Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (1,672)
  • 2020-2024  (1,671)
  • 1980-1984  (1)
  • Internet videos  (1,615)
  • Film
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Alexandria, Va. : Alexander Street Press ; Nachgewiesen 2010 -
    Language: English
    Pages: Online-Ressource
    Dates of Publication: Nachgewiesen 2010 -
    Keywords: Datenbank ; Bibliografie ; Film ; Ethnologie ; Feldforschung ; Dokumentarfilm ; Geschichte 1922-2013
    Abstract: Enth. v.a. ethnologische Filme, filmische Feldforschungsberichte und Dokumentarfilme aus der ganzen Welt und größtenteils in englischer Sprache, darunter Filme der BBC und der Non-Profit-Organisation Documentary Educational Resources (DER) aus den Jahren 1922 - 2013
    Note: Gesehen am 03.02.2023
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835463857 , 1835463851
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 33 min.)) , sound, color.
    Edition: [First edition].
    DDC: 001.4/226
    Keywords: Digital storytelling ; Information visualization ; Visualization Data processing ; Visual communication ; Récits numériques ; Visualisation de l'information ; Visualisation ; Informatique ; Communication visuelle ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins by setting a solid foundation, debunking myths around storytelling as a natural talent and instead framing it as a skill that can be learned and perfected. Dive into the common pitfalls of data presentation, learning from real-life examples and establishing a presentation baseline for measurable improvement. Explore the neuroscience behind effective storytelling and its impact on decision-making, emphasizing the significance of narrative in data communication. Through structured frameworks like GAME and ABT, you'll learn to craft engaging narratives tailored to your audience, select the right visuals, and deliver your message with impact. From theoretical underpinnings to practical applications, the course covers building compelling data stories, mastering PowerPoint for clarity and impact, and refining your presentation skills for both in-person and remote settings. Bonus sections on persuasive insights and effective data visualization techniques equip you with the tools to transform data into stories that inform, inspire, and drive action.
    Note: "Updated May 2024.". - Online resource; title from title details screen (O’Reilly, viewed May 14, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Sebastopol, California] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 620/.00420285
    Keywords: Computer-aided design ; Computers Design ; Computer graphics ; Conception assistée par ordinateur ; Infographie ; computer-aided design (process) ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is a comprehensive course designed to teach the essentials of Figma, a leading UI/UX design tool. This course covers everything from basic functionality to advanced features like responsive design and team collaboration, catering to both beginners and those with some design experience. The course addresses the increasing need for skilled Figma users in digital design, helping learners create sophisticated designs and prototypes vital for web and app development. By the end, participants will be proficient in Figma, equipped to handle professional design projects and collaborate effectively in team environments. What you'll learn and how to apply it By the end of this course, learners will be able to proficiently use Figma to create, prototype, and collaborate on UI/UX designs for digital products, demonstrating a comprehensive understanding of the tool's features and applications in real-world projects. This course is for you because You are a designer coming from another tool (XD, Sketch, Photoshop, Illustrator), looking to learn a new tool. You are a graphic/print/illustrator looking to transition to UX and UI. You are a developer looking to gain familiarity with Figma so you can export and implement designs easily. Prerequisites Basic computer skills.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 14, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836204671 , 1836204671
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Data structures (Computer science) ; Python (Langage de programmation) ; Structures de données (Informatique) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This comprehensive course begins with fundamental concepts, introducing you to basic data structures like arrays and lists, and progressively covers more complex structures such as linked lists, stacks, queues, trees, and graphs. Each lesson is intricately designed to build upon the previous, ensuring a seamless transition from simple to complex data management techniques. As the course unfolds, you'll delve into the practical implementations and theoretical underpinnings of each data structure. We not only explain the operations of each structure but also demonstrate their real-world applications in Python, enabling you to optimize software performance and tackle programming challenges with precision. Detailed video tutorials guide you through the intricacies of data manipulation, ensuring you understand how to effectively utilize data structures in your projects. This approach not only enhances learning but also ensures you can apply these structures to solve practical, real-world problems. By the end of this course, your transformation from a beginner to a proficient Python programmer will be well underway. You'll possess the skills to handle complex data structures, making you a valuable asset in the tech industry.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 14, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781836204572 , 1836204574
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 32 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/8
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Web services Study guides Examinations ; Cloud computing Study guides Examinations ; Electronic data processing personnel Certification ; Services Web ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our "AWS Certified Solutions Architect – Associate" course, meticulously crafted to prepare you for the AWS Solutions Architect - Associate exam. This course dives deep into the essentials of designing scalable, resilient, and cost-efficient solutions on AWS, employing the Well-Architected Framework as a guide. Through a structured curriculum, you'll explore crucial concepts such as EC2, S3, VPC, and Route 53, among others, gaining an understanding of how to architect and implement AWS services effectively. The course begins with an overview of cloud-native design principles, setting the stage for more complex discussions on identity management, networking, and compute services. Each section builds on the last, with a focus on practical application, preparing you for scenarios you will face both in the exam and in real-world applications. By the end of this course, you will be well-equipped not only to pass the AWS certification exam but also to design AWS solutions that are robust, secure, and aligned with business needs.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9781836207634 , 1836207638
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 31 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7/8
    Keywords: Amazon.com (Firm) ; Web services ; Electronic data processing personnel Certification ; Cloud computing ; Application software Development ; Services Web ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The "AWS Certified DevOps Engineer - Professional" course is designed to deepen your technical expertise in managing distributed application systems on the AWS platform. This advanced training covers the entire spectrum of DevOps methodologies, including continuous integration, continuous delivery, and infrastructure as code, providing a robust foundation for implementing and managing dynamic, automated environments. Starting with an overview of the AWS DevOps environment, the course progresses through detailed discussions and hands-on practice with AWS tools like CodeCommit, CodeBuild, CodeDeploy, and CodePipeline, teaching you to manage complex workflows and optimize deployment processes. You'll learn how to use Elastic Beanstalk for easy application deployment, manage Docker containers, and orchestrate applications with ECS and CloudFormation. Instructors guide you through setting up real-world scenarios, demonstrating how to integrate various AWS services to create highly efficient DevOps pipelines. This course not only prepares you for the AWS Certified DevOps Engineer - Professional exam but also equips you with the practical skills necessary to implement the lessons learned directly into your workplace.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Sebastopol, California] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Kubernetes ; Application software Development ; Computer programs ; Logiciels d'application ; Développement ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join host David Flanagan for a friendly, fun, and informative learning experience as two ops superstars compete live to debug a broken Kubernetes cluster. The premise of this highly engaging show is simple. Two days prior to the live event, David spins up two working Kubernetes clusters. The chosen contestants have the next 48 hours to break them. Then they go live in front of a virtual audience to actively debug the broken cluster. Registrants for the event get to witness the strategies, tactics, and tools used by two skilled individuals—and perhaps pick up some creative solutions for their own Kubernetes problems. Kubernetes is infinitely configurable, and rarely are two clusters broken in the same way because each contestant brings unique experience, knowledge, and skill, and each will debug and remediate differently.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135358856 , 013535885X
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 15 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer software Development ; Machine learning ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Learn MLOps for Machine Learning - With both machine learning and DevOps at the forefront these days, Milecia McGregor helps engineers understand how to apply key DevOps principles to their machine learning projects. When teams are working with machine learning models, changing features, different data sets, new algorithms, and unique computing resources all influence a machine learning model’s performance. Tracking all of these items can be complicated. With tools such as DVC, MLFlow, AWS, you can meet the challenge. Milecia McGregor demonstrates how to use MLOps tools to improve machine learning and automate some of the steps in the process. In Securing Your DevOps Pipelines: DevSecOps Best Practices, Milecia covers how DevSecOps improves upon regular DevOps pipelines. She covers the tools and methodologies you can use to bring DevSecOps to your organization. By the end of the course, you will know how to build a DevSecOps pipeline and how to integrate different tools to handle the OWASP Top Ten, as well as compliance checks to stay up to date with regulations like HIPAA, PCI, and GDPR.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Sebastopol, California] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (9 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Shortcuts
    DDC: 005.2/5
    Keywords: Mobile apps Programming ; JavaScript (Computer program language) ; Mobile computing Programming ; Applications mobiles ; Programmation ; JavaScript (Langage de programmation) ; Informatique mobile ; Programmation ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This video shortcuts collection is the book Fluent React delivered as a collection of videos. The book has proven invaluable for a number of web engineers who feel they can more confidently build powerful web experiences, particularly because React comes with a large ecosystem of frameworks, primitives, and opinions. This shortcut series aims to demystify those topics along with some of the inner workings of React to help the viewers develop true fluency of the web’s most popular library for building user interfaces.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138285104 , 0138285101
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Rust (Computer program language) ; Computer programming ; Streaming video ; Internet videos ; Rust (Langage de programmation) ; Programmation (Informatique) ; Vidéo en continu ; Vidéos sur Internet ; computer programming ; streaming video ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Rust is one of the fastest growing programming languages and is often used to build projects typically requiring languages like C++. Rust offers full control and extreme performance with type safety and strong support for concurrency. Rust is also well suited for Web3 development as it is used in many blockchains and decentralized applications. Rust is also the influence and starting point for multiple domain specific languages used throughout Web3. Caleb Curry brings programmers up to speed quickly on the benefits of Rust, and how and when to use it to get fully up and running.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781836205777 , 1836205775
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 47 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Cloud computing Study guides Examination ; Electronic data processing personnel Study guides Certification ; Computer technicians Study guides Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The "AWS Certified SysOps Administrator - Associate" course is an expertly structured educational journey designed to equip you with the operational skills and best practices needed for AWS system administration. This course dives deep into the core aspects of managing AWS environments, ensuring you understand the full functionality of the AWS suite. Starting with Identity and Access Management (IAM), the course covers essential security configurations and progresses through managing virtual private clouds, utilizing Elastic Compute Cloud (EC2), and ensuring high availability and fault tolerance. Throughout the course, you will engage with detailed tutorials on setting up and securing networks, managing storage options, and optimizing resource utilization to ensure cost-effective operations. As the modules advance, you'll learn about sophisticated strategies for application load balancing, route management, database administration, and backup and recovery processes, all within AWS frameworks. By the end of this course, you will have navigated through comprehensive training on automating deployments, monitoring system performance, and managing costs, setting you up for success on the AWS Certified SysOps Administrator - Associate exam and in real-world operations.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780135359051 , 0135359058
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 2 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1/14
    Keywords: Functional programming (Computer science) ; JavaScript (Computer program language) ; Python (Computer program language) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Functional Programming is a revolutionary way of writing code that’s rapidly gaining traction in the world of software development. While Object-Oriented Programming is still the most popular programming paradigm, there are a number of problems that come about when using it—hard-to-find bugs, tightly coupled code, and it’s difficult to scale. Functional programming allows us to solve or avoid these problems by taking a different approach to writing software. Functional Programming Projects with JavaScript teaches all about the core concepts of Functional Programming and how to apply them in JavaScript, mix of screen casting, slides, and coding. Basic functional concepts lead to first class functions, which leads to working with arrays and objects and then advanced functional concepts. Functional Programming Projects with Python 3 is about the core concepts of Functional Programming and how to apply them in Python, through a mix of screen casting, slides, and coding. It also covers basic functional concepts that lead to first class functions, which leads to working with arrays and objects and then advanced functional concepts.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 35 min.)) , sound, color.
    Edition: [First edition]
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Information technology Study guides Management ; Examinations ; Computer technicians Study guides Certification ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Are you ready to pass the CompTIA Security+ exam? Join Dean Bushmiller for this recording of an interactive event to find out. Dean will help you work with his preparation checklist, validate all that you’ve done to prepare, and build or tweak a study plan you can rely on.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 51 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Microcomputers Access control ; Sécurité informatique ; Micro-ordinateurs ; Accès ; Contrôle ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Are you tired of chasing security vulnerabilities after your code is already built? Integrating security best practices into your development pipeline through DevSecOps automation allows your organization to effectively implement and scale solutions to this problem. Automation creates visibility and observability across the software development lifecycle, but while it can enable a "shift left," it is important to examine its potential pitfalls and challenges. Join top DevSecOps experts for an overview of some of the greatest benefits and most pressing concerns of automation. You'll explore best practices around the use of automated security tools for testing and vulnerability management, the ongoing care and feeding of your automation program, and the behavioral and cultural factors that can make or break your automation strategy. What you'll learn and how you can apply it Understand how the development, operations, and security teams can work together to improve your organization's product. Gain a deeper understanding of system resilience, security champion programs, secure system development, and securing the ML lifecycle. Learn how to implement DevSecOps best practices. This live event is for you because... You're a security practitioner interested in DevSecOps. You're a developer or engineer looking to integrate security into your ML lifecycle. You want to understand the role of security in complex systems. Recommended follow-up: Read Learning DevSecOps (early release book) Read Security Chaos Engineering (book) Watch Software Development Hour with Sam Newman: Building Secure Software with Laura Bell (video) Please note that slides or supplemental materials are not available for download from this recording. Resources are only provided at the time of the live event.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 50 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; Application software Development ; Web applications Development ; JavaScript (Langage de programmation) ; Logiciels d'application ; Développement ; Applications Web ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to our Next.js Mastery course where you'll journey into the world of Next.js and React to become a proficient developer. In this comprehensive course, we'll cover a range of essential topics to equip you with the skills and knowledge needed to create top-tier web applications. Our journey begins with an introduction to Next.js, highlighting its key features and advantages. We'll set clear expectations for what you'll learn in the course and prepare you for the hands-on experience ahead. Dive into practical aspects, including setup and installation, Next.js basics, and mastering React Hooks like useState, useEffect, and useMemo. Routing in Next.js is a vital skill, and we'll cover it extensively. Explore creating dynamic and user-friendly navigation systems, from basic routing to nested routing. Additionally, we'll understand layout design, the differences between common and conditional layouts, and how to effectively implement middleware. Our course places a strong emphasis on API integration, encompassing both client-side and server-side APIs. Gain hands-on experience working with data from external sources and grasp the nuances of client and server components. We'll also delve into optimization, covering image optimization, SEO best practices, and fundamental styling techniques to enhance user experiences. By the course's end, you'll emerge as a Next.js expert, capable of building efficient, optimized, and feature-rich web applications. Whether you're a beginner or an experienced developer, our Next.js Mastery course will empower you to create web applications that excel in the digital landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 21 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to this immersive course designed to take you from a basic understanding to a proficient level in using Git and GitHub, two of the most essential tools in modern software development. This course begins by laying a solid foundation with an introduction to the core concepts of version control, the significance of Git and GitHub in the development world, and the differences between them. We dive into why these tools are indispensable for developers, ensuring even absolute beginners grasp the basics. We then progress to practical aspects, guiding you through installations and account setups. You'll learn how to install Git, set up a GitHub account, and configure necessary tools like Visual Studio Code. This practical approach ensures you're not just learning concepts but also applying them in real-world scenarios. The heart of the course lies in mastering the basics of GitHub. You'll explore how to create and manage repositories, understand branching, make pull requests, address issues, and more. We also delve into the Git Command Line Interface (CLI), teaching you essential commands and how to use Git for effective version control. Advanced topics are not left out. We'll introduce you to GitHub Desktop, Git Bash, GitHub Extensions, and the innovative GitHub Copilot. By the end of this course, you'll have a comprehensive understanding of Git and GitHub, equipped to handle code in a collaborative environment with ease and confidence. Whether you're a beginner programmer, a project manager, or just passionate about coding, this course will provide the knowledge and skills necessary to excel in your coding journey.
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.6/93
    Keywords: SketchUp ; Three-dimensional imaging ; Imagerie tridimensionnelle ; three-dimensional ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Welcome to this comprehensive beginner's course designed to unlock your creative potential in the realm of 3D design. Throughout this course, you will be introduced to the fundamentals of 3D design, the layout and functionality of SketchUp, and the techniques necessary to transform your ideas into digital reality. You will engage in hands-on projects, encouraging you to apply learned concepts while cultivating a robust understanding of SketchUp's tools and applications. By the end of this course, you will not only grasp the essentials of SketchUp but also gain the confidence to explore more complex design challenges. You will develop a strong foundation that will serve as a stepping stone towards more advanced 3D modeling techniques. So, whether you are an aspiring architect, an interior designer, a game developer, or someone who loves to create, this course offers a fun, flexible, and comprehensive approach to 3D modeling. Let's start modeling!
    Note: Online resource; title from title details screen (O’Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (55 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Pragmatic AI labs course
    DDC: 005.7
    Keywords: Big data ; Electronic data processing ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Big Data Processing with Hadoop, Spark, Snowflake and Databricks. Learn to process big data using popular platforms like Hadoop, Spark, Snowflake and Databricks through live coding examples Learn from O'Reilly author Kennedy Behrman. This video series covers key concepts and tools for big data processing and storage. It introduces platforms like Hadoop, Spark, Snowflake and Databricks, discussing their architectures and use cases. Through live coding demonstrations in Python and SQL, you'll learn to work with these technologies hands-on.
    Note: Online resource; title from title details screen (O'Reilly, viewed May 7, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3/5
    Keywords: Natural language processing (Computer science) ; Artificial intelligence ; Traitement automatique des langues naturelles ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Introduction to LLM vulnerabilities This introductory course on vulnerabilities for Large Language Models (LLMs) and language models in general. It provides a deep dive into the practical applications of large language models (LLMs) using Azure's AI services. Upon completion, learners will be able to: Explain the concept of model replication or model shadowing as a potential attack vector in large language models, and describe methods to mitigate it through techniques like rate limiting and buffering. Analyze the potential benefits and limitations of using pre-trained LLMs Develop strategies for mitigating risks and ethical considerations when deploying LLM-powered applications. Describe the high-level process of creating a large language model, including data collection, cleaning, and training. Explain the role of security in large language models and recognize potential security vulnerabilities and attack vectors. Identify insecure plugin designs in large language model software development kits (SDKs) that could lead to remote execution and implement strategies to secure plugins. You will learn how to secure your large language model (LLM) applications by addressing potential vulnerabilities. You will explore strategies to mitigate risks from insecure plugin design, including proper input validation and sanitization. Additionally, you will discover techniques to protect against sensitive information disclosure, such as using a redaction service to remove personally identifiable data from prompts and model responses. Finally, you will learn how to actively monitor your application dependencies for security updates and vulnerabilities, ensuring your system remains secure over time. Week 1: Foundations of Language Models This week you will get a brief overview of LLMs and how do they work Learning Objectives Analyze common types of generative applications and their architectures, including multi-model applications, and understand their challenges and benefits. Explain the functioning of a multi-model application, including the role of the framework and specialized machine learning models. Identify the advantages of smaller, specialized models in terms of resource usage, interaction speed, and deployment agility. Compare and contrast different generative AI application types, such as API-based, embedded models, and multi-model applications, and understand their use cases and challenges. Recognize the importance of large language models in various real-world applications, including text-based chatting, customer service, content creation, and daily tasks. Evaluate the benefits and drawbacks of large language models, considering aspects like accuracy, privacy, and potential misuse. Understand the basics of tokenization, indexing, and probability machines in the context of large language models. Describe the high-level process of creating a large language model, including data collection, cleaning, and training. Explain the role of security in large language models and recognize potential security vulnerabilities and attack vectors. Week 2: Language Model Vulnerabilities This week focuses on model-based vulnerabilities that you can explore with prompts. Learning Objectives Explain the concept of model replication or model shadowing as a potential attack vector in large language models, and describe methods to mitigate it through techniques like rate limiting and buffering. Identify and demonstrate insecure output handling in large language models, and understand the potential security threats and attack vectors associated with it. Understand prompt injection and its implications for large language models, including how certain applications define the initial behavior of these models and how to exploit implicit system prompts. Recognize model theft vulnerabilities and understand how handling and access to system components can impact model security, particularly in the context of dynamically loaded models from external sources. Week 3: System vulnerabilities This week you will learn how to deal with environments and system-based vulnerabilities as they relate to LLMs. Learning Objectives Identify insecure plugin designs in large language model software development kits (SDKs) that could lead to remote execution and implement strategies to secure plugins. Explain the potential risks of sensitive information disclosure in large language models and implement measures to redact personal identifiable information using HTTP APIs and regular expressions. Monitor and update dependencies in large language model applications to prevent potential security vulnerabilities and automate the process using tools like GitHub's Dependabot. Evaluate application vulnerabilities based on the programming language and framework, and implement measures to prevent potential security threats. Week 4: Other types of vulnerabilities Learning Objectives Identify potential security threats and vulnerabilities associated with large and small language models. Implement strategies to prevent security situations and guard against making environments more secure. Recognize the concept of excessive agency in large language models and its potential impacts on functionality. Explain the denial of service threat for large language models and describe methods to guard against API misuse.% About your instructor Alfredo Deza has over a decade of experience as a Software Engineer doing DevOps, automation, and scalable system architecture. Before getting into technology he participated in the 2004 Olympic Games and was the first-ever World Champion in High Jump representing Peru. He currently works in Developer Relations at Microsoft and is an Adjunct Professor at Duke University teaching Machine Learning, Cloud Computing, Data Engineering, Python, and Rust. With Alfredo's guidance, you will gain the knowledge and skills to understand and work with vulnerabilities within language models. Resources Introduction to Generative AI Responsible Generative AI and Local LLMS Practical MLOps book.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 22, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Coding theory ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.13/3
    Keywords: Go (Computer program language) ; Computer programming ; Computer multitasking ; Go (Langage de programmation) ; Programmation (Informatique) ; Fonctionnement multitâche ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Concurrency doesn't need to be confusing. Start writing concurrent code that improves performance, scales up to handle large volumes of data, and takes full advantage of modern multi-processor hardware. Too many developers think concurrency is extremely challenging. Learn Concurrent Programming with Go is here to prove them wrong! This book uses the easy-to-grasp concurrency tools of the Go language to demonstrate principles and techniques, steadily teaching you the best practices of effective concurrency. Techniques learned in this book can be applied to other languages. In Learn Concurrent Programming with Go you will learn how to: Implement effective concurrency for more responsive, higher performing, scalable software Avoid common concurrency problems such as deadlocks and race conditions Manage concurrency using goroutines, mutexes, readers-writer locks, and more Identify concurrency patterns such as pipelining, worker pools, and message passing Discover advantages, limits, and properties of parallel computing Improve your Go coding skills with advanced multithreading topics Concurrent programming allows multiple tasks to execute and interact simultaneously, speeding up performance and reducing user wait time. In Learn Concurrent Programming with Go, you'll discover universal principles of concurrency, along with how to use them for a performance boost in your Go applications. Expert author James Cutajar starts with the basics of modeling concurrency in your programs, demonstrates differences between message passing and memory sharing, and even introduces advanced topics such as atomic variables and futexes. About the Technology You can improve almost any application's performance and responsiveness by introducing concurrency into the codebase. This book will show you how! It starts with the basics of concurrent programming and builds your skills step by step by exploring scenarios you'll face every day as a developer. Author James Cutajar explains each aspect of concurrency in plain language using the intuitive features baked into the Go language. About the Book Learn Concurrent Programming with Go provides a practical, hands-on introduction to creating software for modern multiprocessor systems. In it, you'll learn how to divide larger programming tasks into independent parts that can run simultaneously. You'll use the Go language to implement common concurrency patterns by utilizing readers-writer locks, semaphores, message passing, and memory sharing. The skills you learn will easily transfer to other languages. What's Inside Prevent deadlocks and race conditions Go concurrency features like goroutines, mutexes, channels, and more Concurrency patterns including pipelining and worker pools About the Reader For programmers with basic knowledge of Go or another C-style language. No experience in concurrent programming required. About the Author James Cutajar has been programming for more than 20 years. He's an open source contributor, blogger, tech evangelist, Udemy instructor, and author. Quotes Concurrency is a notoriously difficult, but important, topic. This book will make it all clear! - Allen B. Downey, author of The Little Book of Semaphores, Think Python, and Probably Overthinking It This is the book I was looking for. It explains the necessary building blocks with easy-to-understand examples. Excellent! - Arne Claus, trivago Uncover the beauty of concurrency, where logic dances with elegance. - Jasmeet Singh, Hashicorp A powerhouse of a book! It lays the foundation for understanding concurrency in any language. - Nathan B. Crocker, Galaxy Digital LP.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer programming ; Computer software Development ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson
    ISBN: 9780138361600 , 0138361606
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.8
    Keywords: Artificial intelligence Computer programs ; Security measures ; Computer networks Security measures ; Natural language generation (Computer science) ; Intelligence artificielle ; Logiciels ; Sécurité ; Mesures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Génération automatique de texte ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Ethical development and responsible deployment of AI and ML systems. Learn the latest technology in AI and ML security to safeguard against AI attackers and ensure data integrity and user privacy. Navigate privacy and ethical considerations to gain insights into responsible AI practices and address ethical consideration. Explore emerging trends and future directions in AI, ML, security, ethics, and privacy focusing on key concepts including threats, vulnerabilities, and attack vectors. Recognize and understand the privacy aspects of AI and ML, including data protection, anonymization, and regulatory compliance Get the essential skills to protect your AI system against cyber attacks. Explore how generative AI and LLMs can be harnessed to secure your projects and organizations against AI cyber threats. Develop secure and ethical systems while being mindful of privacy concerns with real-life examples that we use on a daily-basis with ChatGPT, GitHub Co-pilot, DALL-E, Midjourney, DreamStudio (Stable Diffusion), and others. Gain a solid foundation in AI and ML principles and be better prepared to develop secure and ethical systems while being mindful of privacy concerns. Authors Omar Santos and Dr. Petar Radanliev are industry experts to guide and boost your AI security knowledge. Related Learning: Sign up for live training classes by Omar Santos. Read Beyond the Algorithm: AI, Security, Privacy, and Ethics by Omar Santos and Petar Radanliev. About the Instructors: Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, cybersecurity research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of more than 25 books, 21 video courses, and nore than 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs. Prior to Cisco, Omar served in the United States Marines focusing on the deployment, testing, and maintenance of Command, Control, Communications, and Computer and Intelligence (C4I) systems. Dr. Petar Radanliev, Department of Engineering Science, University of Oxford. Dr. Radanliev is a highly accomplished and experienced cybersecurity professional with 10+ years of experience in academic and industry settings. He has expertise in cybersecur ity research, risk management, and cyber defense, as well as a track record of excellence in teaching, mentoring, and leading research teams. Technical skills include new and emerging technical cyber/crypto technologies and algorithms, DeFi, blockchain, Metaverse, and quantum cryptography. Petar obtained a PhD at University of Wales in 2014, and continued with postdoctoral research at Imperial College London, University of Cambridge, Massachusetts Institute of Technology, and University of Oxford. His awards include the Fulbright Fellowship in the United States, and the Prince of Wales Innovation Scholarship in the United Kingdom. Skill Level : Intermediate Course requirement: None.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Application software Development ; Logiciels d'application ; Développement ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Berlin/Boston : De Gruyter
    ISBN: 9783111198019 , 9783111086958 , 9783111198033
    Language: Undetermined
    Pages: 1 Online-Ressource (481 p.)
    Series Statement: Cinepoetics
    Keywords: Figuren ; Phänomenologie ; Film ; Comic ; Characters ; phenomenology ; comics ; thema EDItEUR::A The Arts::AT Performing arts::ATF Films, cinema ; thema EDItEUR::G Reference, Information and Interdisciplinary subjects::GT Interdisciplinary studies::GTZ General studies and General knowledge
    Abstract: Wie begegnen wir Figuren in Filmen und Comics? Für Zuschauende und Lesende sind sie intuitiv zugänglich, nicht aber für die Analyse. Die vorliegende Studie grenzt sich von narratologisch und kognitionstheoretisch geprägten Theorien und Analysemethoden ab, die Figuren als fertige Subjekte denken, welche in ein mediales Gewand gekleidet den Zuschauenden und Lesenden gegenübertreten. Stattdessen werden Film-Sehen und Comic-Lesen als dynamische, von Subjektivität durchzogene Situationen untersucht. Konzipiert als Film- beziehungsweise Comic-Verhalten, bilden diese subjektivierten Dynamiken die Grundlage für das Entstehen von Figuren für Zuschauende und Lesende. Die Studie entwickelt eine phänomenologische Theorie und Methode, die es ermöglicht, über Beschreibungen dieser Verhalten die Begegnung mit Figuren zu analysieren. Sie diskutiert ausgehend von Maurice Merleau-Pontys Wahrnehmungsphilosophie filmphänomenologische Positionen und expliziert einen phänomenologischen Diskurs für die Comicforschung, den diese bislang vermissen lässt. Im Zentrum stehen Arbeiten von Chris Ware, Riad Sattouf und Marc Forster, deren Filme und Comics nicht nur Gegenstand analytischer Fallstudien sondern integraler Bestandteil der Theoriearbeit sind. ; Wie begegnen wir Figuren in Filmen und Comics? Für Zuschauende und Lesende sind sie intuitiv zugänglich, nicht aber für die Analyse. Die vorliegende Studie grenzt sich von narratologisch und kognitionstheoretisch geprägten Theorien und Analysemethoden ab, die Figuren als fertige Subjekte denken, welche in ein mediales Gewand gekleidet den Zuschauenden und Lesenden gegenübertreten. Stattdessen werden Film-Sehen und Comic-Lesen als dynamische, von Subjektivität durchzogene Situationen untersucht. Konzipiert als Film- beziehungsweise Comic-Verhalten, bilden diese subjektivierten Dynamiken die Grundlage für das Entstehen von Figuren für Zuschauende und Lesende. Die Studie entwickelt eine phänomenologische Theorie und Methode, die es ermöglicht, über Beschreibungen dieser Verhalten die Begegnung mit Figuren zu analysieren. Sie diskutiert ausgehend von Maurice Merleau-Pontys Wahrnehmungsphilosophie filmphänomenologische Positionen und expliziert einen phänomenologischen Diskurs für die Comicforschung, den diese bislang vermissen lässt. Im Zentrum stehen Arbeiten von Chris Ware, Riad Sattouf und Marc Forster, deren Filme und Comics nicht nur Gegenstand analytischer Fallstudien sondern integraler Bestandteil der Theoriearbeit sind. ; How do we encounter characters in films and comics? While audiences might relate to characters intuitively, film and comics scholars cannot analyze them in the same intuitive way. Theories and analytical methods influenced by narratology and cognitive theory often conceptualize characters as finished subjects presented in a medial disguise. This study argues instead that film-watching and comic-reading are dynamic situations permeated by subjectivity. Conceptualized as film- or comic-behavior, these subjectivized dynamics form the basis for the emergence of characters for viewers and readers. The study develops a phenomenological theory and method that allows us to analyze encounters with characters through descriptions of film- and comic-behaviors. Drawing on Maurice Merleau-Ponty's philosophy of perception, it discusses current phenomenological positions in film studies and articulates an extensive phenomenological framework for comic research. The works of Chris Ware, Riad Sattouf, and Marc Forster, which it discusses, are not only the subject of analytical case studies but also an integral part of this study's theoretical framework
    Note: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Computer software Testing ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 005.1
    Keywords: Git (Computer file) ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The landscape of programming is evolving with the growing importance of AI-assisted tools, and GitHub Copilot is at the forefront of this change, with over 1.3 million paid users. This collection of videos offers a practical approach to learning this valuable application, delving into key areas such as prompt engineering, the intricacies of refactoring, understanding regular expressions (regex), and the fundamentals of unit testing. You'll also gain hands-on experience through practical demonstrations, including the creation of a weather app.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.
    Language: Undetermined
    Pages: 1 online resource (1 video file)
    DDC: 006.7/8
    Keywords: Amazon Web Services (Firm) Study guides Examinations ; Web services Study guides Examinations ; Cloud computing Study guides Examinations ; Electronic data processing personnel Certification ; Services Web ; Examens ; Guides de l'étudiant ; Infonuagique ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Unlock your full potential of the AWS cloud and take your career to new heights with our comprehensive AWS Solutions Architect Associate Certification Video Course Series! Professionals who can design effective cloud solutions with AWS technologies are some of the most sought-after in today's IT industry, but AWS is challenging to learn with its vast ecosystem of capabilities. Getting certified as a Solutions Architect Associate is one of the best ways to review the latest concepts and best practices while validating your skills and knowledge of all that AWS has to offer. This video course series covers the four domains of the AWS Solutions Architect Associate exam. The first course in this series focuses on Domain #1, Design Secure Architecture. To prepare for this domain, you'll learn about things like encryption, identity and access management, the AWS Shared Responsibility model, and more. By the end of this course, you'll be equipped with strategies for securing your data, workloads, and applications with the right AWS resources and best practices. Through step-by-step guidance, invaluable exam tips, and dozens of quiz questions, AWS-certified expert Mark Wilkins will help you prepare to ace the AWS Solutions Architect Associate exam. Follow along in this course at your own pace and embark on your journey toward cloud excellence! What you'll learn and how you can apply it Understand the basic principles of securing access to AWS resources. Identify and evaluate different methods of access control available on AWS, including AWS Identity and Access Management (IAM), Security Groups, and Network Access Control Lists (NACLs). Apply best practices for securing access to AWS resources, including the principle of least privilege and the use of multi-factor authentication (MFA). Design and implement a secure access control strategy for AWS resources, including creating and managing IAM users, groups, and policies, configuring Security Groups and NACLs, and utilizing AWS Key Management Service (KMS) for secure key storage and management. Understand the basic principles of designing secure workloads and applications on AWS. Identify and evaluate different security mechanisms and services available on AWS, including Amazon GuardDuty, AWS WAF, AWS Shield, and AWS Firewall Manager. Design and implement a secure workload and application architecture on AWS, including utilizing AWS security services, implementing access control and authorization mechanisms, and performing security assessments and testing. Monitor and troubleshoot the security of workloads and applications on AWS, including identifying and resolving security incidents, implementing compliance and governance policies, and ensuring continuous security improvements. Understand the importance of data security controls in protecting sensitive data stored and processed on AWS. Identify the various types of data security controls available on AWS, including encryption, access control, monitoring, and auditing. Evaluate the appropriate data security controls needed based on the specific data and application requirements, compliance regulations, and organizational policies. Design and implement data encryption strategies for data at rest and data in transit using AWS services, such as AWS Key Management Service (KMS), Amazon S3 Server-Side Encryption, and AWS Certificate Manager. This course is for you because... You're a software engineer or architect looking to expand your career in the cloud. You have some experience in a cloud role, and would like to advance your career as a cloud solutions architect. You're an experienced Solutions Architect, DevOps or Systems Engineer, Technical Project Manager, or an Enterprise or Solutions Architect who wants to gain proficiency in AWS cloud solutions. Prerequisites: Understanding of cloud computing concepts, including the difference between public, private, and hybrid clouds. Familiarity with AWS services and tools, including compute, storage, database, and networking services, as well as management tools like AWS Management Console and the AWS CLI would be helpful. Basic knowledge of networking concepts, including IP addressing, subnets, routing, and security. Security and Compliance: Understanding of security and compliance best practices, including data encryption, and access control.
    Note: Machine-generated record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer software Development ; Artificial intelligence ; Intelligence artificielle ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Observability is more difficult in the era of large language models, while insight into your code's behavior is increasingly more important. Join Sam Newman and Jessica Kerr for a discussion about the impact of AI on software production. They explore what happens when deterministic work (software development) meets nondeterministic work (GenAI) and examine some of the limitations of communicating with an AI at scale. This event is for anyone who builds or maintains software and is looking to better understand the intersection of GenAI and observability. What's New in Software Development gives you a chance to explore trending topics in software development and to hear from Sam and Jessica Kerr about software development, how to begin implementing AI tooling into your own work, and their own career journeys. They will spend a few minutes covering the trends that are influencing software development and then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it How to start thinking about integrating GenAI into your production lifecycle How to use observability to gain insight into how your code behaves in production This live course is for you because... You want to hear from Sam Newman and Jessica Kerr about how software development is changing. Recommended Follow-Up: Read Observability Engineering (book).
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885468 , 1835885462
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of the latest computing and networking trends, equipping you with insights into the evolving landscape of cybersecurity. It delves into the intricacies of identifying cyber threats and common attack techniques, providing you with a strong foundation in cybersecurity defense. The course focuses on building your expertise in network security, covering topics like Wi-Fi vulnerabilities, advanced persistent threats, routing protocols, network addressing, and more. You'll gain a deep understanding of Palo Alto Networks security solutions and their role in safeguarding modern networks. As the course progresses, you'll acquire practical knowledge of endpoint security, server and system administration, ITIL concepts, and Palo Alto Networks NGFW components. You'll also explore the essentials of Prisma Cloud, Prisma Access, Cortex XDR, and Cortex XSOAR. By the end of this course, you'll have the skills and knowledge needed to excel in Palo Alto Networks cybersecurity and contribute to the security and resilience of today's digital environments. What you will learn Identify computing and networking trends Describe cybersecurity threats and common attack techniques Identify Wi-Fi vulnerabilities and attacks Understand advanced persistent threats Learn networking security models and technologies Gain insights into data center, cloud, and DevOps security concepts Audience This course is ideal for anyone who wants to learn the fundamentals of cybersecurity so that they have the knowledge for an entry-level network security career. There is no pre-requisite required except for a desire to learn more about cybersecurity and Palo Alto Security solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881828 , 1835881823
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 26 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/3
    Keywords: VMware ; Virtual computer systems ; Cloud computing ; Systèmes virtuels (Informatique) ; Infonuagique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to basic virtualization concepts and the integration of vSphere in the SDDC and cloud infrastructure. It then progresses to the core of ESXi host architecture, including installation and configuration. You'll learn to utilize the DCUI and Host Client for effective ESXi host configuration, and delve into creating and provisioning virtual machines, along with an understanding of VMware Tools. The course focuses on essential networking concepts, guiding you through network configuration files, Network Manager CLI, and Network Time Protocol setups. You'll gain practical skills in NFS server and client configurations, exploring vSphere networking and storage vocabulary, creating VMFS and NFS datastores, and understanding multipathing. The course wraps up with a deep dive into vSphere security, including SELinux management and firewalld configuration. You'll also learn about virtual machine management, CPU and memory concepts in a virtualized environment, creating a vSphere DRS cluster, vSphere HA architecture, and updates using vSphere Lifecycle Manager, rounding out a complete skill set for managing vSphere environments. What you will learn Manage virtual machines and VMware Tools Configure and manage vSphere networks Implement vSphere storage solutions Secure vSphere environments effectively Utilize vSphere for virtual machine management Deploy and manage vSphere HA and DRS clusters Audience This course is ideal for IT professionals and system administrators aiming to specialize in virtualization with VMware vSphere 7. Knowledge of basic virtualization and networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Mike Rodrick: Mike Rodrick, the host, has more than 15 years of IT instruction experience, including 10 years as a Microsoft Certified Trainer. Mike became an ITProTV Edutainer in 2014. Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888186 , 1835888186
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco Systems, Inc Study guides Examinations ; Computer networks Study guides Examinations ; Telecommunication Study guides Switching systems ; Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Télécommunications ; Systèmes de commutation ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at Cisco's NX-OS, laying a foundation for understanding data center environments. It progresses to OSPFv2 and OSPFv3, crucial for robust network communication, and explores Multi-Protocol BGP and PIM, key for scalable networks. Advanced network solutions like FHRPs, RSTP+, and LACP are covered, essential for network resilience. You'll delve into vPC, VXLAN, EVPN, and OTV, essential for network virtualization and overlay networks. The focus then shifts to Cisco ACI, introducing intent-based networking with Cisco APIC. Topics include ACI Access Policies, Tenant Policies, and Contracts. You'll learn about UCS Rack Servers, Blade Chassis, and delve into UCS Infrastructure and Network Management. The course includes insights on UCS Software Updates, NetFlow, SPAN, and Streaming Telemetry, crucial for network maintenance and troubleshooting. Wrapping up, the course covers Fibre Channel, Port Channels, Nexus Software Updates, and essentials of cloud computing with NIST 800-145, equipping you with the knowledge to handle modern data center demands. What you will learn Understand NX-OS and OSPF protocols Gain expertise in FHRPs and RSTP+ Learn advanced LACP and vPC DCCOR Explore VXLAN and EVPN technologies Grasp ACI Tenant Policies and Contracts Analyze packet flow and cloud concepts Audience This course is ideal for network professionals aiming to specialize in data center technologies. Prior knowledge of networking and basic Cisco concepts is recommended. This course is perfect for those seeking to align their skills with Cisco's advanced data center solutions and practices. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881309 , 1835881300
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Study guides Certification ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884966 , 1835884962
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Design ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an overview of Cisco Modeling Labs 2 (CML2) and its installation on Windows 10, macOS Catalina, and VMware ESXi. You'll delve into the essentials of CML2, exploring how to build and configure labs both through the graphical user interface (GUI) and the API. Learn to access CML2 using Telnet and SSH for efficient management. Discover the art of connecting your lab to the outside world and adding VIRL 1.x images to enhance your lab's capabilities. The course focuses on empowering you with hands-on skills in network modeling and simulation using CML2. You'll understand the importance of CML2 in network architecture and how it streamlines network design and testing. As the course progresses, you'll acquire the expertise needed to create and manage complex network scenarios, making you proficient in CML2. By the end, you'll have the knowledge and skills to use CML2 effectively in your networking projects. What you will learn Prepare for CML2 and its installation Build and configure labs using the GUI and API Access CML2 through Telnet and SSH Connect labs to external networks Enhance labs with VIRL 1.x images Gain proficiency in Cisco Modeling Labs 2 Audience This course is ideal for network architects, administrators, and professionals looking to enhance their skills in network modeling and simulation. Basic knowledge of networking concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883747 , 1835883745
    Language: English
    Pages: 1 online resource (1 video file (15 hr., 7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/04
    Keywords: Project management Study guides Examinations ; Gestion de projet ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with the PMI framework, setting the stage for a deep dive into project management methodologies. It delves into the basics of the CAPM exam ensuring a solid foundation in project management principles. The course systematically explores the project management lifecycle, covering topics from project initiation to closure. It covers essential concepts such as risk planning, stakeholder management, and the critical path method, laying the groundwork for managing real-world projects effectively. As you advance, the focus shifts to Agile methodologies, including Scrum and Kanban, blending these with traditional project management approaches. You'll understand the dynamics of the project team, the importance of emotional intelligence, and effective communication management. The course also covers practical applications in predictive and adaptive project environments, quality and integration management, and comprehensive project planning. You'll also delve into advanced areas like earned value analysis and work breakdown structures. The course concludes with a focus on business analysis in various project management frameworks. The course prepares you for both the CAPM exam and real-world challenges, making it an essential resource for aspiring project managers. What you will learn Grasp PMI's approach to project management Learn and apply Scrum, SAFe, and Kanban in projects Develop and implement robust risk management strategies effectively Apply Emotional Intelligence in project leadership Master and apply essential project management tools Execute project plans using Agile methodologies Audience The course is ideal for students and professionals aiming to establish or advance their careers in project management. A basic understanding of management principles is beneficial. The course is perfect for those seeking to align their skills with PMI standards and adapt to Agile methodologies. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL® Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL® Expert v3, ITIL® 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835880180 , 1835880185
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 27 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/8
    Keywords: Internet of things Study guides Examinations ; Electronic data processing personnel Certification ; Computer networks Study guides Examinations ; Internet des objets ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by establishing a foundational understanding of IoT, addressing common terms, benefits, and challenges. It then transitions into an in-depth look at the physical and network components of IoT and Edge Computing, along with an exploration of Cloud Computing's role in IoT. This sets the stage for a comprehensive view of the IoT ecosystem, crucial for both newcomers and seasoned professionals. The course also delves into IoT market sectors, security, and privacy concerns, highlighting the importance of robust security measures and privacy protocols in the IoT sphere. This segment is particularly vital, considering the growing emphasis on data security in today's digital world. Additionally, the course discusses IoT safety and risk management strategies, equipping learners with the skills to navigate potential risks effectively. Concluding with a detailed walkthrough of the IoT Software Development Life Cycle, the course covers each phase from project initiation and planning to development, integration, and maintenance. This holistic approach ensures that learners are not only well-versed in theoretical aspects but also adept at applying these concepts in real-world scenarios, bridging the gap between learning and practical application. What you will learn Understand key IoT concepts and terminology Explore benefits and challenges of IoT Analyze IoT physical and network components Learn about Cloud Computing in IoT Address IoT security and privacy issues Manage risks in IoT environments Audience This course is ideal for professionals and enthusiasts looking to dive into the IoT world. A basic understanding of networking and computing is beneficial. Perfect for those seeking practical skills and comprehensive knowledge of IoT technologies and applications. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886922 , 1835886922
    Language: English
    Pages: 1 online resource (1 video file (20 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into Cisco's networking environment, covering foundational concepts such as network component roles and the Cisco CLI. It progresses through network topology, IPv4 and IPv6 addressing, and essential networking principles like virtualization, wireless configurations, and switch functionalities. The course is designed to build a comprehensive understanding of network infrastructure and cybersecurity basics. Focusing on practical applications, you will gain hands-on experience in configuring and managing Cisco networks. The course emphasizes VLAN configuration, Interswitch connectivity, routing protocols, and network security implementations. Through real-world scenarios, you will explore DHCP, NTP, and DNS in network management, alongside configuring static and dynamic routing, understanding ACLs, and navigating network address translation. The course concludes with advanced topics in network management and security. The course also introduces network management automation, SDN architecture, and REST-based APIs application. This course will ensure you are well-equipped for intermediate to advanced roles in network administration and security, with a robust skill set for navigating complex networking environments. What you will learn Understand network component roles and functions Analyze different network topology characteristics Configure IPv4 and IPv6 addresses on devices Gain insights into wireless configuration and security Learn routing components and packet forwarding techniques Implement network security through ACLs and NAT Audience This course is ideal for aspiring network administrators, IT professionals, and students seeking foundational knowledge in networking. This course is perfect for those preparing for the Cisco CCNA (200-301) certification, aiming to acquire a comprehensive understanding of network security, protocols, and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Lauren Deal: With a decade of in-classroom teaching experience, work as a national television host on the Home Shopping Network, and a background as a talk show producer and host, Lauren Deal possesses a perfect blend of skills and interests in IT. This unique combination makes her an ideal learner advocate for ACI Learning training. She excels in asking clarifying questions related to exam objectives and enthusiastically learns alongside ACI Learning audiences. Additionally, Lauren has been studying the evolving use of AI technology and the development process of Augmented and Virtual Reality. Her certifications include AWS Certified Cloud Practitioner.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 620.0068
    Keywords: Engineering Management ; Leadership ; Technology Management ; Ingénierie ; Gestion ; Leadership ; Technologie ; Gestion ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Join host Michael Lopp, senior vice president at Apple, and his guest Will Larson, chief technology officer at Carta, as they demystify engineering strategy and discuss how these critical documents are much easier to create--and to support--than most people appreciate. You'll explore the common reasons why many organizations do not have a formal engineering strategy and learn about a proven process for creating one. This event is for you if you want to better understand engineering strategy, learn best practices for making one, or help drive and support strategy in your organization. Tech Leadership Tuesday is a dynamic monthly live event that helps empower people and technology leaders to become more effective and successful in their leadership roles. Each episode delves into a relevant topic for engineering leaders and, through a conversation between a host and guest, you'll learn about common challenges, best practices, and lessons learned from the guest's experience. What you'll learn and how you can apply it The importance of having a written engineering strategy How to create an engineering strategy What to avoid when writing an engineering strategy This live course is for you because... You want to hear from Michael Lopp and Will Larson about creating and implementing engineering strategy. You want to learn how to draft an engineering strategy. Recommended follow-up: Read The Engineering Executive's Primer (early release book by Will Larson) Read The Art of Leadership (book by Michael Lopp) Take Executive Leadership Fundamentals in 60 Minutes (on-demand course with Karen Walker).
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884089 , 1835884083
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Google (Firm) ; Electronic data processing personnel Study guides Certification ; Cloud computing Study guides Examinations ; Software engineering ; Infonuagique ; Examens ; Guides de l'étudiant ; Génie logiciel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cloud computing and Google Cloud Platform, setting a strong foundation for understanding the GCP environment. You'll learn about setting up cloud projects and accounts, managing billing, and configuring the GCP Command Line Interface (CLI), providing you with essential skills for managing cloud resources effectively. The course focuses on practical applications, including using the GCP Pricing Calculator, planning and configuring compute and data storage resources, and managing network resources. You'll gain hands-on experience launching instances in Compute Engine and using the Cloud SDK, as well as understanding instance groups for load balancing and autoscaling. The course wraps up by covering advanced topics such as deploying and implementing Kubernetes Engine, serverless compute, and various data solutions. You'll learn about monitoring, logging, managing IAM, and using audit logs, equipping you with the skills needed to manage complex cloud infrastructures and ensure efficient, secure operations. What you will learn Understand cloud computing basics Set up GCP projects and accounts Manage cloud billing and expenses Configure and use GCP CLI Implement network resource strategies Deploy and monitor Kubernetes Engine apps Audience This course is ideal for IT professionals, system administrators, and developers looking to specialize in cloud computing. Basic knowledge of IT infrastructure and familiarity with cloud concepts is recommended. Perfect for those aspiring to become Google Cloud Certified Associate Cloud Engineers. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884706 , 1835884709
    Language: English
    Pages: 1 online resource (1 video file (14 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Routing (Computer network management) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with a deep dive into advanced routing protocols and their troubleshooting. You'll explore Admin Distance, Route Maps, Loop Prevention, and the nuances of Routing Protocol Redistribution. The course then shifts to advanced concepts like Route Tagging, Filtering, and Policy-Based Routing, providing a practical understanding of network routing mechanisms. As the course progresses, you'll delve into OSPF and EIGRP, gaining insights into their operation and optimization in enterprise environments. BGP's intricate details, from peerings to path attributes, are unpacked, equipping you with skills to manage complex network infrastructures. The course also covers MPLS operations and Layer 3 VPNs, enhancing your understanding of modern networking technologies. The course concludes with a comprehensive look at network security and management. Topics like AAA, RBAC, and First Hop Security are thoroughly explored, alongside CoPP strategies to protect the network control plane. You'll also engage with IPv6 security, SNMP, Syslog, and Cisco DNA Center, ensuring your readiness for diverse network scenarios. What you will learn Troubleshoot advanced network scenarios Implement policy-based routing techniques Deploy and manage MPLS and DMVPN Enhance network security with AAA and CoPP Manage IPv6 first hop security features Apply effective strategies in network management Audience This course is ideal for network professionals seeking advanced skills in Cisco networks. The course is perfect for those aiming to enhance their expertise in network troubleshooting and management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881903 , 1835881904
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Routing (Computer network management) ; Computer networks ; BGP (Protocole de réseaux d'ordinateurs) ; Routage (Gestion des réseaux d'ordinateurs) ; Réseaux d'ordinateurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to BGP, explaining what it is and why it is essential in the networking landscape. You'll explore topics such as Autonomous System Numbers (ASNs), BGP attributes, and route selection. The course also covers advanced concepts like BGP route reflectors, communities, and route summarization. The course focuses on real-world scenarios and hands-on labs, ensuring you gain practical experience in configuring and managing BGP in different network environments. By the end of this course, you'll have the expertise to design, implement, and troubleshoot BGP networks effectively. Whether you're a network administrator, engineer, or IT professional, this course will enhance your networking skills and open new career opportunities in the field of advanced networking. What you will learn Understand BGP attributes and path selection Implement BGP route reflectors for efficient routing Utilize BGP communities for traffic management Explore route summarization techniques Optimize network resources with BGP Troubleshoot common BGP issues Audience This course is ideal for IT professionals, system administrators, and developers aiming to specialize in networking and BGP. Basic knowledge of networking concepts and familiarity with routing protocols is recommended. Perfect for those aspiring to enhance their networking skills and pursue advanced networking roles. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835881569 , 1835881564
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.7/1
    Keywords: Computer networks Study guides Examinations ; Routing (Computer network management) Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Réseaux d'ordinateurs ; Examens ; Guides de l'étudiant ; Routage (Gestion des réseaux d'ordinateurs) ; Examens ; Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying the foundation of basic networking hardware, introducing you to pivotal networking models, and navigating through Layer 1 and 2 technologies. You will grasp the core responsibilities in networking, delve into network addressing, and learn to use basic network utilities efficiently. The course focuses on deepening your understanding of Cisco equipment and components, including detailed insights into Cisco port characteristics and memory functions. You'll gain hands-on experience in installing, operating, and troubleshooting Cisco devices, accessing the Cisco IOS, and mastering fundamental Cisco IOS commands. The course wraps up by teaching you advanced skills like upgrading Cisco IOS on routers, password recovery techniques, performing factory resets, and utilizing additional tools for comprehensive network management. Each step is designed to strengthen your proficiency in Cisco's cutting-edge routing and switching technologies. What you will learn Identify key networking hardware components Understand essential networking models Utilize basic Cisco IOS commands effectively Perform network troubleshooting using Windows Execute password recovery on Cisco routers Conduct factory resets on Cisco switches Audience This course is ideal for IT professionals, network engineers, and tech enthusiasts seeking to enhance their skills in Cisco routing and switching. This course is perfect for those aspiring to gain Cisco CCT Routing and Switching certification. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835464694 , 1835464696
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Application program interfaces (Computer software) ; Software architecture ; Python (Computer program language) ; Interfaces de programmation d'applications ; Architecture logicielle ; Python (Langage de programmation) ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course offers a detailed exploration of FastAPI, a cutting-edge Python framework for API development. The course starts with basic API and REST principles, quickly advancing to practical application for a thorough understanding of both theory and practice. The curriculum progresses logically, starting with the basics of FastAPI, including app setup, API routing, linting, and formatting. Participants will create a social media API, manage post and comments, and learn code organization with APIRouter, followed by practical testing experience using pytest. A significant portion of the course focuses on asynchronous databases, vital for scalable application development. It covers database setup, connection, and integration within FastAPI. The course also delves into Python logging techniques, crucial for debugging and monitoring FastAPI applications. It also covers user authentication, an essential element in modern web apps. It includes practical training on JWTs, password hashing, authentication management, and database user relationships, alongside addressing many-to-many database relationships and user email confirmation strategies. In later stages, the course addresses advanced topics like file uploads, background image generation tasks, and deployment methodologies, including continuous integration with GitHub Actions. What you will learn Build and structure a FastAPI application Implement and test RESTful APIs with FastAPI Manage asynchronous database operations Configure and utilize Python logging in FastAPI Secure applications with user authentication and JWTs Handle complex database relationships Deploy FastAPI applications and manage them effectively Audience This course is ideal for aspiring back-end developers, testers looking to integrate automation into their workflows, and front-end developers seeking a deeper understanding of server-side processes. This course will particularly benefit those with a basic grasp of programming and a desire to specialize in the fast-paced realm of web development, API construction, and database management using FastAPI. Prior programming experience in any language is recommended; beginners should consider a basic Python course first, as all required software is provided for free. About the Author Jose Salvatierra Fuentes: Jose, a passionate educator in the realm of coding and software development, has dedicated over 7 years to teaching online. He founded Teclado with a vision to democratize software development education, striving to ensure comprehensive understanding for his students. His approach makes learning coding a clear, rewarding journey, connecting the dots that once seemed obscure. Specializing in Python and JavaScript, Jose excels in web and backend development. He's proficient in various libraries and frameworks, including Flask, React, React Native, and AngularJS. His expertise extends to working with UNIX systems, MongoDB, PostgreSQL, and crafting advanced system architectures. Jose's commitment is to make the learning process both efficient and enjoyable, guiding students to mastery in software development.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882825 , 183588282X
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.4/01
    Keywords: Six sigma (Quality control standard) ; Organizational effectiveness ; Lean manufacturing ; Six Sigma ; Efficacité organisationnelle ; Production allégée ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to Lean Six Sigma (LSS), unraveling its history and foundational concepts. It delves into identifying waste and defects, crucial in process improvement. The journey through the course includes a comprehensive look at project management techniques and the Plan-Do-Check-Act cycle, essential in LSS implementation. The course focuses on the five phases of LSS: Define, Measure, Analyze, Improve, and Control. Each phase is explored in depth, with multiple parts ensuring a thorough understanding. You'll learn about defining project goals, measuring process performance, analyzing data for insights, implementing improvements, and controlling future process performance. The course wraps up with strategic insights into achieving buy-in for LSS initiatives and preparing for the next steps in your LSS journey. By the end of the course, you'll have a holistic understanding of how LSS can drive significant improvements in any organization. What you will learn Identify and eliminate process waste Learn the Plan-Do-Check-Act cycle Control and sustain process gains Gain skills for securing project buy-in Explore LSS project management essentials Utilize tools for effective data analysis Audience This course is ideal for professionals seeking to improve process efficiency and quality. A basic understanding of business processes is beneficial. This course is perfect for those looking to align their skills with Lean Six Sigma methodologies and enhance their problem-solving abilities. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Terra Vanzant Stern, Phd: Dr Stern is a Six Sigma Master Black Belt and the principal of SSD Global Solutions, Inc. She has written several books and articles on problem solving, process improvement and leadership. Her most recent book, Lean and Agile Project Management was released as a second edition in May 2020. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138298432 , 0138298432
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Python (Langage de programmation) ; Programmation (Informatique) ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835884348 , 1835884342
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer networks Study guides Security measures ; Examinations ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an understanding of software security fundamentals, where you'll grasp the importance of secure coding practices and the repercussions of negligence. As you progress, you'll tackle real-world scenarios, learning to identify vulnerabilities and employ strategies to mitigate risks. The course focuses on the hands-on application of security principles, from initial software design to post-deployment checks, ensuring you're adept at protecting applications against modern threats. You'll dive into the OWASP Top Ten, encryption, and secure session management, gaining the foresight to preempt security breaches. The course wraps up by honing your skills in error handling, testing for security, and effective logging, transforming you into an invaluable asset for any development team focused on creating cyber-secure applications. What you will learn Implement secure password protocols Employ encryption for data security Design software with security in mind Apply OWASP security standards Execute thorough security testing Monitor applications against threats Audience The course is ideal for software developers and coders keen to specialize in secure application development. A foundational understanding of programming and basic security concepts is recommended. Perfect for those who aim to integrate top-notch security measures into their development processes. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Justin Dennison: Justin leads AWS and developer content creation for ITProTV. He has experience in multiple programming languages. His certifications include AWS Certified Solutions Architect -- Associate, AWS Certified Developer -- Associate, AWS Certified Cloud Practitioner, Oracle Certified Associate, Java SE 7 Programmer. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886328 , 1835886329
    Language: English
    Pages: 1 online resource (1 video file (48 hr., 19 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Hackers Study guides Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Pirates informatiques ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. It delves into attacker motives and the intricacies of various attack classifications, establishing a robust foundation in cybersecurity principles. The course then covers the entire spectrum of cyber threat landscapes, from information warfare to the Cyber Kill Chain. It discusses vital topics like risk management and cyber threat intelligence, equipping you with the skills to manage cyber threats efficiently. The course shifts its focus to advanced concepts such as the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis, and the CEH Hacking Methodology, merging these with practical ethical hacking skills. You'll gain insights into the nuances of threat hunting, incident handling, and the role of machine learning and AI in cybersecurity. The course also addresses critical aspects of network and web security, including various scanning and enumeration techniques, vulnerability assessments, and countermeasures against common cyber threats. You'll also delve into specialized areas like mobile, IoT, and cloud security. The course concludes with an emphasis on the latest standards and regulations in cybersecurity, preparing you for the CEH certification and real-world cybersecurity challenges. What you will learn Navigate ethical hacking methodologies and frameworks Conduct comprehensive network and web security assessments Develop skills in mobile, IoT, and cloud security strategies Prepare for the CEH certification with practical insights and knowledge Utilize and analyze various cyber-attack classifications Implement effective threat hunting and incident management Audience This Certified Ethical Hacker course is designed to strengthen the practical knowledge of security officers, auditors, site administrators, and any professional focused on network security. It's an excellent fit for those responsible for safeguarding network infrastructure and keen to deepen their understanding of ethical hacking. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Sophie Goodwin: Sophie Goodwin is a Voice-Over talent. Her background spans over eight years as a film and voice talent, with experience in eLearning content, independent films, TV & web commercials, and video games. She joined ACI Learning while completing her BS in Telecommunication at the University of Florida. Apart from her work as an Edutainer, Sophie is also involved in other aspects of the entertainment industry. She is certified in (ISC)_ CC: Certified in Cybersecurity.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138297947 , 0138297940
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Computer programming ; Web site development ; Web applications ; Python (Langage de programmation) ; Programmation (Informatique) ; Sites Web ; Développement ; Applications Web ; computer programming ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 2.5 Hours of Video Instruction Explore Python's capabilities for Data Science and Machine Learning, the topics of greatest import these days in the tech world. Python has risen to popularity as one of the most versatile and beginner-friendly programming languages. Its simplicity, readability, and extensive libraries make it a powerful language for a wide variety of different domains. It's widely used in web development, data analysis, scientific computing, artificial intelligence, and automation. Python's versatility and large community support make it an excellent language to kickstart your programming journey. This course offers a hands-on approach to building your Python skills through a series of practical projects from scratch. Hone your expertise in areas such as data analysis, machine learning, web scraping, and more. Related Learning: Watch and learn from Shaun's other videos: Functional Programming Projects with Python 3 About the Instructor: Shaun is a Senior Software Developer who specializes in Full-stack development and Software Architecture. He manages teams of developers, as well as teaches many hundreds of thousands more how to create enterprise-ready applications. Shaun's online courses have over 300,000 learners largely because of his passion for development and his focus on helping people apply their programming skills in the real world. He is a life-long programmer and problem-solving addict whose goal is to help people solve meaningful problems by mastering the art of software development. Please don't hesitate to get in touch with him about any opportunities or if you'd like to stay up to date on his other courses and live trainings. Skill Level: Intermediate-Advanced What You Will Learn: Each project will include some different aspect of data science/ machine learning with Python that it will be both accessible and engaging while you advance your skill set. Perform Sentiment Analysis on real-world text Work with Image Recognition Tools Scrape Basic Data from Websites And much more! Who Should Take This Course: Job titles: Software developer, Data analyst/scientist, Machine Learning Engineer, Web Developer, DevOps Engineer. Course Requirements: Prerequisites: Python experience and app development background About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Place of publication not identified] : Pragmatic AI Solutions
    Language: English
    Pages: 1 online resource (1 video file (1 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Natural language processing (Computer science) ; Intelligence artificielle ; Traitement automatique des langues naturelles ; artificial intelligence ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Responsible Generative AI and Local LLMs Learning Generative AI During Live Coding This video series covers mastering the theory of Generative AI and using local LLMs like Mistral, llamafile, Candle, and Lorax. Lessons covered include: Profit Sharing Concepts Tragedy of the Commons Game Theory and Generative AI Perfect Competition Negative Externalities Fine-tuning Mistral with Ludwig Getting Started with llamafile Hello World in Candle Exploring Rust and Candle Transcribing Audio with Whisper Rust for LLMs Learning Objectives Learn about responsible and ethical uses of generative AI Getting hands-on with local LLMs like Mistral, llamafile, Candle, and Lorax Learning to build solutions by coding along during tutorials Learning the key syntax and features of the Rust Language Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835887882 , 1835887880
    Language: English
    Pages: 1 online resource (1 video file (13 hr., 18 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Examinations ; Security measures ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Examens ; Sécurité ; Mesures ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the fundamentals of cybersecurity, setting the stage for a deep dive into the world of threat actors and their motives. As the curriculum unfolds, you'll explore the intricacies of attack vectors, network scanning, and vulnerability assessments, understanding their critical role in cybersecurity defense. The course focuses on equipping you with the tools for penetration testing, web application security, and the latest in exploitation frameworks. Practical knowledge is extended to mobile and wireless security challenges, ensuring a holistic skill set. The course wraps up with advanced techniques in incident response, anomaly detection, and the application of forensic concepts, preparing you for real-world cybersecurity challenges. What you will learn Conduct thorough vulnerability scans Execute advanced penetration tests Secure web and mobile applications Counteract wireless and network attacks Implement strategic incident response Apply forensic analysis techniques Audience The course is ideal for IT professionals aspiring to become cybersecurity experts. Familiarity with basic IT concepts and a passion for security are prerequisites. This course is an excellent match for those looking to specialize in incident response and threat management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Zachary Memos: Zachary Memos is a show host with 30+ years of on-camera experience. He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883044 , 1835883044
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6076
    Keywords: Wireless communication systems ; Telecommunications engineers Certification ; Transmission sans fil ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an in-depth look at the Meraki Dashboard, introducing you to its intuitive interface for network management. You'll delve into the management structure, understand licensing considerations, and design enterprise wireless networks with Cisco Meraki. The course focuses on high-density wireless deployments, equipping you with the skills to handle crowded network environments effectively. Discover the power of Meraki's mesh deployment for extending network coverage effortlessly. You'll unbox and set up a Meraki MR56 Access Point, configure it within the Dashboard, and gain hands-on experience in monitoring and troubleshooting AP setups. Throughout the course, you'll understand why Cisco Meraki is essential for modern network management, and you'll follow a journey of practical learning, from initial setup to advanced troubleshooting. What you will learn Learn Cisco Meraki Wireless basics Implement high-density solutions Troubleshoot wireless networks Configure Cisco Meraki APs Ensure secure deployments Optimize wireless performance Audience This course is ideal for network administrators, IT professionals, and anyone looking to enhance their skills in Cisco Meraki wireless networking. A basic understanding of network concepts is recommended but not mandatory. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835882047 , 1835882048
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 11 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Cisco IOS ; Computer networks Study guides Design ; Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an exploration of enterprise network design, introducing high availability techniques and WLAN deployment options. You'll compare on-premises and cloud solutions, gaining insights into the complexities of modern networking. The journey includes learning about SD-WAN, SD-Access, and QoS, enhancing your network performance skills. Focusing on advanced topics, you'll delve into Cisco Express Forwarding, device and path virtualization technologies like GRE and IPsec, essential for secure network architecture. The course also covers LISP, VXLAN, and VTP, crucial for network scalability. Troubleshooting techniques form a key part of the curriculum, addressing challenges in 802.1Q, EtherChannel, and more. You'll gain expertise in routing protocols such as OSPF and BGP, crucial for enterprise networking. The course also covers wireless networking fundamentals, NTP, NAT/PAT, and FHRP. Wrapping up, the course dives into network security and automation, including REST API security and orchestration tools, equipping you for the dynamic field of enterprise networking. This comprehensive course prepares you for navigating complex network environments and emerging technologies. What you will learn Grasp enterprise network design fundamentals Learn WLAN deployment strategies Compare on-prem and cloud network deployments Deepen knowledge of Quality of Service (QoS) Explore Cisco Express Forwarding techniques Develop troubleshooting skills for network issues Audience This course is ideal for network professionals and enthusiasts seeking advanced skills in enterprise networking. Prior knowledge of basic networking concepts and familiarity with Cisco's network environment is recommended. This course is perfect for those looking to deepen their understanding of Cisco's enterprise solutions. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on modern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape. Ronnie Wong: Ronnie Wong has had a diverse career, from diesel service and ministry to computer repair and network administration in small businesses. He set up networks and servers and created policies in these roles. As an Edutainer at ITProTV, now ACI Learning, he started as an IT technical instructor, later working as a contract trainer for the University of Florida, Marion County School Systems, and Nationwide Insurance. He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 23, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835883020 , 1835883028
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 59 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an essential overview, preparing you to dive into the world of Blender with a focus on lighting and compositing fundamentals. It progresses to cover lighting basics, where you'll learn to manipulate area, point, spot, and sunlight sources, and understand their properties for creating mood and atmosphere. The course focuses on Blender's Eevee renderer to teach ambient occlusion, bloom effects, and real-time rendering options, enhancing the visual fidelity of your projects. Advanced lessons explore techniques for reducing render times, exploring HDRI skybox lighting, and achieving stylistic effects with cell shading. The course wraps up with practical applications in night scene lighting, professional 3-point setups, interior and studio lighting configurations, and the intricacies of 3D environment presentation. By the end, you'll be equipped to add depth, realism, and emotion to your 3D scenes through proficient lighting and compositing. What you will learn Apply HDRI skyboxes for environmental lighting Utilize Eevee renderer for ambient and bloom effects Accelerate Blender render times efficiently Implement cell shading with Freestyle Light night scenes and create volumetric fog Set up professional 3-point lighting Audience This course is ideal for beginners and hobbyists eager to delve into 3D art, with a focus on lighting and compositing. No prior knowledge of Blender is required, making this course perfect for those new to 3D modeling and looking to enhance their visual storytelling skills. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson will guide you through creating a dynamic and visually impressive conditional clustered column chart with a moving target line using Microsoft Excel. If you've ever wondered how to make your charts both informative and aesthetically pleasing, this one’s for you. Learn how to add extra columns strategically and use conditional formulas to highlight specific data points. By the end of this lesson, you'll have a visually appealing and insightful chart — demonstrating the power of conditional formatting and dynamic data visualisation in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (9 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson will debunk common misconceptions and showcase the potential of Excel tables. Discover the ease of transforming your raw data into a table using various methods, and learn how tables enhance data manipulation. Establish the benefits of automatic formula replication and easy reference naming. We’ll explore features like dynamic expansion, ensuring your charts automatically adapt to growing datasets. Optimise your Excel experience and make Excel tables your most valuable asset for data analysis and presentation.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Hoboken, New Jersey] : Pearson
    ISBN: 9780138314767 , 0138314764
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 10 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Reflection is a powerful Java feature that can be used to expand the capabilities of a program, to examine the class or object internals at runtime. Java Reflection is quite powerful and can be very useful. Java Reflection makes it possible to inspect classes, interfaces, fields, and methods at runtime, without knowing the names of the classes, methods, etc. at compile time. Java Reflection is useful for creating generic code, implementing dynamic frameworks, and testing and debugging. In this course, we start with the basics, then show how reflection works with the more modern language features such as sealed classes and records. We also show how arrays can be manipulated and created via reflection. Lastly, we show MethodHandle and VarHandle. Learn from hands-on exercises that are followed by demos revealing the solutions.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889244 , 1835889247
    Language: English
    Pages: 1 online resource (1 video file (11 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Tests d'intrusion ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course unfolds with a comprehensive introduction to cybersecurity, spanning essential topics like online safety, ethics, and current events. Delving deeper, participants explore core principles, including the CIA Triad, threats, and vulnerabilities. From fundamental to advanced levels, the course covers cybersecurity techniques with hands-on experience in both Microsoft Windows and Linux environments. Navigating through networking basics, Microsoft Windows history, and security tools, the course emphasizes account management, security policies, and tools. A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. The course continues by unraveling the intricacies of computer operations, virtualization, and performance monitoring. Introducing Linux and Ubuntu, the course covers command-line usage, security measures, and advanced techniques. In the final stretch, you will explore ethical hacking tools and techniques, developing critical security analysis and incident response skills. The course concludes with advanced Ubuntu security, providing a comprehensive skill set for tackling evolving cyber threats. What you will learn Grasp the CIA Triad principles Implement basic and advanced cybersecurity techniques Navigate Microsoft Windows and MSDN Understand Linux and Ubuntu fundamentals Apply ethical hacking tools and techniques Develop critical incident response skills Audience This course is ideal for students and professionals seeking to excel in cybersecurity. A basic understanding of computer basics is recommended. Perfect for those aspiring to enhance their skills and adapt to the evolving landscape of cybersecurity. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Steve Linthicum: Steven W. Linthicum was a professor of computer science at Sierra College in Rocklin, California, retiring from his role in June 2017. Steve continues to teach and support other community college faculty in a variety of classes that focus on network administration, information assurance and security, and virtualization/cloud technologies. Steve has always been on the leading edge of technology, holding a variety of industry certifications issued by major industry leaders like Microsoft, VMware, CompTIA, ISC2, EMC, and Citrix. Cherokee Boose: Cherokee Boose started as a computer technician and moved to a network administrator role. Her love for learning is what pushed her towards a career in IT education. Certifications: MCSE Cloud Platform and Infrastructure; MCSA: Server 2012; MCT; MCP; MTA: Networking Fundamentals; MTA: Windows Operating System Fundamentals; Six Sigma Green Belt; CompTIA A+, A+ CE, Network+, CTT+, and Cloud+.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5
    Keywords: Microsoft Office ; Microsoft Outlook ; Microsoft SharePoint (Electronic resource) ; Microsoft Team manager ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson explores how Outlook Groups, SharePoint, and Microsoft Teams can work together within the Microsoft 365 suite to simplify tasks and boost collaborative efficiency. We demonstrate how to create and manage a group directly from Outlook Online. Learn how to add members and utilise the unique group email address. Uncover the interconnected nature of Microsoft 365 applications and examine the synchronisation between Outlook and SharePoint, allowing you to manage and share documents within your team. Establish the time-saving benefits of using your Outlook group to create a team in Microsoft Teams, ensuring consistency across settings and members. Optimise your Microsoft 365 experience by understanding the seamless connection between features.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson is a guide to building a habit tracker using Excel. You can add checkboxes for each day of the week, allowing you to visually mark off completed daily habits and receive a percentage update. Whether you want to track your fitness routine, study habits, or any other daily activities, this tutorial is customisable to suit your needs. Learn essential tips, such as hiding unnecessary information for a clean look and using formulas to calculate the percentage of completed tasks for the week. By the end of this lesson, you'll have a functional Daily Habit Tracker – ideal for supercharging your productivity – that you can adapt to monitor your progress.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business Computer programs ; Electronic spreadsheets ; Tableurs ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: A standard VLOOKUP has its limitations. XLOOKUP offers additional search options but fails to provide the desired result. This lesson presents a familiar scenario involving a table with employee names, departments, and countries of residence, showcasing the complexity of traditional lookup functions when faced with duplicates. By combining multiple pieces of information, such as employee names and departments, we create a unique identifier for each record. Using this approach with XLOOKUP, we successfully achieve accurate lookups - highlighting the importance of finding unique identifiers when dealing with duplicate values in your data sets. Join us in mastering this essential skill for effective data management! Learning Objectives Perform accurate lookups in tables with duplicate values by creating unique identifiers - ensuring precision in data retrieval and management.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835885321 , 1835885322
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to Linux, the powerful operating system that powers most servers and embedded systems worldwide. We explore the significance of Linux in today's tech-driven world, highlighting its use in everything from mobile phones to supercomputers. The journey continues with a deep dive into open-source software, illustrating how it fosters innovation and collaboration in the tech community. The course focuses on the Linux family tree, detailing the relationships and differences between distributions such as Debian, Ubuntu, RHEL, and CentOS. This section is vital for understanding the landscape of Linux distributions and selecting the right one for your needs. We also cover essential considerations for selecting compatible hardware, ensuring you can build or choose a system that runs Linux flawlessly. The course wraps up with practical skills, including installing Ubuntu and CentOS, using productivity suites, and navigating the Linux filesystem. You'll learn the basics of the terminal and shell, discover how to install software across different distributions, and manage user accounts and permissions. These skills are crucial for anyone looking to thrive in a tech environment powered by Linux.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    [Sebastopol, California] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 658.5/14
    Keywords: Business enterprises Information technology ; Management ; Technological innovations ; Strategic planning ; Organizational change ; Entreprises ; Technologie de l'information ; Gestion ; Innovations ; Planification stratégique ; Changement organisationnel ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Build A Data Strategy to Create Iron-Clad Profit Performance is an online course and toolkit for data professionals who want to get unstuck and up-leveled into their next promotion by delivering fail-proof data strategy plans for their data projects. Learners need to have some degree of mastery with respect to data technologies and skill sets. They don’t need to know how to build every type of data / data science / data engineering solution under the sun, but they should have a firm understanding of at least data analytics, data science, data management or data engineering.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Language: English
    Pages: 1 online resource (1 video file (54 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3028/7
    Keywords: Software measurement ; Computer software Evaluation ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: With engineering leaders under increasing pressure to quantify engineering performance, there’s no shortage of opinions or frameworks suggesting which engineering metrics matter most. Join Peter Bell, CTO of Rare Talent, and guests for a discussion about how to select the metrics that matter for your organization’s success. Through this expert panel discussion, you’ll learn why selecting engineering metrics is so challenging, what considerations and trade-offs should be taken into account, the problems with commonly used metrics, and how to have more productive conversations about how metrics relate to executives’ key business goals. CTO Hour is a quarterly live event that brings together a panel of senior engineering leaders to discuss with expert and host Peter Bell how they’ve approached timely technology or business challenges. This dynamic event features ample time for questions. Active and aspiring senior leaders will learn valuable insights from top VPs and CTOs and ultimately be prepared to make better-informed decisions as heads of technology.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    [Sebastopol, California] : O'Reilly Media, Inc.
    Language: English
    Pages: 1 online resource (1 video file (58 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.3
    Keywords: Artificial intelligence ; Natural language processing (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Join host George Anadiotis and guest Eric Xing, for a discussion about the current and expanding field of open-source large language models and how they are impacting the development of generative AI. We’ll cover technical aspects, as well as the business and policy concerns related to open-source LLMs.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835888940 , 1835888941
    Language: English
    Pages: 1 online resource (1 video file (30 hr., 23 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Computer technicians Study guides Certification ; Electronic data processing personnel Study guides Certification ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management. Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats. By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise. What you will learn Summarize fundamental security concepts to build a strong base. Compare various threat types to better understand security breaches. Explain cryptographic solutions to secure organizational data. Implement robust identity and access management controls. Secure enterprise and cloud network architectures against potential threats. Enhance application security capabilities and ensure software integrity. Audience This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field. About the Author Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835889848 , 1835889840
    Language: English
    Pages: 1 online resource (1 video file (4 hr., 36 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Embark on a transformative journey into the world of 3D design with our comprehensive Blender 4 Geometry Nodes course. Designed for beginners, this course covers everything from setting up your Blender project to mastering the intricacies of Geometry Nodes for creating stunning 3D models. You'll start with the basics, learning how to manipulate grid meshes and transform them into complex staircase designs. As you progress, the course introduces you to advanced techniques for railing construction, pole support creation, and optimizing your models for efficiency and precision. This hands-on approach is complemented by lessons on mesh manipulation, dynamic staircase shaping, and advanced node group creation, ensuring a comprehensive understanding of 3D modeling techniques. Whether your interest lies in game art, architectural visualization, or digital artistry, this course equips you with the skills to bring your imaginative concepts to life. By understanding the importance of each concept, you'll be able to apply these skills across various projects, enhancing your portfolio and opening up new career opportunities. What you will learn Navigate and utilize Blender 4's interface effectively. Understand and apply geometry node basics for 3D modeling. Design and manipulate grid meshes with curve length density. Transform 2D planes into 3D staircase models seamlessly. Create scalable controls and ensure uniformity in stair steps. Construct complex geometry node groups for detailed modeling. Audience This course welcomes everyone from beginners with no prior experience in Blender or 3D modeling to those looking to enhance their skills. It is ideal for beginners, aspiring artists, architects, digital creators, game developers, and educators eager to master 3D modeling with Blender 4's geometry nodes. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835886465 , 1835886469
    Language: English
    Pages: 1 online resource (1 video file (16 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8076
    Keywords: Information Systems Audit and Control Association Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins with an introduction to the context of IT risk management, laying the foundation with key concepts and illustrating the vital role of IT risk management in shaping business strategy. The course progresses to elucidate the RACI Chart, essential roles concerning risk, and the influence of organizational structure and culture on risk management practices. It focuses on developing a solid understanding of risk management principles, processes, and controls, and delves into the relationship between IT risk and other business functions. It also addresses project risk, change risk, and the nuances of people and technology in the risk landscape. The course wraps up with practical insights into implementing controls, testing their effectiveness, and deploying risk response plans, all while emphasizing the value of risk communication and the importance of policies, standards, and procedures. What you will learn Grasp IT risk management fundamentals Navigate RACI charts and risk roles Assess organizational risk impact Communicate risk effectively Develop risk scenarios and responses Utilize key risk assessment tools Audience This course is ideal for IT professionals aiming to bolster their risk management skills. Knowledge of basic IT concepts is recommended. Perfect for those prepping for CRISC certification or seeking to align IT strategies with business objectives for robust security management. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. Much of his experience has been as a PMP and ITIL℗ʼ Expert/Managing Professional. Chris is a sought-after conference speaker and consultant in ITSM and a published author. Certifications: CompTIA A+, Network +, iNet+, MCSE: Communication, MCSE: Server Infrastructure, CCNP, CWLS, AWLSS, AWLDS, PMP, ITIL℗ʼ Expert v3, ITIL℗ʼ 4 Managing Professional/Strategic Leader, PRINCE2 Practitioner, COBIT 2019 Foundation Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT. Anthony Sequeira: Anthony Sequeira, CCIE #15626, is a seasoned tech trainer and author with expertise in cloud, cybersecurity, and IT. His IT journey began in 1994 at IBM in Tampa, Florida. He later founded Computer Solutions but discovered his true passion for teaching and writing about technology. In 1996, he joined Mastering Computers, which evolved into KnowledgeNet, where he continued to share the latest tech advancements. Today, he serves as a full-time Edutainer at ACI Learning, delivering global training and authoring textbooks on chrmodern technologies. He holds certifications like CCIE R&S #15626, as well as numerous others from AWS, CompTIA, Juniper, and Microsoft, among others. Anthony's expertise spans the IT landscape.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (5 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.13/3
    Keywords: Python (Computer program language) Juvenile films ; Computer programming Juvenile films ; Python (Langage de programmation) ; Films pour la jeunesse ; Programmation (Informatique) ; Films pour la jeunesse ; children's films ; Instructional films ; Children's films ; Nonfiction films ; Internet videos ; Films de formation ; Films pour enfants ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: A Pythonic Adventure teaches you to code by asking questions, making errors, and trying out different solutions—just like in real life. As you go, you’ll create a web application for a coffee shop step-by-step, from your first online menu to saving orders in a database. And this unique tutorial goes deeper than other beginner books. You’ll learn and practice important skills like planning applications, finding bugs, and managing user expectations.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.30285/436
    Keywords: Kubernetes ; Electronic data processing Distributed processing ; Machine learning ; Traitement réparti ; Apprentissage automatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Distributing machine learning systems allow developers to handle extremely large datasets across multiple clusters, take advantage of automation tools, and benefit from hardware accelerations. This book reveals best practice techniques and insider tips for tackling the challenges of scaling machine learning systems. Inside Distributed Machine Learning Patterns you’ll learn to apply established distributed systems patterns to machine learning projects—plus explore cutting-edge new patterns created specifically for machine learning. Firmly rooted in the real world, this book demonstrates how to apply patterns using examples based in TensorFlow, Kubernetes, Kubeflow, and Argo Workflows. Hands-on projects and clear, practical DevOps techniques let you easily launch, manage, and monitor cloud-native distributed machine learning pipelines. Distributed Machine Learning Patterns provides dozens of techniques for designing and deploying distributed machine learning systems. In it, you’ll learn patterns for distributed model training, managing unexpected failures, and dynamic model serving. You’ll appreciate the practical examples that accompany each pattern along with a full-scale project that implements distributed model training and inference with autoscaling on Kubernetes.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Ever struggled with chaotic data columns? In this lesson, we share a quick Excel hack: skip manual dragging and dropping by using a numbering system. Assign a numerical order to columns, select your dataset, and opt for left-to-right sorting in the Data tab. Whether it's a compact sheet or a vast dataset, this method streamlines Excel data management and is guaranteed to save you time. Join us to learn this efficient trick for hassle-free column sorting. Enhance your data analysis workflow and leave behind the tedious task of manually rearranging columns in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: While many of us are familiar with the MIN and MAX functions, LARGE and SMALL offer a unique twist to data analysis. This lesson provides a step-by-step guide to help you maximise your Excel expertise. We demonstrate how LARGE and SMALL functions work seamlessly. We also explore combining these functions with XLOOKUP. If you're ready to elevate your Excel game and extract precisely the data you need, this lesson is for you. We’ll explore the LARGE and SMALL functions – Excel's hidden gems for refined data analysis.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson examines calculation methods. If terms like AVERAGE function and SUMPRODUCT have left you confused, fear not – our step-by-step guide is here to simplify things for you. We start by demonstrating how to find a regular average using the AVERAGE function. However, the real game-changer comes when you explore the nuances of weighted averages, where certain disciplines hold more weight than others. We break down the process of assigning percentage-based weight values. Whether you're a beginner or an experienced Excel user, this lesson will ensure you confidently grasp the details of weighted averages.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson covers data analysis and visualisation and confronts the challenge of deciphering a confusing sales chart. We'll explore the intricacies of data and the need for a strategic pivot table intervention. Explore various Excel table features and create a comprehensive PivotTable for a refined and organised dataset. The lesson presents solutions to technical challenges and provides a deeper understanding of data representation and manipulation. Learning Objectives Proficiently analyse and visualise data in Excel and master the use of pivot tables and line charts for effective data representation and manipulation.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (4 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/7
    Keywords: Microsoft Outlook ; Business Computer programs ; Time management ; Personal information management Computer programs ; Electronic mail systems Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: QuickSteps in Outlook is ideal for personalised and on-the-spot email handling. We'll explore the often-overlooked QuickSteps group on the Home tab, revealing the power to create and execute personalised actions for more efficient inbox management. Unlike rules that apply broadly, QuickSteps empower you to perform targeted actions on individual emails at your discretion. By the end of this lesson, you'll have the skills to create and utilise QuickSteps in Outlook, transforming how you manage your emails. Say hello to a more tailored Outlook experience that aligns with your unique workflow. Join us to make your email management more personalised and efficient.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: If you've mastered the basics of Excel and are ready for a challenge, this lesson is your ticket to understanding the powerful LAMBDA function. LAMBDA empowers you to craft custom functions within Excel, offering a game-changing ability to simplify lengthy and intricate formulas. In this lesson, we’ll explore the LAMBDA function by breaking down its components. By naming cell ranges and creating user-friendly variables, we transform complex calculations into reusable functions. Watch as we guide you through the step-by-step process of turning a conventional formula into a LAMBDA and converting it into a versatile function. Whether you're dealing with intricate financial models or complex data analyses, mastering LAMBDA opens the door to efficiency and flexibility in Excel.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Discover a unique option that adds a touch of magic to your charts. Picture a pearl chart created by stacking colourful circles representing data points. No matter what you need to create one for, the possibilities are endless. Learn how to format your chart, add custom elements like coloured circles, and add the stacking feature. With practical insights and useful tips, you'll witness how easy adjustments can turn a simple chart into an engaging visual representation.
    Note: Online r esource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; ChatGPT ; Artificial intelligence Computer programs ; Electronic spreadsheets Computer programs ; Business Computer programs ; Intelligence artificielle ; Logiciels ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson explores the effective use of ChatGPT to effortlessly create diverse datasets. Learn how to interact with ChatGPT to instruct it to generate specific datasets, whether it's a 100-row sales dataset or a customised HR dataset with specific fields. While ChatGPT can be a helpful tool, this lesson covers some of its limitations. It establishes how to overcome challenges, such as generating larger datasets, and shares practical tips for refining prompts to achieve optimal results. Learning Objectives Establish how to use ChatGPT to generate diverse practice datasets and supercharge your productivity.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (7 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This is a guide to making your data bars a precise and powerful tool for effective data communication. Explore the power of data bars for representing values more effectively. This lesson demonstrates how to use data bars efficiently, making it so much easier to interpret and communicate insights. We’ll navigate through practical examples and share essential keyboard shortcuts. We’ll look at customisation options that go beyond the default settings. Discover advanced techniques such as protecting sensitive information and fine-tuning the length of data bars based on percentage or specific numerical ranges.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 29 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Software engineering ; Computer software Development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Software development is increasingly central to a business’s identity. But as the complexity of the practice grows, the demand is high for developers who operate at a senior level. And the rise in generative AI tools means that even expert developers must recalibrate how they work to keep up with the pace of development. Join us to level up your skills and accelerate your journey to senior software engineer. These in-depth sessions cover some of the biggest challenges facing software developers today, teaching you practical methods and best practices to improve coding and software design, better manage data, mentor new engineers, and collaborate with your team.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835885567 , 183588556X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 13 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins with the basics of terminals and shells, setting the foundation for interaction with Linux at a fundamental level. It progresses to cover essential commands for navigating the filesystem and managing files, ensuring students can efficiently organize and manipulate data within the Linux environment. The journey continues through advanced topics such as process management, storage optimization, and package management across Debian and Red Hat systems, ensuring a well-rounded skill set. The course focuses on practical skills, including installing software from source, navigating text editors like vi, vim, and nano, and managing environment variables and file permissions. It emphasizes the importance of these skills in real-world scenarios, illustrating how they contribute to effective system administration and development practices. The course wraps up by exploring file systems, locating files, and utilizing other useful commands that streamline daily tasks. By the end of this course, students will have navigated through the most significant aspects of the Linux command line, equipped with the knowledge to apply these skills in a professional setting.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835889046 , 1835889042
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 57 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Computer networks Study guides Examinations ; Electronic data processing personnel Certification ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by laying a solid foundation with the installation and configuration of the BIND DNS server, moving on to the intricacies of creating forward and reverse lookup zones, which are pivotal for network navigation and management. It emphasizes the critical role DNS plays in network infrastructure, detailing troubleshooting techniques and ways to enhance mail server support through DNS configurations. It continues with securing BIND using DNSSEC, ensuring data integrity and authentication across the network. The course focuses on web server deployment and management, starting with Apache, which includes virtual server configuration, SSL encryption, and URL redirection, before transitioning to the Squid proxy server setup, user authentication, and access restrictions. It also covers Nginx for web serving and reverse proxy applications, highlighting its flexibility and efficiency. The course wraps up with an exploration of network file sharing and server management using Samba and NFS, DHCP server configuration, OpenLDAP for authentication, Postfix for SMTP services, and secure communications with OpenVPN and SSH. Additionally, it touches on firewall management with iptables, FTP server setup, and the importance of Fail2ban for security.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (6 hr., 39 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.1
    Keywords: Computer multitasking ; Fonctionnement multitâche ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Perplexed by concurrency? Don’t be. This engaging, fully-illustrated beginner’s guide gets you writing the kind of high-performance code your apps deserve. Inside, you’ll find thorough explanations of concurrency’s core concepts—all explained with interesting illustrations, insightful examples, and detailed techniques you can apply to your own projects. Grokking Concurrency is a perfectly paced introduction to the fundamentals of concurrent, parallel, and asynchronous programming. In it, you’ll learn the practices you’ll need to program multicore processors, GPUs, and other high-performance systems. Author Kirill Bobrov skips the math, jargon, and academic language and concentrates on clear, plain-English explanations.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: This lesson showcases efficient data organisation with WrapRows. It provides insights for both Microsoft 365 users and those on other Excel versions. We'll address the need to split a dataset into distinct columns with a streamlined approach and uncover how to utilise the WrapRows function, leveraging the latest Excel functions. You’ll become familiar with practical shortcuts and commands to simplify your data management process and elevate your Excel skills.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (6 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Electronic spreadsheets Computer programs ; Business Computer programs ; Tableurs ; Logiciels ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Discover the power of data validation and conditional formatting with our comprehensive lesson on creating dynamic dropdown lists in Excel. This lesson will guide you through setting up a user-friendly interface that automatically highlights corresponding rows in a table. We’ll provide step-by-step instructions on using formulas, data validation, and conditional formatting to enhance your Excel skills. Discover how to organise your data by creating a table, giving it a name for easy reference, and generating a unique list using the UNIQUE function. Don't worry if you don't have access to the UNIQUE function – we've got you covered with an alternative method.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835886007 , 1835886000
    Language: English
    Pages: 1 online resource (1 video file (34 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: UNIX Shells ; Computer networks Security measures ; Data encryption (Computer science) ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The course begins by introducing you to the fundamentals of SSH, the Secure Shell protocol that is crucial for secure remote administration and file transfers. You'll learn how to set up SSH on various operating systems, ensuring you have the foundational knowledge to build secure connections across networks. The course continues as we delve into the use of certificates with SSH, a pivotal skill for enhancing authentication processes and strengthening your network's security posture. By focusing on practical, real-world applications, this section demystifies the complexities of cryptographic keys and certificates. The course wraps up with advanced strategies for hardening SSH, providing you with the expertise to configure, manage, and troubleshoot SSH-enabled devices with an emphasis on security best practices. Through this comprehensive exploration, you'll emerge equipped to navigate the challenges of securing remote access and data communication in today's interconnected digital world.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing Ltd.
    ISBN: 9781835465462 , 1835465463
    Language: English
    Pages: 1 online resource (1 video file (12 hr., 22 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.7
    Keywords: Web site development ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Dive into the freelancing world with this course that bridges the theoretical and practical aspects of web development. This course is designed for aspiring freelancers and seasoned developers looking to expand their skill set with hands-on, project-based learning. You will embark on a journey to build a fully functional website for a surfcamp, complete with an integrated, customizable blog and sign-up forms, using NextJS and Strapi. This course stands out by focusing on real-world projects, avoiding generic examples and diving deep into the synergy of NextJS and Strapi for a flexible design and seamless developer experience. Learn how to deliver websites to clients who lack coding skills, allowing them to update content directly, rivaling the convenience of platforms like WordPress, Squarespace, and Wix with the power of a Headless CMS. From design to deployment, you will transform Figma designs into live sites, mastering the art of a seamless design-to-development workflow. With over 12 hours of content, the curriculum introduces new concepts at a comfortable pace, ensuring a comprehensive understanding of each element.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835883525 , 1835883524
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 42 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Systèmes d'exploitation (Ordinateurs) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course begins by introducing you to the basics of terminals and shells, laying a solid foundation for command line proficiency. It methodically progresses through executing commands, offering three parts to ensure a thorough grasp of command functionalities and nuances. The course focuses on enhancing your Linux skills further with detailed explanations on filesystem management, permissions, and file editing with Vi, ensuring you can navigate and manipulate the Linux environment with ease. It covers essential topics such as finding files, managing processes, and executing scripts, providing you with the tools needed to optimize and automate your Linux tasks. The course wraps up by delving into advanced programming constructs, presented in two comprehensive parts to solidify your scripting and automation capabilities. Each section is designed to build on the previous, ensuring a seamless learning curve from beginner to advanced techniques. By the end of this course, you will have learned the art of leveraging Linux for powerful, efficient computing, making you an invaluable asset in tech-driven environments.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835887660 , 183588766X
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 35 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Internet of things ; Embedded Internet devices ; Computer networks Security measures ; Tests d'intrusion ; Internet des objets ; Internet intégré ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing you to the world of IoT and its significance in today's tech-driven society, emphasizing the importance of security in this interconnected environment. It covers the spectrum of IoT targets and the necessity of robust security measures to protect them. The course focuses on practical skills, including the use of hardware components like multimeters, TTL to USB, and JTAGulators, as well as software tools such as terminal emulators, Binwalk, and QEMU. You will learn about firmware analysis, including acquisition, extraction, and emulation, alongside techniques for exploiting embedded operating systems, network services, and IoT web applications. The course wraps up by guiding you through hands-on practices for identifying hardware vulnerabilities, automating UART pin identification, and gaining device access, ensuring you have the knowledge to perform comprehensive pentests on IoT devices.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Birmingham, United Kingdom] : Packt Publishing
    ISBN: 9781835462935 , 1835462936
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 14 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Scripting languages (Computer science) ; Systèmes d'exploitation (Ordinateurs) ; Langages de script (Informatique) ; operating systems ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This course not only equips you with the skills to write more efficient and effective scripts but also introduces you to the world of graphical scripting, allowing you to create visually interactive scripts that enhance user experience. From basic text-based menus to sophisticated graphical interfaces using dialog and its widgets, the course offers a comprehensive look at elevating command-line scripts to GUI-based applications, making your scripts more accessible to a wider audience. The exploration doesn't stop there; advanced sed techniques await, revealing the potential within multi-line commands and the intricacies of command negation for complex text processing challenges. Meanwhile, the dive into advanced gawk programming unveils the art of variable management, array handling, and the implementation of structured commands, further broadening your scripting capabilities.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835885925 , 1835885926
    Language: English
    Pages: 1 online resource (1 video file (8 hr., 44 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.6
    Keywords: Artificial intelligence ; Computer programming ; Chatbots ; Application program interfaces (Computer software) ; Python (Computer program language) ; Intelligence artificielle ; Programmation (Informatique) ; Interfaces de programmation d'applications ; Python (Langage de programmation) ; artificial intelligence ; computer programming ; APIs (interfaces) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This comprehensive masterclass takes you on a transformative journey into the realm of LangChain and Large Language Models, equipping you with the skills to build autonomous AI tools. Starting with the basics, you'll set up your development environment, including OpenAI API and Python, and progress to advanced topics like LangChain's architecture, prompt templates, and parsers. The course meticulously guides you through creating complex chains, memory models, and agents, culminating in the development of practical applications such as PDF extractors, newsletter generators, and multi-document chatbots. With hands-on tutorials, you'll learn to leverage LangChain for tasks ranging from document loading and splitting to embedding vector stores for semantic similarity searches. By the end, you'll have the knowledge to implement AI in creative and impactful ways, from image-to-text conversion to building interactive chatbots and more, all while navigating the ethical considerations of AI deployment. What you will learn Configure OpenAI API and Python for AI development Create and manipulate LangChain prompt templates and parsers Implement LangChain memory models and chains for complex AI applications Develop real-world applications, including newsletter generators and chatbots Work with LangChain embeddings and vector stores for semantic searches Navigate the ethical and copyright implications of AI-generated content Audience This course is designed for a broad audience interested in artificial intelligence, from data scientists enhancing projects with AI and LangChain, to product managers boosting user experience with AI features. AI enthusiasts, tech innovators, and programmers will deepen their understanding of LangChain, unlocking new opportunities in AI-driven development and pioneering next-gen solutions. While specific knowledge of Python is not necessary, familiarity with programming concepts is essential. About the Author Paulo Dichone: Paulo Dichone, a seasoned software engineer and AWS Cloud Practitioner, is renowned for his expertise in Android, Flutter, and AWS, as well as being a best-selling instructor. Paulo has successfully imparted his knowledge to over 200,000 students across 175 countries, specializing in mobile app development for Android and iOS, web development, and AWS Cloud. His teaching philosophy centers on empowering students to excel as developers and AWS cloud practitioners, regardless of their prior experience. Beyond his professional pursuits, Paulo is devoted to his family, enjoys playing the guitar and mandolin, and loves to travel. He is committed to guiding students to achieve their highest potential in the tech industry.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781801078047 , 1801078041
    Language: English
    Pages: 1 online resource (1 video file (10 hr., 40 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.4/46
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Certification ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: The course begins by introducing the foundational concepts of working with variables and basic scripting, setting the stage for more advanced scripting techniques. It delves into the intricacies of the Linux operating system, including the X11 and Xorg configuration. As the course progresses, it covers critical administrative tasks such as managing user accounts, groups, system accounts, and scheduling tasks with cron and systemd. The importance of localizing Linux, managing system time, and configuring network time protocol (NTP) servers and clients is highlighted. The course focuses on essential system management topics, including system logging with rsyslog and journald, configuring mail transfer agents, and managing printers. Networking fundamentals are explored, from understanding TCP/IP to configuring network adapters and troubleshooting network issues. Security is a key theme, with topics on auditing permissions, managing root access with sudo, exploring networks, hardening Linux, and configuring SSH and GPG for secure communications. The course wraps up by offering insights into tunneling traffic with SSH, providing students with a comprehensive skill set for securing and managing Linux systems effectively. What you will learn Manage Linux user accounts and groups efficiently Schedule tasks using cron and systemd Configure and troubleshoot Xorg and remote X servers Secure Linux systems and manage root access Configure network settings and troubleshoot networking issues Encrypt data and communications with GPG Audience This course is ideal for aspiring and current IT professionals seeking to deepen their expertise in Linux administration. Ideal for those aiming to pass the LPIC-1 (102-500) certification exam. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Don Pezet: Don Pezet, with over 25 years in IT, brings rich experience from his time as a field engineer in finance and insurance, supporting networks globally. A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. For the last 15 years, Don has dedicated himself to IT education, co-founding ITProTV in 2012 to provide top-tier IT training. As ACI Learning's CPO, he continues to deliver innovative training to IT professionals. His credentials include Microsoft MCSE, Amazon ACSA, Cisco CCNP, LPI LPIC-2, PMI PMP, and several CompTIA certifications like A+, Network+, Security+, and Linux+. Wes Bryan: Wes Bryan embarked on his IT career path in 2009, initially as a mentored learning instructor, and later transitioning into a technical IT instructor. His exceptional teaching skills were recognized with three global teaching awards for 'Global Technical Instructor' during his early teaching years. Wes has made notable contributions as a member of the CIN (CompTIA Instructor Network) Advisory Board and the Board of Directors for CompTIA AITP (Association of Information Technology Professionals). Certifications: CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+; MCSA; MTA; MCTS; MCP; MS; MCT.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 4, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Place of publication not identified] : Packt Publishing
    ISBN: 9781835460429 , 1835460429
    Language: English
    Pages: 1 online resource (1 video file (18 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    DDC: 006.693
    Keywords: Blender (Computer file) ; Three-dimensional display systems ; Computer graphics ; Affichage tridimensionnel ; Infographie ; three-dimensional ; computer graphics ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Begin your 3D modeling journey with Blender, starting from the basics of setting up projects and creating grey boxes to organizing work with collections. Learn the intricacies of seams, sharps, and UV mapping, essential for effective texturing. The course progresses to scene optimization and asset management, followed by an exploration of materials, shaders, and advanced mesh editing techniques, including proportional editing and the use of Booleans. Dive deeper into refining skills with texturing, structural elements, and the art of adding Viking details. Transition your creations to Unreal Engine 5, where you'll set up scenes, integrate assets, and apply advanced materials for realistic environments. This course, designed for beginners ready to advance their skills, combines detailed instruction with project-based learning, preparing you for a career in 3D modeling and game development. From Blender's fundamentals to UE5's dynamic environment, unlock your creative potential and bring your digital worlds to life. What you will learn Utilize UV mapping for texture perfection Optimize 3D scenes for efficiency Craft materials and unique shaders Employ advanced mesh editing techniques Transition assets from Blender to UE5 Finalize scenes with professional lighting Audience This course is ideal for aspiring 3D artists and game developers with a keen interest in environment design. No prior experience is needed, making it perfect for beginners ready to dive into the world of 3D modeling and scene creation. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. After attending the University for Creative Arts (UCA) for a BA (Hons) Computer Games Arts degree, Neil began freelancing. In 2019, Neil Bettison founded 3D Tudor, a YouTube channel, to help other game developers because of his passion for 3D modeling. Neil is an excellent tutor known for his concise instructions and expertise in Blender, Unreal Engine 5, and Unity. His to-the-point guidance and years of experience make him a valuable resource for learning particle effects, complex asset animation, and game development.
    Note: Online resource; title from title details screen (O'Reilly, viewed February 27, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (9 hr., 48 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.3
    Keywords: Kubernetes ; Application software Development ; Open source software ; Cloud computing ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Empower your team with platforms built on top of Kubernetes using open source tools. Adopting Kubernetes is complex--especially when you're working in an organization with multiple teams, deploying to multiple cloud providers, and working with different stacks. Platform Engineering on Kubernetes shows you how to solve these common cloud native problems with open-source tools and emerging best practices from the Kubernetes community. In Platform Engineering on Kubernetes you will learn about: The principles behind platform engineering and how these apply to Kubernetes Evaluating and adopting open-source projects to build domain specific platforms Creating Platform APIs to enable teams to release more software more efficiently Reducing the cognitive load of a platform for your teams Measuring your platform initiatives using established software delivery metrics Package, version, distribute, and deploy with Helm, Tekton, Dagger and Argo CD Implement a multi-cloud infrastructure strategy using Crossplane Progressive upgrades with Knative Serving and Argo Rollouts Enable development teams with standard application-level APIs with Dapr A platform helps your team stay focused on delivering amazing software. But building a reliable platform on top of Kubernetes demands real expertise. Platform Engineering on Kubernetes reveals how to combine multiple popular open-source projects into a custom platform that works for your applications and your teams. It's the perfect guide for your organization's journey to Kubernetes, simplifying cloud native development for your dev teams and helping them deliver software faster. About the Technology Kubernetes is an amazing orchestration tool, but it's just the start of your journey to the cloud. To efficiently deliver cloud-native software, your team needs a solid build pipeline, an efficient package manager and distribution mechanism, and APIs that reduce your team's cognitive load. This book will show you how to build custom platforms on top of Kubernetes--all with open-source tools such as Dapr, Knative, Argo CD and Rollouts, and Tekton. About the Book Platform Engineering on Kubernetes starts by clearly defining the elements of a great Kubernetes-based platform. Then, it systematically introduces the tools you'll need to build a platform that exactly matches your organization's requirements. Hands-on examples and detailed code guide you through each step. By the end, you'll be able to create a complete platform to efficiently deliver cloud-native software without being tied to a specific cloud provider or vendor. What's Inside Package, version, distribute, and deploy with Helm, Tekton, Dagger and Argo CD Implement a multi-cloud infrastructure strategy using Crossplane Progressive upgrades with Knative Serving and Argo Rollouts Enable development teams with standard application-level APIs with Dapr About the Reader For developers and software architects familiar with the basics of containers and Kubernetes. About the Author Mauricio Salatino is currently a Dapr OSS Contributor, a Knative Steering Committee member, and co-lead of the Knative Functions working group. Quotes An engaging and captivating hands-on exploration of the CNCF landscape through the prism of platform engineering. - Viktor Farcic, Upbound/DevOpsToolkit The book is a reflection of a mountain of personal experience and the author's own journey on the windy paths of cloud native. - Andreas Grabner, Dynatrace Brims with Mauricio's unique experience, insights, and deep understanding. - Thomas Vitale, Systematic For anyone looking to build a modern, cloud native development platform on Kubernetes. An indispensable guide. - Lance Ball, Red Hat A comprehensive exploration of platform engineering. - Carlos Santana, AWS.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 20, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    [Shelter Island, New York] : Manning Publications
    Language: English
    Pages: 1 online resource (1 video file (7 hr., 56 min.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Cloud computing ; Observers (Control theory) ; Observabilité (Théorie de la commande) ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Cloud Observability in Action gives you the background and techniques you need to successfully introduce observability into cloud-based serverless and Kubernetes environments. In it, you’ll learn to use open standards and tools like OpenTelemetry, Prometheus, and Grafana to build your own observability system and end reliance on proprietary software. You’ll discover insights from different telemetry signals, including logs, metrics, traces, and profiles. Plus, the book’s rigorous cost-benefit analysis ensures you’re getting a real return on your observability investment.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (8 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/8
    Keywords: Microsoft PowerPoint (Computer file) ; Presentation graphics software ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: This lesson will guide you through using Morph transitions to craft a visually stunning spotlight effect, allowing you to highlight crucial elements in PowerPoint. Learn how to morph objects, text, and shapes to make your slides more dynamic and engaging. We’ll explore shaping and colouring as well as outlining and glowing effects. You’ll learn to transform static slides into a vibrant showcase, making your presentations more visually impressive.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Place of publication not identified] : Assemble You
    Language: English
    Pages: 1 online resource (1 video file (3 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.5/8
    Keywords: Microsoft PowerPoint (Computer file) ; Microsoft Forms ; Social surveys ; Presentation graphics software ; Enquêtes sociales ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: Discover the power of combining Microsoft Forms with PowerPoint to collect real-time responses from your audience and display them directly on your presentation slides. This lesson guides you through the simple process of creating engaging surveys, quizzes, and polls using Forms. Learn how to insert these forms into your PowerPoint slides effortlessly, allowing your audience to participate and vote live during your presentation. With the bonus of a QR code feature, your audience can easily access and contribute to the feedback session using their smartphones. Transform your presentations into an interactive and dynamic experience.
    Note: Online resource; title from title details screen (O’Reilly, viewed March 19, 2024)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...