. We will get an overview of the Natural Language Toolkit (NLTK). You will learn to install packages and create a corpus with Python. We will delve into text preprocessing and helper function deployment, generate responses, and implement term-frequency times inverse document-frequency. We will train and test rule-based chatbots and finally work on a project developing an artificial intelligence question-answer chatbot using NLTK. Upon course completion, you will be able to relate the concepts and theories for chatbots in various domains, understand and implement machine learning models for building real-time chatbots, and evaluate machine learning models in chatbots. What You Will Learn Learn about chatbot types, rule-based and self-learning chatbots Learn text preprocessing and develop helper functions with Python Explore the impact and overview of the Natural Language Toolkit Gain hands-on practice, generate text in Python to develop chatbots Explore testing and training of chatbot with machine learning Implement term-frequency times inverse document-frequency hands-on Audience This course delivers content to people wishing to advance their skills in applied machine learning, master data analysis with machine learning, build customized chatbots for their applications, and implement machine learning algorithms for chatbots. This course is for you if you are passionate about rule-based and conversational chatbots. Machine learning practitioners, research scholars, and data scientists can benefit from the course. No prior knowledge of chatbots, or machine learning, is needed. You will need to know basic to intermediate Python coding, which is not taught separately in the course. About The Author AI Sciences: AI Sciences is a group of experts, PhDs, and practitioners of AI, ML, computer science, and statistics. Some of the experts work in big companies such as Amazon, Google, Facebook, Microsoft, KPMG, BCG, and IBM. They have produced a series of courses mainly dedicated to beginners and newcomers on the techniques and methods of machine learning, statistics, artificial intelligence, and data science. Initially, their objective was to help only those who wish to understand these techniques more easily and to be able to start without too much theory. Today, they also publish more complete courses for a wider audience. Their courses have had phenomenal success and have helped more than 100,000 students master AI and data science.
    Note: "Published in February 2023.". - Online resource; title from title details screen (O'Reilly, viewed March 21, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805121503 , 1805121502
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.75/85
    Keywords: SQL server ; Client/server computing ; Database management ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Are you interested in learning SQL and database management? Our comprehensive course offers an in-depth look at the fundamentals of databases, including database types, SQL commands, table operations, and advanced concepts such as grouping sets and data types. In the first few sections, you will learn about data manipulation, including selecting, inserting, updating, and deleting data from a database. The course then dives into more advanced topics such as stored procedures, which allow you to write reusable code that can be executed multiple times. You will also learn about views, which provide a way to organize and simplify complex SQL queries, and triggers, which enable you to automate database actions based on certain events. The course then delves into transactions, which are essential for ensuring data consistency and reliability. You will also learn about normalization, which is the process of organizing data in a database to reduce redundancy and improve efficiency. The final sections of the course cover database backup and restore, as well as securing the database against potential threats such as SQL injection attacks. Throughout the course, you will gain hands-on experience by working with real-world examples and scenarios. By the end of the course, you will have a strong foundation in SQL and database management that will serve you well in any career that involves data management. What You Will Learn Understand the fundamentals of database design and management Learn to write SQL queries to extract and manipulate data Implement advanced SQL techniques such as subqueries and views Explore the different types of SQL triggers and transactions Create database backups and restore data in case of loss Secure your database against potential threats like SQL injections Audience This course is designed for anyone interested in learning SQL and database management, including beginners with little to no prior knowledge of SQL. It is suitable for individuals looking to gain skills for a career in data analysis, database administration, or software development. This course will also benefit professionals looking to enhance their current skill set with SQL knowledge. Students pursuing degrees in computer science, information technology, or related fields can also benefit from this course. About The Author Abhilash Nelson: Abhilash Nelson is a pioneering, talented, and security-oriented Android/iOS mobile and PHP/Python web application developer with more than 8 years of IT experience involving designing, implementing, integrating, testing, and supporting impactful web and mobile applications. He has a master's degree in computer science and engineering and has PHP/Python programming experience, which is an added advantage for server-based Android and iOS client applications. Abhilash is currently a senior solution architect managing projects from start to finish to ensure high quality and innovative and functional design.
    Note: "Published in April 2023.". - Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805129417 , 1805129414
    Language: English
    Pages: 1 online resource (1 video file (13 hr.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/37
    Keywords: Amazon Web Services (Firm) ; User interfaces (Computer systems) ; Cloud computing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Vault is one of the most popular tools from HashiCorp and an extremely feature-rich secrets management platform, so naturally, those who are deploying and managing it need to understand how it all works. Therefore, individuals are interested in obtaining the HashiCorp Vault Associate certification. The course starts with an overview of HashiCorp Vault, installation, authentication methods, policies, tokens, secrets engines, and utilization of the Vault CLI, API, and UI. Throughout the course, you will be provided with comprehensive knowledge and skills to deploy HashiCorp Vault and its components effectively. You will delve into the Vault architecture and gain insights on configuring and installing the solution, creating policies, managing tokens, utilizing secrets engines, and much more. Furthermore, the course will guide you through configuring and deploying essential services, exploring core HashiCorp concepts, and providing you with a foundation to become a Vault expert. By the end of the course, you will be fully equipped with the skills and knowledge needed to pass the Vault Associate exam and gain a solid foundation in Vault and be able to confidently use it in your organization. Additionally, you will be prepared to manage HashiCorp Vault in real-world scenarios, ensuring seamless and secure access to critical data. What You Will Learn Get introduced to Vault and look at the architecture of Vault Install and run Vault Server using Packer and manually Configure Auth methods using the CLI, API, and UI Manage policies and tokens using the CLI, API, and UI Access Vault tokens and create Vault policies Compare and configure Secrets Engines Audience This course is perfect for DevOps engineers, cloud architects, security engineers, IT professionals, system administrators, network engineers, developers, and infrastructure engineers looking to become proficient in HashiCorp Vault. Anyone can start their journey to become an expert in HashiCorp Vault today! With a focus on practical application, it is suitable for beginners and intermediate-level learners. Security background is optional, and basic terminal experience with Linux is recommended. About The Author Bryan Krausen: Bryan Krausen is an IT consultant with over 20 years of experience in enterprise IT. He specializes in Amazon Web Services and HashiCorp tools. Bryan focuses on cloud design and facilitates customer workshops that define business and technical requirements to allow businesses to deliver applications on the AWS cloud platform. He was the first individual to earn the HashiCorp Vault Expert partner certification. Bryan has deployed and assisted with adopting the HashiCorp Vault into many Fortune 1000 companies. He delivers lectures at community events, such as HashiConf (2019 to 2022), HashiTalks (2019 to 2020), and many HashiCorp user groups across the mid-west and eastern US.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781801077590 , 1801077592
    Language: English
    Pages: 1 online resource (1 video file (21 hr., 15 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Swift (Computer program language) ; iPhone (Smartphone) Programming ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In this course, we will guide you through the process of building two applications: a Notes app and a Twitter Clone app using SwiftUI and Node.js. We start with the basics and build up to developing a Twitter Clone app with authentication using Node.js and JSONWebToken library. We will also cover the foundation of Swift programming language, SwiftUI framework, core data with SwiftUI, MVVM architecture, external REST APIs integration, and many more. With hands-on tutorials, you will gain a deep understanding of Swift concurrency, data fetching, JSON serialization, and how to use the Swift Package Manager (SPM) for version control with Git. Not only that, but we will also take you through the process of building a REST API using Node.js. You will learn how to use Express.js to create a web server and Sharp.js for image processing. We will also show you how to use JSONWebToken (JWT) for authentication and many other key features of Node.js. Throughout the course, we will cover powerful SwiftUI features such as SwiftUI Menu, Items and Stacks, Resizable Bottom Sheet, Pull-to-Refresh View, In-App API, Layout Protocol, HTTP Requests, MVVM Architecture, Navigation Controllers, and Slide Menus. By the end of this course, you will have gained a complete understanding of how to develop, design, and publish your own apps in the Apple App Store. You will have learned how to create a beautiful Notes app and a fully functional Twitter Clone app with backend authentication. What You Will Learn Learn Swift 5 programming language to develop native applications Study how to fetch data from MongoDB servers using web APIs Learn how to create custom APIs using Nodejs to fetch and push data Build a complete server-side application using Node.js and JavaScript Deploy your Node apps to production Understand the Node.js ecosystem and build REST APIs Audience This course is designed for beginners and/or intermediate iOS developers, as well as all levels of UIKit developers who want to learn SwiftUI. It is also suitable for mobile app developers who want to learn backend development with Node.js. The course is designed for people who want to build cool apps from scratch, regardless of their prior experience. It will start with the basics and progress to building actual cool software products. No experience needed. The only requirement is access to a Mac or a Mac emulator. About The Author Eren Cem Salta: Eren Cem Salta is a renowned entrepreneur and tech wizard with a passion for revolutionizing the sports industry. He is the founder of Turma, an innovative app that simplifies sports team management and athlete recruitment. The app has garnered clients such as Stanford and Princeton Universities, highlighting Cem's ingenuity and forward-thinking approach to business. Cem's entrepreneurial journey began at a young age when he started one of Turkey's first online retail stores at the age of 14. He has since honed his skills in web and mobile development, working with numerous top firms across various industries, including entertainment, logistics, and academics. Cem's passion for empowering individuals to have a voice led him to set his next goal of providing a free medium for all citizens to express themselves.
    Note: "Published in April 2023.". - Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805124269 , 1805124269
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application software Development ; Natural language generation (Computer science) Computer programs ; JavaScript (Computer program language) ; User interfaces (Computer systems) ; Artificial intelligence ; Computer graphics ; Instructional films ; Nonfiction films ; Internet videos
    Note: "Published in April 2023.". - Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781837633814 , 1837633819
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.6/8
    Keywords: Tableau (Computer file) ; Information visualization Computer programs ; Visual analytics Data processing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Tableau is a business intelligence and data visualization tool that is widely used around the globe. This course covers all the steps from scratch. So, after the course, you will be confident to create beautiful and effective dashboards. You will also learn how you can create a story in Tableau. The course starts with the basics of Tableau and its installation. You will learn about donut charts, KPI cards, placeholders, waterfall charts, lollipop charts, dual axis charts, dynamic arrows, separate legend formatting, how to use custom shapes, visualization in a tooltip, quick table calculations, level of detail expressions, formatting, dashboard actions, how to use dashboard objects effectively, and more. You will have a hands-on approach to creating four different dashboards and views such as the sales analysis dashboard, Netflix analysis dashboard, and investment portfolio dashboard. By the end of this Tableau book, you will have the skills and knowledge to confidently create your own dashboard as per the project requirement. What You Will Learn Learn quick table calculations Understand level of detail expressions Understand the basic charts - line chart, maps, bar chart, crosstabs Explore visualization in a tooltip Understand story and formatting in Tableau Understand donut chart, waterfall chart, lollipop chart, dual axis chart Audience This course can be taken by Tableau developers and anyone who wants to learn the best way to create dashboards in Tableau. A basic knowledge of Tableau will be helpful to get started on the course. About The Author Vivek P.: Vivek P. is a Tableau Certified Associate with more than 12 years of IT experience with different technologies. He is enthusiastic about working with technology and strongly believes in hands-on learning. His teaching methodology is also driven by this belief.
    Note: "Published in March 2023.". - Online resource; title from title details screen (O'Reilly, viewed April 25, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835086667 , 1835086667
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: ChatGPT ; Natural language generation (Computer science) Computer programs ; Neural networks (Computer science) ; Artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: In today's world, artificial intelligence (AI) is changing the way we create content. AI models like ChatGPT and DALL-E 2 are becoming increasingly sophisticated, enabling us to generate high-quality text and images at an unprecedented speed and scale. As a result, it's essential for creatives to understand how to leverage these tools effectively. In this course, you will learn the fundamentals of generative AI and how to use it ethically and responsibly. You will discover the strengths and limitations of these models and when to use them for content creation. You will also explore various applications of AI in the creative industries and the legal and ethical implications of using these tools. The course begins with an introduction to generative AI and an overview of popular models such as ChatGPT and DALL-E 2. You will then delve into the strengths and limitations of AI, including its ability to create content quickly, revise content, and break through creative block. You will also learn about the limitations of AI, including the finite nature of training data, issues of accuracy, plagiarism, and bias, and the need for human modification. By the end of the course, you will have a solid understanding of the role of AI in content creation and the ethical considerations that come with using these tools. You will be able to navigate the strengths and limitations of AI and make informed decisions about when and how to use it. What You Will Learn Navigate risks and limitations of AI Master prompt engineering techniques for quality output Understand key legal concepts for professional usage Address AI bias to improve creative work Develop AI guidelines for team best practices Embrace transparency for unique human perspective Audience This course is designed for creatives, marketers, and anyone interested in learning how to use generative AI tools for content creation. No prior experience with AI is required, as the course covers the fundamentals of AI and the capabilities and limitations of generative AI. However, a basic understanding of digital media tools and technology is recommended. You should also have access to a computer and a stable internet connection. About The Author AI Daily LLC: XCHAIN ANALYTICS LTD is a leading analyst and full-stack developer with expertise in Python and React. Their passion lies in discovering and promoting innovative ideas that are often overlooked in the hype-driven tech industry. With a focus on authenticity and practicality, XCHAIN ANALYTICS strives to share their knowledge and empower others through teaching. They believe in the power of continuous learning and experimentation and often find themselves exploring new ventures. However, they always return to teaching as their true calling, where they can put their ideas into action and help others effectively.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805120438 , 1805120433
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Cloud computing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Google Cloud platform is one of the most rapidly growing cloud providers in the market today, making it an essential skill for aspiring cloud engineers and data scientists. This comprehensive course covers all major serverless components on GCP, providing in-depth implementation of machine learning pipelines using Vertex AI with Kubeflow, and Serverless PySpark using Dataproc, App Engine, and Cloud Run. The course offers hands-on experience using GCP services such as Cloud Functions, Cloud Run, Google App Engine, and Vertex AI for custom model training and development, Kubeflow for workflow orchestration, and Dataproc Serverless for PySpark batch jobs. The course starts with modern-day cloud concepts, followed by GCP trial account setup and Google Cloud CLI setup. You will then look at Cloud Run for serverless and containerized applications, and Google App Engine for serverless applications. Next, you will study cloud functions for serverless and event-driven applications. After that, you will look at data science models with Google App Engine and Dataproc Serverless PySpark. Finally, you will explore Vertex AI for the machine learning framework, and cloud scheduler and application monitoring. By the end of the course, you will be confident in deploying and implementing applications at scale using Kubeflow, Spark, and serverless components on Google Cloud. What You Will Learn Deploy serverless applications using Google App Engine, Cloud Functions, and Cloud Run Learn how to use datastore (NoSQL database) in realistic use cases Understand microservice and event-driven architecture with practical examples Deploying production-level machine learning workflows on cloud Use Kubeflow for machine learning orchestration using Python Deploy Serverless PySpark Jobs to Dataproc Serverless and schedule them using Airflow/Composer Audience This intermediate course is designed for those who aspire to become data scientists and machine learning engineers, data engineers, architects, and anyone with a decent exposure in IT looking to start their cloud journey. The course is ideally suited for individuals who possess a fair idea of how the cloud works and have prior experience in basic programming using Python and SQL. A tech background with basic fundamentals and basic exposure to programming languages such as Python and SQL along with the Bash command line will further help individuals fast-track their learning. About The Author Siddharth Raghunath: Siddharth Raghunath is a business-oriented engineering manager with a vast experience in the field of software development, distributed processing, and cloud data engineering. He has worked on different cloud platforms such as AWS and GCP as well as on-premise Hadoop clusters. He conducts seminars on distributed processing using Spark, real-time streaming and analytics, and best practices for ETL and data governance. He is passionate about coding and building optimal data pipelines for robust data processing and streaming solutions.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781805122050 , 1805122053
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; Computer programming ; Recursion theory ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: We understand that learning programming can be overwhelming, especially when it comes to problem-solving under pressure during coding interviews. That's why we have developed an efficient model of hours upon hours of practice examples, complete with multiple solutions and a glossary of definitions. This approach allows you to move through the course at your own pace, starting with the very basics of programming in JavaScript, such as datatypes, or diving right into code examples, matrices, Fibonacci sequences, and more. The course is divided into four main sections. First, an introduction will help you set up the necessary tools and provide an overview of what you can expect to learn. From there, the course covers the introduction to programming and JavaScript basics for absolute beginners. Next, you will explore data structures, from zero to intermediate level, before moving on to the fundamentals of algorithms. Finally, you will learn about advanced algorithms and data structures, giving you a complete picture of this essential skill set. You will gain the experience and focused practice needed to overcome any challenge in JavaScript and programming data structures and algorithms. By the end of the course, you will be confident in your knowledge and prepared to tackle coding interviews, impressing your future interviewer and colleagues alike. What You Will Learn Sign in to the CodeSandbox IDE and create a new Vanilla.js template on it Look at the comments, datatypes, variables, functions, and operators in JavaScript Use the splice method to decode the puzzle and update new user database Build an Uber app customer JavaScript object database Automate a company's website with correct formatting in JavaScript Understand the Fibonacci series and recursion in JavaScript Audience This course is designed for individuals who want to gain a comprehensive understanding of JavaScript and tackle coding interview challenges with confidence. If you have been struggling to grasp the fundamentals of programming or feel uncertain about solving coding problems, this course is perfect for you. If you are interested in pursuing a career as a programmer or seeking to upskill in advanced topics, whether you are a beginner or have prior experience with JavaScript, this course will teach you advanced concepts in data structures and algorithms to take your skills to the next level. No programming experience is required as you will learn everything from the ground up. About The Author Clarian North: Clarian North is a recognized industry-certified instructor, CEO of Orbital LLC, and a senior project engineer with over 90K enrolments worldwide. His students have gone on to work for some of the biggest production companies such as Universal, Google, Amazon, Warner, and the BBC. He has contributed to viral streams, grown a unique digital imprint in over 80 countries, and been featured in Rolling Stone, Billboard, Guardian, Bloomberg, and Vice. He has worked for majors, indies, and international publishing houses, including Grammy-nominated and award-winning productions, mixing for Emirates Airline Inflight Radio, and producing for Kompakt Records. He is dedicated to giving accessible and comprehensive tech courses, teaching complex subject matter with clear and example-based explanations, and guiding students through complex techniques with just a computer and free software.
    Note: "Published in May 2023.". - Online resource; title from title details screen (O'Reilly, viewed June 13, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...